Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Protocols for Pre-Field Screening of Mutants for Salt Tolerance in Rice, Wheat and Barley
This book offers effective, low-cost and user-friendly protocols for the pre-field selection of salt-tolerant mutants in cereal crops. It presents simple methods for measuring soil salinity, including soil sampling and the analysis of water-soluble salts, and describes a detailed, but simple, screening test for salt tolerance in rice, wheat and bar...
Cryptography in .NET Succinctly
Irresponsible ownership of data is the cause of many leaked emails, data, and other damaging information. Securing a user's personal information is the job of software developers. If you, as a developer, can decrypt the information stored in the database of the system you are working on, then so can anyone else. In Cryptography in .NET Succinc...
Guideline for Salinity Assessment, Mitigation and Adaptation Using Nuclear and Related Techniques
This book is an outcome of the collaboration between the Soil and Water Management & Crop Nutrition Section, Joint FAO/IAEA Division of Nuclear Techniques in Food and Agriculture, Department of Nuclear Sciences and Applications, International Atomic Energy Agency (IAEA), Vienna, Austria, and the International Center for Biosaline Agricultur...
Ocean-Atmosphere Interactions of Gases and Particles
The oceans and atmosphere interact through various processes, including the transfer of momentum, heat, gases and particles. In this book leading international experts come together to provide a state-of-the-art account of these exchanges and their role in the Earth-system, with particular focus on gases and particles. Chapters in the book cover: ...
Cost and Revenue Overruns of the Olympic Games 2000–2018
In this book the cost and revenue overruns of Olympic Games from Sydney 2000 to PyeongChang 2018 from eight years before the Games to Games‐time are investigated to provide a base for future host cities. The authors evaluated the development of expenditure and revenues of the organizing committees to operate the event, and the investment of taxpa...
Habitats and Biota of the Gulf of Mexico: Before the Deepwater Horizon Oil Spill
The Gulf of Mexico is an open and dynamic marine ecosystem rich in natural resources but heavily impacted by human activities, including agricultural, industrial, commercial and coastal development. Nutrients and pollutants from coastal communities and dozens of rivers flow into the Gulf, including material from the Mississippi River watershed, whi...
Agricultural and Forestry Reconstruction After the Great East Japan Earthquake
This book summarizes the results of 3 years of agricultural and forestry reconstructive efforts and applied research conducted directly in the affected areas of Fukushima following the Great East Japan Earthquake. It describes fast and effective revival methods and technologies from tsunami and radiation damages, demonstrated through the collaborat...
Plant Physiology, Development and Metabolism
This book focuses on the fundamentals of plant physiology for undergraduate and graduate students. It consists of 34 chapters divided into five major units. Unit I discusses the unique mechanisms of water and ion transport, while Unit II describes the various metabolic events essential for plant development that result from plants’ ability to cap...
Crypto 101
Crypto 101 is an introductory course on cryptography, freely available for programmers of all ages and skill levels. Learn how to exploit common cryptographic flaws, armed with nothing but a little time and your favorite programming language. Forge administrator cookies, recover passwords, and even backdoor your own random number generator....
Lisp Web Tales
The book is a set of tutorials and examples. It uses the Common Lisp language and some of the libraries we'll be using for the examples and tutorials include: - The hunchentoot web server - The Restas web framework - The SEXML library for outputting XML and HTML - Closure-template for HTML templating - Postmodern for PostgreSQL access, an...
Application Security in .NET Succinctly
Security in software development should be a first-order requirement, but it's often implemented in projects as an afterthought. With Application Security in .NET Succinctly, author Stan Drapkin provides a refresher of .NET security practices and fills common knowledge gaps for experienced developers and novices alike. Learn about hashes, mach...
Mastering Dyalog APL
Mastering Dyalog APL is a complete guide to the use of Dyalog, beginning with a thorough introduction to the APL programming language. Following this, the tutorial describes a large number of common coding techniques and discusses a variety of interfaces, including file handling and COM/OLE. Bernard Legrand provides a comprehensive introduction to ...