1.

Record Nr.

UNINA9910150638503321

Autore

Pimsleur

Titolo

Pimsleur Greek (Modern) Level 2 Lessons 16-20 : Learn to Speak and Understand Modern Greek with Pimsleur Language Programs

Pubbl/distr/stampa

: Pimsleur (Simon & Schuster)

ISBN

1-4423-2007-9

Lingua di pubblicazione

Inglese

Formato

Musica

Livello bibliografico

Monografia

Sommario/riassunto

The Pimsleur® Method is scientifically proven to be your fastest route to near-native fluency. Speak and understand Greek in just 30 minutes a day.Greek Phase 2, Units 16-20 build on material taught in prior units. Each lesson provides 30 minutes of spoken language practice, with an introductory conversation, and new vocabulary and structures. Detailed instructions enable you to understand and participate in the conversation. Each lesson contains practice for vocabulary introduced in previous lessons. The emphasis is on pronunciation and comprehension, and on learning tospeakGreek.



2.

Record Nr.

UNINA9911003695303321

Titolo

ICT Systems Security and Privacy Protection : 40th IFIP International Conference, SEC 2025, Maribor, Slovenia, May 21–23, 2025, Proceedings, Part II / / edited by Lili Nemec Zlatolas, Kai Rannenberg, Tatjana Welzer, Joaquin Garcia-Alfaro

Pubbl/distr/stampa

Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025

ISBN

3-031-92886-5

Edizione

[1st ed. 2025.]

Descrizione fisica

1 online resource (XIV, 280 p. 46 illus., 33 illus. in color.)

Collana

IFIP Advances in Information and Communication Technology, , 1868-422X ; ; 746

Disciplina

004

Soggetti

Computers

Computer networks

Cryptography

Data encryption (Computer science)

Computing Milieux

Computer Communication Networks

Cryptology

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

-- Applied Cryptography.  -- CoolTest: Improved Randomness Testing Using Boolean Functions.  -- Towards a lightweight and privacy friendly Architecture for Online Advertising.  -- Future-Proof Asynchronous IoT Backups: An Evaluation of Secure IoT Data Recovery Considering Post Quantum Threats.  -- Checking the Impact of Security Standardization A Case Study on Bluetooth LE Pairing of Internet of Things Devices.  -- Data and Application Security.  -- Generating and Attacking Passwords with Misspellings by Leveraging Homophones.  -- Time is money: A temporal model of cybersecurity.  -- Update at Your Own Risk: Analysis and Recommendations for Update related Vulnerabilities.  -- ”You still have to study” On the Security of LLM generated code.  -- Certifiably robust malware detectors by design.  -- How stealthy is stealthy? Studying the Efficacy of Black Box Adversarial Attacks in the Real World.  -- Identifying and Analyzing Vulnerabilities and Exploits in On Premises



Kubernetes.  -- International Workshop on Network and Distributed Systems Security (WNDSS 2025).  -- A Novel Evidence-Based Threat Enumeration Methodology for ICS.  -- Impact Analysis of Sybil Attacks in the Tor Network.  -- Security Metrics for False Data Injection in Smart Grids.  -- BERMUDA: A BPSec Compatible Key Management Scheme for DTNs.  -- A Quantum Algorithm for Assessing Node Importance in the st Connectivity Attack.  -- Flatdc: Automatic Schema Reverse Engineering of FlatBuffers.  -- Time Aware Face Anti Spoofing with Rotation Invariant Local Binary Patterns and Deep Learning.

Sommario/riassunto

The two-volume set IFIP AICT 745 + 746 constitutes the refereed proceedings of the 40th IFIP International Conference on ICT Systems Security and Privacy Protection, SEC 2025, held in Maribor, Slovenia, during May 21-23, 2025. The 28 full papers and 7 workshop papers included in this book were carefully reviewed and selected from 127 submissions. They were organized in topical sections as follows: Privacy protection; Industrial and Critical Infrastructure Security; Applied Cryptography; Data and Application Security; and International Workshop on Network and Distributed Systems Security (WNDSS 2025).