Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
The contributors to this volume show that the themes of empire, colony, and national liberation movements can be addressed in a European continental as much as in Asian, Latin American, or African contexts. There is a further benefit from a within-Europe comparison: It calls into question the tendency to assume fundamental differences between "western" and "eastern" Europe, including the now largely abandoned distinction between a "western" nationalism, defined as a civil nationalism, and an "eastern" one, defined as ethnic. It also answers the question whether intra-European comparison of this kind is possible, in a context where post-Soviet scholarship is often invisible in Anglo-American scholarship. As Norman Davies reminds us, low public awareness of Europe's smaller and, in west-European minds, "more distant" nations, underlies the persistence of false generalizations about them, including assumptions like "that the whole of the west was advanced while the whole of the east was backward."
Speicherverwaltung, Hardwareverwaltung, Prozessadministration und Interprozesskommunikation sind zentrale Aufgaben von Betriebssystemen. Die Konzepte und Prinzipien, auf denen klassische und moderne Betriebssysteme basieren, erläutert der Autor anhand von einschlägigen Aufgabenstellungen und Lösungen. Das Werk gibt damit eine verständliche Einführung in die Architektur von Betriebssystemen und eignet sich deshalb auch für die Lehre im Bachelorstudium.
A gripping and explosive account of Vladimir Putin's tyranny, charting his rise from spy to tsar, exposing the events that led to his invasion of Ukraine and his assault on Europe. In Killer in the Kremlin, award-winning journalist John Sweeney takes readers from the heart of Putin's Russia to the killing fields of Chechnya, to the embattled cities of an invaded Ukraine. In a disturbing expose of Putin's sinister ambition, Sweeney draws on thirty years of his own reporting - from the Moscow apartment bombings to the atrocities committed by the Russian Army in Chechnya, to the annexation of Crimea and a confrontation with Putin over the shooting down of flight MH17 - to understand the true extent of Putin's long war. Drawing on eyewitness accounts and compelling testimony from those who have suffered at Putin's hand, we see the heroism of the Russian opposition, the bravery of the Ukrainian resistance, and the brutality with which the Kremlin responds to such acts of defiance, assassinating or locking away its critics, and stopping at nothing to achieve its imperialist aims.
The unfolding crisis in Ukraine has brought the world to the brink of a new Cold War. As Russia and Ukraine tussle for Crimea and the eastern regions, relations between Putin and the West have reached an all-time low. How did we get here? Richard Sakwa here unpicks the context of conflicted Ukrainian identity and of Russo-Ukrainian relations and traces the path to the recent disturbances through the events which have forced Ukraine, a country internally divided between East and West, to choose between closer union with Europe or its historic ties with Russia. In providing the first full account of the ongoing crisis, Sakwa analyses the origins and significance of the Euromaidan Protests, examines the controversial Russian military intervention and annexation of Crimea, reveals the extent of the catastrophe of the MH17 disaster and looks at possible ways forward following the October 2014 parliamentary elections. In doing so, he explains the origins, developments and global significance of the internal and external battle for Ukraine.With all eyes focused on the region, Sakwa unravels the myths and misunderstandings of the situation, providing an essential and highly readable account of the struggle for Europe's contested borderlands.
InhaltVorbemerkung 9Erster Teil 11- Extensive Feindpropaganda 11- Die russische Position 14- Die Strategie der Destabilisierung 17- Eskalation 19- Folgen des Umsturzes und erste Reaktionen Russlands 21- Lügen und Hetze 25- Das Versagen der westlichen Medien 29- Militarisierung 33- Restauration und Indoktrination 37- Bürgerkrieg 43- Taktik und Propaganda 48- Gibt es eine Perspektive für die EU? 50- Erneute Drohungen und Kriegstreiberei 53- Provokationen 56- Anzeichen von Ernüchterung 58- Caveat emptor ¿ Der Käufer trägt das Risiko 61- Die Endlosschleife 66- Vorläufige Waffenruhe 67- Wirtschaftskrieg gegen Russland 70- Freihandel, Klitschko, NATO-Manöver und Proteste in Moskau 73- USA ¿ Kein Vorbild für Frieden und Freiheit 79- Drei Wortmeldungen zur Sache - Rede des russischen Präsidenten zum Beitritt der Krim zur Russischen Föderation 80 - Karl-Wilhelm Lange an Frank-Walter Steinmeier 97 - Willy Wimmer: Alarmstufe ¿Rot¿ 100Zweiter Teil 105- Gelenkte Politik und Meinungsmache 105- Wladimir Putin, Barack Obama und Joe Biden 110- Demagogie 114- Rechtsextremismus, Korruption und Mord 119- Kriegsvorbereitungen 124- Konsequenzen 133- Zwischenbilanz 2015 138Dritter Teil 141- Der Kampf um die Macht 141- Kriegshetze und Hybris 151- Weitere Truppenverlegungen und "Information Warfare" 155- Russland in der Defensive 166- Spionage, Fake News, Indoktrination 170- Hinter den Kulissen 181- Die Ukraine ¿ ein ¿failed state¿ 188- Krieg in Syrien 193- Keine Sanktionen, kein Krieg! 204- Der Machtwechsel in den USA 219- Wladimir Putin: ¿Wir brauchen Freunde¿ 225- Ein Ende des Kalten Krieges? 231- Donald Trump ¿ Hoffnungen und Chaos 236- Erwartungen und offene Fragen 242Bildquellen 253
Der Erste-Hilfe-Wortschatz "Willkommen bei uns" bietet einfachen deutschen Basiswortschatz zur ersten Verständigung in Unterkünften, auf Ämtern, beim Einkaufen oder beim Arzt. Die Sammlung enthält Wörter und Wendungen mit Übersetzungen in Ukrainisch, Englisch und Russisch. Audioaufnahmen des Wortschatzes finden Sie als Download online. Den gesamten Gewinn aus den verkauften Exemplaren dieses Titels spenden wir an Aktion Deutschland Hilft e.V.
»Ukraine between Russia and the European Union«: For centuries the Ukrainians tried to make their way as an independent nation. It was not until August 24, 1991 that the Ukrainians were allowed to proclaim Ukraine's independence. With the Orange Revolution in 2004 and the Maidan Revolution in 2013, the Ukrainians showed that it was no longer the post-Soviet elites but the citizens themselves who should bring about change. The country was not allowed to develop in peace, however, as Russian forces annexed the Crimea and caused unrest in eastern Ukraine
This book constitutes the refereed proceedings of the First HPCLATAM - CLCAR Joint Latin American High Performance Computing Conference, CARLA 2014, held in Valparaiso, Chile, in October 2014. The 17 revised full papers and the one paper presented were carefully reviewed and selected from 42 submissions. The papers are organized in topical sections on grid and cloud computing; HPC architectures and tools; parallel programming; scientific computing.
This book constitutes the refereed proceedings of the 4th International Workshop on Multiple Access Communications, MACOM 2011, held in Trento, Italy, in September 2011. The 21 full papers presented were carefully reviewed and selected from more than 40 submissions. They are divided in topical sections on cognitive radio; MAC protocols; communications theory; special session on MAC protocols for WSNs; system analysis and scheduling; and queuing systems.
This book constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmstadt, Germany, in May 2012. The 41 papers presented were carefully reviewed and selected from 188 submissions. The book also contains one invited talk. The papers are organized in the following topical sections: homomorphic encryption and LWE, signature schemes, code-based and multivariate crypto, public key encryption: special properties, identity-based encryption, public-key encryption: constructions, secure two-party and multi-party computations, key exchange and secure sessions, public-key encryption: relationships, DL, DDH, and more number theory, and beyond ordinary signature schemes.
Irrespective of whether we use economic or societal metrics, the Internet is one of the most important technical infrastructures in existence today. It will serve as a catalyst for much of our innovation and prosperity in the future. A competitive Europe will require Internet connectivity and services beyond the capabilities offered by current technologies. Future Internet research is therefore a must.The Future Internet Assembly (FIA) is a successful and unique bi-annual conference that brings together participants of over 150 projects from several distinct but interrelated areas in the EU Framework Programme 7. The 20 full papers included in this volume were selected from 40 submissions, and are preceded by a vision paper describing the FIA Roadmap. The papers have been organized into topical sections on the foundations of Future Internet, the applications of Future Internet, Smart Cities, and Future Internet infrastructures.
This book constitutes a collaborative and selected documentation of the scientific outcome of the European COST Action IS0605 Econ@Tel "A Telecommunications Economics COST Network" which run from October 2007 to October 2011. Involving experts from around 20 European countries, the goal of Econ@Tel was to develop a strategic research and training network among key people and organizations in order to enhance Europe's competence in the field of telecommunications economics. Reflecting the organization of the COST Action IS0605 Econ@Tel in working groups the following four major research areas are addressed: - evolution and regulation of communication ecosystems; - social and policy implications of communication technologies; - economics and governance of future networks; - future networks management architectures and mechanisms.
This book constitutes the refereed proceedings of the 12th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2010, held in Ghent, Belgium, in October 2011. The 26 revised papers presented were carefully reviewed and selected from 52 submissions. The papers are organized in topical sections on usability, architecture and framework security, mobile identity management, secure hardware platforms, biometrics, multimedia security, network security and authentication.
This book constitutes the proceedings of the 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2011, held in Grenoble, France, in October 2011. The 29 papers presented were carefully reviewed and selected from 79 submissions. They cover the following areas: ad-hoc, sensor, and peer-to-peer networks; safety and verification; security; self-organizing and autonomic systems; and self-stabilization.
This book constitutes the refereed proceedings of the 8th International Conference on Autonomic and Trusted Computing, ATC 2011, held in Banff, Canada, September 2011. The 17 revised full papers presented together with 1 keynote speech were carefully reviewed and selected from numerous submissions. The papers address all current issues in autonomic architectures, models and systems, autonomic communications, trusted and secure computing, reliable, secure and trust applications.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th European Workshop on Public Key Infrastructures, Services and Applications, EuroPKI 2010, held in Athens, Greece, in September 2010. The 14 revised full papers presented together with an invited article were carefully reviewed and selected from 41 submissions. The papers are organized in topical sections on authentication mechanisms; privacy preserving techniques; PKI & PKC applications; electronic signature schemes; identity management.
This book constitutes the refereed proceedings of the 16th Australasian Conference on Information Security and Privacy, ACISP 2011, held in Melbourne, Australia, in July 2011. The 24 revised full papers presented together with an invited talk and 9 poster papers were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on symmetric key cryptography, hash functions, cryptographic protocols, access control and security, and public key cryptography.
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Workshop on Fast Software Encryption, held in Lyngby, Denmark, in February 2011. The 22 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 106 initial submissions. The papers are organized in topical sections on differential cryptanalysis, hash functions, security and models, stream ciphers, block ciphers and modes, as well as linear and differential cryptanalysis.
This book constitutes the refereed proceedings of the 9th International Conference on Applied Cryptography and Network Security, ACNS 2011, held in Nerja, Spain, in June 2011. The 31 revised full papers included in this volume were carefully reviewed and selected from 172 submissions. They are organized in topical sessions on malware and intrusion detection; attacks, applied crypto; signatures and friends; eclectic assortment; theory; encryption; broadcast encryption; and security services.
This book constitutes the proceedings of the Third International Workshop on Traffic Monitoring and Analysis, TMA 2011, held in Vienna, Austria, on April 27, 2011 - co-located with EW 2011, the 17th European Wireless Conference. The workshop is an initiative from the COST Action IC0703 "Data Traffic Monitoring and Analysis: Theory, Techniques, Tools and Applications for the Future Networks". The 10 revised full papers and 6 poster papers presented together with 4 short papers were carefully reviewed and selected from 29 submissions. The papers are organized in topical sections on traffic analysis, applications and privacy, traffic classification, and a poster session.
This book constitutes the refereed proceedings of the International ECML/PKDD Workshop on Privacy and Security Issues in Data Mining and Machine Learning, PSDML 2010, held in Barcelona, Spain, in September 2010.The 11 revised full papers presented were carefully reviewed and selected from 21 submissions. The papers range from data privacy to security applications, focusing on detecting malicious behavior incomputer systems.
This two-volume set, consisting of LNCS 6608 and LNCS 6609, constitutes the thoroughly refereed proceedings of the 12th International Conference on Computer Linguistics and Intelligent Processing, held in Tokyo, Japan, in February 2011.The 74 full papers, presented together with 4 invited papers, were carefully reviewed and selected from 298 submissions. The contents have been ordered according to the following topical sections: lexical resources; syntax and parsing; part-of-speech tagging and morphology; word sense disambiguation; semantics and discourse; opinion mining and sentiment detection; text generation; machine translation and multilingualism; information extraction and information retrieval; text categorization and classification; summarization and recognizing textual entailment; authoring aid, error correction, and style analysis; and speech recognition and generation.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.