03957nam 22008533u 450 991082021030332120240514070803.0978661325793297812832579301283257939978111811405611181140519781118114063111811406X97811181140321118114035(CKB)2550000000051605(EBL)818757(OCoLC)759159302(SSID)ssj0000539379(PQKBManifestationID)11362628(PQKBTitleCode)TC0000539379(PQKBWorkID)10568962(PQKB)11373613(MiAaPQ)EBC818757(Perlego)1012706(EXLCZ)99255000000005160520131014d2011|||| u|| |engur|n|---|||||txtccrNanoscale Multifunctional Materials Science & Applications1st ed.Hoboken Wiley20111 online resource (428 p.)Description based upon print version of record.9780470508916 0470508914 NANOSCALEMULTIFUNCTIONALMATERIALS; CONTENTS; CONTRIBUTORS; PREFACE; SECTION I OVERVIEW; 1 Key Attributes of Nanoscale Materials and Special Functionalities Emerging From Them; 2 Societal Impact and Future Trends in Nanomaterials; SECTION II PROCESSING AND ANALYSIS; 3 Fabrication Techniques for Growing Carbon Nanotubes; 4 Nanoparticles and Polymer Nanocomposites; 5 Laser-Assisted Fabrication Techniques; 6 Experimental Characterization of Nanomaterials; 7 Modeling and Simulation of Nanoscale Materials; SECTION III APPLICATIONS; 8 Nanomaterials for Alternative Energy9 Enhancement of Through-Thickness Thermal Conductivity in Adhesively Bonded Joints Using Aligned Carbon Nanotubes10 Use of Metal Nanoparticles in Environmental Cleanup; 11 Use of Carbon Nanotubes in Water Treatment; 12 Peptide Nanotubes in Biomedical and Environmental Applications; INDEX A multidisciplinary approach that explores the diverse properties, functions, and applications of nanomaterials Drawing together the many scientific and engineering disciplines underlying the development of nanomaterials, Nanoscale Multifunctional Materials provides a multidisciplinary review of the diverse properties, functions, and applications of nanomaterials. The book examines both nanoparticles, which have larger-scale equivalents, and uniquely assembled nanomaterials, which do not have larger-scale equivalents. Readers will gain a tremendous appreciation of the versatility of nDiffusionNanostructured materialsNanostructured materialsPorous materialsTECHNOLOGY & ENGINEERING / Material ScienceTechnology and engineering -- Material scienceNanostructured materialsChemical & Materials EngineeringHILCCEngineering & Applied SciencesHILCCMaterials ScienceHILCCDiffusion.Nanostructured materials.Nanostructured materials.Porous materials.TECHNOLOGY & ENGINEERING / Material Science.Technology and engineering -- Material science.Nanostructured materials.Chemical & Materials EngineeringEngineering & Applied SciencesMaterials Science620.115TEC021000bisacshMukhopadhyay S511780Mukhopadhyay Sharmila MAU-PeELAU-PeELAU-PeELBOOK9910820210303321Nanoscale Multifunctional Materials4106188UNINA05008nam 2200709Ia 450 991021998260332120200520144314.01-280-12694-997866135308060-8330-5960-2(CKB)2550000000074430(EBL)825129(OCoLC)780425716(SSID)ssj0000671945(PQKBManifestationID)11428724(PQKBTitleCode)TC0000671945(PQKBWorkID)10633978(PQKB)10207246(Au-PeEL)EBL825129(CaPaEBR)ebr10516122(MiAaPQ)EBC825129(oapen)doab114972(EXLCZ)99255000000007443020111211d2011 uy 0engur|n|---|||||txtccrThe Cloud understanding the security, privacy and trust challenges /Neil Robinson, ... [et al.]1st ed.Santa Monica Rand20111 online resource (135 p.)Technical report ;[TR-933-EC]"Sponsored by the European Commission Directorate General Information Society and Media".Includes bibliographical references.Cover; Title Page; Copyright; Preface; Acknowledgements; Contents; Glossary; Executive Summary; Synthesis; Defining cloud computing; Defining security, privacy and trust; Issues arising from the reviewed literature; Risk control frameworks; Operational challenges; Implications from case studies; Gap analysis; Solving the challenges: observations and recommendations; Conclusions; Methodology; Structure of the report; Chapter 1:Introduction; Chapter 2: Definitions and drivers; 2.1 Definitions of cloud computing; 2.2 What's pushing cloud take-up?2.3 The economics of cloud computing: implications for security; 2.4 Concluding remarks; Chapter 3: Understanding the implications for security, privacy and trust; 3.1 Defining security, privacy and trust; 3.2 Growing focus on security, privacy and trust concerns; 3.3 Identifying key issues and possible enablers for security, trust and privacy in the cloud; Chapter 4: Security, privacy and trust challenges stemming from the technological underpinnings of cloud computing; 4.1 The linchpin of trust: the hypervisor4.2 Can the distributed models of computation characteristic of grid technology adequately serve the availability and interoperability needs of cloud computing?; 4.3 Current state-of-the-art web services may not be sufficient to establish interoperability for identity management in the cloud; 4.4 Trustworthiness in service-orientated architectures (SOAs); 4.5 Will web application frameworks (APIs and SDKs) be credible in providing trust across distributed environments?; 4.6 The fragility of current encryption approaches in the cloud context; 4.7 Concluding remarksChapter 5: Security, privacy and trust challenges inherent to the legal and regulatory aspects of cloud computing; 5.1 Horizontal perspective: applicable law and jurisdiction; 5.2 Vertical issues: main applicable laws; 5.3 The will of the parties: contractual provisions; 5.4 Overcoming legal barriers: key tools; 5.5 Concluding remarks; Chapter 6: Putting it all together: key risks and operational challenges; 6.1 Summary of legal and technical issues; 6.2 Migrating to the cloud: the operational challenges; Chapter 7: Case studies; 7.1 Introduction; 7.2 Initial classification of case studies7.3 Observations on case studies in practice; 7.4 Matrix of case study typology; 7.5 Case Study 1: the Danish National IT and Telecom Agency; 7.6 Case study 2: the City of Los Angeles; 7.7 Case study 3: EU eHealth provider; 7.8 Implications; Chapter 8: Gap analysis; Chapter 9: Solving the challenges: recommendations and actions; 9.1 Introduction; 9.2 Recommendations; 9.3 Specific actions; Chapter 10: Conclusions; References; AppendicesThis report discusses how policy-makers might address the challenges and risks in respect of the security, privacy and trust aspects of cloud computing that could undermine the attainment of broader economic and societal objectives across Europe.Technical report (Rand Corporation) ;TR-933-EC.Cloud computingSecurity measuresComputer securityPrivacy, Right ofInformation policyEuropean Union countriesCloud computingSecurity measures.Computer security.Privacy, Right of.Information policy342.40858Robinson Neil1964-1041680Rand Corporation.European Commission.Information Society DG.MiAaPQMiAaPQMiAaPQBOOK9910219982603321The Cloud2484873UNINA03920oam 22008414a 450 991056309610332120250905110046.09780295741970029574197X10.1515/9780295741970(CKB)3710000001123876(MiAaPQ)EBC4858172(OCoLC)982376705(MdBmJHUP)musev2_81684(DE-B1597)725285(DE-B1597)9780295741970(Perlego)723918(ODN)ODN0008892112(EXLCZ)99371000000112387620170327d2017 uy 0engurcnu||||||||rdacontentrdamediardacarrierSymptoms of an Unruly AgeLi Zhi and Cultures of Early Modernity /Rivi Handler-SpitzSeattle, [Washington] ;London, [England] :University of Washington Press,2017.©20171 online resource (257 pages)9780295746135 0295746130 9780295741505 0295741503 Includes bibliographical references and index.Transparent language: origin myths and early modern aspirations of recovery -- The rhetoric of bluff: paradox, irony, and self-contradiction -- Sartorial signs and Li Zhi's paradoxical appearance -- Money and Li Zhi's economies of rhetoric -- Dubious books and definitive editions -- Provoking or persuading readers? Li Zhi and the incitement of critical judgment.Symptoms of an Unruly Age compares the writings of Li Zhi (1527-1602) and his late-Ming compatriots to texts composed by their European contemporaries, including Montaigne, Shakespeare, and Cervantes. Emphasizing aesthetic patterns that transcend national boundaries, Rivi Handler-Spitz explores these works as culturally distinct responses to similar social and economic tensions affecting early modern cultures on both ends of Eurasia. The paradoxes, ironies, and self-contradictions that pervade these works are symptomatic of the hypocrisy, social posturing, and counterfeiting that afflicted both Chinese and European societies at the turn of the seventeenth century.HISTORY / Asia / ChinabisacshSociologyPhilosophyfast(OCoLC)fst01123904Political sciencePhilosophyfast(OCoLC)fst01069819CulturePhilosophyfast(OCoLC)fst00885075Critical theoryfast(OCoLC)fst00883690Civilization, ModernPhilosophyfast(OCoLC)fst00863096SOCIAL SCIENCESociologyGeneralbisacshSOCIAL SCIENCERegional StudiesbisacshSOCIAL SCIENCEAnthropologyGeneralbisacshCritical theoryCulturePhilosophyPolitical sciencePhilosophyCivilization, ModernPhilosophySociologyPhilosophyHISTORY / Asia / ChinaSociologyPhilosophy.Political sciencePhilosophy.CulturePhilosophy.Critical theory.Civilization, ModernPhilosophy.SOCIAL SCIENCESociologyGeneral.SOCIAL SCIENCERegional Studies.SOCIAL SCIENCEAnthropologyGeneral.Critical theory.CulturePhilosophy.Political sciencePhilosophy.Civilization, ModernPhilosophy.SociologyPhilosophy.895.18/4609Handler-Spitz Rebecca1223092The Geiss Hsu Foundationfndhttp://id.loc.gov/vocabulary/relators/fndMdBmJHUPMdBmJHUPBOOK9910563096103321Symptoms of an Unruly Age2837279UNINA