You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The Huang Di nei jing su wen, known familiarly as the Su wen, is a seminal text of ancient Chinese medicine, yet until now there has been no comprehensive, detailed analysis of its development and contents. At last Paul U. Unschuld offers entry into this still-vital artifact of China’s cultural and intellectual past. Unschuld traces the history of the Su wen to its origins in the final centuries B.C.E., when numerous authors wrote short medical essays to explain the foundations of human health and illness on the basis of the newly developed vessel theory. He examines the meaning of the title and the way the work has been received throughout Chinese medical history, both before and after th...
A reference work on the tithe maps of England and Wales for historians, geographers and lawyers.
The major Indian treatise on Buddha nature is the Ratnagotravibhaga, also known as the Uttaratantra, and it is this core text that Klaus-Dieter Mathes focuses on in this book. Mathes demonstrates how its author, Go Lotsawa, ties the teachings on Buddha nature in with mainstream Mahayana thought while avoiding the pitfalls of the zhentong approach favored by the Jonang tradition. He also evaluates Go Lotsawa's position on Buddha nature against the background of interpretations by masters of the Kagyu, Nyingma, and Jonang schools.
This book constitutes the refereed proceedings of the 13th International Conference on Information and Communications Security, ICICS 2011, held in Beijing, China, in November 2011. The 33 revised full papers presented together with an invited talk were carefully reviewed and selected from 141 submissions. The papers are organized in topical sections on digital signatures, public key encryption, cryptographic protocols, applied cryptography, multimedia security, algorithms and evaluation, cryptanalysis, security applications, wireless network security, system security, and network security.
New generations of IT users are increasingly abstracted from the underlying devices and platforms that provide and safeguard their services. As a result they may have little awareness that they are critically dependent on the embedded security devices that are becoming pervasive in daily modern life. Secure Smart Embedded Devices, Platforms and Applications provides a broad overview of the many security and practical issues of embedded devices, tokens, and their operation systems, platforms and main applications. It also addresses a diverse range of industry/government initiatives and considerations, while focusing strongly on technical and practical security issues. The benefits and pitfall...
This then is the first full dictionary of the earliest Mongol version of the thirteenth-century moral guide Sa skya Legs bshad that was compiled in Tibetan by the famous high priest and scholar Sa skya Pandita, and as such an indispensable tool for the study of Tibeto-Mongol translation techniques, and Mongol language history in general. The medieval Mongol translator Sonom Gara’s words written in Uygur letters or printed in Kubilai’s Square Script are listed here in transcription together with an English interpretation and their equivalents in the Tibetan original. Parallel passages are quoted from later seventeenth- and eighteenth-century Mongol translations. The foreword extensively discusses the strophic structure, notions and values, discrepancies between the Tibetan and the Middle Mongol versions, Uygur elements and other peculiarities of Sonom Gara’s language.
Against his grandfather's wishes, an orphaned Japanese student at UCLA returns to his home country following the tragic loss of his close friend and university professor, only to discover a malevolent force that aims to take away everything he has left ... and more.
This book constitutes the refereed proceedings of the 9th International Conference on Information Security, ISC 2006, held on Samos Island, Greece in August/September 2006. The 38 revised full papers presented were carefully reviewed and selected from 188 submissions. The papers are organized in topical sections.
This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC 2011, held in Xi'an, China, in October 2011. The 25 revised full papers were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on attacks; protocols; public-key cryptosystems; network security; software security; system security; database security; privacy; digital signatures.