You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Nine technical papers devoted primarily to the carbides, the discovery of which has been a major event in the field of superconductors during the past five years. They also include some extended treatments and reviews relating to the mercury-based, highest-temperature superconducting material discovered to date. The specific topics include the discovery of the system, the interrelation between magnetism and superconductivity, the dependency of superconductivity and magnetism on material parameters, properties of the thin films, synthesizing and characterizing the intermetallic compound, and what the magnetic properties of mercury cuprate high-temperature superconductors reveal. Reproduced from typescripts. Annotation copyrighted by Book News, Inc., Portland, OR
This volume focuses on the wealth of existing literature on physical metallurgy, and deals with materials in different states of order and the process of order evolution. It is a valuable reference by students and researchers in the field of materials science and metallurgy.
Frontiers in Superconducting Materials gives a state-of-the-art report of the most important topics of the current research in superconductive materials and related phenomena. It comprises 30 chapters written by renowned international experts in the field. It is of central interest to researchers and specialists in Physics and Materials Science, both in academic and industrial research, as well as advanced students. It also addresses electronic and electrical engineers. Even non-specialists interested in superconductivity might find some useful answers.
This is essentially a book which belongs to the genre of anthology of autobiographical narratives of some of the finest products of IIT Madras who have come together of their own accord, at the invitation of their former teacher, on the eve of his 80th birthday. Within its covers one can find situations of common occurrence and interest and different ways in which they are handled by different people. Their collective experiences have resulted in a cross-sectional view of current Indian society, looked at from different perspectives. They are presented in a semi- popular style which holds the attention of the readers riveted to these issues and their solutions. The presentation is fluid and conversational rather than serious and technical. As such it is bound to interest a large number of people who are engaged in various professions and belong to many different strata of Indian society.
This volume contains most of the contributions presented at the NATO Advanced Research Workshop on Rare Earth Transition Metal Borocarbides (Nitrides): Superconducting, Magnetic and Normal State Properties, held in Dresden, Germany at 13 - 18 June 2000. The Workshop was chaired by K. -H. MUller and V. N. Narozhnyi. This was the first meeting specially focused on the quaternary rare-earth transition-metal borocarbides and nitrides - a new class of magnetic superconductors discovered in 1994. The motivation for organizing this workshop was to bring together scientists (both experimentalists and theoreticians), actively working in this field in different countries, using different methods, to e...
This book constitutes the refereed proceedings of the Third International Conference on Information Systems Security, ICISS 2007, held in Delhi, India, in December 2007. The 18 revised full papers and five short papers presented together with four keynote papers were carefully reviewed and selected. The papers are organized in topical sections on network security, cryptography, architectures and systems, cryptanalysis, protocols, detection and recognition, as well as short papers.
2.1 Web Application Vulnerabilities Many web application vulnerabilities havebeenwell documented andthemi- gation methods havealso beenintroduced [1]. The most common cause ofthose vulnerabilities isthe insu?cient input validation. Any data originated from o- side of the program code, forexample input data provided by user through a web form, shouldalwaysbeconsidered malicious andmustbesanitized before use.SQLInjection, Remote code execution orCross-site Scriptingarethe very common vulnerabilities ofthattype [3]. Below isabrief introduction toSQL- jection vulnerability though the security testingmethodpresented in thispaper is not limited toit. SQLinjectionvulnerabilityallowsanattackertoille...
This book constitutes the refereed proceedings of the Second International Conference on Information Systems Security, ICISS 2006, held in Kolkata, India in December 2006. The 20 revised full papers and five short papers presented together with four invited papers and three ongoing project summaries were carefully reviewed and selected from 79 submissions. The papers discuss in depth the current state of the research and practice in information systems security.
This book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, India, in December 2016. The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 196 submissions. The papers address the following topics: attacks and mitigation; authentication; authorization and information flow control; crypto systems and protocols; network security and intrusion detection; privacy; software security; and wireless, mobile and IoT security.