feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • UB Potsdam  (656)
  • Moses Mendelssohn Zentrum  (12)
  • SB Königs Wusterhausen
Type of Medium
Language
Region
Library
Virtual Catalogues
Access
  • 1
    UID:
    b3kat_BV035414135
    Format: 1 Online-Ressource (372 Seiten) , Illustrationen, Karten , 25 cm
    Edition: Online_Ausgabe Boulder, Colo NetLibrary 2004 E-Books von NetLibrary Sonstige Standardnummer des Gesamttitels: 22382847
    ISBN: 1402078749
    Series Statement: Transportation research, economics and policy v. 10
    Note: Includes bibliographical references
    Additional Edition: Reproduktion von Assessing the benefits and costs of ITS 2004
    Additional Edition: Erscheint auch als Druck-Ausgabe, Hardcover ISBN 978-1-4020-7677-0
    Additional Edition: Erscheint auch als Druck-Ausgabe, Paperback ISBN 978-1-4757-7982-0
    Language: English
    Keywords: Transportsystem ; Verkehrsleitsystem ; Verkehrsinvestition ; Konferenzschrift ; Electronic books. ; Electronic books. ; Electronic books ; Konferenzschrift
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Maxwell Air Force Base, AL : Air University Press
    UID:
    b3kat_BV040921751
    Format: 1 Online-Ressource (1 v.)
    ISBN: 9781435611986 , 1435611985
    Note: "Fairchild paper." , Includes bibliographical references and index , This paper focuses on the unique and vital capabilities of the US Air Force's KC-135 tanker fleet. It analyzes historic and current tanker usage, tanker operational employment, and the capability of today's tanker fleet, with emphasis on force structure and force management. In light of decreasing budgets, aging airframes, increase downtime for maintenance, and an explosion in the operations tempo, this paper proposes a four-pronged methodology addressing tanker vision, organization, training and employment, as the correction needed to get the KC-135 weapon system back on centerline. This will allow the tanker to effectively aid the Air Force in successfully deterring conflict and, if needed, quickly win the nation's future wars
    Language: English
    Keywords: USA ; Luftwaffe ; Flugbetankung ; Kriegführung ; Geschichte 1948-2000 ; Electronic books
    URL: Full text  (Click to View (Currently Only Available on Campus))
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Baden-Baden :Nomos, | Wien :facultas,
    UID:
    almafu_(DE-604)BV044440055
    Format: 1 Online-Ressource (548 Seiten).
    Edition: 2., vollständig überarbeitet und aktualisierte Auflage
    ISBN: 978-3-8452-7493-5
    Series Statement: Politik und Demokratie in den kleineren Ländern Europas Band 1
    Additional Edition: Erscheint auch als Druck-Ausgabe, Nomos ISBN 978-3-8487-3124-4
    Additional Edition: Erscheint auch als Druck-Ausgabe, facultas ISBN 978-3-7089-1506-7
    Language: German
    Subjects: Political Science
    RVK:
    Keywords: Demokratie ; Internationaler Vergleich ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (URL des Erstveröffentlichers)
    Author information: Wineroither, David 1981-
    Author information: Helms, Ludger 1967-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almahu_9949602262502882
    Format: 1 online resource (515 pages)
    Edition: 1st ed.
    ISBN: 9781484228968
    Note: Intro -- Table of Contents -- About the Authors -- Acknowledgments -- Foreword -- Introduction -- Chapter 1: Conceptualizing the Secure Internet of Things -- The BadUSB Thumb Drive -- Air-Gap Security -- Stuxnet -- Designing Safe and Secure Cyber-Physical Systems -- Constrained Computing and Moore's Law -- Trusted IoT Networks and the Network Edge -- Conclusion -- Chapter 2: IoT Frameworks and Complexity -- Introduction -- Historical Background to IoT -- IoT Ecosystem -- Connectivity Technology -- Messaging Technology -- Platform Technology -- Elements of an IoT System -- IoT Device -- IoT Device Architectural Goals -- Interoperability -- Security -- IoT Network -- IoT System Management -- Device Lifecycle -- Manufacturing -- Supply Chain -- Deployment -- Normal Operation and Monitoring -- Manage -- Update -- Decommissioning -- IoT Framework -- IoT Framework Design Goals -- IoT Data Model and System Abstractions -- IoT Node -- IoT Operations Abstraction -- Connectivity Elements -- Manageability Elements -- Security Elements -- Consider the Cost of Cryptography -- Summary IoT Framework Considerations -- IoT Framework Architecture -- Data Object Layer -- Node Interaction Layer -- Platform Abstraction Layer -- Platform Layer -- Security Challenges with IoT Frameworks -- Consumer IoT Framework Standards -- Open Connectivity Foundation (OCF) -- OCF Core Framework Layer -- OCF Profiles Framework Layer -- The OCF Device Abstraction -- OCF Security -- AllSeen Alliance/AllJoyn -- AllJoyn Security -- Universal Plug and Play -- UPnP Security -- Lightweight Machine 2 Machine (LWM2M) -- LWM2M Architecture -- LWM2M Device Management -- LWM2M Security -- One Machine to Machine (OneM2M) -- OneM2M Security -- Industrial IoT Framework Standards -- Industrial Internet of Things Consortium (IIC) and OpenFog Consortium. , Open Platform Communications-Unified Architecture (OPC-UA) -- OPC-UA Framework Architecture -- OPC-UA Security -- Data Distribution Service (DDS) -- DDS Framework Architecture -- DDS Security -- Security Enveloping -- Security Tokens -- Security Plugin Modules -- Framework Gateways -- Framework Gateway Architecture -- Type I Framework Gateway -- Type II Framework Gateway -- Type III Framework Gateway -- Type IV Framework Gateway -- Security Considerations for Framework Gateways -- Security Endpoints Within the Gateway -- Security Endpoints in Type I Gateways -- Security Endpoints in Type II Gateways -- Security Endpoints in Type III Gateways -- Security Endpoints in Type IV Gateways -- Security Framework Gateway Architecture -- Summary -- Chapter 3: Base Platform Security Hardware Building Blocks -- Background and Terminology -- Assets, Threats, and Threat Pyramid -- Inverted Threat Pyramid -- Sample IoT Device Lifecycle -- End-to-End (E2E) Security -- Security Essentials -- Device Identity -- Protected Boot -- Protected Storage -- Trusted Execution Environment (TEE) -- Built-In Security -- Base Platform Security Features Overview -- CPU Hosted Crypto Implementations -- Malware Protection (OS Guard) -- OS Guard (SMEP) -- OS Guard (SMAP) -- Encryption/Decryption Using AES-NI -- Sign/Verify Using Intel® SHA Extensions -- Intel® Data Protection Technology with Secure Key (DRNG) -- Converged Security and Manageability Engine (CSME) -- Secure/Verified, Measured Boot and Boot Guard -- Trusted Execution Technology (TXT) -- Platform Trust Technology (PTT) -- Enhanced Privacy ID (EPID) -- Memory Encryption Technologies -- TME -- MKTME -- Dynamic Application Loader (DAL) -- Software Guard Extensions (SGX) - IA CPU Instructions -- Identity Crisis -- Enhanced Privacy Identifier (EPID) -- Anonymity -- PTT/TPM -- Device Boot Integrity - Trust But Verify. , Secure Boot Mechanisms -- Secure Boot Terminology Overview -- Overview of BIOS/UEFI Secure Boot Using Boot Guard Version 1.0 (BtG) -- Data Protection - Securing Keys, Data at Rest and in Transit -- Intel Platform Trust Technology (PTT) -- Windows PTT Architecture -- Linux PTT Software Stack -- Runtime Protection - Ever Vigilant -- Intel Virtualization Technology (Intel VT) -- Software Guard Extensions (SGX) -- Intel CSE/CSME - DAL -- Isolation from Rich Execution Environment -- Authenticity and Security -- Portability -- Intel Trusted Execution Technology (TXT) -- Threats Mitigated -- Zero-Day Attacks -- Other Attacks -- Conclusion -- References -- Chapter 4: IoT Software Security Building Blocks -- Understanding the Fundamentals of Our Architectural Model -- Operating Systems -- Threats to Operating Systems -- Zephyr: Real-Time Operating System for Devices -- Zephyr Execution Separation -- Zephyr Memory Separation -- Zephyr Privilege Levels and System Authorization -- Zephyr Programming Error Protections -- Zephyr's Other Security Features -- Zephyr Summary -- Linux Operating Systems -- Pulsar: Wind River Linux -- Ubuntu IoT Core -- Intel® Clear Linux -- Linux Summary -- Hypervisors and Virtualization -- Threats to Hypervisors -- Intel® ACRN -- Real-Time and Power Management Guarantees in ACRN -- ACRN Summary -- Software Separation and Containment -- Containment Security Principles -- Threats to Extended Application Containment -- Containers -- Kata Containers -- Kata Containers Summary -- Trusted Execution Environments -- Software Guard Extensions -- SGX Security Summary -- Android Trusty -- Trusty TEE Security Summary -- Containment Summary -- Network Stack and Security Management -- Intel Data Plane Development Kit -- Security Management -- Secure Device Onboarding -- Platform Integrity -- Network Defense -- Platform Monitoring. , McAfee Embedded Control -- Network Stack and Security Summary -- Device Management -- Mesh Central -- Wind River Helix Device Cloud -- Device Management Summary -- System Firmware and Root-of-Trust Update Service -- Threats to Firmware and RoT Update -- Turtle Creek System Update and Manageability Service -- System Firmware and RoT Summary -- Application-Level Language Frameworks -- JavaScript and Node.js or Sails -- Java and Android -- EdgeX Foundry -- Application-Level Framework Summary -- Message Orchestration -- Message Queuing Telemetry Transport -- OPC Unified Architecture -- Constrained Application Protocol -- Message Orchestration Summary -- Applications -- Summary -- Chapter 5: Connectivity Technologies for IoT -- Ethernet Time-Sensitive Networking -- Legacy Ethernet-Based Connectivity in Industrial Applications -- Key Benefits of TSN -- TSN Standards -- TSN Profiles -- 802.1AS/AS-Rev -- 802.1Qbv -- 802.1Qbu -- 802.1CB -- 802.1Qcc -- 802.1Qci -- 802.1Qch -- 802.1Qcr -- TSN and Security -- OPC-UA Over TSN -- Overview of Wireless Connectivity Technologies -- Considerations for Choosing Wireless Technologies for IoT -- Spectrum -- Range and Capacity -- Network Topology -- Quality of Service -- Network Management -- Security -- Wi-Fi -- Bluetooth -- Zigbee -- NFC -- GPS/GNSS -- Cellular -- 5G Cellular -- Key Standards, Regulatory, and Industry Bodies Involved in 5G -- New Use Cases Enabled by 5G -- Key Technology Enablers for 5G -- LPWAN - Low-Power Wide Area Networks -- LoRa -- Sigfox -- Weightless -- Comparison of Low-Power LTE and Other LPWAN Technologies -- A Case Study - Smart Homes -- Summary -- References -- Chapter 6: IoT Vertical Applications and Associated Security Requirements -- Common Domain Requirements and the Security MVP -- Some Common Threats -- Retail Solutions -- Security Objectives and Requirements -- Threats. , Standards - Regulatory and Industry -- Transportation Solutions14 -- Connected Vehicle Infrastructure -- Security Objectives and Requirements -- Threats -- Mitigations -- Standards - Regulatory and Industry -- Industrial Control System (ICS) and Industrial IoT (IIoT) -- Security Objectives and Requirements -- Threats -- Standards - Regulatory and Industry -- Digital Surveillance System -- Security Objectives and Requirements -- Threats -- Standards - Regulatory and Industry -- Summary -- Appendix: Conclusion -- Economics of Constrained Roots-of-Trust -- IoT Frameworks - Necessary Complexity -- Hardware Security - More Than a Toolbox -- IOT Software - Building Blocks with Glue -- Ethernet TSN - Everybody's Common Choice? -- Security MVP - The Champion Within a Fractured IoT Ecosystem -- The Way Forward -- Index.
    Additional Edition: Print version: Cheruvu, Sunil Demystifying Internet of Things Security Berkeley, CA : Apress L. P.,c2019 ISBN 9781484228951
    Language: English
    Subjects: Computer Science , Economics
    RVK:
    RVK:
    RVK:
    Keywords: Electronic books. ; Electronic books
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Full-text  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    almafu_BV012809227
    Format: XXI, 602 S. : , graph. Darst.
    ISBN: 0-471-07253-2
    Note: Includes bibliographical references and index
    Language: English
    Subjects: Economics , Psychology
    RVK:
    RVK:
    RVK:
    Keywords: Humanvermögen ; Personalentwicklung ; Strategisches Management ; Personalpolitik
    Author information: Kreps, David M. 1950-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin Heidelberg :
    UID:
    almahu_9947921463402882
    Format: X, 198 p. , online resource.
    ISBN: 9783540392347
    Series Statement: Lecture Notes in Mathematics, 931
    Note: Notation and preliminaries -- Types and rank—1 groups -- Examples of indecomposable groups and direct sums -- Endomorphism rings and decompositions of rank 2 groups -- Pure subgroups of completely decomposable groups -- Homogeneous completely decomposable groups and generalizations -- Completely decomposable groups and generalizations -- Additive categories, quasi-isomorphism and near-isomorphism -- Stable range, substitution, cancellation, and exchange properties -- Subrings of finite dimensional Q-algebras -- Orders in finite dimensional simple Q-algebras -- Maximal orders in finite dimensional simple Q-algebras -- Near isomorphism and genus class -- Grothendieck groups -- Additive groups of subrings of finite dimensional Q-algebras -- Q-simple and p-simple groups.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783540115571
    Language: English
    Subjects: Mathematics
    RVK:
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Ithaca ; London : Cornell Selects, an imprint of Cornell University Press
    UID:
    b3kat_BV046302373
    Format: 1 Online-Ressource
    ISBN: 9781501749346 , 9781501749339
    Note: Erscheint als Open Access bei De Gruyter
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-1-5017-4932-2
    Language: English
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Cover
    URL: Cover
    URL: Cover
    Author information: Farrell, David M. 1960-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    b3kat_BV037195499
    Format: 1 Online-Ressource (380 p.) , 101 b&w, ill
    ISBN: 1847558763 , 9781847558763
    Series Statement: RSC Biomolecular sciences v. 15
    Note: Provides a perspective on nucleic acid-metal ion interactions with an emphasis on experimental biophysical studies which will prove indispensable to biophysicists and molecular biologists, Natural biochemical processes are routinely being discovered in living cells that involve RNA. Some of these processes, such as RNA interference, are now being exploited for biotechnology and medicinal applications. DNA has also proven in recent years to be more than a passive storehouse of information. For example, non-B-form DNA structures formed by G-rich DNA have been shown to participate in the regulation of gene expression, a discovery that presents new possibilities for drug targets in the genome. The current quest to understand how nucleic acid functions at the most fundamental level requires that we have a detailed understanding of nucleic acid-metal ion interactions. Because RNA and DNA are polyanions the structure and biological function of these biopolymers depends strongly on their association with metal ions. While this intimate connection between metal ions and nucleic function has been appreciated for decades, the noncovalent and dynamic nature of these interactions has continually presented challenges to the development of accurate and quantitative descriptions. Over the past few years the development of solution state spectroscopic techniques and the achievement of high resolution X-ray crystal structures have provided tremendous insights into the nature of nucleic acid-metal ion interactions, including direct evidence for their importance in determining nucleic acid structure, from the dictation of folding pathways followed by large RNA molecules to the subtle modulation of DNA groove widths. This new book provides a comprehensive review of the experimental studies that define our current understanding of nucleic acid-metal ion interactions with a particular ++ , emphasis being placed on experimental biophysical studies. However, the book is not merely a current review of the literature, as original material and fresh perspectives on published results are also presented. Particularly noteworthy topics include: -The chapter by Williams and fellow workers which reviews information provided by x-ray crystal structures and discusses what this information has revealed about the unique nature of Mg2+ interactions with RNA phosphate groups. The authors provide fresh insights, based upon structural comparisons, for how these interactions govern the local folding pathways of RNA. By dedicating separate chapters to the participation of metal ions in the kinetics and thermodynamics of RNA folding, this volume provides a more in depth treatise of both areas than is typically possible for reviews in which these two related, but distinct, topics are combined -Polyelectrolyte models of nucleic acids have proven to be extremely valuable for understanding the sequestering counterions in a so-called diffuse cloud around polymeric DNA. J. Michael Schurr provides a comprehensive review of polyanion models. of nucleic acid-metal ion interactions. Despite the success of polyelectrolyte models in describing some physical properties of nucleic acids, this topic is not always sufficiently understood by many researchers to make use of these models and this chapter serves as a valuable and up to date introduction to this topic. -The chapter by Pizarro and Sadler on metal ion-nucleic acid interactions in disease and medicine is complemented by a chapter by Lippert on coordinative bond formation between metal ions and nucleic acid bases. Together, these two chapters provide an overview of transition metal ion interactions with nucleic acids that illustrates the promise and peril that is associated with direct metal ion coordination to nucleic acid b++e , s in living cells. The book is sufficiently detailed to serve as a reference source for researchers active in the field of nucleic acids biophysics and molecular biology. In addition, chapter authors have added introductory material and enough background material in each chapter so that the book can also can serve as an entry point for students and researchers that have not previously worked in the field which will make the book of lasting value and more accessible by a wider audience
    Language: English
    Subjects: Chemistry/Pharmacy
    RVK:
    Keywords: Nucleinsäuren ; Metallion
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    b3kat_BV037195559
    Format: 1 Online-Ressource (330 p.) , 59 b&w, ill
    ISBN: 1847559980 , 9781847559982
    Series Statement: RSC Biomolecular sciences v. 16
    Note: This book, written by expert scientists in the field, analyses how diverse fields of scientific research interact on a specific example - RNA polymerases, The cell can be viewed as a 'collection of protein machines' and understanding these molecular machines requires sophisticated cooperation between cell biologists, geneticists, enzymologists, crystallographers, chemists and physicists. To observe these machines in action, researchers have developed entirely new methodologies for the detection and the nanomanipulation of single molecules. This book, written by expert scientists in the field, analyses how these diverse fields of research interact on a specific example - RNA polymerase. The book concentrates on RNA polymerases because they play a central role among all the other machines operating in the cell and are the target of a wide range of regulatory mechanisms. They have also been the subject of spectacular advances in their structural understanding in recent years, as testified by the attribution of the Nobel prize in chemistry in 2006 to Roger Kornberg. The book focuses on two aspects of the transcription cycle that have been more intensively studied thanks to this increased scientific cooperation - the recognition of the promoter by the enzyme, and the achievement of consecutive translocation steps during elongation of the RNA product. Each of these two topics is introduced by an overview, and is then presented by worldwide experts in the field, taking the viewpoint of their speciality. The overview chapters focus on the mechanism-structure interface and the structure-machine interface while the individual chapters within each section concentrate more specifically on particular processes-kinetic analysis, single-molecule spectroscopy, and termination of transcription, amongst others. Specific attention has been paid to the newcomers in the field, with ++ , careful descriptions of new emerging techniques and the constitution of an atlas of three-dimensional pictures of the enzymes involved. For more than thirty years, the study of RNA polymerases has benefited from intense cooperation between the scientific partners involved in the various fields listed above. It is hoped that a collection of essays from outstanding scientists on this subject will catalyse the convergence of scientific efforts in this field, as well as contribute to better teaching at advanced levels in Universities
    Language: English
    Subjects: Biology
    RVK:
    Keywords: DNS-abhängige-RNS-Polymerasen ; Aufsatzsammlung
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    b3kat_BV037195430
    Format: 1 Online-Ressource (400 p.) , 77 b&w, ill
    ISBN: 1847557961 , 9781847557964
    Note: This insightful book spotlights both the structural and medicinal chemistry aspects of drug design, Computational methods impact all aspects of modern drug discovery and most notably these methods move rapidly from academic exercises to becoming drugs in clinical trials! This insightful book represents the experience and understanding of the global experts in the field and spotlights both the structural and medicinal chemistry aspects of drug design. The need to 'encode' the factors that determine adsorption, distribution, metabolism, excretion and toxicology are explored, as they remain the critical issues in this area of research. This indispensable resource provides the reader with: * A rich understanding of modern approaches to docking * A comparison and critical evaluation of state-of-the-art methods * Details on harnessing computational methods for both analysis and prediction * An insight into prediction potencies and protocols for unbiased evaluations of docking and scoring algorithms * Critical reviews of current fragment based methods with perceptive applications to kinases Addressing a wide range of uses of protein structures for drug discovery the Editors have created and essential reference for professionals in the pharmaceutical industry and moreover an indispensable core text for all graduate level courses covering molecular interactions and drug discovery
    Language: English
    Subjects: Chemistry/Pharmacy
    RVK:
    Keywords: Arzneimitteldesign ; Ligand ; Proteindesign ; Arzneimittelentwicklung ; Ligand ; Proteindesign
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages