Ebooks Gratuits

Le plus grand univers d'ebooks au format PDF et EPUB

Nous avons trouvé un total de 39 livres disponibles en téléchargement

Mastering Secrets Management

Auteure: Cybellium

Nombre de pages: 194

Cybellium Ltd is dedicated to empowering individuals and organizations with the knowledge and skills they need to navigate the ever-evolving computer science landscape securely and learn only the latest information available on any subject in the category of computer science including: - Information Technology (IT) - Cyber Security - Information Security - Big Data - Artificial Intelligence (AI) - Engineering - Robotics - Standards and compliance Our mission is to be at the forefront of computer science education, offering a wide and comprehensive range of resources, including books, courses, classes and training programs, tailored to meet the diverse needs of any subject in computer science. Visit https://www.cybellium.com for more books.

The Protection of Trade Secrets in China

Auteure: Shan Hailing

Nombre de pages: 572

For business investors in China, the legal handling of trade secrets is often crucial. However, initiatives are often complicated by a patchwork trade secrets protection system – pieced together haphazardly over the last two decades and drawing on disparate elements of competition law, contract law, employment law, and criminal law – that diverges in significant ways from global standards and corresponding regimes in other countries. Now at last interested parties can benefit richly from a thorough and practical approach to the subject. This detailed analysis of China’s trade secrets law provides in-depth information and guidance on such important factors as the following: the current framework of China’s trade secrets law, its past development and its ongoing trends; legal comparison of China’s trade secrets law with various international, regional, and national schemes; what constitutes trade secrets infringement in China and what remedies are available; and the legal interaction in China between employment relations and trade secrets protection. The author pays close attention to judicial practice and precedent in the areas of civil remedies, criminal punishment, and...

Code of Federal Regulations

Nombre de pages: 762

Special edition of the Federal Register, containing a codification of documents of general applicability and future effect ... with ancillaries.

Fundamentals of Computer Security

Auteure: Josef Pieprzyk , Thomas Hardjono , Jennifer Seberry

Nombre de pages: 704

This reference work looks at modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts before moving on to modern developments in cryptography. The concepts are presented clearly and illustrated by numerous examples. Subjects covered include: private-key and public-key encryption, hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, and many others. The section on intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed. The final chapters introduce modern e- business systems based on digital cash.

Derrida and Negative Theology

Auteure: Professor Harold Coward , Harold G. Coward , Toby Foshay , Jacques Derrida

Nombre de pages: 356

This book explores the thought of Jacques Derrida as it relates to the tradition of apophatic thought--negative theology and philosophy--in both Western and Eastern traditions. Following the Introduction by Toby Foshay, two of Derrida's essays on negative theology, Of an Apocalyptic Tone Newly Adopted in Philosophy and How to Avoid Speaking: Denials, are reprinted here. These are followed by essays from a Western perspective by Mark C. Taylor and Michel Despland, and essays from an Eastern perspective by David Loy, a Buddhist, and Harold Coward, a Hindu. In the Conclusion, Jacques Derrida responds to these discussions.

Security in Computing and Communications

Auteure: Jemal H. Abawajy , Sougata Mukherjea , Sabu M. Thampi , Antonio Ruiz-martínez

Nombre de pages: 561

This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2015, held in Kochi, India, in August 2015. The 36 revised full papers presented together with 13 short papers were carefully reviewed and selected from 157 submissions. The papers are organized in topical sections on security in cloud computing; authentication and access control systems; cryptography and steganography; system and network security; application security.

Atlassian DevOps Toolchain Cookbook

Auteure: Robert Wen , Alex Ortiz , Edward Gaile , Rodney Nissen

Nombre de pages: 504

Seamlessly integrate Atlassian Open DevOps tools such as Jira, Bitbucket Pipelines, Compass, Confluence, and Opsgenie with other automated testing, monitoring, and security tools such as SonarQube and Snyk for a powerful and agile DevSecOps deployment process Key Features Streamline development progress visibility by connecting Jira with other DevOps tools through Open DevOps Enhance observability by integrating development tools like Bitbucket Pipelines with Compass Learn best practices for DevSecOps integrations and processes using real-world examples Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionImplementing DevOps practices and toolchains for automated testing and deployment can accelerate product development with minimal errors in the production environment. However, creating DevOps toolchains by integrating tools from various vendors presents challenges for both administrators and developers. Written by four well-known experts from the Atlassian community, this book addresses the complexities of DevOps toolchain creation and integration by leveraging Atlassian’s Open DevOps solution. Starting with a holistic overview of the DevOps and...

Advances in Cryptology – ASIACRYPT 2023

Auteure: Jian Guo , Ron Steinfeld

Nombre de pages: 494

The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023. The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design.

E-Commerce and Web Technologies

Auteure: Kurt Bauknecht , Martin Bichler , Birgit Pröll

Nombre de pages: 380

We welcome you to the proceedings of the 5t International Conference on E- CommerceandWebTechnology(EC-Web2004)heldinconjunctionwithDEXA 2004 in Zaragoza, Spain. This conference, ?rst held in Greenwich, United Ki- dom in 2000, now is in its ?fth year and very well established. As in the four previous years, it served as a forum to bring together researchersfrom academia and commercial developers from industry to discuss the current state of the art in e-commerce and Web technology. Inspirations and new ideas emerged from intensive discussions during formal sessions and social events. Keynote addresses, research presentations and discussions during the c- ference helped to further develop the exchange of ideas among the researchers, developers and practitioners present. The conference attracted 103 paper submissions and almost every paper was reviewed by three program committee members. The program committee - lected 37 papers for presentationand publication, a task which was not easy due to the high quality of the submitted papers. We would like to express our thanks to our colleagues who helped with putting together the technical program: the program committee members and...

Uncertainty, Information Management, and Disclosure Decisions

Auteure: Tamara Afifi , Walid Afifi

Nombre de pages: 497

This volume integrates scholarly work on disclosure and uncertainty with the most up-to-date, cutting edge research, theories, and applications. Uncertainty is an ever-present part of human relationships, and the ways in which people reduce and/or manage uncertainty involves regulating their communication with others through revealing and concealing information. This collection is devoted to collating knowledge in these areas, advancing theory and presenting work that is socially meaningful. This work includes contributions from renowned scholars in interpersonal uncertainty and information regulation, focusing on processes that bridge boundaries within and across disciplines, while maintaining emphasis on interpersonal contexts. Disciplines represented here include interpersonal, family, and health communication, as well as relational and social psychology. Key features of the volume include: comprehensive coverage integrating the latest research on disclosure, information seeking, and uncertainty a highly theoretical content, socially meaningful in nature (applied to real-world contexts) an interdisciplinary approach that crosses sub-fields within communication. This volume is a ...

Privacy-preserving Computing

Auteure: Kai Chen , Qiang Yang

Nombre de pages: 269

Systematically introduces privacy-preserving computing techniques and practical applications for students, researchers, and practitioners.

Getting Started with Kubernetes

Auteure: Jonathan Baier

Nombre de pages: 276

Learn how to schedule and run application containers using Kubernetes. About This Book Get well-versed with the fundamentals of Kubernetes and get it production-ready for deployments Confidently manage your container clusters and networks using Kubernetes This practical guide will show you container application examples throughout to illustrate the concepts and features of Kubernetes Who This Book Is For This book is for developers, sys admins, and DevOps engineers who want to automate the deployment process and scale their applications. You do not need any knowledge about Kubernetes. What You Will Learn Download, install, and configure the Kubernetes codebase Understand the core concepts of a Kubernetes cluster Be able to set up and access monitoring and logging for Kubernetes clusters Set up external access to applications running in the cluster Understand how CoreOS and Kubernetes can help you achieve greater performance and container implementation agility Run multiple clusters and manage from a single control plane Explore container security as well as securing Kubernetes clusters Work with third-party extensions and tools In Detail Kubernetes has continued to grow and...

Sanctum Sanctorum

Auteure: Justin Mandela Roberts

Nombre de pages: 187

This book seeks to answer the question, “What is holiness?” What do we talk about when we talk about holiness? We might describe many things as holy, but as Socrates says, what is “the essential aspect, by which all holy acts are holy?” Sanctum Sanctorum gives an account of the holy from within the Christian participatory tradition, and argues that holiness is included in a special category of divine names that Christian metaphysics calls “transcendentals” (which are five: being, one, truth, goodness, and beauty). Moreover, holiness stands in a hierarchical relationship to the other five transcendentals, as the culmination or concentration of the rest. Only by understanding holiness as the “head” of the transcendentals, as “the” transcendental, can one account for all the complexity the idea of the holy conjures. Therefore, holiness is the transcendental of the transcendentals. It adds the aspect of reverence to existence and, as such, it is constituted by the formula sanctum sanctorum (Holy-of-holies) which extends from the divine nature through the triune life to all creation.

Nolo's Patents for Beginners

Auteure: David Pressman , Richard Stim

Nombre de pages: 180

A brilliantly clear and up-to-date patent guide This bestselling primer is packed with everything inventors need to know about patent law basics, including current patent regulations, filing rules, and caselaw. Nolo’s Patents for Beginners helps inventors: document an invention read and write patents make a patent search file for a patent determine patent ownership understand the basics of patent infringement get international patent protection, and decide whether to file a provisional patent. You’ll also find patent and invention resources and a glossary of patent terms. This new edition is completely updated to cover all the latest changes in patent law and regulations.

Advances in Cryptology — CRYPTO ’94

Auteure: Yvo G. Desmedt

Nombre de pages: 450

The CRYPTO ’94 conference is sponsored by the International Association for Cryptologic Research (IACR), in co-operation with the IEEE Computer Society Technical Committee on Security and Privacy. It has taken place at the Univ- sity of California, Santa Barbara, from August 21-25,1994. This is the fourteenth annual CRYPTO conference, all of which have been held at UCSB. This is the first time that proceedings are available at the conference. The General Chair, Jimmy R. Upton has been responsible for local organization, registration, etc. There were 114 submitted papers which were considered by the Program Committee. Of these, 1 was withdrawn and 38 were selected for the proce- ings. There are also 3 invited talks. Two of these are on aspects of cryptog- phy in the commercial world. The one on hardware aspects will be presented by David Maher (AT&T), the one on software aspects by Joseph Pato (Hewlett- Packard). There will also be a panel discussion on “Securing an Electronic World: Are We Ready?” The panel members will be: Ross Anderson, Bob Blakley, Matt Blaze, George Davida, Yvo Desmedt (moderator), Whitfield Diffie, Joan Feig- baum, Blake Greenlee, Martin Hellman, David...

Advances in Information and Computer Security

Auteure: Atsuo Inomata , Kan Yasuda

Nombre de pages: 330

This book constitutes the refereed proceedings of the 13th International Workshop on Security, IWSEC 2018, held in Sendai, Japan, in September 2018. The 18 regular papers and 2 short papers presented in this volume were carefully reviewed and selected from 64 submissions. They were organized in topical sections named: Cryptanalysis, Implementation Security, Public-Key Primitives, Security in Practice, Secret Sharing, Symmetric-Key Primitives, and Provable Security.

Spies and Saboteurs

Auteure: Joseph F. Jakub Iii

Nombre de pages: 307

Spies and Saboteurs is the story of the origins of the Anglo-American 'Special Relationship' in human intelligence collection and special operations, which took place amidst the global conflagration that was the Second World War. It is the story of William 'Wild Bill' Donovan - the father of America's Central Intelligence Agency - and of his relationship with legendary British spymasters like William Stephenson, code named 'Intrepid', Stewart Menzies ('C'), chief of the Secret Intelligence Service, Admiral John Godfrey, the powerful and enigmatic director of Naval Intelligence, and General Colin Gubbins, Britain's master saboteur. Relying almost exclusively upon recently declassified OSS and British intelligence documents and survivor interviews, it examines the transatlantic association in espionage and sabotage, guerrilla warfare and disinformation. It explores the evolution of covert relations from a 'tutorial' arrangement with the U.S. as pupil, to an unequal then full partnership, and ultimately to competition and rivalry in the prosecution of the clandestine war.

India's Near East

Auteure: Avinash Paliwal

Nombre de pages: 304

Celebrated as a theatre of geo-economic connectivity typified by the ‘Act East’ policy, India’s near east is key not only to its great-power rivalry with China, which first boiled over in the 1962 war, but to the idea(s) of India itself. It is also one of the most intricately partitioned lands anywhere on Earth. Rent by communal and class violence, the region has birthed extreme forms of religious and ethnic nationalisms and communist movements. The Indian state’s survival instinct and pursuit of regional hegemony have only accentuated such extremes. This book scripts a new history of India’s eastward-looking diplomacy and statecraft. Narrated against the backdrop of separatist resistance within India’s own northeastern states, as well as rivalry with Beijing and Islamabad in Myanmar and Bangladesh, it offers a simple but compelling argument. The aspirations of ‘Act East’ mask an uncomfortable truth: India privileges political stability over economic opportunity in this region. In his chronicle of a state’s struggle to overcome war, displacement and interventionism, Avinash Paliwal lays bare the limits of independent India’s influence in its near east.

Information and Communications Security

Auteure: Javier López , Eiji Okamoto

Nombre de pages: 574

This book constitutes the refereed proceedings of the 6th International Conference on Information and Communications Security, ICICS 2004, held in Malaga, Spain in October 2004. The 42 revised full papers presented were carefully reviewed and selected from 245 submissions. The papers address a broad range of topics in information and communication security including digital signatures, group signature schemes, e-commerce, digital payment systems, cryptographic attacks, mobile networking, authentication, channel analysis, power-analysis attacks, mobile agent security, broadcast encryption, AES, security analysis, XTR, access control, and intrusion detection.

New Progress of Regulations and Judicial Practice of Intellectual Property

Auteure: Deli Cheng , Xinmiao Yu , Klaus Bacher

Nombre de pages: 603

This open access book brings together two types of cases at home and abroad. One is the latest influential cases in the field of intellectual property rights in the past three years, and the other is the classic intellectual property cases in the world. The types of cases involve typical cases in the fields of patents, trademarks, copyrights, unfair competition, etc., involving a wide range of intellectual property laws and a complete range of categories. Some cases have been a sensation, and some legal issues have been raised or clarified for the first time in relevant judgments. Many cases not only have a wide range of social influence but also have typical legal application significance. Many cases involve facts and legal issues that go beyond the case and the adjudication itself and have greater reference significance. At the same time, we also attached the different opinions of some case judgments, such as the Concurring Opinion and the Dissenting Opinion in the US judgment, reflecting the different understandings of different judges on the application of the law. This part is also very meaningful.

Advances in Information and Computer Security

Auteure: Maki Yoshida , Koichi Mouri

Nombre de pages: 297

This book constitutes the refereed proceedings of the 9th International Workshop on Security, IWSEC 2014, held in Hirosaki, Japan, in August 2014. The 13 regular papers presented together with 8 short papers in this volume were carefully reviewed and selected from 55 submissions. The focus of the workshop was on the following topics: system security, threshold cryptography, hardware security, foundation, and encryption.

Digital Forensics and Watermarking

Auteure: Yun Qing Shi , Hyoung-joong Kim , Fernando Perez-gonzalez

Nombre de pages: 522

This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Workshop on Digital-forensics and Watermarking (IWDW 2011) held in Atlantic City, NJ, USA, during October 23-26, 2011. The 37 revised full papers presented were carefully selected from 59 submissions. Conference papers are organized in 6 technical sessions, covering the topics of steganography and steganalysis, watermarking, visual cryptography, forensics, anti-forensics, fingerprinting, privacy and security.

J. Hillis Miller and the Possibilities of Reading

Auteure: Eamonn Dunne

Nombre de pages: 177

J. Hillis Miller is undoubtedly one of the most important literary critics of the past century. For well over five decades his work has been at the forefront of theoretical and philosophical thinking and writing. From his earliest work with Georges Poulet and the so-called Geneva School, which introduced a generation of North American critics to the concept of a phenomenological literary hermeneutic, to a deconstructive rhetorical philology and an ethically motivated textual analysis, Miller's readings have not only reflected major movements in literary theory, they have also created them.Surprisingly, Eamonn Dunne's J. Hillis Miller and the Possibilities of Reading is the first book devoted exclusively to examining Miller's work. Dunne argues that an appreciation of Miller is crucial to an informed understanding about the radical changes occurring in critical thinking in the humanities in recent years. This book, the first of its kind, will be a vital and enabling avenue for further research into J. Hillis Miller's exemplary and prolific output.

Advanced Auditing (Latest Edition)

Auteure: Dr. B. K. Mehta

Nombre de pages: 283

Who can buy? Students pursuing B.Com, BBA, M.Com, MBA and other commerce as well as the students taking professional exam conducted by the Institute of Chartered Accountants. It is according to the syllabus of various universities. Advanced Auditing book is different from all other books. Each topic is addressed in a simple and clear fashion. The book contains the latest approach to the practice and changes in the legislation. The basic motto is to generate interest in the subject in the mind of the students and prepare them for their examinations. The book seeks to provide a thorough understanding of the theoretical and practical concepts of advanced auditing. The book contains the latest information about the subject in a broad manner, sensible way and simple language. Every best effort has been made to include the questions asked in various examinations in different years. The subject matter of this book is prepared scientifically and analytically.

North Carolina Criminal Law 2021

Auteure: Peter Edwards, Esq. , North Carolina Legal Publishing

Nombre de pages: 460

This 2021 edition of the North Carolina Criminal Law, Chapter 14 of the General Statutes, provides the practitioner with a convenient copy to bring to court or the office. Look for other titles such as North Carolina Legal Rules of Civil Procedure and Rules of Evidence.

The Bible cyclopædia: or, Illustrations of the civil and natural history of the sacred writings [ed. by W. Goodhugh, completed by W.C. Taylor].

Auteure: William Goodhugh , William Cooke Taylor

Nombre de pages: 734

International Relations Today: Concepts and Applications

Auteure: Aneek Chatterjee

Nombre de pages: 326

Meant primarily for students studying international relations, aspirants of civil services, International Relations Today: Concepts And Applications captures the drastic changes in international relations after the disintegration of the Soviet Union and the end of the Cold War in 1991. It also examines the rise of China as a major military and economic power, and the potential of Russia, India and Germany as tomorrow's big powers. It will also be useful for those interested in the discipline.

Recent Trends in Network Security and Applications

Auteure: Natarajan Meghanathan , Selma Boumerdassi , Nabendu Chaki , Dhinaharan Nagamalai

Nombre de pages: 654

The Third International Conference on Network Security and Applications (CNSA-2010) focused on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on understanding modern security threats and countermeasures, and establishing new collaborations in these areas. Authors are invited to contribute to the conference by submitting articles that illustrate research results, projects, survey work and industrial experiences describing significant advances in the areas of security and its applications, including: • Network and Wireless Network Security • Mobile, Ad Hoc and Sensor Network Security • Peer-to-Peer Network Security • Database and System Security • Intrusion Detection and Prevention • Internet Security, and Applications Security and Network Management • E-mail Security, Spam, Phishing, E-mail Fraud • Virus, Worms, Trojon Protection • Security Threats and Countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc. ) • Ubiquitous Computing Security • Web 2. 0 Security • Cryptographic...

Cumulative List of Organizations Described in Section 170 (c) of the Internal Revenue Code of 1954

Nombre de pages: 1132

Elementary Information Security

Auteure: Richard E. Smith

Nombre de pages: 912

Comprehensive and accessible, Elementary Information Security covers the entire range of topics required for US government courseware certification NSTISSI 4013 and urges students analyze a variety of security problems while gaining experience with basic tools of the trade. Written for the one-term undergraduate course, the text emphasises both the technical and non-technical aspects of information security and uses practical examples and real-world assessment tools. Early chapters in the text discuss individual computers and small LANS, while later chapters deal with distributed site security and the Internet. Cryptographic topics follow the same progression, starting on a single computer and evolving to Internet-level connectivity. Mathematical concepts throughout the text are defined and tutorials with mathematical tools are provided to ensure students grasp the information at hand. Rather than emphasizing memorization, this text challenges students to learn how to analyze a variety of security problems and gain experience with the basic tools of this growing trade. Key Features: -Covers all topics required by the US government curriculum standard NSTISSI 4013. - Unlike other...

Color Image Processing

Auteure: Rastislav Lukac , Konstantinos N. Plataniotis

Nombre de pages: 752

Color Image Processing: Methods and Applications embraces two decades of extraordinary growth in the technologies and applications for color image processing. The book offers comprehensive coverage of state-of-the-art systems, processing techniques, and emerging applications of digital color imaging. To elucidate the significant progress in specialized areas, the editors invited renowned authorities to address specific research challenges and recent trends in their area of expertise. The book begins by focusing on color fundamentals, including color management, gamut mapping, and color constancy. The remaining chapters detail the latest techniques and approaches to contemporary and traditional color image processing and analysis for a broad spectrum of sophisticated applications, including: Vector and semantic processing Secure imaging Object recognition and feature detection Facial and retinal image analysis Digital camera image processing Spectral and superresolution imaging Image and video colorization Virtual restoration of artwork Video shot segmentation and surveillance Color Image Processing: Methods and Applications is a versatile resource that can be used as a graduate...

Information Hiding

Auteure: Jan Camenisch , Christian Collberg , Neil F. Johnson , Phil Sallee

Nombre de pages: 396

This volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, Virginia, in July 2006. Twenty-five carefully reviewed full papers are organized into topical sections covering watermarking, information hiding and networking, data hiding in unusual content, fundamentals, software protection, steganalysis, steganography, and subliminal channels.

Outdoor Learning Environments

Auteure: Helen Little

Nombre de pages: 229

Educators have a key pedagogical role in promoting early years outdoor play in natural environments. Active outdoor play involving risk-taking has been linked to positive effects on social health and behaviour, and encourages physical activity and motor skill development. At the same time, it has been recognised that opportunities for children to experience outdoor learning have been reduced in recent decades due to the impacts of technology, urbanisation and social change. This book brings together renowned authors, with research and professional experience in a range of disciplines, to provide a comprehensive guide to developing positive and engaging outdoor learning environments in the early years. Part 1 looks at pedagogy and outdoor environments, and considers the value of risk-taking and developing a young child's appreciation of the natural world. Part 2 examines the key principles involved in the design and planning of these spaces, such as applying the relevant equipment standards and regulations. Part 3 explores how educators can develop an understanding of children's own perspectives on outdoor spaces, including promoting agency and recognising the importance of private ...

Saxophone Secrets

Auteure: Tracy Lee Heavner

Nombre de pages: 149

Modeled on the brilliant approach first formulated by distinguished professor music and master clarinetist Michele Gingras in her Clarinet Secrets and More Clarinet Secrets (both available from Scarecrow Press), Tracy Heavner’s Saxophone Secrets provides advanced saxophonists with 60 performance secrets that will assist in their musical development. This work is the result of 30 years of personal teaching and performance experience. Heavner offers both intermediate players and advanced professionals a wide variety of techniques, which will greatly improve any saxophonist’s performance ability.

Derniers livres et auteurs recherchés