Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

The Capitalist Dilemma in China's Cultural Revolution
  • Language: en
  • Pages: 340

The Capitalist Dilemma in China's Cultural Revolution

How can capitalists' motivations during a Communist revolution be reliably documented and fully understood? Up to now, the answer to this question has generally eluded scholars who, for lack of nonofficial sources, have fallen back on Communist governments' official explanations. But the essays in this volume confirm that, at least in the case of the Communist revolution in China, it is finally possible to make new and fresh interpretations. By focusing closely on individuals and probing deeply into their thinking and experience, the authors of these essays have discovered a wide range of reasons for why Chinese capitalists did or did not choose to live and work under communism. The contributors to this volume have all concentrated on the dilemma for capitalists in China's Communist revolution. But their approach to their subject through archival research and rigorous analysis may also serve as a guide for future thinking about a variety of other historical figures. This approach is well worth adopting to explain how any members of society (not only capitalists) have resolved comparable dilemmas in all revolutions—the ones in China, Russia, Vietnam, Cuba, or anywhere else.

Applied Cryptography and Network Security
  • Language: en
  • Pages: 714

Applied Cryptography and Network Security

  • Type: Book
  • -
  • Published: 2017-06-23
  • -
  • Publisher: Springer

This book constitutes the proceedings of the 15th International Conference on Applied Cryptology and Network Security, ACNS 2017, held in Kanazawa, Japan, in July 2017. The 34 papers presented in this volume were carefully reviewed and selected from 149 submissions. The topics focus on innovative research and current developments that advance the areas of applied cryptography, security analysis, cyber security and privacy, data and server security.

Information Security and Cryptology
  • Language: en
  • Pages: 543

Information Security and Cryptology

  • Type: Book
  • -
  • Published: 2018-02-12
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, Inscrypt 2017, held in Xi'an, China, in November 2017. The 27 revised full papers presented together with 5 keynote speeches were carefully reviewed and selected from 80 submissions. The papers are organized in the following topical sections: cryptographic protocols and algorithms; digital signatures; encryption; cryptanalysis and attack; and applications.

Computer Security
  • Language: en
  • Pages: 626

Computer Security

  • Type: Book
  • -
  • Published: 2018-08-10
  • -
  • Publisher: Springer

The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018. The 56 revised full papers presented were carefully reviewed and selected from 283 submissions. The papers address issues such as software security, blockchain and machine learning, hardware security, attacks, malware and vulnerabilities, protocol security, privacy, CPS and IoT security, mobile security, database and web security, cloud security, applied crypto, multi-party computation, SDN security.

Anyuan
  • Language: en
  • Pages: 412

Anyuan

“This book is classic Perry -- elegantly and clearly written, based on rich and previously unexplored source material, full of human detail on political actors at the local level, presenting a gripping narrative and a clear analytical thrust. Perry’s account of Anyuan is fresh and original, making a convincing case for the area’s enduring contribution to the revolution.” - Joseph W. Esherick, UC San Diego, author of Ancestral Leaves

Artificial Intelligence and Security
  • Language: en
  • Pages: 766

Artificial Intelligence and Security

This two-volume set of LNCS 12736-12737 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS. The total of 93 full papers and 29 short papers presented in this two-volume proceedings was carefully reviewed and selected from 1013 submissions. Overall, a total of 224 full and 81 short papers were accepted for ICAIS 2021; the other accepted papers are presented in CCIS 1422-1424. The papers were organized in topical sections as follows: Part I: Artificial intelligence; and big data Part II: Big data; cloud computing and security; encryption and cybersecurity; information hiding; IoT security; and multimedia forensics

Information Security Practice and Experience
  • Language: en
  • Pages: 573

Information Security Practice and Experience

  • Type: Book
  • -
  • Published: 2015-04-08
  • -
  • Publisher: Springer

This book constitutes the proceedings of the 11th International Conference on Information Security Practice and Experience, ISPEC 2015, held in Beijing China, in May 2015. The 38 papers presented in this volume were carefully reviewed and selected from 117 submissions. The regular papers are organized in topical sections named: system security, stream cipher, analysis, key exchange protocol, elliptic curve cryptography, authentication, attribute-based encryption, mobile security, theory, implementation, privacy and indistinguishability.

Tools for Design, Implementation and Verification of Emerging Information Technologies
  • Language: en
  • Pages: 169

Tools for Design, Implementation and Verification of Emerging Information Technologies

This book constitutes the refereed post-conference proceedings of the 17th EAI International Conference on Tools for Design, Implementation and Verification of Emerging Information Technologies, TridentCom 2022, which was held in Melbourne, Australia, in November 23-25,2022. The 11 full papers were selected from 30 submissions and deal the emerging technologies of big data, cyber-physical systems and computer communications. The papers are grouped in thematical sessions on network security; network communication; network services; mobile and ad hoc networks; blockchain; machine learning.

Civil Engineering and Disaster Prevention
  • Language: en
  • Pages: 758

Civil Engineering and Disaster Prevention

  • Type: Book
  • -
  • Published: 2023-10-25
  • -
  • Publisher: CRC Press

Civil Engineering and Disaster Prevention focuses on the research of civil engineering, architecture and disaster prevention and control. These proceedings gather the most cutting-edge research and achievements, aiming to provide scholars and engineers with valuable research direction and engineering solutions. Subjects covered in the proceedings include: Civil Engineering Engineering Structure Architectural Materials Disaster Prevention and Control Building Electrical Engineering The works of these proceedings aim to promote the development of civil engineering and environment engineering. Thereby, fostering scientific information interchange between scholars from the top universities, research centers and high-tech enterprises working all around the world.

Information Security and Cryptology
  • Language: en
  • Pages: 545

Information Security and Cryptology

  • Type: Book
  • -
  • Published: 2017-03-02
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Information Security and Cryptology, Inscrypt 2016, held in Beijing, China, in November 2016. The 32 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on symmetric ciphers; public-key cryptosystems; signature and authentication; homomorphic encryption; leakage-resilient; post-quantum cryptography; commitment and protocol; elliptic curves; security and implementation.