Browse Items (3867 total)

self-learning.jpg
Configuring an anomaly-based Network Intrusion Detection System for cybersecurity of an industrial system in the absence of information on networking infrastructure and programmed deterministic industrial process is challenging. Within the research…

9781509945085.pdf.jpg
This open access book brings conceptual clarity to the study and practice of self-determination, showing that it is, without doubt, one of the most important concepts of the international legal order. It argues that the accepted categorisation of…

Self as Method.jpg
Despite China’s rise to the status of global power, many Chinese youths are anxious about their personal future, in large measure because the rapid changes have left them feeling adrift. This book, available in open access, provides a manifesto of…

Selenium and Human Health.jpg
Selenium is a powerful trace element and antioxidant with multiple effects on metabolism and human health. Available as a dietary supplement for many years, it is one of the most popular over-the-counter alternative medicines available. Written by…

26. Cover Selected Topics in ....jpg
Plastic Surgery is a fast evolving surgical specialty. Although best known for cosmetic procedures, plastic surgery also involves reconstructive and aesthetic procedures, which very often overlap, aiming to restore functionality and normal appearance…

cover.jpg
This book addresses a variety of critical themes that relate to child and adolescent mental health and working memory. It focuses on various theoretical perspectives as well as highlighting implications for practice. The topics contemplated include…

9780472904037.pdf.jpg
South Korea is sometimes held as a dream case of modernization theory, a testament to how economic development leads to democracy. Seeds of Mobilization takes a closer look at the history of South Korea to show that Korea’s advance to democracy was…

9780472903054.pdf.jpg
Historically, national borders have evolved in ways that serve the interests of central states in security and the regulation of trade. This volume explores Canada–US border and security policies that have evolved from successive trade agreements…

buku 4.jpg
In recent years, the rising complexity of Internet of Things (IoT) systems has increased their potential vulnerabilities and introduced new cybersecurity challenges. In this context, state of the art methods and technologies for security risk…
Output Formats

atom, csv, dcmes-xml, json, omeka-xml, rss2