You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Vienna in 1942 is a city overrun with Nazis, profiteers, and spies. A desperate Nazi officer, under pressure from his superiors, bullies Lichtblau, a banker, also a writer, into handing him over some of the bank' s money. He is the object of hatred on the part of Hellroth, who has always been in love with Lichtblau' s wife. As Lichtblau' s and his family' s lives become more and more perilous, they devise a plan for his wife and children to leave Vienna and travel across Europe to England. Once in Oxford, a professor, Tom Oliver, with whom they have been in touch through a Resistance network in Europe, is due to take them in. Tom Oliver is loosely based on the figure of Maurice Bowra (1898-1...
In his study, Markus Jaeger explores the coalescence of Joan Baez's work as a singer and songwriter with her endeavors as a political activist throughout the last fifty years. He illustrates an American popular singer's significance as a political activist -- for her audiences and for her opponents as well as for those victims of politically organized violence who have profited from her work. Mingling popular culture with political activism can be a helpful means to achieve non-violent societal progress. Joan Baez's work offers an excellent example for this hypothesis.
Markus Jäger wrote a detailed study on the way singer and activist Joan Baez combined two outstanding components of peace studies - art and activism - to protest against the Vietnam War. The study shows that the 1960s (and early 1970s) are by far more than an era of hippies; overloaded with clichés. Baez is depicted as a timeless heroine; making timeless music and proving the timeless relevance of peaceful protest against violent authorities. She is still active and creative today (she released a new album and performed at numerous demonstrations against the war in Iraq).
The history of an early major work of architecture by Peter Behrens Few know that the former Continental Administration Building in Hanover was built between 1912 and 1914 according to plans by architect Peter Behrens. This publication reconstitutes the history of this building.
The huge potential in future connected services has as a precondition that privacy and security needs are dealt with in order for new services to be accepted. This issue is increasingly on the agenda both at company and at individual level. Cybersecurity and Privacy - bridging the gap addresses two very complex fields of the digital world, i.e., Cybersecurity and Privacy. These multifaceted, multidisciplinary and complex issues are usually understood and valued differently by different individuals, data holders and legal bodies. But a change in one field immediately affects the others. Policies, frameworks, strategies, laws, tools, techniques, and technologies - all of these are tightly interwoven when it comes to security and privacy. This book is another attempt to bridge the gap between the industry and academia. The book addresses the views from academia and industry on the subject.
None
Berlin boasts six modernist housing estates, all built between 1913 and 1932, by architects such as Bruno Taut and Hans Scharoun with the goal of providing affordable housing. These housing complexes are of great international significance and have been extremely well preserved. The housing projects were all planned to include bathrooms, kitchens, and balconies, with green space surrounding the complexes so that residents could enjoy sunlight and fresh air. These housing estates contineu to remain an example for international housing projects.
This book constitutes the refereed proceedings of the Third International Conference on Future Data and Security Engineering, FDSE 2016, held in Can Tho City, Vietnam, in November 2016. The 27 revised full papers and 2 short papers presented were carefully reviewed and selected from 115 submissions. They have been organized in the following topical sections: Big Data Analytics and Cloud Data Management; Internet of Things and Applications; Security and Privacy Engineering; Data Protection and Data Hiding; Advances in Authentication and Data Access Control; Access Control in NoSQL and Big Data; Context-based Data Analysis and Applications; Emerging Data Management Systems and Applications.