| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996385314903316 |
|
|
Autore |
Ross Alexander <1591-1654.> |
|
|
Titolo |
Mel heliconium, or, Poeticall honey gathered out of the weeds of Parnassus [[electronic resource] ] : divided into VII chapters according to the first VII letters of the alphabet : containing XLVIII fictions, out of which are extracted many historicall, naturall, morall, politicall and / by Alexander Rosse . |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
London, : Printed by L.N. and J.F. for William Leak ..., 1642 |
|
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Soggetti |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
First ed. Cf. BM. |
Reproduction of original in Huntington Library. |
Includes index. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNISA996655269603316 |
|
|
Titolo |
Computer Security. ESORICS 2024 International Workshops : DPM, CBT, and CyberICPS, Bydgoszcz, Poland, September 16–20, 2024, Revised Selected Papers, Part I / / edited by Joaquin Garcia-Alfaro, Ken Barker, Guillermo Navarro-Arribas, Cristina Pérez-Solà, Sergi Delgado-Segura, Sokratis Katsikas, Frédéric Cuppens, Costas Lambrinoudakis, Nora Cuppens-Boulahia, Marek Pawlicki, Michał Choraś |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2025.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XVI, 545 p. 119 illus., 101 illus. in color.) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Computer Science, , 1611-3349 ; ; 15263 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer networks - Security measures |
Computers |
Cryptography |
Data encryption (Computer science) |
Computer engineering |
Computer networks |
Data protection |
Mobile and Network Security |
Computing Milieux |
Cryptology |
Computer Engineering and Networks |
Computer Communication Networks |
Data and Information Security |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Establishing Secure and Privacy-Preserving Blockchain Applications Through Real World Cryptography. DPM Papers: Privacy-Preserving Optimal Parameter Selection for Collaborative Clustering -- reteLLMe: Design rules for using Large Language Models to Protect the Privacy of Individuals in their Textual Contributions -- Plausible Deniability of Redacted Text -- Exploring Distribution Learning of Synthetic Data |
|
|
|
|
|
|
|
|
|
|
|
Generators for Manifolds -- HEDAS: Secure and Efficient Distributed OLAP using Fully Homomorphic Encryption -- Card-based Cryptographic Protocols for Three-input Functions with a Standard Deck of Cards Using Private Operations -- Grid-Based Decompositions for Spatial Data under Local Differential Privacy -- Balancing Privacy and Utility in Multivariate Time-Series Classification -- Dynamic k-anonymity: A Topological Framework -- Using Static Code Analysis for GDPR Compliance Checks -- Privacy-preserving tabular data generation: Systematic Literature Review -- A DPIA Repository for Interdisciplinary Data Protection Research -- Secrecy and Sensitivity: Privacy-Performance Trade-Offs in Encrypted Traffic Classification. CBT Papers: Route Discovery in Private Payment Channel Networks -- A comparative study of Rust smart contract SDKs for Application-Specific Blockchains -- Offchain Runtime Verification (for The Tezos Blockchain) -- Quantifying Liveness and Safety of Avalanche’s Snowball -- We will DAG you -- Assessing the Impact of Sanctions in the Crypto Ecosystem: Effective Measures or Ineffective Deterrents? -- Practical Implementation of Pairing-Based zkSNARK in Bitcoin Script -- Homomorphic Encryption Based ECDSA Generation Over Five Party Protocol -- Benchmarking post-quantum cryptography in Ethereum-based blockchains. CyberICPS Papers: Exploring Anomaly Detection for Marine Radar Systems -- Hunting Vulnerabilities in the Maritime Domain -- Threat Modeling in Satellite Communications for Maritime Operations -- Cybersecurity Challenges in Industrial Control Systems: An Interview Study with Asset Owners in Norway -- Usage of Cybersecurity Standards in Operational Technology Systems -- Deployment Challenges of Industrial Intrusion Detection Systems -- A Framework For Applying Digital Twins To Support Incident Response -- Automated Side-Channel Analysis of ARM TrustZone-M Programs -- FrameD: Toward Automated Identication of Embedded Frameworks in Firmware Images -- Leveraging the domain experts: specializing privacy threat knowledge. |
|
|
|
|
|
|
Sommario/riassunto |
|
This two-volume set LNCS 15263 and LNCS 15264 constitutes the refereed proceedings of eleven International Workshops which were held in conjunction with the 29th European Symposium on Research in Computer Security, ESORICS 2024, held in Bydgoszcz, Poland, during September 16–20, 2024. The papers included in these proceedings stem from the following workshops: 19th International Workshop on Data Privacy Management, DPM 2024, which accepted 7 full papers and 6 short papers out of 24 submissions; 8th International Workshop on Cryptocurrencies and Blockchain Technology, CBT 2024, which accepted 9 full papers out of 17 submissions; 10th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2024, which accepted 9 full papers out of 17 submissions; International Workshop on Security and Artificial Intelligence, SECAI 2024, which accepted 10 full papers and 5 short papers out of 42 submissions; Workshop on Computational Methods for Emerging Problems in Disinformation Analysis, DisA 2024, which accepted 4 full papers out of 8 submissions; 5th International Workshop on Cyber-Physical Security for Critical Infrastructures Protection, CPS4CIP 2024, which accepted 4 full papers out of 9 submissions; 3rd International Workshop on System Security Assurance, SecAssure 2024, which accepted 8 full papers out of 14 submissions. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910372799603321 |
|
|
Autore |
Amodeo Immacolata (Immacolata Amodeo, Jacobs University Bremen, Deutschland) |
|
|
|
|
Titolo |
|
|
|
|
Das Opernhafte : Eine Studie zum »gusto melodrammatico« in Italien und Europa / Immacolata Amodeo |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Bielefeld, : transcript Verlag, 2015 |
|
2015, c2007 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Collana |
|
Kultur- und Medientheorie |
|
|
|
|
|
|
Classificazione |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Culture |
Oper |
Media |
Kultur |
Literature |
Italien |
Theatre |
Medien |
Theatre Studies |
Literatur |
Theater |
General Literature Studies |
Theaterwissenschaft |
Musicology |
Allgemeine Literaturwissenschaft |
Romance Studies |
Musikwissenschaft |
Romanistik |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Frontmatter 1 Inhalt 5 Einleitung 9 1. Das Opernhafte im fremden |
|
|
|
|
|
|
|
|
|
|
|
Blick 15 2. Literaturwissenschaftliche Positionen gegen das Opernhafte 51 3. Das Opernhafte als kulturtypologische Kategorie 87 4. Der Kontext des Opernhaften im Italien des 19. Jahrhunderts 107 5. Das Opernhafte und das Risorgimento 133 6. Narrationen und Praktiken 159 7. Begräbnisse all'italiana oder Die Transmedialität des Opernhaften 185 Literatur 201 Backmatter 222 |
|
|
|
|
|
|
Sommario/riassunto |
|
Dieser Band etabliert das Opernhafte als neuen ästhetischen Grundbegriff, der mediale ebenso wie kulturelle Grenzen überschreitet: Er lässt sich von der Oper ableiten, kommt aber auch in anderen Medien, etwa in der Literatur und im Film, zur Geltung.Die Autorin definiert das mythische Stereotyp »Italien« als vergleichsweise idealen kulturellen Raum, der dem Opernhaften einen großzügigen Spielraum gewährt; zugleich zeigt sie, wie sich das Opernhafte auch innerhalb nicht italienischer Kulturen entfaltet. Eine erhebliche Anziehungskraft übt es z.B. auf deutsche und französische Philosophen und Schriftsteller aus. |
»Das anregende Buch lädt zu grundsätzlichen Überlegungen und Diskussionen ein, die unbedingt weitergeführt werden sollten.« |
»Der Reiz von Amodeos Buch liegt in der Zusammenführung bislang isoliert betrachteter Phänomene [...].« |
»Das Verdienst dieser ausgesprochen gut lesbaren und äußerst spannenden Habilitationsschrift von Immacolata Amodeo ist ohne Frage die interdisziplinäre Verknüpfung [...], die es möglich macht, sehr unterschiedliche Phänomene unter dem Oberbegriff des Opernhaften zusammenzubringen, womit sie ein neues Feld in der Italianistik erschlossen hat.« |
»Die Lektüre des Buches ist ein eindeutiger Gewinn: Für eine komparatistische Studie zeichnet sich das Buch insbesondere darin aus, dass es weit über klassisch literaturwissenschaftliche Interessen hinausgeht, für eine philologisch-kulturwissenschaftliche Arbeit darin, dass es neben theoretischen Fragen auch die kulturgeschichtlichen Kontexte integriert [...].« |
»Eine aufschlussreiche und interessante Auseinandersetzung mit dem Opernhaften als einer in der italienischen Literatur- und Kulturtheorie ästhetisch bzw. kulturtypologisch gebrauchten Kategorie [...].« |
Besprochen in:Italienisch. Zeitschrift für italienische Sprache und Literatur, 11 (2008), Sabine SchraderMitteilungen des Dokumentationszentrums für Librettoforschung, 16/6 (2008)IASLonline, 03.06.2009, Christiane Plank-BaldaufGermanisch-Romanische Monatsschrift, 61/3 (2011), Daniel Winkler |
|
|
|
|
|
|
|
| |