1.

Record Nr.

UNINA990009750430403321

Titolo

Aberration-Corrected Analytical Transmission Electron Microscopy : Edited by Rik Brydson

Pubbl/distr/stampa

Chichester : WIley, c2011

ISBN

978-0-470-51851-9

Descrizione fisica

XV, 280 p. : ill. ; 24 cm

Locazione

DINCH

Collocazione

04 044-194

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Published in association with the Royal Microscopical Society

2.

Record Nr.

UNINA9910973251103321

Autore

Rabaté Jean-Michel <1949->

Titolo

James Joyce and the politics of egoism / / Jean-Michel Rabaté

Pubbl/distr/stampa

Cambridge : , : Cambridge University Press, , 2001

ISBN

1-107-12368-2

0-511-48527-1

1-280-16225-2

0-511-04395-3

0-511-15354-6

0-511-11965-8

0-521-80425-6

0-511-32515-0

Edizione

[1st ed.]

Descrizione fisica

1 online resource (ix, 248 pages) : digital, PDF file(s)

Disciplina

823/.912

Soggetti

Politics and literature - Ireland - History - 20th century

Difference (Psychology) in literature

Modernism (Literature) - Ireland

Hospitality in literature

Egoism in literature

Self in literature



Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Title from publisher's bibliographic system (viewed on 05 Oct 2015).

Nota di bibliografia

Includes bibliographical references (p. 235-242) and index.

Nota di contenuto

Après le mot, le déluge : the ego as symptom -- The ego, the nation and degeneration -- Joyce the egoist -- The aesthetic paradoxes of egoism: from egoism to the theoretic -- Theory's slice of life -- The egoist and the king -- The conquest of Paris -- Joyce's transitional revolution -- Hospitality and sodomy -- Textual hospitality in the 'capital city' -- Joyce's late modernism and the birth of the genetic reader -- Stewardism, Parnellism and egotism.

Sommario/riassunto

In James Joyce and the Politics of Egoism, first published in 2001, a leading scholar approaches the entire Joycean canon through the concept of 'egoism'. This concept, Jean-Michel Rabaté argues, runs throughout Joyce's work, and involves and incorporates its opposite, 'hospitality', a term Rabaté understands as meaning an ethical and linguistic opening to 'the other'. For Rabaté both concepts emerge from the fact that Joyce published crucial texts in the London based review The Egoist and later moved on to forge strong ties with the international Paris avant-garde. Rabaté examines the theoretical debates surrounding these connections, linking Joyce's engagement with Irish politics with the aesthetic aspects of his texts. Through egoism, he shows, Joyce defined a literary sensibility founded on negation; through hospitality, Joyce postulated the creation of a new, utopian readership. Rabaté explores Joyce's complex negotiation between these two poles in a study of interest to all Joyceans and scholars of modernism.



3.

Record Nr.

UNISA996691663503316

Autore

Nicomette Vincent

Titolo

Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part III / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya

Pubbl/distr/stampa

Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026

ISBN

3-032-07894-6

Edizione

[1st ed. 2026.]

Descrizione fisica

1 online resource (833 pages)

Collana

Lecture Notes in Computer Science, , 1611-3349 ; ; 16055

Altri autori (Persone)

BenzekriAbdelmalek

Boulahia-CuppensNora

VaidyaJaideep

Disciplina

005.8

Soggetti

Data protection

Cryptography

Data encryption (Computer science)

Computer networks - Security measures

Computer networks

Computer systems

Data and Information Security

Cryptology

Security Services

Mobile and Network Security

Computer Communication Networks

Computer System Implementation

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

-- QUIC-Fuzz: An Effective Greybox Fuzzer For The QUIC Protocol.  -- Systematic Assessment of Cache Timing Vulnerabilities on RISC-V Processors.  -- No Root, No Problem: Automating Linux Least Privilege and Securing Ansible Deployments.  -- NICraft: Malicious NIC Firmware-based Cache Side-channel Attack.  -- Identifying Potential Timing Leakages from Hardware Design with Precondition Synthesis.  -- LibAFLstar: Fast and State-aware Protocol Fuzzing.  -- PUSH for



Security: A PUF-Based Protocol to Prevent Session Hijacking.  -- Hardening HSM Clusters: Resolving Key Sync Vulnerabilities for Robust CU Isolation.  -- AcouListener: An Inaudible Acoustic Side-channel Attack on AR/VR Systems.  -- Verifying DRAM Addressing in Software.  -- Epistemology of Rowhammer Attacks: Threats to Rowhammer Research Validity.  -- Personalized Password Guessing via Modeling Multiple Leaked Credentials of the Same User.  -- WelkIR: Flow-Sensitive Pre-trained Embeddings from Compiler IR for Vulnerability Detection.  -- Edge Coverage Feedback of Embedded Systems Fuzzing Based on Debugging Interfaces.  -- Cache Demote for Fast Eviction Set Construction and Page Table Attribute Leakage.  -- WaitWatcher & WaitGuard: Detecting Flush-Based Cache Side-Channels through Spurious Wakeups.  -- T-Time: A Fine-grained Timing-based Controlled-Channel Attack against Intel TDX.  -- Unraveling DoH Traces: Padding-Resilient Website Fingerprinting via HTTP/2 Key Frame Sequences.  -- NLSaber: Enhancing Netlink Family Fuzzing via Automated Syscall Description Generation.  -- The Hidden Dangers of Public Serverless Repositories: An Empirical Security Assessment.  -- CapMan: Detecting and Mitigating Linux Capability Abuses at Runtime to Secure Privileged Containers.  -- Digital Twin for Adaptive Adversary Emulation in IIoT Control Networks.  -- Formal Security Analysis of ss2DNS.  -- High-Efficiency Fuzzing Technique Using Hooked I/O System Calls for Targeted Input Analysis.  -- VeriFLo: Verifiable Provenance with Fault Localization for Inter-domain Routing.  -- The Polymorphism Maze: Understanding Diversities and Similarities in Malware Families.  -- End-to-End Non-Profiled Side-Channel Analysis on Long Raw Traces.

Sommario/riassunto

This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22–24, 2025. The 100 full papers presented in these proceedings were carefully reviewed and selected from 600 submissions. They were organized in topical sections as follows: AI and Data-Centric Security, Systems and Hardware Security, Privacy, Cryptography and Secure Protocol Design, Blockchain and Financial Security, Privacy Policy and Identity Management, Adversarial and Backdoor Defenses. .