![]() |
![]() |
Your cart is empty |
||
Showing 1 - 25 of 571 matches in All Departments
Unlike some other reproductions of classic texts (1) We have not used OCR(Optical Character Recognition), as this leads to bad quality books with introduced typos. (2) In books where there are images such as portraits, maps, sketches etc We have endeavoured to keep the quality of these images, so they represent accurately the original artefact. Although occasionally there may be certain imperfections with these old texts, we feel they deserve to be made available for future generations to enjoy.
This book contains a range of invited and submitted papers presented at the 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Karlstad, Sweden, in August 2016. The 17 revised full papers and one short paper included in this volume were carefully selected from a total of 42 submissions and were subject to a two-step review process. The papers combine interdisciplinary approaches to bring together a host of perspectives: technical, legal, regulatory, socio-economic, social, societal, political, ethical, anthropological, philosophical, and psychological. The paper 'Big Data Privacy and Anonymization' is published open access under a CC BY 4.0 license at link.springer.com.
This book explores near-threshold computing (NTC), a design-space using techniques to run digital chips (processors) near the lowest possible voltage. Readers will be enabled with specific techniques to design chips that are extremely robust; tolerating variability and resilient against errors. Variability-aware voltage and frequency allocation schemes will be presented that will provide performance guarantees, when moving toward near-threshold manycore chips. * Provides an introduction to near-threshold computing, enabling reader with a variety of tools to face the challenges of the power/utilization wall; * Demonstrates how to design efficient voltage regulation, so that each region of the chip can operate at the most efficient voltage and frequency point; * Investigates how performance guarantees can be ensured when moving towards NTC manycores through variability-aware voltage and frequency allocation schemes.
NewInternetdevelopmentsposegreaterandgreaterprivacydilemmas. Inthe- formation Society, the need for individuals to protect their autonomy and retain control over their personal information is becoming more and more important. Today, informationandcommunicationtechnologies-andthepeopleresponsible for making decisions about them, designing, and implementing them-scarcely consider those requirements, thereby potentially putting individuals' privacy at risk. The increasingly collaborative character of the Internet enables anyone to compose services and contribute and distribute information. It may become hard for individuals to manage and control information that concerns them and particularly how to eliminate outdated or unwanted personal information, thus leavingpersonalhistoriesexposedpermanently. Theseactivitiesraisesubstantial new challenges for personal privacy at the technical, social, ethical, regulatory, and legal levels: How can privacy in emerging Internet applications such as c- laborative scenarios and virtual communities be protected? What frameworks and technical tools could be utilized to maintain life-long privacy? DuringSeptember3-10,2009, IFIP(InternationalFederationforInformation Processing)workinggroups9. 2 (Social Accountability),9. 6/11. 7(IT Misuseand theLaw),11. 4(NetworkSecurity)and11. 6(IdentityManagement)heldtheir5th InternationalSummerSchoolincooperationwiththeEUFP7integratedproject PrimeLife in Sophia Antipolis and Nice, France. The focus of the event was on privacy and identity managementfor emerging Internet applications throughout a person's lifetime. The aim of the IFIP Summer Schools has been to encourage young a- demic and industry entrants to share their own ideas about privacy and identity management and to build up collegial relationships with others. As such, the Summer Schools havebeen introducing participants to the social implications of information technology through the process of informed discussion.
This volume gets to the heart of what films mean to people on personal, political and commercial levels. Exploring value judgements that underpin social, academic and institutional practices, it examines the diverse forms of worth attributed to a range of international films in relation to taste, passion, morality and aesthetics.
Here is a book that aggregates five years of experience of three successive R and D projects (ELCH, GetTogether, GROPIS) covering technical and organizational issues of eProcurement. The projects, which were funded partly by the government and partly by industry and hospitals, looked at the characteristics of procurement processes and at standard technologies. Two of the projects included case studies (ELCH, GROPIS), the third project focused on the development of standard business objects for eProcurement in healthcare (GetTogether). Together they form a rich source of information worth communicating to a large audience of experts and newcomers alike.
Since their first industrial use polymers have gained a tremendous success. The two volumes of "Polymers - Opportunities and Risks" elaborate on both their potentials and on the impact on the environment arising from their production and applications. Volume 11 "Polymers - Opportunities and Risks I: General and Environmental Aspects" is dedicated to the basics of the engineering of polymers - always with a view to possible environmental implications. Topics include: materials, processing, designing, surfaces, the utilization phase, recycling, and depositing. Volume 12 "Polymers - Opportunities and Risks II: Sustainability, Product Design and Processing" highlights raw materials and renewable polymers, sustainability, additives for manufacture and processing, melt modification, biodegradation, adhesive technologies, and solar applications. All contributions were written by leading experts with substantial practical experience in their fields. They are an invaluable source of information not only for scientists, but also for environmental managers and decision makers.
st The world of the 21 century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase by the day. The demand for better methods of identification and access control is growing, not only in companies and organisations but also in the world at large. At the same time, such security measures have to be balanced with means for protecting the privacy of users. Identity management is put under pressure, due to the growing number of frauds who want to hide their true identity. This challenges the information security research community to focus on interdisciplinary and holistic approaches while retaining the benefits of previous research efforts. In this context, the IFIP Working Group 11.6 on Identity Management has been founded in August 2006. The intention of the Working Group is to offer a broad forum for the exchange of knowledge and for the tracking and discussion of issues and new developments. In this, we take an interdisciplinary approach. Scientists as well as practitioners, from government and business, who are involved in the field of identity management are welcome to participate. The IDMAN 2007 Conference on Policies and Research in Identity Management was the very first conference organized by this Working Group. We aim to organize conferences bi-annually. The IDMAN 2007 Conference has been centered around the theme of National Identity Management or, in other words, identity management in the public sector.
This book provides a comprehensive overview of modern networks design, from specifications and modeling to implementations and test procedures, including the design and implementation of modern networks on chip, in both wireless and mobile applications. Topical coverage includes algorithms and methodologies, telecommunications, hardware (including networks on chip), security and privacy, wireless and mobile networks and a variety of modern applications, such as VoLTE and the internet of things.
This book constitutes the thoroughly refereed post conference proceedings of the 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, held in Helsingborg, Sweden, in August 2010. The 27 revised papers were carefully selected from numerous submissions during two rounds of reviewing. They are organized in topical sections on terminology, privacy metrics, ethical, social, and legal aspects, data protection and identity management, eID cards and eID interoperability, emerging technologies, privacy for eGovernment and AAL applications, social networks and privacy, privacy policies, and usable privacy.
This collection addresses the significant cultural phenomenon of the 'zombie renaissance' - the growing importance of zombie texts and zombie cultural practices in popular culture. The chapters examine zombie culture across a range of media and practices including films games, music, social media, literature and fandom.
As the complexity of modern embedded systems increases, it becomes less practical to design monolithic processing platforms. As a result, reconfigurable computing is being adopted widely for more flexible design. Reconfigurable Computers offer the spatial parallelism and fine-grained customizability of application-specific circuits with the postfabrication programmability of software. To make the most of this unique combination of performance and flexibility, designers need to be aware of both hardware and software issues. FPGA users must think not only about the gates needed to perform a computation but also about the software flow that supports the design process. The goal of this book is to help designers become comfortable with these issues, and thus be able to exploit the vast opportunities possible with reconfigurable logic.
1 Einleitung.- 2 Globalisierung: Veranderte Bedeutungen von Hier und Dort.- 2.1 Globalisiemngsfieber und Globalisierungskonzepte.- 2.2 Internationalisierung und Globale Linkages.- 3 Bestimmung der Anforderungen an die Politik der Nachhaltigkeit: Was ist Nachhaltigkeit?.- 3.1 Eine kurze Bilanz der bisherigen Umweltpolitik.- 3.2 Glockenfoermiger Zusammenhang zwischen Umweltbelastung und Wirtschaftswachstum?.- 3.3 Neue Umweltprobleme und der Paradigmen Wechselder Umweltpolitik.- 3.4 Von der Umweltoekonomie zur oekologischen OEkonomie.- 3.5 Facetten des Nachhaltigkeitsbegriffs.- 3.6 Probleme der Operationalisierbarkeit.- 3.7 Das Drei-Saulen-Modell.- 3.8 Zielorientierung und Fazit.- 3.9 Globale Umweltprobleme auf der Agenda.- 4 Institutioneller Wandel, wirtschaftliche Entwicklung und Nachhaltigkeit.- 4.1 Ein Blick in die Geschichte.- 4.2 OEkologische Nachhaltigkeitsaspekte der Globalisierung.- 4.3 Anforderungen an den institutionellen Wandel.- 5 Globalisierung: Eine empirische Bestandsaufnahme.- 5.1 Vorgehensweise.- 5.2 Aussenhandel und Direktinvestitionen.- 5.3 Globalisierung und nationale Arbeitsmarkte.- 5.4 Globalisierung der Finanzmarkte.- 5.5 Eine erste Zwischenbilanz.- 5.6 Die Rolle von Institutionen und Normen unter Bedingungen einer globalen OEkonomie.- 6 Exkurs: Globalisierung, Entkoppeiung von realer und monetarer Akkumulation und monetarer Weltmarkt.- 6.1 Das Problem.- 6.2 Global neoclassicism und seine Begrundungen.- 6.3 Risse in den Transmissionsmechanismen.- 6.4 Eine andere Interpretation.- 7 Wettbewerbsfahigkeit und Standortdebatte.- 7.1 Begriffe der internationalen Wettbewerbsfahigkeit.- 7.2 Der Wettbewerb der Nationen.- 7.3 Die Rolle des Standortes und theoretische Ansatze zur Erklarung internationaler Wettbewerbsfahigkeit.- 7.4 Krugmans Analyse der Herausbildung wettbewerbsfahiger Zentren.- 7.5 Porters Analyse nationaler Wettbewerbsvorteile.- 7.6 Das Konzept der systemischen Wettbewerbsfahigkeit.- 7.7 Die Debatte um den Standort Deutschland.- 7.8 Wirkungen der Umweltpolitik auf Standort und Wettbewerbsfahigkeit.- 8 Bestimmungsfaktoren fur den Unternehmenserfolg.- 8.1 Kritische Erfolgsfaktoren.- 8.2 Die Hidden Champions.- 8.3 Die Umsetzung neuer Managementkonzepte.- 8.4 Umweltschutz und Unternehmenserfolg.- 9 Globalisierungsmoeglichkeiten und ihre Grenzen.- 9.1 Globalisierungsstrategien der Unternehmen.- 9.2 Produkte, Produktionsprozesse und Globalisierung.- 9.3 Die Standortwahl fur die Ansiedlung von Forschung und Entwicklung (FuE).- 10 Handel und Umwelt.- 10.1 Aussenhandelstheorie.- 10.2 Auswirkungen der Handelsliberalisierung auf die Umwelt.- 10.3 Argumente fur die Begrenzung des Aussenhandels.- 10.4 Umweltdumping und unterschiedliche nationale Produkt- und Produktionsstandards.- 10.5 Beschrankungen der unilateralen Handelspolitik durch regionale und internationale Abkommen.- 10.6 Das Allgemeine Zoll- und Handelsabkommen.- 10.7 Internationaler Umweltschutz durch eine globale Umweltschutzbehoerde als Alternative zur OEkologisierung des GATT-Rahmens.- 10.8 Die Berucksichtigung des Umweltschutzes im Nordamerikanischen Freihandelsabkommen.- 11 Fallstudie 1: Globalisierung der Automobilindustrie.- 11.1 Die oekonomische und kulturelle Bedeutung des Automobils.- 11.2 Die Globalisierung der Automobilindustrie.- 11.3 Der Fall der deutschen Automobilindustrie.- 11.4 Bewertungen.- 12 Fallstudie 2: Textilindustrie.- 12.1 Charakteristika.- 12.2 Bekleidungsindustrie.- 12.3 Nachfrageentwicklung.- 12.4 Die Bedeutung des Handels.- 12.5 Unternehmerische Strategien in der Textil-und Bekleidungsindustrie.- 12.6 Bekleidungsindustrie in Italien.- 12.7 Probleme und Ansatze zu ihrer UEberwindung.- 13 Die Ebenen der Handlungsmoeglichkeiten.- 13.1 Die weltwirtschaftlich-regionale Dimension der Handlungsmoeglichkeiten.- 13.2 Die nationale-makrooekonomische und die makropolitische Dimension.- 13.3 Die nationale-mikrooekonomische Dimension der Handlungsmoeglichkeiten.- 14 Nationale Handlungsmoegliehkeiten einer Politik
This book offers all important industrial communication systems for buildings in one single book! It stimulates a basic understanding of network and bus systems for the automation of buildings. After an introduction to EIB/KNX, LON und BACnet technologies, the authors illustrate how these systems can be utilized for specific applications, like air conditioning or illumination. This book assumes only a basic knowledge of mathematics and thanks to its simple explanations and many examples is ideal for students and professional engineers who require practical solutions. Numerous practical examples explain basic concepts of industrial communication technology as well as the procedure for the transmission of digital data. All chapters have been thoroughly revised for the 2nd edition and the book includes the latest technical developments and standards.
What does it mean to be human? Is there something that makes us distinct from computers, other great apes, Martians, gods? Is there philosophical, ethical, or political value in continuing to think in terms of a common human nature? Or should we rather throw this concept into the dustbin of history? A paradox of the concept of "human nature" is that it holds both the promise of universal equality-insofar as it takes us all to share a common nature-while all too often rationalizing exploitation, oppression, and even violence against other individuals and other species. Most appallingly, differences in skin color and other physiological traits have been viewed as signs of a "lesser" humanity, or of outright inhumanity, and used to justify great harms. The volume asks: is the concept of human nature separable from the racist, sexist, and speciest abuse that has been made of it? And is it even possible-or desirable-to articulate a notion of human nature unaffected by race or gender or class, as if it were possible to observe humanity in a pure form? This volume traces the history of the concept "human" by examining the history of claims about distinctively human properties and capacities, and the ethical and political repercussions of such accounts. Spanning the history of philosophy, political science, religion, medical ethics, the history of art and science fiction, it illuminates how our self-understanding as "human" evolved across time and place-from ancient Greek, classical Chinese, and medieval Arabic accounts of human nature to contemporary evolutionary theory and the transhumanist movement. It examines problems ranging from the intelligibility of Incarnation (a relationship between divine and human beings) to problems posed by genetic engineering and artificial intelligence. Short pieces, or Reflections, are interspersed among the chapters, which take up topics ranging from Frankenstein to Marx's concept of human nature.
The increasing diversity of Infonnation Communication Technologies and their equally diverse range of uses in personal, professional and official capacities raise challenging questions of identity in a variety of contexts. Each communication exchange contains an identifier which may, or may not, be intended by the parties involved. What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally networked infonnation society? th th From the 6 to the 10 August 2007, IFIP (International Federation for Infonnation Processing) working groups 9. 2 (Social Accountability), 9. 6/11. 7 (IT rd Misuse and the Law) and 11. 6 (Identity Management) hold their 3 Intemational Summer School on "The Future of Identity in the Infonnation Society" in cooperation with the EU Network of Excellence FIDIS at Karlstad University. The Summer School addressed the theme of Identity Management in relation to current and future technologies in a variety of contexts. The aim of the IFIP summer schools has been to introduce participants to the social implications of Infonnation Technology through the process of infonned discussion. Following the holistic approach advocated by the involved IFIP working groups, a diverse group of participants ranging from young doctoral students to leading researchers in the field were encouraged to engage in discussion, dialogue and debate in an infonnal and supportive setting. The interdisciplinary, and intemational, emphasis of the Summer School allowed for a broader understanding of the issues in the technical and social spheres.
Laura Hubner's book is among the first to analyze key films directed by Ingmar Bergman throughout his lifetime. Various kinds of "illusion" in Bergman's work (the mask, identity, dreams, and visions) are explored at both thematic and formal levels, positioned within wider concerns and perspectives such as cultural and artistic influences on Bergman's creative output, the phenomenon of Bergman as "art film" director, debates about modernism and postmodernism, and emerging feminist discourses on the multiplicity of identity.
This book constitutes the refereed proceedings of the 37th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2022, held in Copenhagen, Denmark, in June 2022. The 29 full papers presented were carefully reviewed and selected from 127 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in information processing systems. They are organized in topical sections on privacy models and preferences; network security and IDS; network security and privacy; forensics; trust and PETs; crypto-based solutions; usable security; blockchain; mobile security and privacy; PETs and crypto; and vulnerabilities.
This book serves as a single-source reference to the state-of-the-art in Internet of Things (IoT) platforms, services, tools, programming languages, and applications. In particular, the authors focus on IoT-related requirements such as low-power, time-to-market, connectivity, reliability, interoperability, security, and privacy. Authors discuss the question of whether we need new IoT standardization bodies or initiatives, toward a fully connected, cyber-physical world. Coverage includes the research outcomes of several, current European projects related to IoT platforms, services, APIs, tools, and applications.
This book contains the Proceedings of the 21st IFIP TC-11 International Information Security Conference (IFIP/SEC 2006) on "Security and Privacy in Dynamic Environments." The papers presented here place a special emphasis on Privacy and Privacy Enhancing Technologies. Further topics addressed include security in mobile and ad hoc networks, access control for dynamic environments, new forms of attacks, security awareness, intrusion detection, and network forensics. |
![]() ![]() You may like...
The Real Meal Revolution
Tim Noakes, Sally-Ann Creed, …
Paperback
![]()
The How Not To Die Cookbook - Over 100…
Michael Greger
Paperback
![]()
A Little Light - Connecting Children…
Andrew Sam Newman, Rosie Balyuzi
Hardcover
R566
Discovery Miles 5 660
A Patient's Guide to Medical Imaging
Ronald Eisenberg, JD, MD, FACR, Alexander Margulis, MD
Hardcover
R1,210
Discovery Miles 12 100
Reversing Acquired Ichthyosis - Success…
Central Health Central
Paperback
R473
Discovery Miles 4 730
|