OPEN EDUCATIONAL RESOURCES

UPA PERPUSTAKAAN UNEJ | NPP. 3509212D1000001

  • Home
  • Admin
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
  • General Material Designation
    See More
  • Location
  • Language
Found 211 from your keywords: subject="security"
First Page Previous 16 17 18 19 20 Next Last Page
cover
Evaluation of Fire Flow Methodologies
Comment Share
BENFER, Matthew E.SCHEFFEY, Joseph L.

This SpringerBrief offers careful assessments of the appropriateness and effectiveness of currently available methodologies for fire flow. It explains the water supply requirements for firefighting including rate of flow, the residual pressure required at that flow, and the duration that is necessary to control a major fire in a specific structure. First reviewing existing fire flow calculation…

Edition
-
ISBN/ISSN
978-1-4939-2889-7
Collation
7 b/w illustrations, 8 illustrations in colour
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
ATEX—Explosive Atmospheres: Risk Assessment, Control and Compliance
Comment Share
JESPEN, Torben

This book details how safety (i.e. the absence of unacceptable risks) is ensured in areas where potentially explosive atmospheres (ATEX) can arise. The book also offers readers essential information on how to comply with the newest (April 2016) EU legislation when the presence of ATEX cannot be avoided. By presenting general guidance on issues arising out of the EU ATEX legislation – espec…

Edition
Ed. 1
ISBN/ISSN
978-3-319-31367-2
Collation
XII, 197
Series Title
Springer Series in Reliability Engineering
Call Number
600 JES a
Availability0
Add to basket
MARC DownloadCite
cover
Environmental Security of the European Cross-Border Energy Supply Infrastructure
Comment Share
OSIPOV, M.G. Culshaw, V.I.VICTOROV, S.J. Booth, A.S.

The current volume provides examples of how environmental hazards such as landslides, earthquakes, mountain processes, cold climate processes and tidal flows and currents can affect the energy supply infrastructure. In times of uncertainty, the security of the European cross-border energy supply infrastructure, such as pipelines, has great importance. Whilst the potential effects of political d…

Edition
-
ISBN/ISSN
978-94-017-9538-8
Collation
24 b/w illustrations, 74 illustrations in colour
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Ag…
Comment Share
ARTHUR, WillCHALLENER, DavidGOLDMAN, Kenneth

A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp t…

Edition
Ed. 1
ISBN/ISSN
978-1-4302-6584-9
Collation
-
Series Title
-
Call Number
001.54 ART p
Availability0
Add to basket
MARC DownloadCite
cover
Enterprise Cybersecurity How to Build a Successful Cyberdefense Program Agai…
Comment Share
DONALDSON, Scott E.SIEGEL, Stanley G.WILLIAMS, Chris K.ASLAM, Abdul

Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, design, implement, and operate a coherent cybersecurity pro…

Edition
-
ISBN/ISSN
978-1-4302-6083-7
Collation
223 b/w illustrations
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Enhancing Synergies in a Collaborative Environment
Comment Share
CORTES, PabloGONZALEZ, Elvira MaesoSANTANA, Alejandro Escudero

This volume contains a selection of the best papers presented at the 8th International Conference on Industrial Engineering and Industrial Management, XX International Conference on Industrial Engineering and Operations Management, and International IIE Conference 2014, hosted by ADINGOR, ABEPRO and the IIE, whose mission is to promote links between researchers and practitioners from different…

Edition
-
ISBN/ISSN
978-3-319-14078-0
Collation
71 b/w illustrations
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Through-life Engineering Services
Comment Share
REDDING, LouisROY, Rajkumar

Demonstrating the latest research and analysis in the area of through-life engineering services (TES), this book utilizes case studies and expert analysis from an international array of practitioners and researchers – who together represent multiple manufacturing sectors: aerospace, railway and automotive – to maximize reader insights into the field of through-life engineering services. …

Edition
-
ISBN/ISSN
978-3-319-12111-6
Collation
162 b/w illustrations
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Theory of Cryptography
Comment Share
DODIS, YevgeniyNIELSEN, Jesper Buus

The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015. The 52 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on foundations, symmetric key, multiparty computation, concu…

Edition
-
ISBN/ISSN
978-3-662-46494-6
Collation
89 b/w illustrations
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Nanotechnology in the Security Systems
Comment Share
SERGEI KRUCHININJanez Bonča

The topics discussed at the NATO Advanced Research Workshop “Nanotechnology in the Security Systems" included nanophysics, nanotechnology, nanomaterials, sensors, biosensors security systems, explosive detection. There have been many significant advances in the past two years and some entirely new directions of research are just opening up. Recent advances in nano science have demonstrated th…

Edition
1
ISBN/ISSN
978-94-017-9004-8
Collation
XVII, 286
Series Title
NATO Science for Peace and Security Series C: Environmental Security
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Network and System Security
Comment Share
QIU, MeikangXU, ShouhuaiYUNG, MotiZHANG, Haibo

This book constitutes the proceedings of the 9th International Conference on Network and System Security, NSS 2015, held in New York City, NY, USA, in November 2015. The 23 full papers and 18 short papers presented were carefully reviewed and selected from 110 submissions. The papers are organized in topical sections on wireless security and privacy; smartphone security; systems security; appl…

Edition
1
ISBN/ISSN
978-3-319-25644-3
Collation
XIV, 542
Series Title
Lecture Notes in Computer Science
Call Number
-
Availability0
Add to basket
MARC DownloadCite
First Page Previous 16 17 18 19 20 Next Last Page
OPEN EDUCATIONAL RESOURCES

Search

start it by typing one or more keywords for title, author or subject


Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?