OPEN EDUCATIONAL RESOURCES

UPA PERPUSTAKAAN UNEJ | NPP. 3509212D1000001

  • Home
  • Admin
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
  • General Material Designation
    See More
  • Location
  • Language
Found 32 from your keywords: subject="COD"
First Page Previous 1 2 3 4 Next Last Page
cover
Voicing Code in STEM: A Dialogical Imagination
Comment Share
Sengupta, PratimDickes, AmandaFarris, Amy Voss

An exploration of coding that investigates the interplay between computational abstractions and the fundamentally interpretive nature of human experience. The importance of coding in K–12 classrooms has been taken up by both scholars and educators. Voicing Code in STEM offers a new way to think about coding in the classroom—one that goes beyond device-level engagement to consider the int…

Edition
-
ISBN/ISSN
9780262363075
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Why Cryptography Should Not Rely on Physical Attack Complexity
Comment Share
KRAMER, Juliane

This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successf…

Edition
-
ISBN/ISSN
978-981-287-787-1
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Nature-made economy :cod, capital, and the great economization of the ocean
Comment Share
Asdal, Kristin,Huse, Tone,

"Examines the relationship between nature and economy by telling two closely connected stories: that of the ocean and its transformation into a regulated, assetized space; and that of the Atlantic cod"--OCLC-licensed vendor bibliographic record.

Edition
-
ISBN/ISSN
9780262374422
Collation
1 online resource.
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Critical code studies :initial methods
Comment Share
Marino, Mark C.,

"Critical Code Studies (CCS) names a set of methodologies for the exploration of computer source code using the hermeneutics of the humanities. Like 10 PRINT CHR$ (205.5 + RND (1)); : GOTO 10, Mark Marino's Critical Code Studies treats code not as merely functional but as a text, one that can be read, and misinterpreted, by non-programmers. As the author notes, code's "meaning is not determined…

Edition
-
ISBN/ISSN
9780262357425
Collation
1 online resource.
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Visual Cryptography for Image Processing and Security Theory, Methods, and A…
Comment Share
LIU, FengYAN, Wei Qi

This book addresses the fundamental concepts in the theory and practice of visual cryptography. The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Original, cutting-edge research is presented on probabilistic, size invariant, threshold, concolorous, and cheating immune VCS. This updated second edition has also been expanded with ne…

Edition
-
ISBN/ISSN
978-3-319-23473-1
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Nature-Made Economy: Cod, Capital, and the Great Economization of the Ocean
Comment Share
ASDAL, KristinHUSE, Tone

An exploration of the economization of the ocean through the small modifications that enable great transformations of nature. The ocean is the site of an ongoing transformation that is aimed at creating new economic opportunities and prosperity. In Nature-Made Economy, Kristin Asdal and Tone Huse explore how the ocean has been harnessed to become a space of capital investment and innovation,…

Edition
-
ISBN/ISSN
9780262374422
Collation
-
Series Title
-
Call Number
597.6
Availability0
Add to basket
MARC DownloadCite
cover
RNA, the Epicenter of Genetic Information
Comment Share
JOHN, MattickPAULO, Amaral

The origin story and emergence of molecular biology is muddled. The early triumphs in bacterial genetics and the complexity of animal and plant genomes complicate an intricate history. This book documents the many advances, as well as the prejudices and founder fallacies. It highlights the premature relegation of RNA to simply an intermediate between gene and protein, the underestimation of the…

Edition
-
ISBN/ISSN
9781000623086
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Ubiquitous Computing Application and Wireless Sensor UCAWSN-14
Comment Share
PARK, James J. (Jong Hyuk)PAN, YiCHAO, Han-Chieh

IT changes everyday’s life, especially in education and medicine. The goal of ITME 2014 is to further explore the theoretical and practical issues of Ubiquitous Computing Application and Wireless Sensor Network. It also aims to foster new ideas and collaboration between researchers and practitioners. The organizing committee is soliciting unpublished papers for the main conference and its spe…

Edition
-
ISBN/ISSN
978-94-017-9618-7
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Cryptology and network security
Comment Share
International Conference on Cryptology and Network Security

This book constitutes the refereed proceedings of the 14th International Conference on Cryptology and Network Security, CANS 2015, held in Marrakesh, Morocco, in December 2015. The 12 full papers presented together with 6 short papers were carefully reviewed and selected from numerous submissions. The papers cover topics of interest such as internet of things and privacy; password-based authent…

Edition
-
ISBN/ISSN
9783319268231
Collation
x, 257 pages
Series Title
-
Call Number
003.54
Availability0
Add to basket
MARC DownloadCite
cover
Transactions on Data Hiding and Multimedia Security X
Comment Share
SHI, Yun Q.

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development …

Edition
-
ISBN/ISSN
978-3-662-46739-8
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 Next Last Page
OPEN EDUCATIONAL RESOURCES

Search

start it by typing one or more keywords for title, author or subject


Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?