Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Poetic Writing and the Vietnam War in West Germany
  • Language: en
  • Pages: 248

Poetic Writing and the Vietnam War in West Germany

  • Type: Book
  • -
  • Published: 2023-05-30
  • -
  • Publisher: UCL Press

In the 1960s and 1970s in the Federal Republic of Germany (FRG), or West Germany, newspaper readers and television viewers were appalled by terrible images of fires burning half a world away. The Vietnam War was a decisive catalyst for the era’s wider protest movements and gave rise to an ardent anti-war discourse. This discourse privileged writing in many forms. Within it, poetry and poetic writing were key; and because coverage of the conflict in Vietnam often focused on spectacular, destructive conflagrations ignited by hi-tech machines of war, their dominant trope was fire. Hundreds of poems and related writings about Vietnam circulated in the FRG, yet they are almost entirely forgotte...

Media Tactics in the Long Twentieth Century
  • Language: en
  • Pages: 299

Media Tactics in the Long Twentieth Century

Integrating media studies with history, Media Tactics in the Long Twentieth Century explores the dynamic relationship between tactics and strategies in recent history. Drawing on examples from a range of different countries and world regions, and looking at the infrastructures, entanglements, and institutions involved, the volume makes a strong case for media tactics as a new field of scholarly inquiry and for the importance of a historically informed approach. In contrast to strategic communication approaches, this media historical intervention contributes to new knowledge about the practical implementation of strategies. First foregrounding tactics as an object of study, the volume then co...

Managing the Dynamics of Networks and Services
  • Language: en
  • Pages: 191

Managing the Dynamics of Networks and Services

This book constitutes the refereed proceedings of the 5th International Conference on Autonomous Infrastructure, Management and Security, AIMS 2011, held in Nancy, France, in June 2011. The 11 revised full papers presented together 11 papers of the AIMS PhD workshops were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on security management, autonomic network and service management (PhD workshop), policy management, P2P and aggregation schemes, and monitoring and security (PhD workshop).

System Analysis and Modeling: About Models
  • Language: en
  • Pages: 266

System Analysis and Modeling: About Models

This book constitutes the throughly refereed post-proceedings of the 6th International Workshop on Systems Analysis and Modeling, SAM 2010, held in collocation with MODELS 2010 in Oslo, Norway in October 2010. The 15 revised full papers presented went through two rounds of reviewing and improvement. The papers are organized in topical sections on modularity, composition, choreography, application of SDL and UML; SDL language profiles; code generation and model transformations; verification and analysis; and user requirements notification.

E-Business and Telecommunications
  • Language: en
  • Pages: 550

E-Business and Telecommunications

  • Type: Book
  • -
  • Published: 2015-12-29
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 11th International Joint Conference on E-Business and Telecommunications, ICETE 2014, held in Vienna, Austria, in August 2014. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, DCNET; International Conference on E-Business, ICE-B; International Conference on Optical Communication Systems, OPTICS; International Conference on Security and Cryptography, SECRYPT; International Conference on Wireless Information Systems, WINSYS; and International Conference on Signal Processing and Multimedia, SIGMAP. The 27 full papers presented were carefully reviewed and selected from 328 submissions. The papers cover the following key areas of e-business and telecommunications: data communication networking; e-business; optical communication systems; security and cryptography; signal processing and multimedia applications; wireless information networks and systems.

Distributed Applications and Interoperable Systems
  • Language: en
  • Pages: 184

Distributed Applications and Interoperable Systems

This book constitutes the refereed proceedings of the 9th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems, DAIS 2009, held in Lisbon, Portugal, in June 2009. The DAIS conference was held as part of the federated event on Distributed Computing Techniques (DisCoTec), together with the 11th International Conference on Coordination Models and Languages (Coordination 2009) and the IFIP WG 6.1 International Conference on Formal Techniques for Distributed Systems (FMOODS/FORTE 2009). The 12 revised full papers presented were carefully reviewed and selected from 32 submissions. The papers address service orientation, quality of service and service contract, business processes, Web services, service components, algorithms and protocols supporting dependability, fault tolerance, data replication, group communication, adaptive and collaborative systems, context awareness, model-driven development, middleware for ubiquitous computing and sensor networks, ad hoc network protocols, peer-to-peer systems, and overlays. They are organized in topical sections peer-to-peer networks, adhoc networks, dependability, and infrastructure and services.

Privacy-Respecting Intrusion Detection
  • Language: en
  • Pages: 304

Privacy-Respecting Intrusion Detection

Effective response to misuse or abusive activity in IT systems requires the capability to detect and understand improper activity. Intrusion Detection Systems observe IT activity, record these observations in audit data, and analyze the collected audit data to detect misuse. Privacy-Respecting Intrusion Detection introduces the concept of technical purpose binding, which restricts the linkability of pseudonyms in audit data to the amount necessary for misuse detection. Also, it limits the recovery of personal data to pseudonyms involved in a detected misuse scenario. The book includes case studies demonstrating this theory, and solutions that are constructively validated by providing algorithms.

Emerging Trends in Information and Communication Security
  • Language: en
  • Pages: 541

Emerging Trends in Information and Communication Security

  • Type: Book
  • -
  • Published: 2006-06-01
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the International Conference on Emerging Trends in Information and Communication Security, ETRICS 2006, held in Freiburg, Germany, in June 2006. The book presents 36 revised full papers, organized in topical sections on multilateral security; security in service-oriented computing, secure mobile applications; enterprise privacy; privacy, identity, and anonymity; security engineering; security policies; security protocols; intrusion detection; and cryptographic security.

Formal Techniques for Networked and Distributed Systems - FORTE 2004
  • Language: en
  • Pages: 388

Formal Techniques for Networked and Distributed Systems - FORTE 2004

This book constitutes the refereed proceedings of the 24th IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems, FORTE 2004, held in Madrid, Spain, in September 2004. The 20 revised full papers presented together with 3 invited papers were carefully reviewed and selected from 54 submissions. Among the topics addressed are state-based specification, distributed Java objects, UML and SDL, algorithm verification, communicating automata, design recovery, formal protocol testing, testing and model checking, distributed real-time systems, formal composition, distributed testing, automata for ACTL, symbolic state space representation, pi-calculus, concurrency, Petri nets, routing protocol verification, and intrusion detection.

Advanced Information Systems Engineering
  • Language: en
  • Pages: 556

Advanced Information Systems Engineering

  • Type: Book
  • -
  • Published: 2006-07-29
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 18th International Conference on Advanced Information Systems Engineering, CAiSE 2006, held in Luxembourg, in June 2006. The book presents 33 revised full papers together with 3 keynote talks. The papers are organized in topical sections on security, conceptual modeling, queries, document conceptualization, service composition, workflow, business modeling, configuration and separation, business process modeling, agent orientation, and requirements management.