Browse Items (3867 total)

8. Sea_Surface_Temperature_From_Observation_to_Applications.jpg
Sea surface temperature (SST) has been defined byWorld Meteorological Organization
(WMO) as one of the essential climate variables (ECVs) contributing to the characterization
of Earth’s climate. As one of the ECVs, SST study and analysis have been…

18. Sea_River_Lake_Ice_Properties_and_Their_Applications_in_Practices.jpg
This reprint covers topics on geographical scale of glacier and lake ice variations, as well as the engineering scale of ice properties and their practical applications via laboratory tests and numerical modeling.

Seafood_Sustainability__Series_I.jpg
This special edition, Seafood Sustainability Series I, includes two articles on seafood consumption, four on sustainable capture fisheries, and four on sustainable aquaculture. The articles on consumption explore an alternative perspective on…

Seamanship-Techniques.jpg
Seamanship Techniques, since its first publication in 1987, has now evolved to this fifth edition and is available in all the maritime nations of the world. The text, being changed considerably over the years, meets increased technology and safety…

Secondary Analysis of Electronic Health Records.jpg
Health Informatics; Ethics; Data Mining and Knowledge Discovery; Statistics for Life Sciences, Medicine, Health Sciences

9781498741996.jpg
Any organization with valuable data has been or will be attacked, probably successfully, at some point and with some damage. And, don't all digitally connected organizations have at least some data that can be considered "valuable"?

Cyber security…

978-3-031-09357-9.jpg
This open access book constitutes the thoroughly refereed proceedings of the Second International Symposium on Computer and Information Sciences, EuroCybersec 2021, held in Nice, France, in October 2021.
The 9 papers presented together with 1…

buku 4.jpg
In recent years, the rising complexity of Internet of Things (IoT) systems has increased their potential vulnerabilities and introduced new cybersecurity challenges. In this context, state of the art methods and technologies for security risk…

9780472903054.pdf.jpg
Historically, national borders have evolved in ways that serve the interests of central states in security and the regulation of trade. This volume explores Canada–US border and security policies that have evolved from successive trade agreements…
Output Formats

atom, csv, dcmes-xml, json, omeka-xml, rss2