03384oam 22008414a 450 99633314700331620221206095425.00-520-96723-210.1525/9780520967236(CKB)3800000000216121(DE-B1597)539718(DE-B1597)9780520967236(OCoLC)1085410600(MdBmJHUP)muse72990(ScCtBLL)eb566095-4936-47e0-ae78-226e6539eda2(EXLCZ)99380000000021612120170224h20172017 uy 0engurm|#---|||||txtrdacontentcrdamediacrrdacarrierPlacing EmpireTravel and the Social Imagination in Imperial Japan /Kate McDonaldOakland, California :University of California Press,2017.1 online resource (xvii, 254 pages) illustrations (some colour), maps; digital, PDF file(s)0-520-29391-6 Includes bibliographical references and index.Seeing like the nation -- The new territories -- Boundary narratives -- Local color -- Speaking Japanese."Placing Empire examines the spatial politics of Japanese imperialism through a study of Japanese travel and tourism to Korea, Manchuria, and Taiwan between the late nineteenth century and the early 1950s. In a departure from standard histories of Japan, this book shows how debates over the place of colonized lands reshaped the social and spatial imaginary of the modern Japanese nation and how, in turn, this sociospatial imaginary affected the ways in which colonial difference was conceptualized and enacted. In so doing, it illuminates how ideas of place became central to the production of new forms of colonial hierarchy as empires around the globe transitioned from an era of territorial acquisition to one of territorial maintenance"--Provided by publisher.TourismPolitical aspectsJapan20th centuryTourismJapanHistory20th centuryTaiwanDescription and travelManchuria (China)Description and travelKoreaDescription and travelJapanColoniesDescription and travel1950s.19th century.20th century.boundaries.colonial.colonialism.colonized lands.colonized.contemporary.empire.global.japanese history.japanese imperialism.japanese tourism.japanese travel.japanese.korea.manchuria.modern world.post colonial.social studies.speaking japanese.taiwan.territorial maintenance.territorial.territory.tourism.tourist.TourismPolitical aspectsTourismHistory306.4/819089956051McDonald Kate1981-985932MdBmJHUPMdBmJHUPBOOK996333147003316Placing empire2253510UNISA03373nam 2200853z- 450 991056647030332120220506(CKB)5680000000037677(oapen)https://directory.doabooks.org/handle/20.500.12854/81008(oapen)doab81008(EXLCZ)99568000000003767720202205d2022 |y 0engurmn|---annantxtrdacontentcrdamediacrrdacarrierCryptography and Its Applications in Information SecurityBaselMDPI - Multidisciplinary Digital Publishing Institute20221 online resource (202 p.)3-0365-3767-8 3-0365-3768-6 Nowadays, mankind is living in a cyber world. Modern technologies involve fast communication links between potentially billions of devices through complex networks (satellite, mobile phone, Internet, Internet of Things (IoT), etc.). The main concern posed by these entangled complex networks is their protection against passive and active attacks that could compromise public security (sabotage, espionage, cyber-terrorism) and privacy. This Special Issue "Cryptography and Its Applications in Information Security" addresses the range of problems related to the security of information in networks and multimedia communications and to bring together researchers, practitioners, and industrials interested by such questions. It consists of eight peer-reviewed papers, however easily understandable, that cover a range of subjects and applications related security of information.History of engineering & technologybicsscTechnology: general issuesbicssc3D chebyshevasymmetricasymmetric algorithmauthorization modelbit independencebit independence criterionblockchainchaos-based stream ciphercommunicationcomplexitycomputationally biasedcoupled map latticecryptographydigital cashdigital copyright managementfederated learningFPGAframeworkhomomorphic encryptionintermittent jumpingintrusion detection systemslimited computational powerlogisticmachine learningmulti-chaosmuseumn/aperformanceprivacyprivacy preservingpublic key exchangeRC4securityskew-tentsmart contractSPCNGstream cipherHistory of engineering & technologyTechnology: general issuesAssad Safwan Eledt1295523Lozi RenéedtPuech WilliamedtAssad Safwan ElothLozi RenéothPuech WilliamothBOOK9910566470303321Cryptography and Its Applications in Information Security3023574UNINA