ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Books  (35)
  • LC QA3  (13)
  • Environment  (12)
  • Data encryption (Computer science)  (6)
  • Business  (4)
  • English  (35)
  • German
  • Polish
  • Swedish
  • 2020-2024
  • 2010-2014  (22)
  • 2005-2009
  • 1985-1989  (11)
  • 1950-1954  (2)
  • 1945-1949
  • 1940-1944
  • 2014  (22)
  • 1988  (9)
  • 1987  (2)
  • 1953  (2)
  • 1948
  • 1941
Collection
  • Books  (35)
Source
Keywords
Language
  • English  (35)
  • German
  • Polish
  • Swedish
Years
  • 2020-2024
  • 2010-2014  (22)
  • 2005-2009
  • 1985-1989  (11)
  • 1950-1954  (2)
  • +
Year
  • 1
    Keywords: Environment ; Renewable energy resources ; Energy policy ; Energy and state ; Energy efficiency ; Climate change ; Renewable energy sources ; Alternate energy sources ; Green energy industries ; Environmental engineering ; Biotechnology ; Sustainable development ; Environment ; Sustainable Development ; Energy Policy, Economics and Management ; Energy Efficiency (incl. Buildings) ; Climate Change Management and Policy ; Renewable and Green Energy ; Environmental Engineering/Biotechnology
    Description / Table of Contents: 1 “Diffusive Demand” and “Creative Demand” --- 2 The 21st Century Paradigm and the Role of Information Technology --- 3 “Vision 2050” as the Rescue of a “Limited Earth” --- 4 Finding a Way Out Through Creative Demand, I --- 5 Finding a Way Out Through Creative Demand, II --- 6 Toward the Realization of a “Platinum Society”
    Pages: Online-Ressource (XXIX, 103 pages) , 30 illustrations, 29 illustrations in color
    ISBN: 9784431545590
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 2
    Keywords: Environment ; Regional planning ; Urban planning ; Applied ecology ; Wildlife ; Fish ; Climate change ; Nature conservation ; Environment ; Climate Change ; Nature Conservation ; Fish & Wildlife Biology & Management ; Landscape/Regional and Urban Planning ; Applied Ecology
    Description / Table of Contents: Preface --- Acknowledgements --- Chapter 1 – Natural Heritage at Risk by Climate Change --- Chapter 2 – Climate Change in Central and Eastern Europe --- Chapter 3 – Effects of Climate Change on the Hydrological Cycle in Central and Eastern Europe --- Chapter 4 – Potential impacts of climate change on protected habitats --- Chapter 5 – Climate Change impact modelling cascade - Benefits and limitations for --- Chapter 6 – Indicators for Monitoring Climate Change-Induced Effects on Habitats – a --- Chapter 7 – Remote Sensing-based Monitoring of Potential Climate-induced Impacts on Habitats --- Chapter 8 – Assessment of Climate-induced Impacts on Habitats --- Chapter 9 – Legal Aspects of Climate Change Adaptation --- Chapter 10 – A Methodical Framework for Climate Change-Adapted Management in Protected Areas --- Chapter 11 – Monitoring concept of climate-induced impacts on peat bog vegetation in Pokljuka plateau in Triglav National Park, Slovenia --- Chapter 12 – Concept for the monitoring of climate induced impacts on rock ptarmigan (Lagopus muta) in Triglav National Park, Slovenia --- Chapter 13 – Suggested management measures for Natura 2000 Habitats in Körös-Maros National Park, Hungary --- Chapter 14 – Climate-induced challenges for wetlands: revealing the background for the adaptive ecosystem management in the Biebrza Valley, Poland --- Chapter 15 – Habitat changes caused by sea level rise, driven by climate change in the Northern Adriatic coastal wetlands, Slovenia --- Chapter 16 – Potential impacts of climate change on forest habitats in the Biosphere Reserve Vessertal-Thuringian Forest in Germany --- Chapter 17 – Potential Impact of Climate Change on Alpine Habitats from Bucegi Natural Park, Romania --- Chapter 18 – Potential Impacts of Climate Change on Habitats and their Effects on Invasive Plant Species in Danube Delta Biosphere Reserve, Romania --- Chapter 19 - Reproduction biology of an alien invasive plant: a case of drought-tolerant Aster squamatus on the Northern Adriatic seacoast, Slovenia --- Chapter 20 – Conclusions and Recommendations for Adapting Conservation Management in the Face of Climate Change --- Index
    Pages: Online-Ressource (XXV, 308 pages) , 77 illustrations, 33 illustrations in color
    ISBN: 9789400779600
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 3
    Unknown
    Berlin, Heidelberg : Springer
    Keywords: Business ; Library science ; Management science ; Literacy ; Business and Management ; Business and Management, general ; Library Science ; Literacy
    Description / Table of Contents: Part I Information Profession and Information Literacy --- Chapter 1 Career and Professional Opportunities and Challenges for Librarians and Other Information Professionals Specializing in Information Literacy and Lifelong Learning --- Chapter 2 So What’s the Big Deal With Information Literacy in the United States? --- Chapter 3 A Group Discussion on Information Literacy --- Part II Trends of Library and Information Sciences Education --- Chapter 4 iSchools & the iSchool at Syracuse University --- Part III Information Seeking and Retrieval --- Chapter 5 Visual Data Mining in a Q&A based Social Media Website --- Chapter 6 Information Seeking Behaviour and Usage on a Multi-media Platform: Case Study Europeana --- Chapter 7 Exploratory Search: a Critical Analysis of the Theoretical Foundations, Systems Features, and Research Trends --- Part IV Informatics --- Chapter 8 Scientific Datasets: Informetric Characteristics and Social Utility Metrics for Biodiversity Data Sources --- Chapter 9 Knowledge Discovery of Complex Networks Research Literature --- Chapter 10 Bibliometrics and University Research Rankings Demystified for Librarians --- Part V Development of World Libraries --- Chapter 11 The Development of East Asian Libraries in North America
    Pages: Online-Ressource (XIV, 177 pages) , 49 illustrations, 30 illustrations in color
    ISBN: 9783642548123
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 4
    Keywords: Production management ; Trade ; Business ; Commerce ; International economics ; Economics ; International Economics ; Operations Management ; Trade
    Description / Table of Contents: Chapter 1: Preliminaries: concepts, trends and frameworks --- Chapter 2: The participation of Latin America in international supply chains --- Chapter 3: Drivers of global value chain participation: cross-country analyses --- Chapter 4: What does it take to be part of an international value chain: firm-level evidence --- Chapter 5: Conclusions
    Pages: Online-Ressource (XIV, 141 pages) , 39 illustrations in color
    ISBN: 9783319099910
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 5
    Keywords: Environment ; Agriculture ; Ecosystems ; Sustainable development ; Sociology ; Human geography ; Sex (Psychology) ; Gender expression ; Gender identity ; Environment ; Sustainable Development ; Agriculture ; Gender Studies ; Ecosystems ; Human Geography
    Description / Table of Contents: PART I: Ester Boserup’s Intellectual Heritage --- 1. Ester Boserup: An Interdisciplinary Visionary Relevant for Sustainability --- 2. “Finding Out Is My Life”: Conversations with Ester Boserup in the 1990s --- 3. Boserup’s Theory on Technological Change as a Point of Departure for the Theory of Sociometabolic Regime Transition --- PART II Land Use, Technology and Agriculture --- 4. The Dwindling Role of Population Pressure in Land Use Change – a Case from the South West Pacific --- 5. Conceptual and Empirical Approaches to Mapping and Quantifying Land-Use Intensity --- 6. Malthusian Assumptions, Boserupian Response in Transition to Agriculture Models --- 7. Reconciling Boserup with Malthus: Agrarian Change and Soil Degradation in Olive Orchards in Spain (1750-2000) --- 8. Beyond Boserup: The Role of Working Time in Agricultural Development --- PART III: Population and Gender --- 9. Following Boserup’s Traces: From Invisibility to Informalisation of Women’s Economy to Engendering Development in Translocal Spaces --- 10. Daughters of the Hills: Gendered Agricultural Production, Modernisation, and Declining Child Sex Ratios in the Indian Central Himalayas --- 11. Revisiting Boserup’s Hypotheses in the Context of Africa --- 12. An Interpretation of Large-Scale Land Deals Using Boserup’s Theories of Agricultural Intensification, Gender and Rural Development --- 13. Labour Migration and Gendered Agricultural Asset Shifts in Southeastern Mexico: Two Stories of Farming Wives and Daughters --- 14. Working Time of Farm Women and Small-Scale Sustainable Farming in Austria --- 15. A Human Ecological Approach to Ester Boserup: Steps Towards Engendering Agriculture and Rural Development --- 16. Conclusions: Re-Evaluating Boserup in the Light of the Contributions to this Volume
    Pages: Online-Ressource (XXV, 267 pages) , 44 illustrations, 22 illustrations in color
    ISBN: 9789401786782
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 6
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Computer security ; Data encryption (Computer science) ; Computer Science ; Systems and Data Security ; Data Encryption
    Description / Table of Contents: For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges. This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT). Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud. OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud. A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations. "A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!" —Vince Lubsey, Vice President, Product Development, Virtustream Inc. " Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles." —John Skinner, Vice President, HyTrust Inc. "Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation
    Pages: Online-Ressource (XXVI, 244 pages) , 95 illustrations
    ISBN: 9781430261469
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 7
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Data Encryption ; Information Systems and Communication Service
    Description / Table of Contents: The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. Security is a constantly growing concern that everyone must deal with. Whether it’s an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face
    Pages: Online-Ressource (XXIV, 392 pages) , 303 illustrations
    ISBN: 9781430263838
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 8
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Software engineering ; Data encryption (Computer science) ; Computer Science ; Data Encryption ; Software Engineering/Programming and Operating Systems
    Description / Table of Contents: Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applications’ secrets and users’ privacy in a secure, light-weight, and inexpensive way. Besides native built-in features, it allows third-party software vendors to develop applications that take advantage of the security infrastructures offered by the engine. Intel’s security and management engine is technologically unique and significant, but is largely unknown to many members of the tech communities who could potentially benefit from it. Platform Embedded Security Technology Revealed reveals technical details of the engine. The engine provides a new way for the computer security industry to resolve critical problems resulting from booming mobile technologies, such as increasing threats against confidentiality and privacy. This book describes how this advanced level of protection is made possible by the engine, how it can improve users’ security experience, and how third-party vendors can make use of it. It's written for computer security professionals and researchers; embedded system engineers; and software engineers and vendors who are interested in developing new security applications on top of Intel’s security and management engine. It’s also written for advanced users who are interested in understanding how the security features of Intel’s platforms work
    Pages: Online-Ressource (XX, 272 pages) , 74 illustrations
    ISBN: 9781430265726
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 9
    Keywords: Computer science ; Software engineering ; Data encryption (Computer science) ; Computer Science ; Software Engineering/Programming and Operating Systems ; Data Encryption
    Description / Table of Contents: It's our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy as an integral part of the product life cycle are on the right track. --The authors of The Privacy Engineer's Manifesto The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industry-proven solutions that go beyond mere theory and adding lucid perspectives on the challenges and opportunities raised with the emerging "personal" information economy. The authors, a uniquely skilled team of longtime industry experts, detail how you can build privacy into products, processes, applications, and systems. The book offers insight on translating the guiding light of OECD Privacy Guidelines, the Fair Information Practice Principles (FIPPs), Generally Accepted Privacy Principles (GAPP) and Privacy by Design (PbD) into concrete concepts that organizations, software/hardware engineers, and system administrators/owners can understand and apply throughout the product or process life cycle—regardless of development methodology—from inception to retirement, including data deletion and destruction. In addition to providing practical methods to applying privacy engineering methodologies, the authors detail how to prepare and organize an enterprise or organization to support and manage products, process, systems, and applications that require personal information. The authors also address how to think about and assign value to the personal information assets being protected. Finally, the team of experts offers thoughts about the information revolution that has only just begun, and how we can live in a world of sensors and trillions of data points without losing our ethics or value(s)...and even have a little fun. The Privacy Engineer's Manifesto is designed to serve multiple stakeholders: Anyone who is involved in designing, developing, deploying and reviewing products, processes, applications, and systems that process personal information, including software/hardware engineers, technical program and product managers, support and sales engineers, system integrators, IT professionals, lawyers, and information privacy and security professionals. This book is a must-read for all practitioners in the personal information economy. Privacy will be an integral part of the next wave in the technology revolution; innovators who emphasize privacy as an integral part of the product life cycle are on the right track. Foreword by Dr. Eric Bonabeau, PhD, Chairman, Icosystem, Inc. & Dean of Computational Sciences, Minerva Schools at KGI
    Pages: Online-Ressource (XXXVI, 400 pages) , 104 illustrations
    ISBN: 9781430263562
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 10
    Keywords: Environment ; Agriculture ; Ecosystems ; Sustainable development ; Sociology ; Human geography ; Sex (Psychology) ; Gender expression ; Gender identity ; Environment ; Sustainable Development ; Agriculture ; Gender Studies ; Ecosystems ; Human Geography
    Description / Table of Contents: PART I: Ester Boserup’s Intellectual Heritage --- 1. Ester Boserup: An Interdisciplinary Visionary Relevant for Sustainability --- 2. “Finding Out Is My Life”: Conversations with Ester Boserup in the 1990s --- 3. Boserup’s Theory on Technological Change as a Point of Departure for the Theory of Sociometabolic Regime Transition --- PART II Land Use, Technology and Agriculture --- 4. The Dwindling Role of Population Pressure in Land Use Change – a Case from the South West Pacific --- 5. Conceptual and Empirical Approaches to Mapping and Quantifying Land-Use Intensity --- 6. Malthusian Assumptions, Boserupian Response in Transition to Agriculture Models --- 7. Reconciling Boserup with Malthus: Agrarian Change and Soil Degradation in Olive Orchards in Spain (1750-2000) --- 8. Beyond Boserup: The Role of Working Time in Agricultural Development --- PART III: Population and Gender --- 9. Following Boserup’s Traces: From Invisibility to Informalisation of Women’s Economy to Engendering Development in Translocal Spaces --- 10. Daughters of the Hills: Gendered Agricultural Production, Modernisation, and Declining Child Sex Ratios in the Indian Central Himalayas --- 11. Revisiting Boserup’s Hypotheses in the Context of Africa --- 12. An Interpretation of Large-Scale Land Deals Using Boserup’s Theories of Agricultural Intensification, Gender and Rural Development --- 13. Labour Migration and Gendered Agricultural Asset Shifts in Southeastern Mexico: Two Stories of Farming Wives and Daughters --- 14. Working Time of Farm Women and Small-Scale Sustainable Farming in Austria --- 15. A Human Ecological Approach to Ester Boserup: Steps Towards Engendering Agriculture and Rural Development --- 16. Conclusions: Re-Evaluating Boserup in the Light of the Contributions to this Volume
    Pages: Online-Ressource (XXV, 267 pages) , 44 illustrations, 22 illustrations in color
    ISBN: 9789401786782
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 11
    Keywords: Production management ; Trade ; Business ; Commerce ; International economics ; Economics ; International Economics ; Operations Management ; Trade
    Description / Table of Contents: Chapter 1: Preliminaries: concepts, trends and frameworks --- Chapter 2: The participation of Latin America in international supply chains --- Chapter 3: Drivers of global value chain participation: cross-country analyses --- Chapter 4: What does it take to be part of an international value chain: firm-level evidence --- Chapter 5: Conclusions
    Pages: Online-Ressource (XIV, 141 pages) , 39 illustrations in color
    ISBN: 9783319099910
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 12
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Data Encryption ; Information Systems and Communication Service
    Description / Table of Contents: The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. Security is a constantly growing concern that everyone must deal with. Whether it’s an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face
    Pages: Online-Ressource (XXIV, 392 pages) , 303 illustrations
    ISBN: 9781430263838
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 13
    Keywords: Environment ; Renewable energy resources ; Energy policy ; Energy and state ; Energy efficiency ; Climate change ; Renewable energy sources ; Alternate energy sources ; Green energy industries ; Environmental engineering ; Biotechnology ; Sustainable development ; Environment ; Sustainable Development ; Energy Policy, Economics and Management ; Energy Efficiency (incl. Buildings) ; Climate Change Management and Policy ; Renewable and Green Energy ; Environmental Engineering/Biotechnology
    Description / Table of Contents: 1 “Diffusive Demand” and “Creative Demand” --- 2 The 21st Century Paradigm and the Role of Information Technology --- 3 “Vision 2050” as the Rescue of a “Limited Earth” --- 4 Finding a Way Out Through Creative Demand, I --- 5 Finding a Way Out Through Creative Demand, II --- 6 Toward the Realization of a “Platinum Society”
    Pages: Online-Ressource (XXIX, 103 pages) , 30 illustrations, 29 illustrations in color
    ISBN: 9784431545590
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 14
    Keywords: Environment ; Environmental management ; Ecotoxicology ; Waste management ; Environment ; Ecotoxicology ; Environmental Management ; Waste Management/Waste Technology
    Description / Table of Contents: Preface --- Foreword by Keith Solomon and John Giesy --- Foreword by Coordinating Board of Editors --- Ecological Risk Assessment for Chlorpyrifos in Terrestrial and Aquatic Systems in The United States – Overview and Conclusions --- Properties and Uses of Chlorpyrifos in the United States --- Fate in the Environment and Long-Range Atmospheric Transport of the Organophosphorus Insecticide, Chlorpyrifos and its Oxon in the United States --- Exposures of Aquatic Organisms to the Organophosphorus Insecticide, Chlorpyrifos Resulting from Use in the United States --- Risks to Aquatic Organisms from Use of Chlorpyrifos in the United States --- Refined Avian Risk Assessment for Chlorpyrifos in the United States --- Risk to Pollinators from the Use of Chlorpyrifos in the United States --- Index
    Pages: Online-Ressource (XVI, 269 pages) , 40 illustrations
    ISBN: 9783319038650
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 15
    Keywords: Environment ; Nuclear energy ; Nuclear chemistry ; Radiation protection ; Radiation ; Safety measures ; Environmental health ; Water pollution ; Environment ; Effects of Radiation/Radiation Protection ; Environmental Health ; Nuclear Energy ; Waste Water Technology / Water Pollution Control / Water Management / Aquatic Pollution ; Nuclear Chemistry
    Description / Table of Contents: Part 1 Introduction --- 1 Outline of the Environmental Monitoring of TEPCO's Fukushima Daiichi Nuclear Power Plant Accident (Tomoyuki TAKAHASHI) --- 2 Outline of the Radiation Dose Estimation of Residents After the Fukushima Daiichi Nuclear Power Plant Accident (Sentaro TAKAHASHI) --- Part 2 Overview --- 3 Accident of Fukushima Daiichi Nuclear Power Plant: Sequences, FP Released, Lessons Learned (Jun SUGIMOTO) --- 4 Some Comments on Dose Assessment for Members of the Public After the Fukushima Daiichi Nuclear Power Plant Accident (Jiro INABA) --- Part 3 Radiation Survey of the Environment --- 5 Environmental Radiation Status in and Around Tokyo Immediately After the TEPCO Fukushima Daiichi Nuclear Power Plant Disaster (Takeshi IIMOTO) --- 6 Radiation Survey Along Two Trails in Mt. Fuji to Investigate the Radioactive Contamination Due to TEPCO's Fukushima Daiichi Nuclear Plant Accident (Kazuaki YAJIMA) --- 7 Development of a Carborne Survey System, KURAMA (Minoru TANIGAKI) --- 8 Radiation Measurement in East Japan in 2011 After the Fukushima Nuclear Accident (Takumi KUBOTA) --- Part 4 Environmental Radioactivity --- 9 Distribution of Plutonium Isotopes in Marine Sediments Off Japan Before and After the Fukushima Daiichi Nuclear Power Plant Accident: A Review (Jian ZHENG) --- 10 Time Trend Change of Air Dose Rate on Paved Area in Fukushima City After the Fukushima Daiichi Nuclear Power Plant Accident (Shin-ya HOHARA) --- 11 Observation of Radionuclides in Marine Biota off the Coast of Fukushima Prefecture After TEPCO's Fukushima Daiichi Nuclear Power Plant Accident (Tatsuo AONO) --- Part 5 Transfer Models and/or Parameters --- 12 Evaluating Removal of Radionuclides from Landfill Leachate Using Generally Practiced Wastewater Treatment Processes (Nao ISHIKAWA) --- 13 Studies on Radiocesium Transfer in Agricultural Plants in Fukushima Prefecture (Takashi SAITO) --- Part 6 Source Estimation --- 14 Investigation of Uncertainty in the Release Rates of I 131 and Cs 137 from Fukushima Daiichi Nuclear Power Station Estimated from Environmental Data (Shigekazu HIRAO) --- 15 Source Term Estimation of 131I and 137Cs Discharged from the Fukushima Daiichi Nuclear Power Plant into the Atmosphere (Haruyasu NAGAI) --- Part 7 Dose Assessment --- 16 NIRS's Activities for the Reconstruction of Early Internal Exposure in the TEPCO Fukushima Daiichi Nuclear Power Station Accident (Osamu KURIHARA) --- 17 Internal Radiation Dose of KURRI Volunteers Working at Evacuation Shelters After TEPCO's Fukushima Daiichi Nuclear Power Plant Accident (Yuko KINASHI) --- 18 Probabilistic Assessment of Doses to the Public Living in Areas Contaminated by the Fukushima Daiichi Nuclear Power Plant Accident (Shogo TAKAHARA) --- 19 Reduction of External Exposure for Residents Owing to the Fukushima Nuclear Accident by Weathering and Decontamination (Hiroko YOSHIDA)
    Pages: Online-Ressource (XV, 223 pages) , 81 illustrations, 42 illustrations in color
    ISBN: 9784431545835
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 16
    Unknown
    Berlin, Heidelberg : Springer
    Keywords: Business ; Library science ; Management science ; Literacy ; Business and Management ; Business and Management, general ; Library Science ; Literacy
    Description / Table of Contents: Part I Information Profession and Information Literacy --- Chapter 1 Career and Professional Opportunities and Challenges for Librarians and Other Information Professionals Specializing in Information Literacy and Lifelong Learning --- Chapter 2 So What’s the Big Deal With Information Literacy in the United States? --- Chapter 3 A Group Discussion on Information Literacy --- Part II Trends of Library and Information Sciences Education --- Chapter 4 iSchools & the iSchool at Syracuse University --- Part III Information Seeking and Retrieval --- Chapter 5 Visual Data Mining in a Q&A based Social Media Website --- Chapter 6 Information Seeking Behaviour and Usage on a Multi-media Platform: Case Study Europeana --- Chapter 7 Exploratory Search: a Critical Analysis of the Theoretical Foundations, Systems Features, and Research Trends --- Part IV Informatics --- Chapter 8 Scientific Datasets: Informetric Characteristics and Social Utility Metrics for Biodiversity Data Sources --- Chapter 9 Knowledge Discovery of Complex Networks Research Literature --- Chapter 10 Bibliometrics and University Research Rankings Demystified for Librarians --- Part V Development of World Libraries --- Chapter 11 The Development of East Asian Libraries in North America
    Pages: Online-Ressource (XIV, 177 pages) , 49 illustrations, 30 illustrations in color
    ISBN: 9783642548123
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 17
    Keywords: Environment ; Regional planning ; Urban planning ; Applied ecology ; Wildlife ; Fish ; Climate change ; Nature conservation ; Environment ; Climate Change ; Nature Conservation ; Fish & Wildlife Biology & Management ; Landscape/Regional and Urban Planning ; Applied Ecology
    Description / Table of Contents: Preface --- Acknowledgements --- Chapter 1 – Natural Heritage at Risk by Climate Change --- Chapter 2 – Climate Change in Central and Eastern Europe --- Chapter 3 – Effects of Climate Change on the Hydrological Cycle in Central and Eastern Europe --- Chapter 4 – Potential impacts of climate change on protected habitats --- Chapter 5 – Climate Change impact modelling cascade - Benefits and limitations for --- Chapter 6 – Indicators for Monitoring Climate Change-Induced Effects on Habitats – a --- Chapter 7 – Remote Sensing-based Monitoring of Potential Climate-induced Impacts on Habitats --- Chapter 8 – Assessment of Climate-induced Impacts on Habitats --- Chapter 9 – Legal Aspects of Climate Change Adaptation --- Chapter 10 – A Methodical Framework for Climate Change-Adapted Management in Protected Areas --- Chapter 11 – Monitoring concept of climate-induced impacts on peat bog vegetation in Pokljuka plateau in Triglav National Park, Slovenia --- Chapter 12 – Concept for the monitoring of climate induced impacts on rock ptarmigan (Lagopus muta) in Triglav National Park, Slovenia --- Chapter 13 – Suggested management measures for Natura 2000 Habitats in Körös-Maros National Park, Hungary --- Chapter 14 – Climate-induced challenges for wetlands: revealing the background for the adaptive ecosystem management in the Biebrza Valley, Poland --- Chapter 15 – Habitat changes caused by sea level rise, driven by climate change in the Northern Adriatic coastal wetlands, Slovenia --- Chapter 16 – Potential impacts of climate change on forest habitats in the Biosphere Reserve Vessertal-Thuringian Forest in Germany --- Chapter 17 – Potential Impact of Climate Change on Alpine Habitats from Bucegi Natural Park, Romania --- Chapter 18 – Potential Impacts of Climate Change on Habitats and their Effects on Invasive Plant Species in Danube Delta Biosphere Reserve, Romania --- Chapter 19 - Reproduction biology of an alien invasive plant: a case of drought-tolerant Aster squamatus on the Northern Adriatic seacoast, Slovenia --- Chapter 20 – Conclusions and Recommendations for Adapting Conservation Management in the Face of Climate Change --- Index
    Pages: Online-Ressource (XXV, 308 pages) , 77 illustrations, 33 illustrations in color
    ISBN: 9789400779600
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 18
    Keywords: Environment ; Nuclear energy ; Nuclear chemistry ; Radiation protection ; Radiation ; Safety measures ; Environmental health ; Water pollution ; Environment ; Effects of Radiation/Radiation Protection ; Environmental Health ; Nuclear Energy ; Waste Water Technology / Water Pollution Control / Water Management / Aquatic Pollution ; Nuclear Chemistry
    Description / Table of Contents: Part 1 Introduction --- 1 Outline of the Environmental Monitoring of TEPCO's Fukushima Daiichi Nuclear Power Plant Accident (Tomoyuki TAKAHASHI) --- 2 Outline of the Radiation Dose Estimation of Residents After the Fukushima Daiichi Nuclear Power Plant Accident (Sentaro TAKAHASHI) --- Part 2 Overview --- 3 Accident of Fukushima Daiichi Nuclear Power Plant: Sequences, FP Released, Lessons Learned (Jun SUGIMOTO) --- 4 Some Comments on Dose Assessment for Members of the Public After the Fukushima Daiichi Nuclear Power Plant Accident (Jiro INABA) --- Part 3 Radiation Survey of the Environment --- 5 Environmental Radiation Status in and Around Tokyo Immediately After the TEPCO Fukushima Daiichi Nuclear Power Plant Disaster (Takeshi IIMOTO) --- 6 Radiation Survey Along Two Trails in Mt. Fuji to Investigate the Radioactive Contamination Due to TEPCO's Fukushima Daiichi Nuclear Plant Accident (Kazuaki YAJIMA) --- 7 Development of a Carborne Survey System, KURAMA (Minoru TANIGAKI) --- 8 Radiation Measurement in East Japan in 2011 After the Fukushima Nuclear Accident (Takumi KUBOTA) --- Part 4 Environmental Radioactivity --- 9 Distribution of Plutonium Isotopes in Marine Sediments Off Japan Before and After the Fukushima Daiichi Nuclear Power Plant Accident: A Review (Jian ZHENG) --- 10 Time Trend Change of Air Dose Rate on Paved Area in Fukushima City After the Fukushima Daiichi Nuclear Power Plant Accident (Shin-ya HOHARA) --- 11 Observation of Radionuclides in Marine Biota off the Coast of Fukushima Prefecture After TEPCO's Fukushima Daiichi Nuclear Power Plant Accident (Tatsuo AONO) --- Part 5 Transfer Models and/or Parameters --- 12 Evaluating Removal of Radionuclides from Landfill Leachate Using Generally Practiced Wastewater Treatment Processes (Nao ISHIKAWA) --- 13 Studies on Radiocesium Transfer in Agricultural Plants in Fukushima Prefecture (Takashi SAITO) --- Part 6 Source Estimation --- 14 Investigation of Uncertainty in the Release Rates of I 131 and Cs 137 from Fukushima Daiichi Nuclear Power Station Estimated from Environmental Data (Shigekazu HIRAO) --- 15 Source Term Estimation of 131I and 137Cs Discharged from the Fukushima Daiichi Nuclear Power Plant into the Atmosphere (Haruyasu NAGAI) --- Part 7 Dose Assessment --- 16 NIRS's Activities for the Reconstruction of Early Internal Exposure in the TEPCO Fukushima Daiichi Nuclear Power Station Accident (Osamu KURIHARA) --- 17 Internal Radiation Dose of KURRI Volunteers Working at Evacuation Shelters After TEPCO's Fukushima Daiichi Nuclear Power Plant Accident (Yuko KINASHI) --- 18 Probabilistic Assessment of Doses to the Public Living in Areas Contaminated by the Fukushima Daiichi Nuclear Power Plant Accident (Shogo TAKAHARA) --- 19 Reduction of External Exposure for Residents Owing to the Fukushima Nuclear Accident by Weathering and Decontamination (Hiroko YOSHIDA)
    Pages: Online-Ressource (XV, 223 pages) , 81 illustrations, 42 illustrations in color
    ISBN: 9784431545835
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 19
    Keywords: Environment ; Environmental law ; Environmental policy ; Social policy ; Environmental economics ; Environment ; Environment, general ; Environmental Law/Policy/Ecojustice ; Environmental Economics ; Social Policy
    Description / Table of Contents: 1 Marginality—An Overview and Implications for Policy --- Part 1 Concepts and Theory --- 2 Marginality—A Framework for Analyzing Causal Complexities of Poverty --- 3 Exclusion and Initiatives to “Include”: Revisiting Basic Economics to Guide Development Practice --- 4 Marginality from a Socio-ecological Perspective --- Part 2 Dimensions and Prevalence of Marginality --- 5 Mapping Marginality Hotspots --- 6 The Poorest: Who and Where They Are --- 7 Targeting the Poorest and Most Vulnerable: Examples from Bangladesh --- 8 Correlates of Extreme Poverty in Rural Ethiopia --- 9 Examining the Circle of Attachment, Trauma, Shame, and Marginalization: the Unheard Voices of Young Kutchi Girls --- Part 3 Environmental Drivers of Marginality --- 10 Poverty, Agriculture and the Environment: the Case of Sub-Saharan Africa --- 11 The Marginal Poor and their Dependence on Ecosystem Services: Evidence from South Asia and Sub-Saharan Africa --- 12 Land Degradation, Poverty, and Marginality --- Part 4     Experiencing Marginality in Africa and Asia --- 13 Tackling Social Exclusion and Marginality for Poverty Reduction: Indian Experiences --- 14 Consumption Behavior of the Poorest and Policy Implications in Indonesia --- 15 Addressing Extreme Poverty and Marginality: Experiences in Rural China --- 16 Experiences in Targeting the Poorest: a Case Study from Bangladesh --- 17 Rural Poverty and Marginalization in Ethiopia: a Review of Development Interventions --- Part 5 Responses to Marginality at Different Levels: State, Business, and Community --- 18 Macro, Fiscal, and Decentralization Options to Address Marginality and Reach the Extremely Poor --- 19 Social Protection, Marginality, and Extreme Poverty: Just Give Money to the Poor --- 20 Innovative Business Approaches for the Reduction of Extreme Poverty and Marginality --- 21 Business Initiatives that Overcome Rural Poverty and Marginality Through Creating Shared Value --- 22 The Marginalized and Poorest in Different Communities and Settings of Ethiopia
    Pages: Online-Ressource (XVII, 389 pages)
    ISBN: 9789400770614
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 20
    Keywords: Environment ; Environmental management ; Ecotoxicology ; Waste management ; Environment ; Ecotoxicology ; Environmental Management ; Waste Management/Waste Technology
    Description / Table of Contents: Preface --- Foreword by Keith Solomon and John Giesy --- Foreword by Coordinating Board of Editors --- Ecological Risk Assessment for Chlorpyrifos in Terrestrial and Aquatic Systems in The United States – Overview and Conclusions --- Properties and Uses of Chlorpyrifos in the United States --- Fate in the Environment and Long-Range Atmospheric Transport of the Organophosphorus Insecticide, Chlorpyrifos and its Oxon in the United States --- Exposures of Aquatic Organisms to the Organophosphorus Insecticide, Chlorpyrifos Resulting from Use in the United States --- Risks to Aquatic Organisms from Use of Chlorpyrifos in the United States --- Refined Avian Risk Assessment for Chlorpyrifos in the United States --- Risk to Pollinators from the Use of Chlorpyrifos in the United States --- Index
    Pages: Online-Ressource (XVI, 269 pages) , 40 illustrations
    ISBN: 9783319038650
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 21
    Keywords: Environment ; Environmental law ; Environmental policy ; Social policy ; Environmental economics ; Environment ; Environment, general ; Environmental Law/Policy/Ecojustice ; Environmental Economics ; Social Policy
    Description / Table of Contents: 1 Marginality—An Overview and Implications for Policy --- Part 1 Concepts and Theory --- 2 Marginality—A Framework for Analyzing Causal Complexities of Poverty --- 3 Exclusion and Initiatives to “Include”: Revisiting Basic Economics to Guide Development Practice --- 4 Marginality from a Socio-ecological Perspective --- Part 2 Dimensions and Prevalence of Marginality --- 5 Mapping Marginality Hotspots --- 6 The Poorest: Who and Where They Are --- 7 Targeting the Poorest and Most Vulnerable: Examples from Bangladesh --- 8 Correlates of Extreme Poverty in Rural Ethiopia --- 9 Examining the Circle of Attachment, Trauma, Shame, and Marginalization: the Unheard Voices of Young Kutchi Girls --- Part 3 Environmental Drivers of Marginality --- 10 Poverty, Agriculture and the Environment: the Case of Sub-Saharan Africa --- 11 The Marginal Poor and their Dependence on Ecosystem Services: Evidence from South Asia and Sub-Saharan Africa --- 12 Land Degradation, Poverty, and Marginality --- Part 4     Experiencing Marginality in Africa and Asia --- 13 Tackling Social Exclusion and Marginality for Poverty Reduction: Indian Experiences --- 14 Consumption Behavior of the Poorest and Policy Implications in Indonesia --- 15 Addressing Extreme Poverty and Marginality: Experiences in Rural China --- 16 Experiences in Targeting the Poorest: a Case Study from Bangladesh --- 17 Rural Poverty and Marginalization in Ethiopia: a Review of Development Interventions --- Part 5 Responses to Marginality at Different Levels: State, Business, and Community --- 18 Macro, Fiscal, and Decentralization Options to Address Marginality and Reach the Extremely Poor --- 19 Social Protection, Marginality, and Extreme Poverty: Just Give Money to the Poor --- 20 Innovative Business Approaches for the Reduction of Extreme Poverty and Marginality --- 21 Business Initiatives that Overcome Rural Poverty and Marginality Through Creating Shared Value --- 22 The Marginalized and Poorest in Different Communities and Settings of Ethiopia
    Pages: Online-Ressource (XVII, 389 pages)
    ISBN: 9789400770614
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 22
    Keywords: Computer science ; Computer security ; Data encryption (Computer science) ; Computer Science ; Systems and Data Security ; Data Encryption
    Description / Table of Contents: For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges. This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT). Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud. OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud. A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations. "A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!" —Vince Lubsey, Vice President, Product Development, Virtustream Inc. " Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles." —John Skinner, Vice President, HyTrust Inc. "Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation
    Pages: Online-Ressource (XXVI, 244 pages) , 95 illustrations
    ISBN: 9781430261469
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 23
    Unknown
    Boston : Academic Press
    Keywords: DDC 510 s ; DDC 515.7/42 ; LC QA3 ; LC QA329eb ; Interpolation spaces ; Operator theory
    Pages: Online-Ressource (xiv, 469 pages)
    ISBN: 9780120887309
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 24
    Unknown
    Boston : Academic Press
    Keywords: DDC 519.2 ; LC QA3 ; Markov processes
    Pages: Online-Ressource (xi, 419 pages)
    ISBN: 9780126390605
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 25
    Keywords: DDC 510 s ; DDC 512.2 ; LC QA171eb ; LC QA3 ; Linear algebraic groups ; Representations of groups
    Pages: Online-Ressource (iv, 747-1486 pages)
    ISBN: 9780122527227
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 26
    Unknown
    Boston : Academic Press
    Keywords: DDC 510 s ; DDC 512/.55 ; LC QA3 ; LC QA326eb
    Pages: Online-Ressource (xix, 412 pages)
    ISBN: 9780127329604
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 27
    Unknown
    Boston : Academic Press
    Keywords: DDC 510 s ; DDC 512/.4 ; LC QA247eb ; LC QA3 ; Rings (Algebra)
    Pages: Online-Ressource (1 v)
    ISBN: 9780125998420
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 28
    Unknown
    Boston : Academic Press
    Keywords: DDC 510 s ; DDC 512/.4 ; LC QA247eb ; LC QA3 ; Rings (Algebra)
    Pages: Online-Ressource (1 v)
    ISBN: 9780125998413
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 29
    Unknown
    Boston : Academic Press
    Keywords: DDC 510 s ; DDC 512/.55 ; LC QA3 ; LC QA326eb ; Finite groups ; Modular functions ; Representations of algebras ; Superstring theories ; Vertex operator algebras
    Pages: Online-Ressource (liii, 508 pages)
    ISBN: 9780122670657
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 30
    Unknown
    Boston : Academic Press
    Keywords: DDC 510 s ; DDC 512/.55 ; LC QA3 ; LC QA326eb
    Pages: Online-Ressource (xiv, 454 pages)
    ISBN: 9780127329611
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 31
    Keywords: DDC 510 s ; DDC 512.2 ; LC QA171eb ; LC QA3 ; Linear algebraic groups ; Representations of groups
    Pages: Online-Ressource (xviii, 751 pages)
    ISBN: 9780122527210
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 32
    Unknown
    Boston : Academic Press
    Keywords: DDC 510 s ; DDC 512.2 ; LC QA171eb ; LC QA3 ; Linear algebraic groups ; Representations of groups
    Pages: Online-Ressource (xiii, 443 pages)
    ISBN: 9780123802453
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 33
    Unknown
    Boston : Academic Press
    Keywords: DDC 510 s ; DDC 515.7/222 ; LC QA3 ; Spectral theory (Mathematics)
    Pages: Online-Ressource (x, 192 pages)
    ISBN: 9780125630405
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 34
    Unknown
    New York : Academic Press
    Keywords: DDC 517.38 ; LC QA3 ; Differential equations ; Functions
    Pages: Online-Ressource (xiii, 432 pages)
    ISBN: 9780123745811
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 35
    Unknown
    New York : Academic Press
    Keywords: DDC 516.57 ; LC QA3 ; Geometry, Projective
    Pages: Online-Ressource (viii, 332 pages)
    ISBN: 9780123745804
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...