1.

Record Nr.

UNINA9910815852803321

Autore

Maspero Gaston <1846-1916, >

Titolo

Les contes populaires de l'Égypte ancienne : traduits et commentés par Gaston Maspero / / Gaston Maspero

Pubbl/distr/stampa

[Place of publication not identified] : , : Ligaran, , [2015]

©2015

ISBN

2-335-16735-9

Descrizione fisica

1 online resource (112 p.)

Collana

Livre numérique

Disciplina

398.2

Soggetti

Folklore - Egypt

Lingua di pubblicazione

Francese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di contenuto

Page de titre; Introduction; I; II; III; IV; V; Le conte des deux frères; Le conte des deux frères; Le prince prédestiné; Le prince prédestiné; Le conte de Satni-Khâmoïs; Le conte de Satni-Khâmoïs; Comment Thoutii prit la ville de Joppé; Comment Thoutii prit la ville de Joppé; Les aventures de Sinouhit; Les aventures de Sinouhit; Le naufrage; Le naufragé; Le conte de Rampsinitos; Le conte de Rampsinitos; Fragments; Fragment d'un conte fantastique remontant à la XIIe dynastie; Histoire d'un paysan; Histoire d'un paysan; La querelle d'Apopi et de Soknounri; La querelle d'Apopi et de Soknounri

Trois fragments d'une histoire de revenantTrois fragments d'une histoire de revenant; Histoire d'un matelot; Histoire d'un matelot; Histoire du bon tour que joua le sculpteur Pétisis au roi Nectonabo; Histoire du bon tour que joua le sculpteur Pétisis au roi Nectonabo; Page de Copyright



2.

Record Nr.

UNINA9910366610003321

Titolo

Proceedings of International Ethical Hacking Conference 2019 : eHaCON 2019, Kolkata, India / / edited by Mohuya Chakraborty, Satyajit Chakrabarti, Valentina E. Balas

Pubbl/distr/stampa

Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2020

ISBN

981-15-0361-3

Edizione

[1st ed. 2020.]

Descrizione fisica

1 online resource (261 pages) : illustrations

Collana

Advances in Intelligent Systems and Computing, , 2194-5365 ; ; 1065

Disciplina

005.8

Soggetti

Telecommunication

Data protection

Data structures (Computer science)

Information theory

Communications Engineering, Networks

Data and Information Security

Data Structures and Information Theory

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

Review and Comparison of Face Detection Techniques -- Keyword Spotting with Neural Networks used for Image-Classification -- Strategic Way to Count the Number of People in a Room Using Multiple Kinect Cameras -- Biomedical Image Security using Matrix Manipulation and DNA Encryption -- A study on the issue of blockchain’s energy consumption -- Study on network scanning using machine learning based methods -- Is Blockchain the Future of Supply Chain Management? -- APDRChain: ANN Based Predictive Analysis of Diseases and Report Sharing Through Blockchain -- Study on S-box Properties of Convolution Coder -- Smart Healthcare Assistance towards on-road Medical Emergency -- A Study on Various Database Models: Relational, Graph and Hybrid Databases -- Microcontroller Based Automotive Control System Employing Real Time Health Monitoring of Drivers to Avoid Road Accidents -- Surface Potential Profile of Nano scaled Work function Engineered Gate Recessed IR Silicon on Insulator MOSFET -- A mobile user authentication technique in Global mobility network --



Efficient Entity Authentication using modified Guillou-Quisquater Zero Knowledge Protocol -- Ethical Hacking: Redefining Security in Information System -- Internal Organizational Security -- Securing Air Gapped Systems -- Data Security Techniques based on DNA Encryption. .

Sommario/riassunto

This book gathers the peer-reviewed proceedings of the International Ethical Hacking Conference, eHaCON 2019, the second international conference of its kind, which was held in Kolkata, India, in August 2019. Bringing together the most outstanding research papers presented at the conference, the book shares new findings on computer network attacks and defenses, commercial security solutions, and hands-on, real-world security lessons learned. The respective sections include network security, ethical hacking, cryptography, digital forensics, cloud security, information security, mobile communications security, and cyber security.