| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910778094603321 |
|
|
Autore |
Joudah Fady <1971-> |
|
|
Titolo |
The earth in the attic [[electronic resource] /] / Fady Joudah ; foreword by Louise Glück |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
New Haven, : Yale University Press, c2008 |
|
|
|
|
|
|
|
ISBN |
|
1-282-08944-7 |
9786612089442 |
0-300-14516-0 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (96 p.) |
|
|
|
|
|
|
Collana |
|
Yale series of younger poets ; ; v. 102 |
|
|
|
|
|
|
Altri autori (Persone) |
|
GlückLouise <1943-2023.> |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Poetry, Modern - 20th century |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
Nota di contenuto |
|
Frontmatter -- CONTENTS -- FOREWORD -- ACKNOWLEDGMENTS -- Atlas -- Pulse -- Proposal -- Immigrant Song -- Mother Hair -- The Tea and Sage Poem -- The Way Back -- Sleeping Trees -- Resistance -- An Idea of Return -- Love Poem -- Travel Document -- Landscape -- Scarecrow -- Anonymous Song -- The Name of the Place -- Surviving Caterpillars -- Morning Ritual -- Moon Grass Rain -- Along Came a Spider -- An American Spandrel -- The Onion Poem -- Ascension -- Night Travel -- Condolence -- Image -- Bird Banner -- American Gas Station -- At a Café -- Home -- Additional Notes on Tea -- NOTES |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Fady Joudah's The Earth in the Attic is the 2007 winner of the Yale Series of Younger Poets competition. In his poems Joudah explores big themes-identity, war, religion, what we hold in common-while never losing sight of the "idian, the specific. Contest judge Louise Glück describes the poet in her Foreword as "that strange animal, the lyric poet in whom circumstance and profession . . . have compelled obsession with large social contexts and grave national dilemmas." She finds in his poetry an incantatory quality and concludes, "These are small poems, many of them, but the grandeur of conception is inescapable. The Earth in the Attic is varied, coherent, fierce, tender; impossible to put down, impossible to forget." |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9911047656503321 |
|
|
Autore |
Nicomette Vincent |
|
|
Titolo |
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part IV / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2026.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (753 pages) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Computer Science, , 1611-3349 ; ; 16056 |
|
|
|
|
|
|
Altri autori (Persone) |
|
BenzekriAbdelmalek |
Boulahia-CuppensNora |
VaidyaJaideep |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data protection |
Cryptography |
Data encryption (Computer science) |
Computer networks - Security measures |
Computer networks |
Computer systems |
Data and Information Security |
Cryptology |
Security Services |
Mobile and Network Security |
Computer Communication Networks |
Computer System Implementation |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
-- Transparency and Consent Challenges in mHealth Apps: An Interdisciplinary Study of Privacy Policies, Data Sharing, and Dark Patterns. -- Don’t Hash Me Like That: Exposing and Mitigating Hash-Induced Unfairness in Local Differential Privacy. -- Functional Credentials: a Practical Construction for the European Digital Identity. -- Privacy-Preserving k-Nearest Neighbor Query: Faster and More Secure. -- Breaking verifiability and vote privacy in CHVote. -- Zero- |
|
|
|
|
|
|
|
|
|
|
|
Click SnailLoad: From Minimal to No User Interaction. -- Analysis of input-output mappings in coinjoin transactions with arbitrary values. -- Email Cloaking: Deceiving Users and Spam Email Detectors with Invisible HTML Settings. -- BlowPrint: Blow-Based Multi-Factor Biometrics for Smartphone User Authentication. -- GET-AID: Graph-Enhanced Transformer for Provenance-based Advanced Persistent Threats Investigation and Detection. -- The Economics of Deception: Structural Patterns of Rug Pull across DeFi Blockchains. -- Privacy-Preserving Trajectory Data Publication Via Differentially-Private Representation Learning. -- Fine-grained, privacy-augmenting, LI-compliance in the LAKE standard. -- RIPOST: Two-Phase Private Decomposition for Multidimensional Data. -- Correcting the Record on Leakage Abuse Attacks: Revisiting the Subgraph Attacks with Sound Evaluation. -- Efficient and Secure Sleepy Model for BFT Consensus. -- An Algebraic Approach to Asymmetric Delegation and Polymorphic Label Inference. -- An Efficient Security-enhanced Accountable Access Control for Named Data Networking. -- Dobby: A Privacy-Preserving Time Series Data Analytics System with Enforcement of Flexible Policies. -- A User-Centric, Privacy-Preserving, and Verifiable Ecosystem for Personal Data Management and Utilization. -- Imitater: An Efficient Shared Mempool Protocol with Application to Byzantine Fault Tolerance. -- Premining in the Shadows: How Hidden Blocks Weaken the Security of Proof-of-Work Chains. |
|
|
|
|
|
|
Sommario/riassunto |
|
This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22–24, 2025. The 100 full papers presented in these proceedings were carefully reviewed and selected from 600 submissions. They were organized in topical sections as follows: AI and Data-Centric Security, Systems and Hardware Security, Privacy, Cryptography and Secure Protocol Design, Blockchain and Financial Security, Privacy Policy and Identity Management, Adversarial and Backdoor Defenses. . |
|
|
|
|
|
|
|
| |