Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Pre-Field Screening Protocols for Heat-Tolerant Mutants in Rice
This book presents simple, robust pre-field screening protocols that allow plant breeders to screen for enhanced tolerance to heat stress in rice. Two critical heat-sensitive stages in the lifecycle of the rice crop are targeted – the seedling and flowering stages – with screening based on simple phenotypic responses. The protocols are based on...
Protocols for Pre-Field Screening of Mutants for Salt Tolerance in Rice, Wheat and Barley
This book offers effective, low-cost and user-friendly protocols for the pre-field selection of salt-tolerant mutants in cereal crops. It presents simple methods for measuring soil salinity, including soil sampling and the analysis of water-soluble salts, and describes a detailed, but simple, screening test for salt tolerance in rice, wheat and bar...
Preclinical MRI of the Kidney
This open volume provides readers with an open access protocol collection and wide-ranging recommendations for preclinical renal MRI used in translational research. The chapters in this book are interdisciplinary in nature and bridge the gaps between physics, physiology, and medicine. They are designed to enhance training in renal MRI sciences and ...
Computer Networks
Computer Networks: A Systems Approach, Sixth Edition, explores the key principles of computer networking, using real world examples from network and protocol design. Using the Internet as the primary example, this best-selling classic textbook explains various protocols and networking technologies. The systems-oriented approach encourages students ...
Low-Cost Methods for Molecular Characterization of Mutant Plants
This book offers low-cost and rapid molecular assays for the characterization of mutant plant germplasm. Detailed protocols are provided for the desiccation of plant tissues; the extraction of high-quality DNA for downstream applications; the extraction of single-strand-specific nucleases for single nucleotide polymorphism; and small insertion/dele...
Biotechnologies for Plant Mutation Breeding
This book offers 19 detailed protocols on the use of induced mutations in crop breeding and functional genomics studies, which cover topics including chemical and physical mutagenesis, phenotypic screening methods, traditional TILLING and TILLING by sequencing, doubled haploidy, targeted genome editing, and low-cost methods for the molecular charac...
Rethinking the Internet of Things
Rethinking the Internet of Things was a 2014 Jolt Award Finalist, the highest honor for a programming book. And the amazing part is that there is no code in the book. Over the next decade, most devices connected to the Internet will not be used by people in the familiar way that personal computers, tablets and smart phones are. Billions of inter...
Guideline for Salinity Assessment, Mitigation and Adaptation Using Nuclear and Related Techniques
This book is an outcome of the collaboration between the Soil and Water Management & Crop Nutrition Section, Joint FAO/IAEA Division of Nuclear Techniques in Food and Agriculture, Department of Nuclear Sciences and Applications, International Atomic Energy Agency (IAEA), Vienna, Austria, and the International Center for Biosaline Agricultur...
MERS Coronavirus
This volume provides various techniques and methodologies currently used in the study of MERS-CoV. Chapters are divided into four parts detailing evolution and entry of MERS-coronavirus, genetic alteration and structural determination of MERS-coronavirus proteins, quantitation of virus and anti-viral factors, and mouse models for MERS -coronavirus....
Guide to Computer Network Security
This definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the rapidly evolving ubiquitous technology we are increasingly dependent on. Fully revised and updated, this timely new edition encompasses the latest developments ...
A Graduate Course in Applied Cryptography
Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making ...
Swift Notes for Professionals
The Swift Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Demystifying Internet of Things Security
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Inte...
Implementation of EU Readmission Agreements
By examining the implementation dynamics of EU Readmission Agreements (EURAs), this book addresses the practical reasons why irregular immigrants cannot be expelled. EURAs are one of the vital legal instruments framing EU external migration law with regard to the expulsion of irregular immigrants, yet their implementation has met with various obsta...
Access to Online Resources
The book offers a concise guide for librarians, helping them understand the challenges, processes and technologies involved in managing access to online resources. After an introduction the book presents cases of general authentication and authorisation. It helps readers understand web based authentication and provides the fundamentals of IP addres...
Lightweight Systems for Realtime Monitoring
If you're looking to access and make sense of all your data in real time, there's a more cost-effective and efficient way than using expensive commercial tool suites. In this O'Reilly report, Sam Newman from ThoughtWorks describes several small, freely available open source tools and frameworks for freeing data locked up in silos and...
Statistical Population Genomics
This open access volume presents state-of-the-art inference methods in population genomics, focusing on data analysis based on rigorous statistical techniques. After introducing general concepts related to the biology of genomes and their evolution, the book covers state-of-the-art methods for the analysis of genomes in populations, including demog...
Handbook on Craniofacial Superimposition
This free book is the first comprehensive guide to a new soft computing technique which is used in complex forensic cases. The chapters include detailed technical and practical overviews, and discussions about the latest tools, open problems and ethical and legal issues involved. The book will be of interest to researchers and practitioners in fore...
Early Geometrical Thinking in the Environment of Patterns, Mosaics and Isometries
This book discusses the learning and teaching of geometry, with a special focus on kindergarten and primary education. It examines important new trends and developments in research and practice, and emphasizes theoretical, empirical and developmental issues. Further, it discusses various topics, including curriculum studies and implementation, spat...
Bioimage Data Analysis Workflows
This Open Access textbook provides students and researchers in the life sciences with essential practical information on how to quantitatively analyze data images. It refrains from focusing on theory, and instead uses practical examples and step-by step protocols to familiarize readers with the most commonly used image processing and analysis platf...
Asterisk: The Future of Telephony
This bestselling book is now the standard guide to building phone systems with Asterisk, the open source IP PBX that has traditional telephony providers running scared! Revised for the 1.4 release of the software, the new edition of Asterisk: The Future of Telephony reveals how you can save money on equipment and support, and finally be in control ...
C# Notes for Professionals
The C# Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
The Kademlia Protocol Succinctly
With its novel XOR-based metric topology, Kademlia is the first peer-to-peer system to combine provable consistency and performance, latency-minimizing routing, and a symmetric, unidirectional topology. In The Kademlia Protocol Succinctly, author Marc Clifton leads readers through the positive aspects of Kademlia's decentralized specifications...
Objective-C Notes for Professionals
The Objective-C Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Learning Zeromq
Even connecting a few programs across a few sockets is plain nasty when you start to handle real life situations. Trillions? The cost would be unimaginable. Connecting computers is so difficult that software and services to do this is a multi-billion dollar business. So today we're still connecting applications using raw UDP and TCP, proprieta...
Linux Network Administrator's Guide
Linux, a Unix-compatible operating system that runs on personal computers and larger servers, is valued above all for its networking strengths. The Linux Network Administrator's Guide spells out all the information needed for joining a network, whether it's a simple UUCP connection or a full LAN with a Linux system serving as a firewall, ...
Learning C#
C# is a general-purpose, modern and object-oriented programming language pronounced as "C sharp". It is an unofficial and free C# ebook created for educational purposes. All the content is extracted from Stack Overflow Documentation, which is written by many hardworking individuals at Stack Overflow....
Measuring Emission of Agricultural Greenhouse Gases and Developing Mitigation Options using Nuclear and Related Techniques
This open book is an outcome of the collaboration between the Soil and Water Management & Crop Nutrition Section, Joint FAO/IAEA Division of Nuclear Techniques in Food and Agriculture, Department of Nuclear Sciences and Applications, International Atomic Energy Agency (IAEA), Vienna, Austria, and the German Science Foundation research unit DASI...
Haptics: Science, Technology, Applications
This open access book constitutes the proceedings of the 12th International Conference on Human Haptic Sensing and Touch Enabled Computer Applications, EuroHaptics 2020, held in Leiden, The Netherlands, in September 2020. The 60 papers presented in this volume were carefully reviewed and selected from 111 submissions. The were organized in topica...
The Impact of Digital Technologies on Public Health in Developed and Developing Countries
This open access book constitutes the refereed proceedings of the 18th International Conference on String Processing and Information Retrieval, ICOST 2020, held in Hammamet, Tunisia, in June 2020.* The 17 full papers and 23 short papers presented in this volume were carefully reviewed and selected from 49 submissions. They cover topics such as: Io...
Towards Interoperable Research Infrastructures for Environmental and Earth Sciences
This open access book summarises the latest developments on data management in the EU H2020 ENVRIplus project, which brought together more than 20 environmental and Earth science research infrastructures into a single community. It provides readers with a systematic overview of the common challenges faced by research infrastructures and how a '...
Get Started with MicroPython on Raspberry Pi Pico
Raspberry Pi Pico is a new low-cost, high-performance microcontroller board with flexible digital interfaces. Microcontrollers are computers stripped back to their bare essentials. You don't use monitors or keyboards, but program them to take their input from, and send their output to the input/output pins. Using these programmable connections...

1 2