- Table View
- List View
Secrets Of The Garden: Food Chains And The Food Web In Our Backyard
by Kathleen Weidner ZoehfeldPerfect for spring planting season--an outstanding book about backyard science the whole family will appreciate. <P><P> Alice's family plants a vegetable garden each spring, and this budding naturalist reports all she sees about how the plants grow, what insects come to eat the plants, and what birds and animals come to eat the insects It's the food chain, right in her own backyard! While Alice's narrative is simple and engaging, science concepts are presented in more depth in sidebars by a pair of very knowledgeable (and highly amusing) chickens! Noted science writer Kathleen Weidner Zoehfeld knows how to layer information to make it accessible to a wide range of readers and useful for educators. And illustrator Priscilla Lamont's funny, friendly paintings make this a garden everyone will want to explore. Kids will eat up this wonderful book of backyard science--and perhaps they'll even be inspired to eat their vegetables! "A wonderfully informative and enjoyable journey through one family's backyard garden, from spring planting to fall harvest. . . . this is bound to spark some backyard explorations. " --Kirkus, Starred Review From the Hardcover edition.
The Secrets of Lovelace Academy
by Marie Benedict Courtney SheinmelFrom New York Times bestselling author Marie Benedict and Courtney Sheinmel comes a historical adventure about a young girl plucked from a London orphanage to begin attending a boarding school with more secrets than she could imagine—perfect for fans of Enola Holmes.Lainey Philipps has lived at the Sycamore Home for Orphaned Children since she was three years old. Now nearly a teenager, her life is hard, and she doesn&’t expect it to get better—until a chance encounter during an open house changes everything when Lainey meets a woman who invites her to attend the prestigious Lovelace Academy. Fitting in amongst the many privileged students within the ivy-covered walls of Lovelace Academy presents challenges unlike the ones Lainey has faced in the past. Her life of drudgery has hardly prepared her for the aristocratic airs and cutthroat academic ambition of the other girls. Terrified she&’ll be cast out of the academy, Lainey grabs at her chance to prove herself by traveling to Switzerland to meet a female scientist crafting a groundbreaking theory. Determined to prove her capability and reach her destination, Lainey must rely on her own wit—as well as a mysterious boy who has yet to prove himself as friend or foe. But the real test is what awaits her in Switzerland, at the home of Mileva Maric, wife of Albert Einstein.
Secrets of Recording: Professional Tips, Tools & Techniques
by Lorne BregitzerPacked with all the studio tips and tricks you'll need it's easier than ever to create pro-quality music at home. This book is the only reference you'll ever need to start producing and engineering your music, or other artists' music, in your own home studio. Covering less than ideal acoustics, solving problems before they occur, tools of the editing phase and much more you can gain the knowledge and know how to make your recordings sound like pro recordings- understand the technology, use it in the right way and you can make a good recording great.
Secrets of Silicon Valley: What Everyone Else Can Learn From the Innovation Capital of the World
by Deborah Perry PiscioneWhile the global economy languishes, one place just keeps growing despite failing banks, uncertain markets, and high unemployment: Silicon Valley. In the last two years, more than 100 incubators have popped up there, and the number of angel investors has skyrocketed. Today, 40 percent of all venture capital investments in the United States come from Silicon Valley firms, compared to 10 percent from New York. In Secrets of Silicon Valley, entrepreneur and media commentator Deborah Perry Piscione takes us inside this vibrant ecosystem where meritocracy rules the day. She explores Silicon Valley's exceptionally risk-tolerant culture, and why it thrives despite the many laws that make California one of the worst states in the union for business. Drawing on interviews with investors, entrepreneurs, and community leaders, as well as a host of case studies from Google to Paypal, Piscione argues that Silicon Valley's unique culture is the best hope for the future of American prosperity and the global business community and offers lessons from the Valley to inspire reform in other communities and industries, from Washington, DC to Wall Street.
Secrets of the Sea: The Story of Jeanne Power, Revolutionary Marine Scientist
by Evan GriffithThe curiosity, drive, and perseverance of the nineteenth-century woman scientist who pioneered the use of aquariums to study ocean life are celebrated in this gorgeous, empowering picture book.How did a nineteenth-century dressmaker revolutionize science? Jeanne Power was creative: she wanted to learn about the creatures that swim beneath the ocean waves, so she built glass tanks and changed the way we study underwater life forever. Jeanne Power was groundbreaking: she solved mysteries of sea animals and published her findings at a time when few of women&’s contributions to science were acknowledged. Jeanne Power was persistent: when records of her research were lost, she set to work repeating her studies. And when men tried to take credit for her achievements, she stood firm and insisted on the recognition due to her.Jeanne Power was inspiring, and the legacy of this pioneering marine scientist lives on in every aquarium.
Secrets to Success for Science Teachers
by Ellen Kottler Victoria B. CostaProvides teachers with practical ideas and strategies for promoting inquiry, building literacy, implementing technology, and achieving meaningful instruction in the science classroom.
Sector Coupling - Energy-Sustainable Economy of the Future: Fundamentals, Model and Planning Example of a General Energy System (GES)
by Przemyslaw Komarnicki Michael Kranhold Zbigniew A. StyczynskiThe core of the book is the presentation of a systematic, continuous and logical chain into the coupled total energy system (GES) of the future, which will lead to the fully sustainable use of renewable energies. Thus, unified models are proposed that are applicable to the subsystems/sectors throughout and allow the optimization of the entire GES. Appropriate algorithms and approaches are illustrated with numerous examples. This is embedded in the context of efforts to fully integrate energy generated from renewable sources into the GES. The overarching role of IT systems for secure operations has been emphasized in the book. The relevance of the correct mapping of technologies to use cases is elaborated and necessary steps derived from this are considered technically and organizationally (standardization). Special attention is paid to the didactic presentation of the material in order to present this new, difficult and complex problem "as simple as possible, but not simpler" [according to Einstein].
Secure and Digitalized Future Mobility: Shaping the Ground and Air Vehicles Cooperation
by Yue Cao Omprakash Kaiwartya Tiancheng LiThis book discusses the recent advanced technologies in Intelligent Transportation Systems (ITS), with a view on how Unmanned Aerial Vehicles (UAVs) cooperate with future vehicles. ITS technologies aim to achieve traffic efficiency and advance transportation safety and mobility. Known as aircrafts without onboard human operators, UAVs are used across the world for civilian, commercial, as well as military applications. Common deployment include policing and surveillance, product deliveries, aerial photography, agriculture, and drone racing. As the air-ground cooperation enables more diverse usage, this book addresses the holistic aspects of the recent advanced technologies in ITS, including Information and Communication Technologies (ICT), cyber security, and service management from principle and engineering practice aspects. This is achieved by providing in-depth study on several major topics in the fields of telecommunications, transport services, cyber security, and so on. The book will serve as a useful text for transportation, energy, and ICT societies from both academia and industrial sectors. Its broad scope of introductory knowledge, technical reviews, discussions, and technology advances will also benefit potential authors.
Secure and Trusted Cyber Physical Systems: Recent Approaches and Future Directions (Smart Sensors, Measurement and Instrumentation #43)
by Shantanu Pal Zahra Jadidi Ernest FooThis book highlights the latest design and development of security issues and various defences to construct safe, secure and trusted Cyber-Physical Systems (CPS). In addition, the book presents a detailed analysis of the recent approaches to security solutions and future research directions for large-scale CPS, including its various challenges and significant security requirements. Furthermore, the book provides practical guidance on delivering robust, privacy, and trust-aware CPS at scale. Finally, the book presents a holistic insight into IoT technologies, particularly its latest development in strategic applications in mission-critical systems, including large-scale Industrial IoT, Industry 4.0, and Industrial Control Systems. As such, the book offers an essential reference guide about the latest design and development in CPS for students, engineers, designers, and professional developers.
Secure and Trustworthy Cyberphysical Microfluidic Biochips: A practical guide to cutting-edge design techniques for implementing secure and trustworthy cyberphysical microfluidic biochips
by Jack Tang Mohamed Ibrahim Krishnendu Chakrabarty Ramesh KarriThis book describes novel hardware security and microfluidic biochip design methodologies to protect against tampering attacks in cyberphysical microfluidic biochips (CPMBs). It also provides a general overview of this nascent area of research, which will prove to be a vital resource for practitioners in the field.This book shows how hardware-based countermeasures and design innovations can be a simple and effective last line of defense, demonstrating that it is no longer justifiable to ignore security and trust in the design phase of biochips.
Secure Automatic Dependent Surveillance-Broadcast Systems (Wireless Networks)
by Haomiao Yang Hongwei Li Xuemin Sherman ShenThis book proposes secure schemes to address security challenges in secure automatic dependent surveillance-broadcast systems (ADS-B) from five different angles. First, the authors examine encryption schemes applied to the ADS-B environment for protecting messages confidentiality. Second, they propose an ADS-B broadcast authentication scheme with batch verification by employing an identity-based signature. Third, they present ADS-B broadcast authentication scheme based on a digital signature with message recovery, which provides a feature that the message is recoverable from the signature. Fourth, they propose a new cryptographic solution to ADS-B security. Finally, they propose an accurate and efficient cognitive aircraft location verification scheme preserving aircraft location privacy by utilizing a grid-based k-nearest neighbor algorithm. In summary, the authors show how ADS-B data links can greatly enhance flight safety by these proposed schemes without sacrificing data security.Proposes several secure schemes to address security challenges in secure automatic dependent surveillance-broadcast systems (ADS-B);Provides extensive experiments and evaluates the proposed schemes using real-world data;Shows how ADS-B data links can greatly enhance safety without sacrificing data security
Secure Communication for 5G and IoT Networks (EAI/Springer Innovations in Communication and Computing)
by S. Velliangiri M. Gunasekaran P. KarthikeyanThis book highlights research on secure communication of 5G and the Internet of Things (IoT) Networks, along with related areas to ensure secure and Internet-compatible IoT systems. The authors not only discuss 5G and IoT security and privacy challenges, but also energy efficient approaches to improving the ecosystems through communication. The book addresses the secure communication and privacy of the 5G and IoT technologies, while also revealing the impact of IoT technologies on several scenarios in smart city design. Intended as a comprehensive introduction, the book offers in-depth analysis and provides scientists, engineers and professionals the latest techniques, frameworks and strategies used in 5G and IoT technologies.
Secure Communication in Internet of Things: Emerging Technologies, Challenges, and Mitigation
by T. Kavitha M. K. Sandhya V. J. Subashini Prasidh SrikanthThe book Secure Communication in Internet of Things: Emerging Technologies, Challenges, and Mitigation will be of value to the readers in understanding the key theories, standards, various protocols, and techniques for the security of Internet of Things hardware, software, and data, and explains how to design a secure Internet of Things system. It presents the regulations, global standards, and standardization activities with an emphasis on ethics, legal, and social considerations about Internet of Things security. Features:● Explores the new Internet of Things security challenges, threats, and future regulations to end-users.● Presents authentication, authorization, and anonymization techniques in the Internet of Things.● Illustrates security management through emerging technologies such as blockchain and artificial intelligence.● Highlights the theoretical and architectural aspects, foundations of security, and privacy of the Internet of Things framework.● Discusses artificial-intelligence-based security techniques, and cloud security for the Internet of Things.It will be a valuable resource for senior undergraduates, graduate students, and academic researchers in fields such as electrical engineering, electronics and communications engineering, computer engineering, and information technology.
Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT (SpringerBriefs in Electrical and Computer Engineering)
by Yushu Zhang Yong Xiang Leo Yu ZhangThis book gives a comprehensive and systematic review of secure compressive sensing (CS) for applications in various fields such as image processing, pattern recognition, Internet of things (IoT), and cloud computing. It will help readers grasp the knowledge of secure CS and its applications, and stimulate more readers to work on the research and development of secure CS. It discusses how CS becomes a cryptosystem, followed by the corresponding designs and analyses. The application of CS in multimedia data encryption is presented, in which the general design framework is given together with several particular frameworks including parallel CS, involvement of image processing techniques, and double protection mechanism. It also describes the applications of CS in cloud computing security and IoT security, i.e., privacy-preserving reconstruction in cloud computing and secure low-cost sampling in IoT, respectively.
Secure Control of Networked Control Systems and Its Applications
by Dong Yue Songlin Hu Zihao ChengThis book shows some secure control methods of networked control systems related to linear control system, nonlinear control system, multi-agent system and its applications in power systems. The proposed secure control methods provide some useful results about modeling of network attacks, resilient analysis and synthesis methods, active defense control method.The contents of this book are lists as followings. (1) Modeling of DoS attacks, deception attacks and replay attacks; (2)Secure control methods are proposed by combing delay system method, switched system method and event-based control method. (3) Active control methods are proposed by using model-predictive control and redundant control. (4) The proposed control methods are applied to the security problem of power system.The methods of this book include DoS attacks modeling such as, periodic jamming attack model,model-based average dwell time model, deception attack modeling and relay attack modeling; piece-wise Lyapunov-Krasoviskiifunctional method, stochastic control method; the results including resilient conditions of networked control system and related resilient control design method with linear matrix inequalities(LMIs).From this book, readers can learn about the general network attack modeling methods, resilient analysis and synthesis methods, active control methods from viewpoint of redundancy control, and secure conditions of power systems.Some fundamental knowledge prepared to read this book includes delay system theory, event triggered mechanism, T-S fuzzy system theory and frequency/voltage control of power system.
Secure Coordination Control of Networked Robotic Systems: From a Control Theory Perspective
by Xiaolei Li Jiange Wang Xiaoyuan Luo Xinping GuanAs one of the core equipments and actuators, robotic technology has attracted much attention and has made great progress. However, a single robotic system is often unable to handle complex tasks due to limitations in sensors, microprocessors, actuators, and the ability to handle complex situations. With the development of distributed control and microprocessing technology, networked robotic systems have greatly expanded their perceptual, computational, and execution capabilities, with high efficiency, low cost, and strong functionality advantages. As a typical distributed cyber-physical system (DCPS), which is an intelligent system that integrates computing, communication, and control, networked robotic systems can perform higher-level tasks by sharing information and working together. It can provide intelligent control and monitoring of a physical process, such as environment observation, information collection, and search and rescue, etc. Thus, coordination control of networked robotic systems has become the focus of scholars worldwide. However, the sensing, communication, and control integration of networked robotic systems make them face unprecedented network security threats, in which cyber attacks have become a major hidden danger to the reliable operation of autonomous unmanned systems. Although existing control methods can achieve swarm collaborative control of networked robotic systems, the protection of which, especially the security of control systems, is rarely addressed. In this book, we conduct research on the secure coordination problem of networked robotic systems from a control theory perspective, given the limited communication bandwidth and the increasingly prominent network security threats. This book showcases several continuous-time and event-triggered secure control design and analysis methods for networked robotic systems under different types of cyberattacks. Additionally, several future research directions are provided for networked robotic systems. This book will be an important reference for scientists, engineers, and graduate students from the field of underwater robotic technologies, maritime science, and control engineering.
Secure Data Sensing, Computing, and Dissemination in Vehicular Ad Hoc Networks (Advanced Topics in Science and Technology in China #1)
by Yingjie Xia Xuejiao Liu Huihui Wu Qichang LiThis book focuses on the fields of security of vehicular ad hoc networks (VANETs). Building upon previous research findings, it conducts research on three modules: secure data sensing, computing, and dissemination in VANETs. The book adopts a combination of security analysis, theoretical analysis, and simulation analysis to comprehensively evaluate and demonstrate the effectiveness and performance of proposed solutions. It aims to assist other researchers in conducting studies on the data security issues of vehicular ad hoc networks, while designing secure and efficient schemes.
Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities: Includes selected Papers from International Conference on Advanced Computing & Next-Generation Communication (ICACNGC 2022) (EAI/Springer Innovations in Communication and Computing)
by Ahmed A. Abd El-Latif Lo’ai Tawalbeh Yassine Maleh Brij B. GuptaThis book gathers recent research in security and privacy to discuss, evaluate, and improve the novel approaches of data protection in IoT and edge and fog computing. The primary focus of the book addresses security mechanisms in IoT and edge/ fog computing, advanced secure deployments for large scaled edge/ fog computing, and new efficient data security strategy of IoT and edge/ fog computing. The book lays a foundation of the core concepts and principles of IoT and 5G security, walking the reader through the fundamental ideas. This book is aimed at researchers, graduate students, and engineers in the fields of secure IoT and edge/ fog computing. The book also presents selected papers from International Conference on Advanced Computing & Next-Generation Communication (ICACNGC 2022).
Secure Fusion Estimation and Control for Cyber-Physical Systems Under Malicious Attacks
by Bo Chen Tongxiang Li Wen-An Zhang Li YuThe book focuses on the issues of secure fusion estimation and control in cyber-physical systems under cyber-attacks, such as privacy protection under eavesdropping attacks, security fusion estimation under DoS and FDI attacks, and model-based and model-free security control under cyber-attacks. The comprehensive and systematic treatment of security protection in cyber-physical systems is one of the main features of the book, which is particularly suitable for readers interested in learning practical solutions for the security of cyber-physical systems. The book can benefit researchers, engineers and graduate students in the fields of control science and engineering, computer science, communication engineering, etc.
Secure Image Transmission in Wireless Sensor Network (Lecture Notes in Electrical Engineering #564)
by K. Shankar Mohamed ElhosenyThis book offers an essential guide to Wireless Sensor Networks, IoT Security, Image Processing, Secure Information Systems, and Data Encryption. In addition, it introduces students and aspiring practitioners to the subject of destination marketing in a structured manner. It is chiefly intended for researcher students in the areas of Wireless Sensor Networks and Secure Data Communication (including image encryption, and intrusion detection systems), academics at universities and colleges, IT professionals, policymakers and legislators. Given its content, the book can be used as a reference text for both undergraduate and graduate studies, in courses on Wireless Sensor Networks, Secure Image Processing, and Data Encryption applications. The book is written in plain and easy-to-follow language and explains each main concept the first time it appears, helping readers with no prior background in the field. As such, it is a “must-read” guide to the subject matter.
Secure Integrated Circuits and Systems
by Ingrid M.R. VerbauwhedeOn any advanced integrated circuit or "system-on-chip" there is a need for security. In many applications the actual implementation has become the weakest link in security rather than the algorithms or protocols. The purpose of the book is to give the integrated circuits and systems designer an insight into the basics of security and cryptography from the implementation point of view. As a designer of integrated circuits and systems it is important to know both the state-of-the-art attacks as well as the countermeasures. Optimizing for security is different from optimizations for speed, area, or power consumption. It is therefore difficult to attain the delicate balance between the extra cost of security measures and the added benefits.
Secure IP Mobility Management for VANET
by Sanaa Taha Xuemin ShenThis brief presents the challenges and solutions for VANETs' security and privacy problems occurring in mobility management protocols including Mobile IPv6 (MIPv6), Proxy MIPv6 (PMIPv6), and Network Mobility (NEMO). The authors give an overview of the concept of the vehicular IP-address configurations as the prerequisite step to achieve mobility management for VANETs, and review the current security and privacy schemes applied in the three mobility management protocols. Throughout the brief, the authors propose new schemes and protocols to increase the security of IP addresses within VANETs including an anonymous and location privacy-preserving scheme for the MIPv6 protocol, a mutual authentication scheme that thwarts authentication attacks, and a fake point-cluster based scheme to prevent attackers from localizing users inside NEMO-based VANET hotspots. The brief concludes with future research directions. Professionals and researchers will find the analysis and new privacy schemes outlined in this brief a valuable addition to the literature on VANET management.
Secure IT Systems: 25th Nordic Conference, NordSec 2020, Virtual Event, November 23–24, 2020, Proceedings (Lecture Notes in Computer Science #12556)
by Mikael Asplund Simin Nadjm-TehraniThis book constitutes the refereed proceedings of the 25th Nordic Conference on Secure IT Systems, NordSec 2020, which was organized by Linköping University, Sweden, and held online during November 23-24, 2020.The 15 papers presented in this volume were carefully reviewed and selected from 45 submissions. They were organized in topical sections named: malware and attacks; formal analysis; applied cryptography; security mechanisms and training; and applications and privacy.
Secure IT Systems: 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings (Lecture Notes in Computer Science #11252)
by Nils GruschkaThis book constitutes the refereed proceedings on the 23rd Nordic Conference on Secure IT Systems, NordSec 2018, held in Oslo, Norway, in November 2018.The 29 full papers presented in this volume were carefully reviewed and selected from 81 submissions. They are organized in topical sections named: privacy; cryptography; network and cloud security; cyber security and malware; and security for software and software development.
Secure, Low-Power IoT Communication Using Edge-Coded Signaling
by Shahzad Muzaffar Ibrahim (Abe) ElfadelThis book discusses single-channel, device-to-device communication in the Internet of Things (IoT) at the signal encoding level and introduces a new family of encoding techniques that result in significant simplifications of the communication circuitry. These simplifications translate into lower power consumption, smaller form factors, and dynamic data rates that are tolerant to clock discrepancies between transmitter and receiver. Readers will be introduced to signal encoding that uses edge-coded signaling, based on the coding of binary data as counts of transmitted pulses. The authors fully explore the far-reaching implications of these novel signal-encoding techniques and illustrate how their usage can help minimize the need for complex circuitries for either clock and data recovery or duty-cycle correction. They also provide a detailed description of a complete ecosystem of hardware and firmware built around edge-code signaling. The ecosystem comprises an application-specific processor, automatic protocol configuration, power and data rate management, cryptographic primitives, and automatic failure recovery modes. The innovative IoT communication link and its associated ecosystem are fully in line with the standard IoT requirements on power, footprint, security, robustness, and reliability.