| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910781445703321 |
|
|
Autore |
Payne Brian J |
|
|
Titolo |
Fishing a borderless sea : environmental territorialism in the North Atlantic, 1818-1910 / / Brian J. Payne |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
East Lansing : , : Michigan State University Press, , 2010 |
|
©2010 |
|
|
|
|
|
|
|
|
|
ISBN |
|
1-62895-160-5 |
1-60917-215-9 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (xxiv, 164 pages) : maps |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Baitfish fisheries - North Atlantic Ocean - History - 19th century |
Baitfish fisheries - North Atlantic Ocean - History - 20th century |
Fishers - North Atlantic Ocean - History |
Social conflict - North Atlantic Ocean - History |
Territorial waters - North Atlantic Ocean - History |
Fishery resources - North Atlantic Ocean - History |
Fishery law and legislation - History |
International economic relations - History - 19th century |
International economic relations - History - 20th century |
North Atlantic Ocean Commerce History |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references (p. 153-160) and index. |
|
|
|
|
|
|
Nota di contenuto |
|
"White-washed Yankees" : the beginnings of the bait trade, 1790-1854 -- "Intrusion of strangers" : seeking local control in an emerging national context, 1854-1885 -- "A fisherman ought to be a free trader anyway" : the bait trade in diplomatic controversy, 1886-1888 -- "Peaceable settlement" : bait and international law, 1888-1910. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Over the centuries, processing and distribution of products from land and sea has stimulated the growth of a global economy. In the broad sweep of world history, it may be hard to imagine a place for the meager little herring baitfish. Yet, as Brian Payne adeptly recounts, the baitfish trade was hotly contested in the Anglo-American world throughout the nineteenth century. Politicians called for wars, navies |
|
|
|
|
|
|
|
|
|
|
|
|
|
were dispatched with guns at the ready, vessels were seized at sea, and violence erupted at sea. Yet, the battle over baitfish was not simply a diplomatic or political |
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910484214703321 |
|
|
Titolo |
Innovative Security Solutions for Information Technology and Communications : 13th International Conference, SecITC 2020, Bucharest, Romania, November 19–20, 2020, Revised Selected Papers / / edited by Diana Maimut, Andrei-George Oprina, Damien Sauveron |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2021.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (X, 303 p. 74 illus., 44 illus. in color.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology, , 2946-1863 ; ; 12596 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data protection |
Application software |
Computer networks |
Computer systems |
Cryptography |
Data encryption (Computer science) |
Data and Information Security |
Computer and Information Systems Applications |
Computer Communication Networks |
Computer System Implementation |
Cryptology |
Security Services |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
Elementary Attestation of Cryptographically Useful Composite Moduli -- Off -the-Shelf Security Testing Platform for Contactless Systems -- A New Generalisation of the Goldwasser-Micali Cryptosystem Based on |
|
|
|
|
|
|
|
|
|
|
|
the Gap $2^k$-Residuosity Assumption -- New Insights On Differential And Linear Bounds Using Mixed Integer Linear Programming -- Secure Card-based Cryptographic Protocols Using Private Operations Against Malicious Players -- Decentralized Multi-authority Anonymous Credential System with Bundled Languages on Identifiers -- A Scalable Simulation of the BB84 Protocol Involving Eavesdropping -- Approach to Cryptography from Di erential Geometry with Example -- On using zk-SNARKs and zk-STARKs inblockchain-based identity management -- Manager asks: Which vulnerability must be eliminated first? -- An IND-CCA2 attack against the 1st- and 2nd-round versions of NTS-KEM -- Behaviour-based Biometrics for Continuous User Authentication to Industrial Collaborative Robots -- Secure Speaker Recognition System Using Homomorphic Encryption Reliable RFID Offline Privacy -- Virtualization and Automation for Cybersecurity Training and Experimentation -- Long-Term Secure Deniable Group Key Establishment -- Card-based Covert Lottery -- Hardware-Accelerated Cryptography for Software-Defined Networks -- with P4 -- Security Analysis Using Subjective Attack Trees. |
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Security for Information Technology and Communications, SecITC 2020, held in Bucharest, Romania, in November 2020. The 17 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 41 submissions. The conference covers topics from cryptographic algorithms, to digital forensics and cyber security and much more. |
|
|
|
|
|
|
|
| |