You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Daphne Oram (1925-2003) was one of the central figures in the development of British experimental electronic music. Having declined a place at the Royal College of Music to become a music balancer at the BBC, she went on to become the co-founder and first director of the BBC Radiophonic Workshop. In 1972, she authored her only book, 'An Individual
A small boy, bored with all his toys, suddenly notices a trapdoor in the ceiling that can be reached by climbing the ladder of his toy fire engine. Once up in the attic he finds a window that opens many other windows and he meets a very special friend . . .
This book constitutes the proceedings of the 9th International Conference on Network and System Security, NSS 2015, held in New York City, NY, USA, in November 2015. The 23 full papers and 18 short papers presented were carefully reviewed and selected from 110 submissions. The papers are organized in topical sections on wireless security and privacy; smartphone security; systems security; applications security; security management; applied cryptography; cryptosystems; cryptographic mechanisms; security mechanisms; mobile and cloud security; applications and network security.
This book constitutes the refereed proceedings of the 16th International Conference on on Applied Cryptography and Network Security, ACNS 2018, held in Leuven, Belgium, in July 2018. The 36 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers were organized in topical sections named: Cryptographic Protocols; Side Channel Attacks and Tamper Resistance; Digital Signatures; Privacy Preserving Computation; Multi-party Computation; Symmetric Key Primitives; Symmetric Key Primitives; Symmetric Key Cryptanalysis; Public Key Encryption; Authentication and Biometrics; Cloud and Peer-to-peer Security.
This important book, first published in 1998 to great acclaim, makes available information relating to more than 3,000 soldiers and civilians who were sentenced to death by military courts during the First World War and its aftermath. Details of these individuals are presented in two lists - one chronological according to the date of sentencing, the other alphabetical - together with National Archives reference numbers"--Back cover.
Arthur's anger is so great that he wants to take it out on the whole world.
This book constitutes the thoroughly refereed roceedings of the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017.The 31 revised regular papers and 15 short papers were carefully reviewed and selected from 105 submissions. The topics range from security and privacy in machine learning to differential privacy, which are currently hot research topics in cyber security research.
This book constitutes the proceedings of the 8th International Conference on Applied Cryptography and Network Security, ACNS 2010, held in Beijing, China, in June 2010. The 32 papers presented in this volume were carefully reviewed and selected from 178 submissions. The papers are divided in topical sections on public key encryption, digital signature, block ciphers and hash functions, side-channel attacks, zero knowledge and multi-party protocols, key management, authentication and identification, privacy and anonymity, RFID security and privacy, and internet security.
How do the experts solve difficult problems in software development? In this unique and insightful book, leading computer scientists offer case studies that reveal how they found unusual, carefully designed solutions to high-profile projects. You will be able to look over the shoulder of major coding and design experts to see problems through their eyes. This is not simply another design patterns book, or another software engineering treatise on the right and wrong way to do things. The authors think aloud as they work through their project's architecture, the tradeoffs made in its construction, and when it was important to break rules. This book contains 33 chapters contributed by Brian Ker...