Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Castle on a Hill
  • Language: en
  • Pages: 317

Castle on a Hill

This recasting of modern European history offers new insights into the Visegrad Group's significant role in changing political mind-sets and refashioning the continent Rick Fawn has written the first book-length account of the Visegrad Group of states, which consists of the Czech Republic, the Slovak Republic, Poland, and Hungary. Named after Hungary's Visegrád Castle, the group's significance includes changing international perceptions of Central Europe since the fall of communism and securing membership in NATO and the European Community. It plays an ongoing role today in regional solidarity and politics within the European Union and NATO. Castle on a Hill is built on years of uniquely ob...

Summary of Andy Greenberg's Tracers in the Dark
  • Language: en
  • Pages: 25

Summary of Andy Greenberg's Tracers in the Dark

Get the Summary of Andy Greenberg's Tracers in the Dark in 20 minutes. Please note: This is a summary & not the original book. "Tracers in the Dark" by Andy Greenberg delves into the world of digital financial investigations, particularly focusing on the efforts of IRS investigator Tigran Gambaryan and his colleagues in tracking illicit cryptocurrency transactions. The book begins with a notable Bitcoin transaction between a dark web drug lord and a federal agent acting as a mole, which piqued Gambaryan's interest. Gambaryan's background in accounting and his family's experiences with corruption in Soviet Armenia fueled his pursuit of justice through financial crime investigations...

The Future of Money
  • Language: en
  • Pages: 497

The Future of Money

A cutting-edge look at how accelerating financial change, from the end of cash to the rise of cryptocurrencies, will transform economies for better and worse. We think weÕve seen financial innovation. We bank from laptops and buy coffee with the wave of a phone. But these are minor miracles compared with the dizzying experiments now underway around the globe, as businesses and governments alike embrace the possibilities of new financial technologies. As Eswar Prasad explains, the world of finance is at the threshold of major disruption that will affect corporations, bankers, states, and indeed all of us. The transformation of money will fundamentally rewrite how ordinary people live. Above ...

The Iron Curtain
  • Language: en
  • Pages: 385

The Iron Curtain

It was forty-two years ago that Winston Churchill made his famous speech in Fulton, Missouri, in which he popularized the phrase "Iron Curtain." This speech, according to Fraser Harbutt, set forth the basic Western ideology of the coming East-West struggle. It was also a calculated move within, and a dramatic public definition of, the Truman administration's concurrent turn from accommodation to confrontation with the Soviet Union. It provoked a response from Stalin that goes far to explain the advent of the Cold War a few weeks later. This book is at once a fascinating biography of Winston Churchill as the leading protagonist of an Anglo-American political and military front against the Sov...

Anonymous Point Collection - Improved Models and Security Definitions
  • Language: en
  • Pages: 288

Anonymous Point Collection - Improved Models and Security Definitions

This work is a comprehensive, formal treatment of anonymous point collection. The proposed definition does not only provide a strong notion of security and privacy, but also covers features which are important for practical use. An efficient realization is presented and proven to fulfill the proposed definition. The resulting building block is the first one that allows for anonymous two-way transactions, has semi-offline capabilities, yields constant storage size, and is provably secure.

Advances in Cryptology – CRYPTO 2013
  • Language: en
  • Pages: 570

Advances in Cryptology – CRYPTO 2013

  • Type: Book
  • -
  • Published: 2013-08-15
  • -
  • Publisher: Springer

The two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed proceedings of the 33rd Annual International Cryptology Conference, CRYPTO 2013, held in Santa Barbara, CA, USA, in August 2013. The 61 revised full papers presented in LNCS 8042 and LNCS 8043 were carefully reviewed and selected from numerous submissions. Two abstracts of the invited talks are also included in the proceedings. The papers are organized in topical sections on lattices and FHE; foundations of hardness; cryptanalysis; MPC - new directions; leakage resilience; symmetric encryption and PRFs; key exchange; multi linear maps; ideal ciphers; implementation-oriented protocols; number-theoretic hardness; MPC - foundations; codes and secret sharing; signatures and authentication; quantum security; new primitives; and functional encryption.

Red Eagle: The Army in Polish Politics, 1944 - 1988
  • Language: en
  • Pages: 296

Red Eagle: The Army in Polish Politics, 1944 - 1988

The rise of the Polish army elite had a profound effect on the Communist Party. Many current changes stem from the tougher attitudes the Polish military under Jarulzelski took toward Solidarity. Annotation copyrighted by Book News, Inc., Portland, OR

Advances in Cryptology – ASIACRYPT 2017
  • Language: en
  • Pages: 481

Advances in Cryptology – ASIACRYPT 2017

  • Type: Book
  • -
  • Published: 2017-11-22
  • -
  • Publisher: Springer

The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.The 65 revised full papers were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.

The Search for Reconciliation
  • Language: en
  • Pages: 381

The Search for Reconciliation

Why have some former enemy countries established durable peace while others remain mired in animosity? When and how does historical memory matter in post-conflict interstate relations? Focusing on two case studies, Yinan He argues that the key to interstate reconciliation is the harmonization of national memories. Conversely, memory divergence resulting from national mythmaking harms long-term prospects for reconciliation. After WWII, Sino-Japanese and West German-Polish relations were both antagonized by the Cold War structure, and pernicious myths prevailed in national collective memory. In the 1970s, China and Japan brushed aside historical legacy for immediate diplomatic normalization. But the progress of reconciliation was soon impeded from the 1980s by elite mythmaking practices that stressed historical animosities. Conversely, from the 1970s West Germany and Poland began to de-mythify war history and narrowed their memory gap through restitution measures and textbook cooperation, paving the way for significant progress toward reconciliation after the Cold War.

The Munich Crisis, 1938
  • Language: en
  • Pages: 417

The Munich Crisis, 1938

  • Type: Book
  • -
  • Published: 2012-10-12
  • -
  • Publisher: Routledge

Most of the works on the crises of the 1930s and especially the Munich Agreement in 1938 were written when it was virtually impossible to gain access to the relevant archive collections on both sides of the Iron Curtain. This text studies the Czechoslovak-German crisis and its impact from previously neglected perspectives and celebrates the post-Cold War openness by bringing in new evidence from hitherto inaccessible archives.