feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Charité  (76)
  • F.-Ebert-Stiftung  (11)
  • GB Großbeeren  (4)
  • Moses Mendelssohn Zentrum  (1)
  • GB Grünheide  (1)
  • 2010-2014  (93)
Type of Medium
Language
Region
Library
Virtual Catalogues
Year
Access
  • 1
    UID:
    almafu_(DE-604)BV039652755
    Format: XXVIII, 1452 S. : , Ill., graph. Darst. ; , 29 cm.
    Edition: 5. Aufl.
    ISBN: 978-3-527-32754-6
    Uniform Title: Organic chemistry
    Language: German
    Subjects: Chemistry/Pharmacy
    RVK:
    RVK:
    Keywords: Organische Chemie ; Lehrbuch ; Lehrbuch ; Lehrbuch ; Lehrbuch ; Lehrbuch ; Lehrbuch
    Author information: Schore, Neil Eric 1948-
    Author information: Butenschön, Holger 1953-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    b3kat_BV040928889
    Format: 242 S.
    Edition: 1. publ.
    ISBN: 9781848547902 , 9781848547919 , 9781848547926
    Note: Hier auch später erschienene, unveränderte Nachdrucke , Incl. bibliogr. references (S. [217]-226) and index. - Explores the idea of big data, which refers to our newfound ability to crunch vast amounts of information, analyze it instantly, and draw profound and surprising conclusions from it
    Additional Edition: Erscheint auch als Online-Ausgabe ISBN 978-1-84854-793-3
    Language: English
    Subjects: Computer Science , Economics , Sociology
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Big Data ; Informationsgesellschaft ; Datenmanagement ; Datenanalyse ; Informationsbeschaffung ; Sozialer Wandel ; Privatsphäre ; Datenschutz ; Big Data ; Datennetz ; Soziales Netzwerk ; Datenmissbrauch
    Author information: Cukier, Kenneth
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    b3kat_BV042146990
    Format: 598 S. , zahlr. Ill., Kt. , 24 cm
    Edition: 1. publ.
    ISBN: 9780241008331
    Note: Literatuverz. S. 584 - 587
    Language: English
    Subjects: History
    RVK:
    Keywords: Deutschland ; Geschichte ; Ausstellung
    Author information: MacGregor, Neil 1946-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Book
    Book
    Basingstoke [u.a.] : Palgrave Macmillan
    UID:
    b3kat_BV039517006
    Format: XX, 342 S. , Ill., graph. Darst.
    Edition: 1. publ.
    ISBN: 9780230290105
    Series Statement: Work and welfare in Europe
    Language: English
    Subjects: Sociology
    RVK:
    Keywords: Europäische Union ; Mitgliedsstaaten ; Berufstätiger ; Niedriglohn ; Armut ; Europäische Union ; Mitgliedsstaaten ; Arbeitnehmer ; Armut ; Aufsatzsammlung ; Aufsatzsammlung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Oxford :Academic,
    UID:
    almahu_9947366640802882
    Format: 1 online resource (3987 p.)
    Edition: 3rd ed.
    ISBN: 1-283-73425-7 , 0-12-382220-3
    Content: The third edition of the Handbook of Proteolytic Enzymes is a comprehensive reference work for the enzymes that cleave proteins and peptides, written by acknowledged experts in the field and containing over 850 chapters. Each chapter is organized into sections describing the name and history, activity and specificity, structural chemistry, preparation, biological aspects, and distinguishing features for a specific peptidase. There are also introductory chapters on peptidase classification and mechanisms and a comprehensive index. For the first time, the Handbook is also
    Note: Previous ed.: London: Elsevier Academic, 2004. , Front Cover; Handbook of Proteolytic Enzymes; Copyright Page; Contents; Editor Biographies; Contributors; Preface; Introduction; Terminology; Organization of the Handbook; Special forms of information in the Handbook; Links to the MEROPS database; Molecular images; Alignments; Secondary structure; Description of substrate specificity; References; Aspartic Peptidases; 1 Introduction: Aspartic and Glutamic Peptidases and Their Clans; Clan AA; Family A1; Other Families in Clan AA; Clan AF; Clan AC; Clan AD; Clan AE; Other Families; Glutamic Peptidases; Asparagine Peptide Lyases , Clans NA, NC and NEInteins; Autotransporters; References; 2 Catalytic Pathways of Aspartic Peptidases; Introduction; Enzymatic Mechanism of Aspartic Peptidases; Enzymatic Mechanism of Glutamic Peptidases; References; 3 Pepsin A; Databanks; Name and History; Activity and Specificity; Structural Chemistry; Pepsinogen; Preparation; Biological Aspects; Related Peptidases; Further Reading; References; 4 Pepsin B; Databanks; Name and History; Activity and Specificity; Structural Chemistry; Preparation; Biological Aspects; Further Reading; References; 5 Chymosin; Databanks; Name and History , Activity and SpecificityStructural Chemistry; Preparation; Biological Aspects; Distinguishing Features; Related Proteinases; Further Reading; References; 6 Cathepsin E; Databanks; Name and History; Activity and Specificity; Structural Chemistry; Preparation; Biological Aspects; Tissue Distribution and Subcellular Localization; Regulation of Gene Expression; Processing, Maturation and Intracellular Trafficking Of Cathepsin E; Physiological Roles of Cathepsin E; Distinguishing Features; Further Reading; References; 7 Gastricsin; Databanks; Name and History; Activity and Specificity , Structural ChemistryProgastricsin; Preparation; Biological Aspects; References; 8 Cathepsin D; Databanks; Name and History; Activity and Specificity; Assay Methods; Specificity; Inhibition and Activation; Structural Chemistry; Three-dimensional Structure; Preparation; Biological Aspects; Gene and Expression Control; Knock-out Model; Organ Distribution and Cellular Localization; Apoptosis; Involvement in Cancer; Neurodegeneration; Other Biological Functions; Distinguishing Features; Related Peptidases; Acknowledgment; Further Reading; References; 9 Nothepsin; Databanks; Name and History , Activity and SpecificityStructural Chemistry; Primary Structure Analysis; Distinguishing Features of This New Class of Aspartic Proteinases; Retrieval and Sequencing of Nothepsin Enzymes; Presence of a Nothepsin Enzyme in Non-Antarctic Fish; Nothepsin in Organisms Other Than Fish; Preparation; Biological Aspects; Expression Pattern of the Nothepsin in Fish and Lizard; Phylogenetic Analysis, Adaptive Evolution and Role of Nothepsin; Further Reading; References; 10 Napsin A; Databanks; Name and History; Activity and Specificity; Structural Chemistry; Preparation; Biological Aspects , Further Reading , English
    Additional Edition: ISBN 0-12-382219-X
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almahu_9948324389502882
    Format: xvi, 232 p. : , ill.
    Edition: Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    almahu_9949577312102882
    Format: 1 online resource (135 p.)
    Edition: 1st ed.
    ISBN: 1-280-12694-9 , 9786613530806 , 0-8330-5960-2
    Series Statement: Technical report ; [TR-933-EC]
    Content: This report discusses how policy-makers might address the challenges and risks in respect of the security, privacy and trust aspects of cloud computing that could undermine the attainment of broader economic and societal objectives across Europe.
    Note: "Sponsored by the European Commission Directorate General Information Society and Media". , Cover; Title Page; Copyright; Preface; Acknowledgements; Contents; Glossary; Executive Summary; Synthesis; Defining cloud computing; Defining security, privacy and trust; Issues arising from the reviewed literature; Risk control frameworks; Operational challenges; Implications from case studies; Gap analysis; Solving the challenges: observations and recommendations; Conclusions; Methodology; Structure of the report; Chapter 1:Introduction; Chapter 2: Definitions and drivers; 2.1 Definitions of cloud computing; 2.2 What's pushing cloud take-up? , 2.3 The economics of cloud computing: implications for security; 2.4 Concluding remarks; Chapter 3: Understanding the implications for security, privacy and trust; 3.1 Defining security, privacy and trust; 3.2 Growing focus on security, privacy and trust concerns; 3.3 Identifying key issues and possible enablers for security, trust and privacy in the cloud; Chapter 4: Security, privacy and trust challenges stemming from the technological underpinnings of cloud computing; 4.1 The linchpin of trust: the hypervisor , 4.2 Can the distributed models of computation characteristic of grid technology adequately serve the availability and interoperability needs of cloud computing?; 4.3 Current state-of-the-art web services may not be sufficient to establish interoperability for identity management in the cloud; 4.4 Trustworthiness in service-orientated architectures (SOAs); 4.5 Will web application frameworks (APIs and SDKs) be credible in providing trust across distributed environments?; 4.6 The fragility of current encryption approaches in the cloud context; 4.7 Concluding remarks , Chapter 5: Security, privacy and trust challenges inherent to the legal and regulatory aspects of cloud computing; 5.1 Horizontal perspective: applicable law and jurisdiction; 5.2 Vertical issues: main applicable laws; 5.3 The will of the parties: contractual provisions; 5.4 Overcoming legal barriers: key tools; 5.5 Concluding remarks; Chapter 6: Putting it all together: key risks and operational challenges; 6.1 Summary of legal and technical issues; 6.2 Migrating to the cloud: the operational challenges; Chapter 7: Case studies; 7.1 Introduction; 7.2 Initial classification of case studies , 7.3 Observations on case studies in practice; 7.4 Matrix of case study typology; 7.5 Case Study 1: the Danish National IT and Telecom Agency; 7.6 Case study 2: the City of Los Angeles; 7.7 Case study 3: EU eHealth provider; 7.8 Implications; Chapter 8: Gap analysis; Chapter 9: Solving the challenges: recommendations and actions; 9.1 Introduction; 9.2 Recommendations; 9.3 Specific actions; Chapter 10: Conclusions; References; Appendices , English
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Urbana, Illinois :AOCS Press,
    UID:
    almahu_9948026147902882
    Format: 1 online resource (540 p.)
    ISBN: 0-12-804344-X , 0-9888565-5-7 , 1-61344-998-4
    Content: This book covers the progress of the last 10 years of studies on cocoa butter. Descriptions of several aspects, including physical characteristics such as rheology, hardness, melt profiles, etc., studied by new and advanced techniques are included. Similarly, the polymorphism of cocoa butter is reconsidered in light of studies done by synchrotron DSC, FTIR, and SAXS techniques. These data are complemented by new understandings on the cause of the crystallization and transitions of the polymorphs. Other aspects such as the effect of minor components, emulsifiers, and other fats are discussed in
    Note: Description based upon print version of record. , Front Cover; CocoaButter andRelatedCompounds; Copyright Page; Table of Contents; Preface; Chapter 1. Chocolate and Cocoa Butter-Structure and Composition; Introduction; Chocolate Composition and Structure; Cocoa Butter Composition; Structure and Polymorphism of Cocoa Butter; Effect of Cocoa Butter Composition and Structure on Chocolate Composition and Structure; References; Chapter 2. Theobroma cacao-An Introduction to the Plant, Its Composition, Uses, and Health Benefits; Introduction; Cacao and Cocoa-From Tree to Factory; Industrial Processing of Cocoa; Cocoa-Chemical Composition and Health , Cocoa, Chocolate, and Health-Insights from Epidemiological StudiesConclusions; References; Chapter 3. Cocoa Polyphenols; Introduction; Cocoa Polyphenols on Skin Structure Experiment; Conclusions; Acknowledgment; References; Chapter 4. Phase Behavior of Saturated Triacylglycerides-Influence of Symmetry and Chain Length Mismatch; Introduction; Materials and Methods; Melting Behavior and Phase Development of the Symmetrical/Asymmetrical TAG Binary Systems; Phase Diagrams of the Symmetrical/Asymmetrical TAG Binary Systems , Comparison of the Phase Behavior of the Symmetrical/Asymmetrical Binary Systems with CLM = 2, 4, 6, and 8References; Chapter 5. Molecular Composition Dynamics and Structure of Cocoa Butter; Introduction; Materials and Methods; Shear Work; Chemical Makeup and Structure; Conclusions; References; Chapter 6. Polymorphism and Mixing Phase Behavior of Major Triacylglycerols of Cocoa Butter; Introduction; Polymorphism and Mixing Behavior of Fats; Polymorphism of Cocoa Butter and Its Component TAGs; Mixing Behavior of POP, POS, and SOS; Conclusions; References , Chapter 7. Causes and Best Manufacturing Practices to Minimize Bloom in ConfectionsIntroduction; Definition and Characterization; Overview of Key Attributes in Confectionery Fats; Causes; Key Factors Contributing to Bloom from Composition to Oil Migration; Conclusions; References; Chapter 8. Morphology of Chocolate Fat Bloom; Introduction; Classification by Morphology of Chocolate Fat Bloom; Type 1 Bloom; Type 2 Bloom; Type 3 Bloom; Other Types; Summary; Conclusions; References; Chapter 9. Effect of Minor Components on Cocoa Butter Polymorphism and Kinetics of Crystallization; Introduction , Minor ComponentsFree Fatty Acids; FFA Effects on Microstructure; Diglycerides; Phospholipids; Sterol and Sterol Esters; Total Minor Lipids; Conclusions; References; Chapter 10. Noncocoa Ingredients on Cocoa Butter Crystallization; Introduction; Effect of Sugar with or without Emulsifier on Cocoa Butter Crystallization; Lecithin; Milk Powder; Conclusions; References; Chapter 11. Impact of Cocoa Butter Originon Crystal Behavior; Introduction; Characteristics of Cocoa Butterfrom Different Origins; Effect of Environmental Conditions and Agronomic Practices on Cocoa Butter Composition , Crystallization Habit of Cocoa Butter from Different Origins , English
    Additional Edition: ISBN 0-9830791-2-9
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Waltham, Mass. :Elsevier,
    UID:
    almahu_9947368440602882
    Format: 1 online resource (265 p.)
    Edition: 1st edition
    ISBN: 1-283-39413-8 , 9786613394132 , 1-59749-666-9
    Content: Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. Low Tech Hacking focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. Attackers are using common techniques like social engineering, wireless hacking, and targeting and surveillance to gain access to valuable data. This book contains detailed desc
    Note: Includes index. , Front Cover; Low Tech Hacking: Street Smarts for Security Professionals; Copyright; Contents; Acknowledgments; Foreword; About the Authors; Introlduction; Book Overview and Key Learning Points; Book Audience; How this Book is Organized; Chapter 1: Social engineering: The ultimate low tech hacking threat; Chapter 2: Low tech vulnerabilities: Physical security; Chapter 3: More about locks and ways to low tech hack them; Chapter 4: Low tech wireless hacking; Chapter 5: Low tech targeting and surveillance: How much could they find out about you? , Chapter 6: Low tech hacking for the penetration testerChapter 7: Low tech hacking and the law: Where can you go for help?; Chapter 8: Information security awareness training: Your most valuable countermeasure to employee risk; Conclusion; Chapter 1: Social engineering: The ultimate low tech hacking threat; How Easy is it?; The Mind of a Social Engineer; The mind of a victim; Tools of The Social Engineering Trade; One of my favorite tools of the trade; Social engineering would never work against our company; What Was I Able to Social Engineer Out of Mary? , The Final Sting-Two weeks Later-Friday AfternoonWhy did this scam work?; Let's look at a few more social engineering tools; Keystroke logger: Is there one under your desk?; One of my lunchtime tools; Let's look at that Telephone butt-in set on my tool belt; Meet Mr. Phil Drake; Meet Mr. Paul Henry; Traditional AV, IDS, and IPS considerations; Traditional firewall consideration; Flaw remediation; Do you have a guest user of your credit card?; A few possible countermeasures; Always be slightly suspicious; Start to study the art of social engineering; Start a social engineering book library , SummaryChapter 2: Low tech vulnerabilities: Physical security; A mini risk assessment; What did I have at risk?; What were some possible threats while out on the lake?; What were some of the possible vulnerabilities?; And finally, what about my countermeasures?; Outsider-Insider Threats; Some things to consider for the security of your buildings; Check all locks for proper operation; Use employee badges; Shredder technology keeps changing as well; Keep an eye on corporate or agency phone books; Unsecured areas are targets for tailgating; Special training for off-shift staff , Bomb threats in ChicagoCheck those phone closets; Remove a few door signs; Review video security logs; Consider adding motion-sensing lights; Subterranean vulnerabilities; Clean Out Your Elephant Burial Ground; Spot Check Those Drop Ceilings; Internal auditors are your friends; BONUS: Home Security Tips; Summary; Chapter 3: More about locks and ways to low tech hack them; A little more about locks and lock picking; What kinds of locks are the most popular?; Purchasing better quality locks will be cost effective; Be aware of lock vulnerabilities; Forced entry-and other ways to cheat! , A time-tested low tech method of forced entry , English
    Additional Edition: ISBN 1-59749-665-0
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    almahu_BV042175417
    Format: XVI, 316, [8] S. : , Ill.
    Language: English
    Subjects: History
    RVK:
    Keywords: 1897-1960 Bevan, Aneurin ; Biografie ; Biografie
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages