OPEN EDUCATIONAL RESOURCES

UPA PERPUSTAKAAN UNEJ | NPP. 3509212D1000001

  • Home
  • Admin
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
  • General Material Designation
    See More
  • Location
  • Language
Found 481 from your keywords: subject="DATA"
First Page Previous 21 22 23 24 25 Next Last Page
cover
Digital Holography and Wavefront Sensing Principles, Techniques and Applications
Comment Share
Ulf SchnarsClaas FalldorfJohn WatsonWerner Jüptner

This highly practical and self-contained guidebook explains the principles and major applications of digital hologram recording and numerical reconstruction (Digital Holography).

Edition
2
ISBN/ISSN
9783662446928
Collation
XI, 226
Series Title
-
Call Number
774
Availability0
Add to basket
MARC DownloadCite
cover
Age and Work Advances in Theory, Methods, and Practice
Comment Share
CORT W, RudolphHANNES, Zacher

"Research on age(ing) and work often draws upon lifespan development perspectives to explain how adults “age successfully,” managing developmental gains and losses and maintaining well-being and functioning over time. There are a multitude of similar theories to consider to this end, which is both a blessing and a curse for researchers. In this chapter, we introduce a conceptual integration…

Edition
-
ISBN/ISSN
9781003089674
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Principles of Security and Trust; 4th International Conference, POST 2015, He…
Comment Share
Focardi, RiccardoMyers, Andrew

Volume ini berisi makalah-makalah yang dipresentasikan pada POST 2015: Konferensi ke-4 tentang Prinsip-prinsip Keamanan dan Kepercayaan, yang diadakan selama 16-17 April 2015 di London, Inggris. Prinsip Keamanan dan Kepercayaan adalah forum luas yang terkait dengan aspek teoretis dan mendasar dari keamanan dan kepercayaan. Makalah dari berbagai jenis diterima: hasil teoretis baru, aplikasi prak…

Edition
9036
ISBN/ISSN
978-3-662-46666-7
Collation
-
Series Title
Catatan Kuliah dalam Ilmu Komputer
Call Number
005.8 FOC p
Availability0
Add to basket
MARC DownloadCite
cover
Information and Communications Security 16th International Conference, ICICS…
Comment Share
HUI,Lucas C. K.QING,S. H.SHI, ElaineYIU, S. M.

This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information and Communications Security, ICISC 2014, held in Hong Kong, China, in December 2014. The 22 revised full papers including two invited talks presented were carefully selected from 90 submissions. The papers provide the latest results in research, development and applicati…

Edition
-
ISBN/ISSN
978-3-319-21965-3
Collation
X, 321
Series Title
-
Call Number
004 INF
Availability0
Add to basket
MARC DownloadCite
cover
Information and Communication Technology Third IFIP TC 5/8 International Con…
Comment Share
KHALIL,IsmailNEUHOLD,ErichTJOA,A MinXU,Li DaYOU, Ilsun

This book constitutes the refereed proceedings of the Third IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-EurAsia 2015, with the collocation of AsiaARES 2015 as a special track on Availability, Reliability and Security, and the 9th IFIP WG 8.9 Working Conference on Research and Practical Issues of Enterprise Information Systems, CONFENIS 2015, held as par…

Edition
-
ISBN/ISSN
978-3-319-24314-6
Collation
XIV, 354
Series Title
-
Call Number
004 INF
Availability0
Add to basket
MARC DownloadCite
cover
Safe to be open - study on the protection of research data and recommendation…
Comment Share
LUCIE, GuibaultANDREAS, Wiebe

This study addresses the most important legal issues when implementing an open access e-infrastructure for research data. It examines the legal requirements for different kinds of usage of research data in an open access infrastructure, such as OpenAIREplus, which links them to publications. The existing legal framework regarding potentially relevant intellectual property (IP) rights is analyse…

Edition
-
ISBN/ISSN
-
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Environmental Software Systems. Infrastructures, Services and Applications 1…
Comment Share
DENZER, RalfARGENT, Robert M.SCHIMAK, GeraldHREBICEK, Jiří

This book constitutes the refereed proceedings of the 11th IFIP WG 5.11 International Symposium on Environmental Software Systems, ISESS 2015, held in Melbourne, Australia, in March 2015. The 62 revised full papers presented were carefully reviewed and selected from 104 submissions. The papers are organized in the following topical sections: information systems, information modeling and semanti…

Edition
-
ISBN/ISSN
978-3-319-15994-2
Collation
206 illustrations in colour
Series Title
Springer Texts in Business and Economics
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Trustworthy Computing and Services International Conference, ISCTCS 2014, Be…
Comment Share
YUEMING, LuWU, XUZANG, XI

This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Computing and Services, ISCTCS 2014, held in Beijing, China, in November 2014. The 51 revised full papers presented were carefully reviewed and selected from 279 submissions. The topics covered are architecture for trusted computing systems; trusted computing platform; trusted system building;…

Edition
-
ISBN/ISSN
978-3-662-47401-3
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Trusted Systems 6th International Conference, INTRUST 2014, Beijing, China, …
Comment Share
YUNG, MotiZHU, LiehuangYANG, Yanjiang

Normal 0 false false false EN-US X-NONE X-NONE This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Trusted Systems, INTRUST 2014, held in Beijing, China, in December 2014. The conference brings together academic and industrial researchers, designers, and implementers with end-users of trusted systems, in order to foster the exchan…

Edition
-
ISBN/ISSN
978-3-319-27998-5
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Trusted Computing for Embedded Systems
Comment Share
CANDAELE, BernardANAGNOSTOPOULOS, IraklisSOUDRIS, Dimitrios

This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. …

Edition
-
ISBN/ISSN
978-3-319-09420-5
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
First Page Previous 21 22 23 24 25 Next Last Page
OPEN EDUCATIONAL RESOURCES

Search

start it by typing one or more keywords for title, author or subject


Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?