You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Reconstructs biblical law from a variety of texts, analysing legal cases from the Near East.
Infrastructure is at the heart of China's presence in global development and is also central to larger debates about Chinese influence. This Element provides a comprehensive account of major, Chinese government-financed infrastructure projects in the Global South since 1949. Using new datasets, it demonstrates that Chinese global infrastructure is distinct in terms of its historical tenacity and massive contemporary scope. But this does not imply that contemporary Chinese global infrastructure or the Belt and Road Initiative should be studied in a vacuum. Historical and comparative perspectives show that contemporary projects often emerge based on similar political logics to those that shaped infrastructure investment in earlier periods of Chinese history and other international contexts. The Element then examines how infrastructure projects have created both purposeful and unintended sources of influence by serving as valuable but risky political capital for host country governments as well as the Chinese government.
This book constitutes the refereed proceedings of the 32nd IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, SEC 2017, held in Rome, Italy, in May 2017. The 38 revised full papers presented were carefully reviewed and selected from 199 submissions. The papers are organized in the following topical sections: network security and cyber attacks; security and privacy in social applications and cyber attacks defense; private queries and aggregations; operating systems and firmware security; user authentication and policies; applied cryptography and voting schemes; software security and privacy; privacy; and digital signature, risk management, and code reuse attacks.
This volume contains the proceedings of IFIPTM 2010, the 4th IFIP WG 11.11 International Conference on Trust Management, held in Morioka, Iwate, Japan during June 16-18, 2010. IFIPTM 2010 provided a truly global platform for the reporting of research, development, policy, and practice in the interdependent arrears of privacy, se- rity, and trust. Building on the traditions inherited from the highly succe- ful iTrust conference series, the IFIPTM 2007 conference in Moncton, New Brunswick, Canada, the IFIPTM 2008 conference in Trondheim, Norway, and the IFIPTM 2009 conference at Purdue University in Indiana, USA, IFIPTM 2010 focused on trust, privacy and security from multidisciplinary persp- ...
This book constitutes the refereed proceedings of the 31st IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, SEC 2016, held in Ghent, Belgium, in May/June 2016. The 27 revised full papers presented were carefully reviewed and selected from 139 submissions. The papers are organized in topical sections on cryptographic protocols, human aspects of security, cyber infrastructure, social networks, software vulnerabilities, TPM and internet of things, sidechannel analysis, software security, and privacy.
While many studies on Isaiah are interested in the formation of the book, relatively few have addressed the development of the oracles concerning foreign nations. Like many other prophetic books, the book of Isaiah contains a section of foreign nations oracles (Isaiah 13-23), but within this collection is a smaller grouping of literary material that deals with the nations of Cush (Ethiopia) and Egypt (Isaiah 18-20). This book considers the formation of this smaller group about Cush and Egypt within the literary context of the growth of the larger collection and the development of these individual chapters. This book also contributes a fresh approach to the formation of foreign nations oracles in Isa 13-23.
There is a widening divide between the data, tools, and knowledge that international relations scholars produce and what policy practitioners find relevant for their work. In this first-of-its-kind conversation, leading academics and practitioners reflect on the nature and size of the theory-practice divide. They find the gap varies by issue area and over time. The essays in this volume use data gathered by the Teaching, Research, and International Policy (TRIP) Project over a fifteen-year period. As a whole, the volume analyzes the structural factors that affect the academy’s ability to influence policy across issue areas and the professional incentives that affect scholars’ willingness...
This book investigates the ways governments trade money for favors at the United Nations Security Council.
This book constitutes the refereed proceedings of the 30th IFIP TC 11 International Information Security and Privacy Conference, SEC 2015, held in Hamburg, Germany, in May 2015. The 42 revised full papers presented were carefully reviewed and selected from 212 submissions. The papers are organized in topical sections on privacy, web security, access control, trust and identity management, network security, security management and human aspects of security, software security, applied cryptography, mobile and cloud services security, and cyber-physical systems and critical infrastructures security.
Annotation This volume constitutes the refereed proceedings of the 4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices, WISTP 2010, held in Passau, Germany, in April 2010. The 20 revised full papers and 10 short papers were carefully reviewed and selected from 69 submissions. They are organized in topical sections on embedded security, protocols, highly constrained embedded systems, security, smart card security, algorithms, hardware implementations, embedded systems and anonymity/database security.