Junte-se a nós em uma viagem ao mundo dos livros!
Adicionar este livro à prateleira
Grey
Deixe um novo comentário Default profile 50px
Grey
Assine para ler o livro completo ou leia as primeiras páginas de graça!
All characters reduced
Fossils of Iowa - Field Guide to Paleozoic Deposits - cover

Nos desculpe! A editora ou autor removeu este livro do nosso catálogo. Mas não se preocupe, você ainda tem mais de 500.000 livros para escolher para seguir sua leitura!

Fossils of Iowa - Field Guide to Paleozoic Deposits

Robert Wolf

Editora: Open Road Distribution

  • 0
  • 0
  • 0

Sinopse

The Fossils of Iowa field guide is written primarily for amateurs in geological exploration and collecting. Robert Wolf provides a comprehensive coverage of more than 150 sites in Iowa and adjacent areas of Minnesota and Nebraska with the types of fossils that can be found and precise directions. Excellent illustrations by Carol Ann Ratcliff aide in identification. For an update in site conditions and geological names since the book was first published contact the author at midnightwriter@frontiernet.net.
Disponível desde: 28/06/2016.
Comprimento de impressão: 212 páginas.

Outros livros que poderiam interessá-lo

  • The Incredible Journey of Plants - cover

    The Incredible Journey of Plants

    Stefano Mancuso

    • 0
    • 0
    • 0
    When we talk about migrations, we should study plants to understand that these phenomena are unstoppable. In the many different ways plants move, we can see the incessant action and drive to spread life that has led plants to colonize every possible environment on earth. The history of this relentless expansion is unknown to most people, but we can begin our exploration with these surprising tales, engagingly told by Stefano Mancuso. 
    Generation after generation, using spores, seeds, or any other means available, plants move in the world to conquer new spaces. The number and variety of tools through which seeds spread is astonishing: we have seeds dispersed by wind, by rolling on the ground, by animals, by water, or by a simple fall from the plant, which can happen thanks to propulsive mechanisms, the swaying of the mother plant, the drying of the fruit, and much more. 
    In this accessible, absorbing overview, Mancuso considers how plants convince animals to transport them around the world, and how some plants need particular animals to spread; how they have been able to grow in places so inaccessible and inhospitable as to remain isolated; how they resisted the atomic bomb and the Chernobyl disaster; how they are able to bring life to sterile islands; how they can travel through the ages, as they sail around the world.
    Ver livro
  • The Aliens Among Us - How Invasive Species Are Transforming the Planet - and Ourselves - cover

    The Aliens Among Us - How...

    Leslie Anthony

    • 0
    • 0
    • 0
    From an award-winning adventure and science journalist comes an eye-opening exploration of a burgeoning environmental phenomenon and the science coalescing around it. Leslie Anthony leads listeners on adventures physical and philosophical as he explores how and why invasive species are hijacking ecosystems around the globe. 
    Weaving science, travel, history, and humor with diverse examples to chart and describe the phases of species invasion and human response, Anthony introduces field researchers and managers who seek to understand the biological, social, and economic aspects of this complex issue, and whose work collectively suggests the emergence of a global shadow economy centered on invasives. 
    With tales of pythons in the Everglades, Asian carp and lamprey in the Great Lakes, Japanese knotweed seemingly everywhere, and the invasive organisms we don't see—pathogens and microbes such as the Zika virus—this book rivets attention on a new ecological reality.
    Ver livro
  • Bluefin Tunas and the Problem of Overfishing - cover

    Bluefin Tunas and the Problem of...

    John Rafferty

    • 0
    • 0
    • 0
    John Rafferty of Encyclopædia Britannica discusses the Atlantic and Pacific bluefin, two species of tunas that are threatened by overfishing. This is the third part of the Postcards from the 6th Mass Extinction audio series.
    Ver livro
  • Science Denial - Why It Happens and What to Do About It - cover

    Science Denial - Why It Happens...

    Barbara Hofer, Gale Sinatra

    • 0
    • 0
    • 0
    How do individuals decide whether to accept human causes of climate change, vaccinate their children against childhood diseases, or practice social distancing during a pandemic? Democracies depend on educated citizens who can make informed decisions for the benefit of their health and well-being, as well as their communities, nations, and planet. Understanding key psychological explanations for science denial and doubt can help provide a means for improving scientific literacy and understanding?critically important at a time when denial has become deadly. In Science Denial: Why It Happens and What to Do About It, the authors identify the problem and why it matters and offer tools for addressing it. This book explains both the importance of science education and its limitations, shows how science communicators may inadvertently contribute to the problem, and explains how the internet and social media foster misinformation and disinformation. The authors focus on key psychological constructs such as reasoning biases, social identity, epistemic cognition, and emotions and attitudes that limit or facilitate public understanding of science, and describe solutions for individuals, educators, science communicators, and policy makers. If you have ever wondered why science denial exists, want to know how to understand your own biases and those of others, and would like to address the problem, this book will provide the insights you are seeking.
    Ver livro
  • Introduction to Power System Protection - cover

    Introduction to Power System...

    Dr. Hidaia Mahmood Alassouli

    • 0
    • 0
    • 0
    Power system protection systems have three basic components: Instrument transformers, Relays, Circuit breakers
    
    The function of the CT is to reproduce in its secondary winding a current I' that is proportional to the primary current I. The CT converts primary currents in the kiloamp range to secondary currents in the 0–5 ampere range for convenience of measurement.
    
    The function of the relay is to discriminate between normal operation and fault conditions. The OC relay in Figure 2 has an operating coil, which is connected to the CT secondary winding, and a set of contacts. When |I'| exceeds a specified ''pickup'' value, the operating coil causes the normally open contacts to close. When the relay contacts close, the trip coil of the circuit breaker is energized, which then causes the circuit breaker to open.
    
    System-protection components have the following design criteria:
    • Reliability: Operate dependably when fault conditions occur, even after remaining idle for months or years. Failure to do so may result in costly damages.
    • Selectivity: Avoid unnecessary, false trips.
    • Speed: Operate rapidly to minimize fault duration and equipment damage. Any intentional time delays should be precise.
    • Economy: Provide maximum protection at minimum cost.
    • Simplicity: Minimize protection equipment and circuitry.
    
    Since it is impossible to satisfy all these criteria simultaneously, compromises must be made in system protection.
    
    The book consists from the following sections:
    1. Chapter 1: Power System Faults:
    2. Chapter 2: Instrument Transformers.
    3. Chapter 3: Overcurrent and Earth Fault Protection Relays.
    4. Chapter 4: Radial System Protection.
    5. Chapter 5: Zones of Protection.
    6. Chapter 6: Differential Relays.
    7. Chapter 7: Distance Relays.
    8. Chapter 8: Transformer Protection.
    9. Chapter 9: Generator Protection.
    10. Chapter 10: Busbar Protection.
    11. Chapter 11: Circuit Breakers.
    12. Chapter 12: Fuses.
    13. Chapter 13: References.
    Ver livro
  • Ultimate Web Authentication Handbook - Strengthen Web Security by Leveraging Cryptography and Authentication Protocols such as OAuth SAML and FIDO - cover

    Ultimate Web Authentication...

    Sambit Dash

    • 0
    • 1
    • 0
    Practical gateway to securing web applications with OIDC, OAuth, SAML, FIDO, and Digital Identity to.KEY FEATURES ? Dive into real-world practical hands-on experience with authentication protocols through sample code.? Gain a programmer's perspective on cryptography, certificates, and their role in securing authentication processes.? Explore a wide array of authentication protocols, including TLS, SAML, OAuth, OIDC, WebAuthn, and Digital Identity.? Graded step-by-step guidance that simplifies complex concepts, making them accessible to programmers of all levels of expertise.DESCRIPTIONIn today's digital landscape, web apps evolve rapidly, demanding enhanced security. This Ultimate Web Authentication Handbook offers a comprehensive journey into this realm. Beginning with web authentication basics, it builds a strong foundation. You'll explore cryptography fundamentals, essential for secure authentication. The book delves into the connection between authentication and network security, mastering federated authentication via OAuth and OIDC protocols. You'll also harness multi factor authentication's power and stay updated on advanced trends. The book expands on deepening your understanding of Java Web Token (JWT), FIDO 2, WebAuthn, and biometric authentication to fortify web apps against multifaceted threats. Moreover, you'll learn to use Identity and Access Management (IAM) solutions for constructing highly secure systems. Whether you're a developer, security enthusiast, or simply curious about web security, this book unlocks the secrets of secure online interactions.WHAT WILL YOU LEARN ? Comprehend Web Application Architectures and Enhance Security Measures. ? Implement Robust Web Security with Public Key Cryptography. ? Harness SAML, OAuth, and OIDC for Advanced User Authentication and Authorization. ? Strengthen Web App Security with Multi Factor Authentication. Transition to Passwordless Authentication with FIDO       and Biometric Security. ? Stay Ahead with Insights into Digital Identity, Biometric Authentication, Post-Quantum Cryptography, and Zero Trust Architecture Trends.WHO IS THIS BOOK FOR?This book is for computer programmers, web application designers, and architects. Most Identity Management Products focus on the server components, while this book intends to serve numerous developers of client integrations who need a conceptual understanding of the standards. The sample applications are developed using Golang and Flutter Web.TABLE OF CONTENTS 1. Introduction to Web Authentication.2. Fundamentals of Cryptography.3. Authentication with Network Security.4. Federated Authentication-I5. Federated Authentication-II6. Multifactor Authentication.7. Advanced Trends in Authentication.     Appendix A: The Go Programming Language Reference.     Appendix B: The Flutter Application Framework.     Appendix C: TLS Certificate Creation.	  Index.
    Ver livro