You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
In early 1943 Gunter Fleiss, Adolf Hitler’s master spy, learned that scientists at Los Alamos had selected a remote site off the coast of North Carolina to test America’s first atomic bomb. Hitler decided to dispatch his trusted agent SS Col. Max Reiner to North Carolina in an attempt to infiltrate the test site. However the Fuhrer found himself hooked on the horns of an espionage dilemma. First Col. Reiner couldn’t tell an atomic bomb from an oversized watermelon. The mission called for an atomic physicist, no less. Second, no one had asked the young atomic physicist Hans Richter whether he wanted to take a U-boat ride on this field trip to North Carolina. With the possibility of being captured by the American FBI. And being hanged. Meet The Unwilling Spy.
Ron Gomez is a journalist as well as a veteran of three terms in the Louisiana House of Representative. Here he reports on the humor and theatrics, successes and failures of Louisiana's system of government.
The stories you are about to read are from traveling and a culmination from eight years of my wife and I living among the people in lands of rich stories, not excluding Ireland. It has given me great joy to write of our adventures in a format that takes the best of times, stirred with some pathos of fallen friends and then mixed into the tales within! These reminiscences will be treasured by my wife Pat and I - forever! No one character is represented in his or her entirety and no narrative can be said to be an actual event. These storied chapters herein, capture our lives as it might have happened. I have pasted the wonderful characters together from all the many vignettes we encompassed wh...
This book constitutes the refereed proceedings of the First International Workshop on Active Networks, IWAN'99, held in Berlin, Germany in June/July 1999. The 30 revised full papers presented were carefully reviewed and selected from a total of 80 submissions. The book is divided in sections on networks architectures, platforms, active management and control, and security. All in all, this book provides a unique state-of-the-art account of architectural aspects, technologies, and prototype systems that will impact the way future networked businesses will be created and managed.
I first came across the issue of derivatives documentation when writing my diploma thesis on measuring the credit risk ofOTC derivatives while I was an economics student at the University of Bonn. Despite the fact that security design has been an area of research in economics for many years and despite the widespread use of derivatives documentation in financial practice, the task of designing contracts for derivatives transactions has not been dealt with in financial theory. The one thing that aroused my curiosity was that two parties with usually opposing interests, namely banking supervisors and the banking industry's lobby, unanimously endorse the use ofcertain provisions in standardized...
Semantics of Programming Languages exposes the basic motivations and philosophy underlying the applications of semantic techniques in computer science. It introduces the mathematical theory of programming languages with an emphasis on higher-order functions and type systems. Designed as a text for upper-level and graduate-level students, the mathematically sophisticated approach will also prove useful to professionals who want an easily referenced description of fundamental results and calculi. Basic connections between computational behavior, denotational semantics, and the equational logic of functional programs are thoroughly and rigorously developed. Topics covered include models of types, operational semantics, category theory, domain theory, fixed point (denotational). semantics, full abstraction and other semantic correspondence criteria, types and evaluation, type checking and inference, parametric polymorphism, and subtyping. All topics are treated clearly and in depth, with complete proofs for the major results and numerous exercises.
How an antisemitic legend gave voice to widespread fears surrounding the expansion of private credit in Western capitalism The Promise and Peril of Credit takes an incisive look at pivotal episodes in the West’s centuries-long struggle to define the place of private finance in the social and political order. It does so through the lens of a persistent legend about Jews and money that reflected the anxieties surrounding the rise of impersonal credit markets. By the close of the Middle Ages, new and sophisticated credit instruments made it easier for European merchants to move funds across the globe. Bills of exchange were by far the most arcane of these financial innovations. Intangible and...
World War Two, 1944. After commando Carl Hansen is called to thwart the Allied invasion in Normandy, a love affair with the French heiress Angelique Dagineau becomes his only reason to survive the cataclysmic battle ahead. As the Resistance rises across Southern France, the tangled web of intrigue between the corrupt Vichy government forces, the Parisian criminal network and the Communist insurgents begins to unravel. When Carl learns that Angelique is the target of a massive Gestapo manhunt, he sets on a mission to save her. But can he find her in time?
A comprehensive introduction to type systems and programming languages. A type system is a syntactic method for automatically checking the absence of certain erroneous behaviors by classifying program phrases according to the kinds of values they compute. The study of type systems—and of programming languages from a type-theoretic perspective—has important applications in software engineering, language design, high-performance compilers, and security. This text provides a comprehensive introduction both to type systems in computer science and to the basic theory of programming languages. The approach is pragmatic and operational; each new concept is motivated by programming examples and ...
None