You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Branko Vukelić may not be well known outside his home country, but he certainly should be. That’s because Branko was a spy, part of the famous Soviet secret espionage group based in Tokyo and led by Richard Sorge. They were spying on Japan and Germany in the 1930s and early 1940s. After discovering evidence of Hitler’s plans to launch an attack on the Soviet Union in June 1941, and that the Japanese authorities had decided to direct their attention away from the Soviet borders toward Indochina and the Pacific, Sorge’s group sent word back to Moscow. This news arrived just in time for Stalin to deploy fresh troops from the country’s far eastern border and halt Germany’s rapid advan...
Handbook of Database Security: Applications and Trends provides an up-to-date overview of data security models, techniques, and architectures in a variety of data management applications and settings. In addition to providing an overview of data security in different application settings, this book includes an outline for future research directions within the field. The book is designed for industry practitioners and researchers, and is also suitable for advanced-level students in computer science.
This book constitutes the refereed proceedings of the 15th International Conference on Concurrency Theory, CONCUR 2004, held in London, UK in August/September 2004. The 29 revised full papers presented together with 4 invited papers were carefully reviewed and selected from 134 submissions. Among the topics covered are concurrency related aspects of models of computation, semantic domains, process algebras, Petri nets, event structures, real-time systems, hybrid systems, decidability, model checking, verification techniques, refinement, term and graph rewriting, distributed programming, constraint logic programming, object-oriented programming, typing systems and algorithms, case studies, tools, and environments for programming and verification.
ECOOP'99 Workshops, Panels, and Posters Lisbon, Portugal, June 14-18, 1999 Proceedings
The volume explores new interfaces between linguistics and jurisprudence. Its theoretical and methodological importance lies in showing that many questions asked within language and law receive satisfactory answers from formal linguistics, including computational linguistics, artificial intelligence, translation studies, psycholinguistics, semantics, phonetics and corpus linguistics.
This book is new in every aspect and not only because neither the official history nor an unofficial history of the KGB, and its many predecessors and successors, exists in any language. In this volume, the author deals with the origins of the KGB from the Tsarist Okhrana (the first Russians secret political police) to the OGPU, Joint State Political Directorate, one of the KGB predecessors between 1923 and 1934. Based on documents from the Russian archives, the author clearly demonstrates that the Cheka and GPU/OPGU were initially created to defend the revolution and not for espionage. The Okhrana operated in both the Russian Empire and abroad against the revolutionaries and most of its ope...
ECDL 2002 was the 6th conference in the series of European Conferences on Research and Advanced Technologies for Digital Libraries. Following previous events in Pisa (1997), Heraklion (1998), Paris (1999), Lisbon (2000), and Da- stadt (2001), this year ECDL was held in Rome. ECDL 2002 contributed, - gether with the previous conferences, to establishing ECDL as the major - ropean forum focusing on digital libraries and associated technical, practical, and social issues. ECDL 2002 continued the tradition already established by the previous conferences in meeting the needs of a large and diverse constituency, which includes researchers, practitioners, educators, policy makers, and users. The fo...
This book constitutes the thoroughly refereed joint post-proceedings of nine workshops held as part of the 10th International Conference on Extending Database Technology, EDBT 2006, held in Munich, Germany in March 2006. The 70 revised full papers presented were selected from numerous submissions during two rounds of reviewing and revision.
This volume contains the papers presented at the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC) held in L- don, UK, July 13–16, 2008. This year’s working conference continued its tra- tion of being a forum for disseminating original research results and practical experiences in data and applications security. This year we had an excellent program that consists of 9 research paper s- sions with 22 high-quality research papers, which were selected from a total of 56 submissions after a rigorous reviewing process by the Program Committee members and external reviewers. These sessions included such topics as access control, privacy, auditing, systems se...
Cloud computing may be borderless, but taxes are territorial. It is easy to imagine how the two concepts can clash. Much effort has gone into harmonizing tax rules across borders with the result that many jurisdictions have very similar tax rules. Even so, taxation remains a basic expression of national sovereignty. The goal of this thesis is to examine how international tax law applies to the cross-border cloud computing business. Both, multinational providers and customers of cloud computing services are analyzed. Reflecting three traditional areas of international tax scholarship, the goal could be stated in three questions. Which jurisdictions have the right to tax? What kinds of cloud c...