Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
This textbook introduces new business concepts on cloud environments such as secure, scalable anonymity and practical payment protocols for the Internet of things and Blockchain technology. For example, when a role is granted to a user, this role may conflict with other roles of the user or together with this role;
This book covers the principles, historical development, and applications of many acoustic logging methods, including acoustic logging-while-drilling and cased-hole logging methods.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.