Auswahl der wissenschaftlichen Literatur zum Thema „Sensitive information“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Sensitive information" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Sensitive information"

1

SIVÁK, Jaroslav. "SENSITIVE INFORMATION." Krízový Manažment 14, no. 1 (March 30, 2015): 23–29. http://dx.doi.org/10.26552/krm.c.2015.1.23-29.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Nicklisch, Andreas, Kristoffel Grechenig, and Christian Thöni. "Information-sensitive Leviathans." Journal of Public Economics 144 (December 2016): 1–13. http://dx.doi.org/10.1016/j.jpubeco.2016.09.008.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

PRICE, LINDA L., LAWRENCE F. FEICK, and ROBIN A. HIGIE. "Information Sensitive Consumers and Market Information." Journal of Consumer Affairs 21, no. 2 (December 1987): 328–41. http://dx.doi.org/10.1111/j.1745-6606.1987.tb00206.x.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

NAWA, Kotaro. "Sensitive, but unclassified information." Journal of Information Processing and Management 48, no. 4 (2005): 243–44. http://dx.doi.org/10.1241/johokanri.48.243.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Vernon;, D. P. "Sensitive Versus Classified Information." Science 306, no. 5697 (October 29, 2004): 811e—812e. http://dx.doi.org/10.1126/science.306.5697.811e.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Conley, Sharon. "Keeping Sensitive Information Private." NASNewsletter 22, no. 4 (July 2007): 21. http://dx.doi.org/10.1177/104747570702200407.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Jaswal, S. K., and T. Harpham. "Getting Sensitive Information on Sensitive Issues: Gynaecological Morbidity." Health Policy and Planning 12, no. 2 (January 1, 1997): 173–78. http://dx.doi.org/10.1093/heapol/12.2.173.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Besorai, Ahal. "Tentative Information, Inside Information, Price‐sensitive Information and Materiality." Journal of Financial Crime 3, no. 3 (January 1996): 268–71. http://dx.doi.org/10.1108/eb025719.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

INAMURA, Tomoaki, and Haruki MADARAME. "ICONE15-10612 Control of Information Relating to Sensitive Nuclear Technology (DRAFT^*)." Proceedings of the International Conference on Nuclear Engineering (ICONE) 2007.15 (2007): _ICONE1510. http://dx.doi.org/10.1299/jsmeicone.2007.15._icone1510_334.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Su, Linping, and Zhipeng Liu. "A T-similarity Sensitive Information Protection Method Based on Sensitive Information Gradient Partition." Journal of Physics: Conference Series 2030, no. 1 (September 1, 2021): 012059. http://dx.doi.org/10.1088/1742-6596/2030/1/012059.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Mehr Quellen

Dissertationen zum Thema "Sensitive information"

1

De, Cristofaro E. "Sharing sensitive information with privacy." Thesis, University College London (University of London), 2011. http://discovery.ucl.ac.uk/1450712/.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Ahlqvist, Ola. "Context Sensitive Transformation of Geographic Information." Doctoral thesis, Stockholm : Univ, 2000. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-200.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Forti, Cristiano Augusto Borges. "Bank dividends and signaling to information-sensitive depositors." reponame:Repositório Institucional do FGV, 2012. http://hdl.handle.net/10438/10518.

Der volle Inhalt der Quelle
Annotation:
Submitted by Cristiano Forti (crforti@gmail.com) on 2013-02-20T17:15:40Z No. of bitstreams: 1 Tese Doutorado 2012 - Versão Final.pdf: 1027415 bytes, checksum: 2fa17755a9aff4536228a46badc3d5f2 (MD5)<br>Approved for entry into archive by Suzinei Teles Garcia Garcia (suzinei.garcia@fgv.br) on 2013-02-20T17:46:28Z (GMT) No. of bitstreams: 1 Tese Doutorado 2012 - Versão Final.pdf: 1027415 bytes, checksum: 2fa17755a9aff4536228a46badc3d5f2 (MD5)<br>Made available in DSpace on 2013-02-20T18:30:20Z (GMT). No. of bitstreams: 1 Tese Doutorado 2012 - Versão Final.pdf: 1027415 bytes, checksum: 2fa17755
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Kacem, Sahraoui Ameni. "Personalized information retrieval based on time-sensitive user profile." Thesis, Toulouse 3, 2017. http://www.theses.fr/2017TOU30111/document.

Der volle Inhalt der Quelle
Annotation:
Les moteurs de recherche, largement utilisés dans différents domaines, sont devenus la principale source d'information pour de nombreux utilisateurs. Cependant, les Systèmes de Recherche d'Information (SRI) font face à de nouveaux défis liés à la croissance et à la diversité des données disponibles. Un SRI analyse la requête soumise par l'utilisateur et explore des collections de données de nature non structurée ou semi-structurée (par exemple : texte, image, vidéo, page Web, etc.) afin de fournir des résultats qui correspondent le mieux à son intention et ses intérêts. Afin d'atteindre cet ob
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Ema, Ismat. "Sensitive Data Migration to the Cloud." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64736.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Forde, Edward Steven. "Security Strategies for Hosting Sensitive Information in the Commercial Cloud." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3604.

Der volle Inhalt der Quelle
Annotation:
IT experts often struggle to find strategies to secure data on the cloud. Although current security standards might provide cloud compliance, they fail to offer guarantees of security assurance. The purpose of this qualitative case study was to explore the strategies used by IT security managers to host sensitive information in the commercial cloud. The study's population consisted of information security managers from a government agency in the eastern region of the United States. The routine active theory, developed by Cohen and Felson, was used as the conceptual framework for the study. The
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Träutlein, Sarah Anna Elisabeth [Verfasser], Peter [Akademischer Betreuer] Buxmann, and Alexander [Akademischer Betreuer] Benlian. "Employees' sensitive information disclosure behavior in enterprise information systems / Sarah Träutlein ; Peter Buxmann, Alexander Benlian." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2017. http://d-nb.info/1149252448/34.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Träutlein, Sarah [Verfasser], Peter [Akademischer Betreuer] Buxmann, and Alexander [Akademischer Betreuer] Benlian. "Employees' sensitive information disclosure behavior in enterprise information systems / Sarah Träutlein ; Peter Buxmann, Alexander Benlian." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2017. http://d-nb.info/1149252448/34.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Li, Xinfeng. "Time-sensitive Information Communication, Sensing, and Computing in Cyber-Physical Systems." The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1397731767.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Liu, Yin. "Methodologies, Techniques, and Tools for Understanding and Managing Sensitive Program Information." Diss., Virginia Tech, 2021. http://hdl.handle.net/10919/103421.

Der volle Inhalt der Quelle
Annotation:
Exfiltrating or tampering with certain business logic, algorithms, and data can harm the security and privacy of both organizations and end users. Collectively referred to as sensitive program information (SPI), these building blocks are part and parcel of modern software systems in domains ranging from enterprise applications to cyberphysical setups. Hence, protecting SPI has become one of the most salient challenges of modern software development. However, several fundamental obstacles stand on the way of effective SPI protection: (1) understanding and locating the SPI for any realistically
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Mehr Quellen

Bücher zum Thema "Sensitive information"

1

Hearing on sensitive but not classified information. [Washington, D.C.]: U.S. National Commission on Libraries and Information Science, 1988.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Prime, Terence. Legal protection of commercially sensitive information and trade secrets. Sudbury, Suffolk: Monitor Press Ltd., 1999.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Office, General Accounting. NASA aeronautics: Protecting sensitive technology : report to Congressional requesters. Washington, D.C: U.S. General Accounting Office, 1993.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

United States. National Commission on Libraries and Information Science. Hearing on sensitive but not classified information: Library of Congress, Washington, D.C., Thursday, May 28, 1987. [Washington, D.C: U.S.G.P.O., 1988.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

IFIP TC8/WG8.3 International Conference on Context-Sensitive Decision Support Systems (1998 Bled, Slovenia). Context sensitive decision support systems: IFIP TC8 / WG8.3 International Conference on Context-Sensitive Decision Support Systems, 13-15 July 1998, Bled, Slovenia. London: Chapman & Hall, 1998.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Integrity, Victoria Office of Police. Report on the leak of a sensitive Victoria Police information report. Melbourne: Govt. Printer, 2005.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

World Summit on Information Society Gender Caucus. Towards a gender sensitive information society: The history of World Summit on Information Society Gender Caucus. Johannesburg, South Africa: World Summit on Information Society Gender Caucus, 2005.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

United States. Dept. of Energy. Office of Audit Services. Audit report: Protection of the Department of Energy's unclassified sensitive electronic information. [Washington, DC]: U.S. Dept. of Energy, Office of Inspector General, 2009.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

New York (State). Office of the State Comptroller. Division of State Services. Metropolitan Transportation Authority, controls over security-sensitive information for the Capital Projects Program. [Albany, NY: Office of the State Comptroller, Division of State Services, 2006.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

N, Gibbs John, Lewis Marieke, and Library of Congress. Federal Research Division., eds. Laws and regulations governing the protection of sensitive but unclassified information, a report. Washington, DC: The Division, 2004.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Mehr Quellen

Buchteile zum Thema "Sensitive information"

1

Weik, Martin H. "sensitive information." In Computer Science and Communications Dictionary, 1546. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_16956.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Christen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Private Information Sharing Protocols." In Linking Sensitive Data, 81–97. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Witulski, Klaus. "Context Sensitive Knowledge Processing." In Information and Classification, 335–45. Berlin, Heidelberg: Springer Berlin Heidelberg, 1993. http://dx.doi.org/10.1007/978-3-642-50974-2_34.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Lippitt, Christopher D., and Douglas A. Stow. "Remote Sensing Theory and Time-Sensitive Information." In Time-Sensitive Remote Sensing, 1–10. New York, NY: Springer New York, 2015. http://dx.doi.org/10.1007/978-1-4939-2602-2_1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Tang, Xiaoliang, Xing Wang, Di Jia, Weidong Song, and Xiangfu Meng. "Double-Coding Density Sensitive Hashing." In Neural Information Processing, 429–38. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70093-9_45.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Taghva, Kazem. "Identification of Sensitive Unclassified Information." In Computational Methods for Counterterrorism, 89–108. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01141-2_6.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Ene, Cristian, Laurent Mounier, and Marie-Laure Potet. "Output-Sensitive Information Flow Analysis." In Formal Techniques for Distributed Objects, Components, and Systems, 93–110. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-21759-4_6.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Liu, Panyu, Yangyang Li, Zhiping Cai, and Shuhui Chen. "Discovering New Sensitive Words Based on Sensitive Information Categorization." In Lecture Notes in Computer Science, 338–46. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24274-9_30.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Bast, Holger, Christian W. Mortensen, and Ingmar Weber. "Output-Sensitive Autocompletion Search." In String Processing and Information Retrieval, 150–62. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11880561_13.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Düzağaç, Remzi, and Olcay Taner Yıldız. "Context Sensitive Search Engine." In Information Sciences and Systems 2014, 277–84. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-09465-6_29.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Sensitive information"

1

Jianying, Zhang, Wang Jiamei, Tang Xue, and Zhao Fei. "Sensitive information filtering system." In 3rd International Conference on Green Communications and Networks. Southampton, UK: WIT Press, 2014. http://dx.doi.org/10.2495/gcn130521.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Zhou, Michelle X., Keith Houck, Shimei Pan, James Shaw, Vikram Aggarwal, and Zhen Wen. "Enabling context-sensitive information seeking." In the 11th international conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1111449.1111479.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Ye, Fei-Yue, Wen-Jing Wang, Jia-Yong Du, Kun Zhang, and Xiang-Feng Luo. "Research on Sensitive Information Discovery." In 2011 International Conference on Computational and Information Sciences (ICCIS). IEEE, 2011. http://dx.doi.org/10.1109/iccis.2011.236.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Liu, Yucheng, Lawrence Ong, Phee Lep Yeoh, Parastoo Sadeghi, Joerg Kliewer, and Sarah Johnson. "Information Leakage in Index Coding With Sensitive and Non-Sensitive Messages." In 2022 IEEE International Symposium on Information Theory (ISIT). IEEE, 2022. http://dx.doi.org/10.1109/isit50566.2022.9834747.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Bryant, Ian. "Factors in sharing sensitive security information." In 2014 Science and Information Conference (SAI). IEEE, 2014. http://dx.doi.org/10.1109/sai.2014.6918243.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Kaushik, Sona, and Shalini Puri. "An enhanced sensitive information security model." In 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET). IEEE, 2012. http://dx.doi.org/10.1109/icceet.2012.6203910.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Hussain, Khaled, Naveen Addulla, Sharon Rajan, and Ghada Moussa. "Preventing the capture of sensitive information." In the 43rd annual southeast regional conference. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1167253.1167291.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Macrina, Andrea, and Priyanka A. Parbhoo. "Security Pricing with Information-Sensitive Discounting." In Proceedings of the KIER-TMU International Workshop on Financial Engineering 2009. WORLD SCIENTIFIC, 2010. http://dx.doi.org/10.1142/9789814304078_0006.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Noiret, Sophie. "Assessing Algorithmic Fairness without Sensitive Information." In GoodIT '21: Conference on Information Technology for Social Good. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3462203.3475894.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Rakers, Jason. "Managing professional and personal sensitive information." In the 38th annual fall conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1878335.1878340.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Berichte der Organisationen zum Thema "Sensitive information"

1

Donahue, S. C. A guide to unclassified sensitive information protection. Office of Scientific and Technical Information (OSTI), November 1996. http://dx.doi.org/10.2172/645491.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Smith, Julie A. Risk Assessment Methodology for EDI Unclassified/Sensitive Information Systems. Fort Belvoir, VA: Defense Technical Information Center, May 1993. http://dx.doi.org/10.21236/ada268676.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Hudson-Vitale, Cynthia, and Katherine Klosek. Issue Brief: New US Federal Compliance Rules for Sensitive Information. Association of Research Libraries, May 2021. http://dx.doi.org/10.29242/brief.sensitiveinfo2021.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Kang, Myong, Steven Pieper, Jeremy Smith, and Allen Yeh. The Protections of Bilaterally Sensitive Information on a Restricted Multilateral Network. Fort Belvoir, VA: Defense Technical Information Center, October 2007. http://dx.doi.org/10.21236/ada473751.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Jarman, Kenneth D., Benjamin S. McDonald, Sean M. Robinson, Andrew J. Gilbert, Timothy A. White, W. Karl Pitts, Alex C. Misner, and Allen Seifert. Low-Intrusion Techniques and Sensitive Information Management for Warhead Counting and Verification: FY2012 Annual Report. Office of Scientific and Technical Information (OSTI), November 2012. http://dx.doi.org/10.2172/1072911.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Jarman, Kenneth D., Sean M. Robinson, Benjamin S. McDonald, Andrew J. Gilbert, Alex C. Misner, W. Karl Pitts, Timothy A. White, Allen Seifert, and Erin A. Miller. Low-Intrusion Techniques and Sensitive Information Management for Warhead Counting and Verification: FY2011 Annual Report. Office of Scientific and Technical Information (OSTI), September 2011. http://dx.doi.org/10.2172/1031988.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Ostoja, Steven, Tapan Pathak, Katherine Jarvis-Shean, Mark Battany, and George Zhuang. Adapt - On-farm changes in the face of climate change: NRCS Area 3. USDA California Climate Hub, April 2018. http://dx.doi.org/10.32747/2018.7444387.ch.

Der volle Inhalt der Quelle
Annotation:
The agricultural economy is more vulnerable to projected changes in climate in some California counties than in others. This flyer highlights on-farm adaptation strategies to mitigate some of the effects of increased winter temperatures and more frequent summer heatwaves. Projected conditions will put the most strain on heat intolerant crops and crops with high chill requirements. When crops with these characteristics also have a high market value or are grown in large acreage, counties can be at risk for &#x0D; economic declines. Information on this flyer identifies the most vulnerable counti
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Ostoja, Steven, Tapan Pathak, Katherine Jarvis-Shean, and Mark Battany. Adapt - On-farm changes in the face of climate change: NRCS Area 1. USDA California Climate Hub, April 2018. http://dx.doi.org/10.32747/2018.7444389.ch.

Der volle Inhalt der Quelle
Annotation:
The agricultural economy is more vulnerable to projected changes in climate in some California counties than in others. This flyer highlights on-farm adaptation strategies to mitigate some of the effects of increased winter temperatures and more frequent summer heatwaves. Projected conditions will put the most strain on heat intolerant crops and crops with high chill requirements. When crops with these characteristics also have a high market value or are grown in large acreage, counties can be at risk for economic declines. Information on this flyer identifies the most vulnerable counties in C
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Ostoja, Steven, Tapan Pathak, Andre S. Biscaro, and Mark Battany. Adapt - On-farm changes in the face of climate change: NRCS area 4. USDA California Climate Hub, April 2018. http://dx.doi.org/10.32747/2018.7435379.ch.

Der volle Inhalt der Quelle
Annotation:
The agricultural economy is more vulnerable to projected changes in climate in some California counties than in others. This flyer highlights on-farm adaptation strategies to mitigate some of the effects of increased winter temperatures and more frequent summer heatwaves. Projected conditions will put the most strain on heat intolerant crops and crops with high chill requirements. When crops with these characteristics also have a high market value or are grown in large acreage, counties can be at risk for economic declines. Information on this flyer identifies the most vulnerable counties in C
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Ostoja, Steven, Tapan Pathak, Katherine Jarvis-Shean, Mark Battany, and Andre S. Biscaro. Adapt - On-farm changes in the face of climate change: NRCS Area 2. USDA California Climate Hub, April 2018. http://dx.doi.org/10.32747/2018.7444388.ch.

Der volle Inhalt der Quelle
Annotation:
The agricultural economy is more vulnerable to projected changes in climate in some California counties than in others. This flyer highlights on-farm adaptation strategies to mitigate some of the effects of increased winter temperatures and more frequent summer heatwaves. Projected conditions will put the most strain on heat intolerant crops and crops with high chill requirements. When crops with these characteristics also have a high market value or are grown in large acreage, counties can be at risk for economic declines. Information on this flyer identifies the most vulnerable counties in C
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!