| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910457773103321 |
|
|
Autore |
Mody Cyrus C. M (Cyrus Cawas Maneck), <1974-> |
|
|
Titolo |
Instrumental community [[electronic resource] ] : probe microscopy and the path to nanotechnology / / Cyrus C. M. Mody |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cambridge, Mass., : MIT Press, 2011 |
|
|
|
|
|
|
|
ISBN |
|
1-283-32170-X |
9786613321701 |
0-262-29818-X |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (xiii, 260 p.) : ill |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Nanotechnology - Research - United States |
Nanotechnology - Research - Europe |
Scanning probe microscopy |
Intellectual cooperation |
Scientists - United States |
Scientists - Europe |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Sommario/riassunto |
|
In this volume, the author argues that this technology-centric view does not explain how these microscopes helped to launch nanotechnology - and fails to acknowledge the agency of the microscopists in making the STM and its variants critically important tools. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNISA996279449503316 |
|
|
Autore |
Ghinita Gabriel |
|
|
Titolo |
2015 International Workshop on Secure Internet of Things : SIoT 2015 : 21-25 September 2015, Vienna, Austria : proceedings / / Gabriel Ghinita, Pedro Peris-Lopez |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Piscataway, New Jersey : , : IEEE, , [2015] |
|
©2015 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (ix, 83 pages) : illustrations |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Internet - Security measures |
Internet of things |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Session 1: Security and Privacy -- Session 2: Secure Protocols -- Session 3: Users and Privacy -- Session 4: Security Attacks and Threats -- Author Index. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
The workshop will focus on contributions related to the security of mesh and machine to machine networks, secure software stacks running on ubiquitous network nodes, and algorithms used to provide secure end to end communication between nodes. |
|
|
|
|
|
|
|
| |