Showing 48,901 - 48,919 results of 48,919 for search '"Commerce"', query time: 0.59s Refine Results
  1. 48901
    Published 2017
    Table of Contents: “…-- The Importance of Family Planning and the Development of a Robust Network of Relative Centers in the Greek National Health System -- Assessment of Inhabitants’ Health Care Needs in Local Community -- Innovation and Knowledge-Based Entrepreneurship -- The Role of Marketing Interventions in Fostering the Diffusion of Green Energy Technologies -- Analysis of the Characteristics of Knowledge-Intensive Firms in Greece -- A Comparative Analysis of Knowledge-Based Firms In High-Tech Sectors and Knowledge Intensive Business Services -- Reporting of Human Capital as One of the Corporate Social Responsibility Areas -- Part IX: Strategic Marketing of Heritage, Cultural and Architectural Tourism -- Food Experiences: The Oldest Social Network… -- Tourism Events: the SATA Rallye Azores in Facebook and Twitter -- Cultural Festivals on Sites of Cultural Heritage as a Means of Development of Alternative Forms of Tourism -- Regional Museums as Centers of Strengthening the Local Cultural Identity and as Tourist Attraction: The Case Study of the Display and the Educational Pro-Gram of the Archaeological Collection of Thespies (Biotia, Greece) -- Cultural Policy and Marketing Management: The case study of New Museum of Acropolis -- Part X: Symposium on Business Informatics and Modelling -- Information Systems Engineering and Knowledge-Based Enterprise Modelling: Towards Foundations of Theory -- Modeling the Promotion Process of Academic Conferences Through Social Media -- Merchandising IT Products via Social Networks: Modeling and Simulation of the Procedures -- The Contribution of Social Media in the Management of Social Relations with Customers: Modelling and Simulation of the Problem -- Modeling of Market Segmentation in Social Networks and Media -- Modeling of B2C Communication Strategies in Electronic Commerce -- Robots in the Hospital Setting: A Case Study -- A Case Study on the Use of 3d Printing Technologies in an Educational Institution -- Information Systems Phases and Firm Performance: A Conceptual Framework -- Complex Dynamics of Single Agent Choice Governed by Dual-Channel Multi-Mode Reinforcement Learning -- Blended Learning and Business Modeling in Technical Translation Studies -- Creation Technologies for Smart Hypertextual Tutorials in Intercultural Educational Space -- The Use of Individual Learning Styles in E-Learning -- On Communicative and Didactic Aspects of Mapping An Individual Study Pathway in Electronic Educational Environment -- The Information Communication Technology (ICT) in the Open and Distance Learning (ODL): A Tool with Potentials in the Field of Education; The Case Study of Greek Educational Institutes -- Instrument of Coordination of Social Groups for Effectiveness Increase in Smart Education’ Paradigm -- Legal Aspects Use of Educational and Scientific Information Has Posted on the Internet for Organizing E-Learning on the Example of Russia -- Protection of Confidential Information in Educational Information Environments -- Best Practices for a Scientific Seminar in Business Process Management for Master Students at Russian University -- Part XI: Symposium on…”
    Connect to this title online
    Electronic eBook
  2. 48902
    Published 2015
    View this video online
    Electronic Video
  3. 48903
  4. 48904
    Table of Contents: “…The modern world of commerce and technology was steeped in a Renaissance aesthetic. …”
    Connect to this title online (unlimited users allowed)
    Electronic eBook
  5. 48905
    Published 2007
    Connect to this title online
    Electronic eBook
  6. 48906
    Published 2015
    Table of Contents: “…Kim, et al -- SOM Clustering Method using user’s features to classify profitable customer for Recommender Service in u-Commerce; C. Y. Sung, et al -- A Performance Improvement Scheme for Discovery Service; P. …”
    Connect to this title online
    Electronic eBook
  7. 48907
    Published 2015
    Table of Contents: “…II -- Analysis of The Magnetic Field Homogeneity of Two Different Geometric Configurations of The Helmholtz Coils by Simulation -- A Multi-channel High Precision Pulse Counting System Based on FPGA -- High-Precision Ultrasonic Flow Measurement Based on GP22 -- Vibration Test of Dynamic Target Based on Stereo Machine Vision -- Fiber-Optic Extrinsic Fabry-Perot Interferometer Pressure Sensor Demodulation System with Three Quadrature Signals -- Capacity Improvement by Multi-User Virtual Multi-input and Multi-output System in a Measured Indoor Environment at 5 GHz -- Functional Magnetic Resonance Imaging Based on Large Data -- Diagnosis Expert System Design of a Certain Ordnance Launch Circuit -- Selection of Test Points Based on Heuristic Graph Search -- The Routing Protocol Based on the Aggregation of Routing Table in Cognitive Ad Hoc Networks -- The Lateral Channel Active Disturbance Rejection Controller Design of Small Air-to-Ground Missile for Helicopter -- Fast Image Fog Removal Based on Gray Image Guided Filter -- Parallel Acquisition Architecture for DS_FH Hybrid Spread Spectrum Signal in TT&C -- Arcless Interruption Method of Alternating CurrentContactor -- A High Speed LVDS Driver Design in 0.35-μm CMOS Technology -- Monitoring CE’3 Rover Movement Using Same Beam Interferometry with China Deep Space Network -- The Design of Smart Car Based on A Kind of Dynamic Threshold Algorithm and Speed Control Algorithm -- Face Recognition Based on Cross Validation by Support Vector Machine -- The Management and Monitor System of Tunnel Construction Based on Internet of Things -- A Novel Method of Frequency Selective Surface Transmission Characteristics Test -- Control Strategy of Hybrid Active Filter Based on Output Voltage Correction -- Wireless Optogenetics: An Exploration of Portable Microdevices for Small Animal Photostimulation -- Multi-scale Relevance Vector Machine Fault Prediction based on Genetic Algorithm Optimization -- Analysis of 750kV High Resistance Operation -- Research and Design of Lossy Compression Algorithm in Embedded Real-time Database -- A Novel Planar Elliptical Dipole Antenna for Ultra-wideband Application -- Influence of the Snubber Circuit on the Commutation Process of High-power Five-level Converter -- Color Image Segmentation Using Multilevel Thresholding-Hybrid Particle Swarm Optimization -- Automotive Light Control System Development based on Kinetis KEA -- A Modified Design of Active Magnetic Bearing Controller -- Multiple Channel Assignment and Recycling Algorithm for MR-MC Network Architecture -- Construction of One-Coincidence Frequency-Hopping Sequence Set with Optimal Performance -- A Social Network based Intelligent Collaborative Decision Model with Larger Group Consensus Requirements for Collaborative B2B E-commerce -- Toward the Association Rules of Meteorological Data Mining Based on Cloud Computing -- A Novel In-flight Alignment Algorithm for Airborne Strapdown INS with Assistant of Doppler Radar -- Compiling Missile Environmental Spectrum and Accelerated Corrosion Test Method -- Design of Low Power Humidity and Temperature Collector based on STM32 -- Design of Router for Network on Chip based on Network Coding -- Implementation Method for Class J Power Amplifiers -- Paerosols’ Statistical Fractal Characteristics based on Its Shape Parameter in Optical Sensor -- Analysis of Circulating Currents in Modular Multilevel Converter-Static Synchronous Compensator -- Universal Control of Second-Order Non-holonomic Systems -- An Improved Concurrent Programming Architectural Model Based on Cloud Computing -- Passivity and Biological Control of Singular Mammal Body Complexity System -- Image Retrieval of Poisonous Mushrooms Based on Relevance Feedback and Clustering Algorithm -- An Anti-Collision Protocol of Adaptive Tree Slot without Tag Estimation -- Development of an Elevator Energy Consumption Monitoring Device -- A Hierarchical Synthetic Aperture Radar Image Re.…”
    Connect to this title online
    Electronic eBook
  8. 48908
    Published 2015
    Table of Contents: “…Dimayuga, et al -- Filtering as a Tool of Diversity in Ensemble of Classifiers; Eva Volna, et al -- Mining High Utility Patterns in Different Time Periods; Show-Jane Yen, Yue-Shi Lee -- Content Based Image Retrieval using Fuzzy Texton and Shearlet Transform; Sudhakar Putheti , et al -- Assessing Lean Implementation; Timo Schröders, Virgilio Cruz-Machado -- Concealing of Al2(SO4)3Stainby Spray Coating Process; Chachsanun Srisoy, Suksan Prombanpong -- Developing interfaces based on services to the cloud manufacturing; Eduardo Cardoso Moraes, et al -- Optimization of Teflon Spraying Process for Non-Stick Coating Application; Oraphan Poonkwan, et al -- Multidimensional Process Analytical System for Manufacturing Management; Poonphon Suesaowaluk -- The Design of Machine Cluster for Loading and Unloading Slider in the Hard Disk Drive Manufacturing; Amarin Wongsetti, Suksan Prombanpong -- A study of downloading game applications; Long-Sheng Chen, Chen-Wei Yen -- Explicating the Trends of China's Logistics Services for Electronic Commerce; Mu-Chen Chen, et al -- Measuring Customer Relationship Marketing Outcomes in the Greek Banking Sector; Ilias Santouridis, Melania Stoumbou -- Analysis of Websites of Top Global Logistics Providers by a Trust Building Framework; Lachana Ramingwong, Sakgasit Ramingwong -- An Empirical-based Construction of the Multi-Purpose Process Reference Model for Hospital Supply Chain; Wirachchaya Chanpuypetch, Duangpun Kritchanchai -- Smartphone Based Healthcare Platform and Challenges; Bofan Song, et al -- Operating rooms decision optimization integrating surgery planning and nurse rostering; Siyu Wang, et al -- Linking Hospital Supply Chain Processes and Performance to Identify Key Performance Indicator; Tuangyot Supeekit, et al -- Kansei’s Physiological Measurement in Small-Medium sized Enterprises using Profile of Mood States and Heart Rate; Mirwan Ushada, et al -- Investigation of Customer and Technical Requirements for Designing an Ergonomics Notebook Soft case using Quality Function Deployment (QFD) Approach; Hilma Raimona Zadry, Defri Arif Irfansyah -- Demographic Characteristics in Correlation with Household Electricity Use; Lusi Susanti, et al -- HR Competencies; G. …”
    Connect to this title online
    Electronic eBook
  9. 48909
    Published 2015
    Connect to this title online (unlimited users allowed)
    Electronic eBook
  10. 48910
    Published 2022
    Table of Contents: “…Preface xiii Acknowledgments xv List of Figures xvii List of Tables xxiii List of Contributors xxv List of Abbreviations xxix 1 Introduction to IoT 1 1.1 Introduction 2 1.2 History 5 1.3 Applications of IoT 6 1.3.1 Domestic Applications 6 1.3.2 Applications in Healthcare 7 1.3.3 Applications in E-commerce 8 1.3.4 Industrial Applications 9 1.3.5 Applications in Energy 10 1.4 Technical Details of IoT 11 1.4.1 Sensors 11 1.4.2 Actuators 15 1.4.3 Processing Topologies 16 1.4.4 Communication Technologies 18 1.5 Recent Developments 20 1.6 Challenges 22 1.7 Conclusion 23 References 23 2 IoT and its Requirements for Renewable Energy Resources 29 2.1 Introduction 30 2.1.1 IoT and its Necessity 30 2.1.2 Challenges in RES 30 2.1.3 Integration of IoT in RES and Benefits 32 2.2 Industrial IoT 32 2.2.1 Architecture of IoT 33 2.2.2 IoT Components 34 2.3 RESandIoT 36 2.3.1 IoT Controls for RES 36 2.3.2 Challenges in IoT Implementation 38 2.4 Challenges of IoT in EMS Post-implementation 39 2.4.1 Privacy Issues 39 2.4.2 Security Concerns 41 2.4.3 Data Storage Issues 43 2.4.3.1 Challenges in data management 43 2.4.3.2 Challenges in fetching data 44 2.4.3.3 Challenges in allocation 44 2.5 Solution to IoT Challenges 45 2.5.1 Blockchain Methodology 45 2.5.1.1 Blockchain technology infrastructure features 47 2.5.1.2 Application domains of blockchain technology 47 2.5.1.3 Challenges of blockchain technology 47 2.5.2 Cloud Computing 48 2.5.2.1 Reference architecture 49 2.5.2.2 Network communication and its challenge 51 2.5.2.3 Privacy and security 51 2.5.2.4 Background information 53 2.5.2.5 Big data analytics 53 2.5.2.6 Provision of program quality 53 2.5.2.7 IPv4 addressing limit 54 2.5.2.8 Legal aspects and social facts 55 2.5.2.9 Service detection 56 2.6 Conclusion 56 References 57 3 Power Quality Monitoring of Low Voltage Distribution System Toward Smart Distribution Grid Through IoT 61 3.1 Introduction 62 3.2 Introduction to Various PQ Characteristics 63 3.3 Introduction to IoT 64 3.4 Smart Monitoring using IoT for the Low Voltage Distribution System 65 3.5 Power Quality Monitoring of Low Voltage Distribution System ́⁰₃ Case Study 67 3.5.1 Undervoltage 69 3.5.2 Overvoltage 69 3.5.3 Interruption 71 3.5.4 Overload in Branch Circuit 72 3.6 Conclusion 74 References 75 4 Health Monitoring of a Transformer in a Smart Distribution System using IoT 79 4.1 Introduction 80 4.2 Introduction to the Transformer 81 4.3 Failure of the Distribution Transformer 82 4.4 Transformer Health Monitoring System through IoT 82 4.4.1 Winding and Oil Temperature Sensor 83 4.4.2 Oil Level Monitoring Sensor 84 4.4.3 Current Sensor and Voltage Sensor 84 4.4.4 Microcontroller 85 4.4.5 LCD or Monitor 85 4.4.6 Communication System 85 4.4.7 Central Monitoring and Control 86 4.5 Case Study 86 4.6 Conclusion 89 References 89 5 Introduction To Machine Learning Techniques 93 5.1 Why and What is Machine Learning? …”
    Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)
    Electronic eBook
  11. 48911
  12. 48912
    by Sampaio de Alencar, Marcelo
    Published 2022
    Table of Contents: “…Preface xv Acknowledgements xvii List of Figures xix List of Tables xxiii 1 Introduction 1 1.1 Information on the Network 3 1.2 The Internet of Things 4 1.3 Network Security 6 1.4 Network Encryption 7 1.5 Electronic Voting 8 1.6 Security with Biometrics 10 1.7 How to Understand Recognition 12 1.8 Blockchain and Cryptocurrency 13 1.8.1 Enterprises Can Profit from Blockchain 13 1.8.2 The Cryptocurrency Frenzy 14 2 Main Definitions 19 2.1 Criteria for a Security System 19 2.2 Security Aspects to Consider 20 2.3 Malicious Codes 22 2.3.1 Virus 23 2.3.2 Worms 24 2.3.3 Robots 25 2.3.4 Spy Programs 26 2.3.5 Backdoor Program 27 2.3.6 Trojan Horse 27 2.3.7 Rootkit 28 2.4 Internet Scams 29 2.4.1 Identity Theft 30 2.4.2 Resource Anticipation Fraud 30 2.4.3 Phishing 30 2.4.4 Pharming 31 2.4.5 E-commerce Scams 31 2.4.6 Hoax 32 2.5 Internet Attacks 33 2.5.1 Vulnerability Exploitation 34 2.5.2 Network Scan 34 2.5.3 Fake E-mail Address 34 2.5.4 Traffic Interception 35 2.5.5 Brute Force Attack 35 2.5.6 Page Defacement 36 2.5.7 Denial of Service 36 2.6 Cryptography 37 2.6.1 Symmetric Key and Asymmetric Key Cryptography 37 2.6.2 Hash Function 38 2.6.3 Digital Signature 39 2.6.4 Digital Certificate 39 2.6.5 Cryptography Programs 41 3 Information Theory 43 3.1 Information Measurement 45 3.2 Requirements for an Information Metric 46 3.3 Source Coding 52 3.4 Extension of a Memoryless Discrete Source 54 3.4.1 Improving the Coding Efficiency 54 3.5 Prefix Codes 55 3.6 The Information Unit 58 4 Source Coding 61 4.1 Types of Source Codes 61 4.1.1 Block Codes 61 4.1.2 Non-Singular Codes 61 4.1.3 Uniquely Decodable Codes 62 4.1.4 Instantaneous Codes 63 4.2 Construction of Instantaneous Codes 65 4.3 Kraft Inequality 67 4.4 Huffman Code 69 4.4.1 Constructing a Binary Huffman Code 70 5 Information Transmission and Channel Capacity 75 5.1 The Concept of Information Theory 76 5.2 Joint Information Measurement 76 5.3 Conditional Entropy 78 5.4 Model for a Communication Channel 79 5.5 Noiseless Channel 80 5.6 Channel with Independent Output and Input 80 5.7 Relations Between the Entropies 81 5.8 Mutual Information 82 5.9 Channel Capacity 84 5.9.1 Capacity of the Memoryless Discrete Channel 85 5.9.2 Relative Redundancy and Efficiency 85 6 Computer Networks 91 6.1 Data Flow in Networks 92 6.1.1 Capacity of a Channel Composition 92 6.1.2 Stationary Data Flow 96 6.2 Queue Models 99 6.2.1 Markov Model 101 6.2.2 Solution for a Stable Network 103 6.2.3 Constant Arrival Rate System 104 6.2.4 Efficient Server Model 107 6.2.5 Model with Discouraged Arrivals 108 6.2.6 Models of Queues M/G/1, M/M/1, and M/D/1 109 6.3 Local Area Networks 112 6.3.1 Definitions and Functions 112 6.3.2 Applications for Local Area Networks 113 6.3.3 Network Structure and Topology 113 6.3.4 Channel Access Techniques 116 6.3.5 Traffic on the Network 117 6.3.6 Performance Measures 118 7 Network Protocols and Architecture 123 7.1 What the World Was Like Without the Internet 123 7.2 Layer Architecture 127 7.2.1 The ISO Reference Model 129 7.2.2 Reference Model layers 129 7.2.3 IEEE 802 Standards for Computer Networks 133 8 The TCP/IP Protocol 135 8.1 TCP/IP Protocol History 135 8.2 Internet Coordination 136 8.3 Types of Networks 137 8.4 Transmission Protocols 137 8.5 Interconnection Equipment 138 8.6 Interconnection Protocols 138 8.6.1 Other TCP Services 139 8.6.2 TCP Header Structure 140 8.7 The IP Protocol 141 8.7.1 IP Addresses 141 8.7.2 Example of a DNS 142 8.7.3 Datagram Fragmentation 142 8.7.4 IP Routing 143 8.7.5 IP Address Resolution 144 8.7.6 User Datagram Protocol 146 8.7.7 Applications that Use TCP and UDP 146 8.7.8 Applications that Use TCP and UDP 147 8.8 The TCP/IP Protocol 147 8.8.1 Application Layer 148 8.8.2 Transport Layer 149 8.8.3 Internet Layer 151 8.9 Security Protocols for TCP/IP 153 8.9.1 IP Security Protocol 154 8.9.2 Vulnerabilities and Precautions Regarding TCP/IP 155 8.9.3 Vulnerabilities and Precautions Regarding TCP/IP Services 156 9 Network Security 159 9.1 Cryptography Applied to Computer Networks 159 9.1.1 Potential Network Vulnerabilities 160 9.1.2 Listening, Data Change, Forged Identity 160 9.1.3 Password-Based Attacks 161 9.1.4 Denial of Service 161 9.1.5 Password Break Attack 162 9.1.6 Sniffer Attack 162 9.1.7 Attack to the Application Layer 163 9.2 Alternatives to Prevent Attacks 163 9.2.1 Security Technologies 164 9.2.2 Security Mechanisms for the Application Layer 164 9.2.3 Security Mechanisms for the Transport Layer 165 9.2.4 Security Mechanisms for the Network Layer 165 9.3 Secure Sockets Layer Protocol 166 9.3.1 Encryption Used with SSL 168 9.4 Exchange of Information for the Safe Sockets Layer 169 9.4.1 Server Authentication 171 9.4.2 Attack of the Man in the Middle 173 9.4.3 Client Authentication 173 9.5 Data Protection with IPsec 175 9.5.1 Security Associations 176 9.5.2 Tunneling 178 9.5.3 Authentication Header 179 9.5.4 Authentication Header Format 179 9.5.5 Authentication Header in Transport and Tunnel Modes 182 9.5.6 AH in Tunnel Mode 182 9.6 Encapsulated Security Load 184 9.6.1 ESP Package Format 184 9.6.2 ESP in Transport Mode 186 9.6.3 ESP in Tunnel Mode 186 9.7 Espionage Between Countries 186 10 Theoretical Cryptography 189 10.1 Introduction 189 10.2 Cryptographic Aspects of Computer Networks 190 10.2.1 Potential Vulnerabilities of Computer Networks 190 10.3 Principles of Cryptography 191 10.4 Information Theoretical Aspects of Cryptography 192 10.4.1 Relations Between the Entropies 194 10.5 Mutual Information for Cryptosystems 195 11 The Hash Function 197 11.1 Introduction to Network Security 197 11.2 Hash Functions 198 11.3 Objectives of the Hash Function 199 11.4 Mathematical Preliminaries 201 11.5 Privacy Amplification 202 11.6 Conclusion 204 12 Criminal Cases 205 12.1 Introduction to Cybercrimes 205 12.2 Types of Cybercrimes 205 12.3 Famous Cybercrimes 206 12.3.1 The Mythical Pegasus 207 12.3.2 Hackerś⁰₉ Attack to Colonial and JBS 207 12.3.3 The Biggest Ransomware Attack Ever 208 12.3.4 Credit Cards Data Stolen from Home DepotС́⁰₉s System 208 12.3.5 Largest Theft of Customer Data 208 12.3.6 Yahoo Data Breach 209 12.3.7 CustomerС́⁰₉s Data Stolen from Healthcare Companies 209 12.3.8 Social Security Numbers Stolen from IRS 209 12.3.9 Government Data Breach Due to Outdated Technology 210 12.3.10 Google Corporate Servers Hacked in China 210 12.3.11 Sony Pictures Hacked 210 12.3.12 Wikileaks Obtained Sensitive Information from the Democratic National Committee 211 12.3.13 A DDoS Attack that Took Down Twitter, PayPal, and Netflix 211 12.3.14 MafiaBoyС́⁰₉s Teenage Crimes 211 12.3.15 Epsilon Attacked by Hackers 212 12.3.16 NHS Patients Had Their Computers Infected 212 12.3.17 When the United States Department of Defense was Attacked 213 12.3.18 The Ashley Madison Hack 213 12.3.19 The Stuxnet Worm Attack 213 12.3.20 The Iceman Attack 214 12.3.21 Bitcoin Stolen from Bitfinex Exchange in Hong Kong 214 12.3.22 Crypto Exchange Bithumb Hacked 214 12.3.23 Espionage Between Partners 215 Appendix A Probability Theory 217 A.1 Set Theory and Measure 217 A.1.1 Basic Set Theory 218 A.1.2 Some Operations on Sets 219 A.1.3 Families of Sets 220 A.1.4 Indexing of Sets 221 A.1.5 An Algebra of Sets 222 A.1.6 The Borel Algebra 223 A.2 Basic Probability Theory 223 A.2.1 The Axioms of Probability 224 A.2.2 BayesС́⁰₉ Rule 225 A.3 Random Variables 226 A.3.1 Expected Value of a Random Variable 227 A.3.2 Moments of a Random Variable 227 A.3.3 Variance of a Random Variable 228 A.3.4 Characteristic Function 228 A.3.4.1 Two Important Distributions 228 A.3.5 Joint Random Variables 229 Appendix B Cryptoalgorithms and Cryptosystems 233 Appendix C Glossary of Information Security Terms 247 References 269 Index 277 About the Author 295.…”
    Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)
    Electronic eBook
  13. 48913
  14. 48914
  15. 48915
    Published 2016
    Table of Contents: “…Sharpe ; Sorts, classes, hierarchies / David Schalkwyk ; Trade and commerce : mercantilism / Michael Tratner ; Shakespeare's money / David J. …”
    Book
  16. 48916
    Published 2007
    Table of Contents: “…. -- Climate -- Climate Modeling -- Climate, Arctic and Subarctic -- Climate, Arid and Semi-Arid -- Climate, Continental -- Climate, Humid Subtropical -- Climate, Marine West Coast -- Climate, Mediterranean -- Climate, Tropical -- Climatology -- Climax Communities -- Clinton, William Administration -- Cloning -- Cloud Forests -- Club of Rome -- Coal -- Coastal Zone -- Cocaine -- Coffee -- Cogenerators -- Collective Agriculture -- Colombia -- Colonialism -- Colorado River -- Columbian Exchange -- Command and Control Regulation -- Commerce Clause -- Commodification -- Commodity -- Commodity Chains -- Common Law -- Common Property Theory -- Commoner, Barry -- Communication, Interspecies -- Communism -- Community Forestry -- Community Gardens -- Community-Based Conservation -- Commuting -- Complexity Theory -- Composting -- Comprehensive Environmental -- Response Compensation and Liability act -- Conflict -- Congo -- Congo River and Basin -- Congo, Democratic Republic -- Coniferous Forest -- Conservation -- Conservation Biology -- Conservation Easements -- Conservation Reserve Program -- Consultative Group for International -- Agricultural Research -- Consumers, Ecological -- Consumers, Economic -- Consumption -- Continental Shelf -- Continents -- Contingent Valuation -- Convention on Biological Diversity -- Convention on International Trade in Species of Wild Flora and Fauna -- Coral Reefs -- Costa Rica -- Cost-Benefit Analysis -- Cotton -- Cradle-To-Grave Regulation of Hazardous Waste -- Critical Environmental Theory -- Croatia -- Cronon, William -- Crop Plants -- Crossbreeding -- Croton River Aqueduct -- Cryptosporidium -- Cuba -- Cultural Ecology -- Culture -- Currents, Ocean -- Cuyahoga River -- Cyprus -- Czech Republic.…”
    Connect to this title online
    Electronic eBook
  17. 48917
    Published 1969
    Serial
  18. 48918
  19. 48919
    by Jing, Thomas
    Published 2021
    Connect to this title online (unlimited users allowed)
    Electronic eBook