LEADER 05597nam 2200733 450 001 9910787012103321 005 20200520144314.0 010 $a0-12-801468-7 035 $a(CKB)3710000000264434 035 $a(EBL)1820202 035 $a(SSID)ssj0001349773 035 $a(PQKBManifestationID)12619236 035 $a(PQKBTitleCode)TC0001349773 035 $a(PQKBWorkID)11402791 035 $a(PQKB)11366434 035 $a(Au-PeEL)EBL1820202 035 $a(CaPaEBR)ebr10958564 035 $a(CaONFJC)MIL657039 035 $a(OCoLC)895288472 035 $a(CaSebORM)9780128013083 035 $a(MiAaPQ)EBC1820202 035 $a(EXLCZ)993710000000264434 100 $a20141106h20152015 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCyber reconnaissance, surveillance, and defense /$fRobert Shimonski ; John Zenir, contributing editor ; Allison Bishop, technical editor 205 $a1st edition 210 1$aWaltham, Massachusetts :$cSyngress,$d2015. 210 4$dİ2015 215 $a1 online resource (258 p.) 300 $aIncludes index. 311 $a1-322-25759-0 311 $a0-12-801308-7 327 $aCover; Title Page; Copyright Page; Dedication; Contents; About the Authors; Acknowledgments; Introduction; Chapter 1 - Digital Reconnaissance and Surveillance; Digital Reconnaissance and Surveillance; Art and History of Spying; Threat of Digital Reconnaissance and Surveillance; Threat Landscape; Why Spy?; NSA and Edward Snowden; Public Trust; Cybercrime; Why Spy? Motivation; What Is to Gain? Reward; Digital Forensics; Who Spies?; Professional Roles; Hackers (White, Gray, and Black); Digital Forensics Examiner; Cyber Intelligence Analyst; Cyber Security Engineer; Penetration Tester 327 $aPrivate InvestigatorLaw Enforcement; Legal and Ethical Principles; Ethics; The Law; Surveillance and Cybercrime Sample Law; Summary; Chapter 2 - Information Gathering; Information Gathering; Am I Being Spied On?; How Private Is Your Life?; Examples of Privacy Invasion; How to Gather Information; Information Gathering Tools; Online Reconnaissance; The Internet Threat; Search Engines; Phishing; Tracking; Social Media; Scanning, Sniffing, and Mapping; Wired and Wireless; Infrastructure; Mobile Device Threat; Data Threat (Metadata); Physical Reconnaissance; Tailing and Stalking 327 $aSocial EngineeringTapping; Legal and Ethical Concerns; Summary; Chapter 3 - Social Engineering; Social Engineering; Am I Being Spied On?; Scam Example; How to Gather Information; Dumpster Diving; Shoulder Surfing; Phishing; Social Engineering Toolkit; Bugging and Recording; Mitigation of Social Engineering; Mitigate Attack; Information Privacy; Legal and Ethical Concerns; More Legal Issues; Summary; Chapter 4 - Mobile Phone Tracking; Phone Tracking; Mobile Phones; Apple iPhone; Google Android; Windows Phone; Blackberry; Phone Tracking; Malicious Tracking; Tracking for Reconnaissance 327 $aLocation-Based ServicesTracking a SIM; Global Positioning System and Geolocation; Google Mapping; Legal and Ethical Concerns; Summary; Chapter 5 - Physical Device Tracking; Physical Tracking; Device fingerprint; Tracking for Reconnaissance Today; Application Installation Versus Physical Device; Physical Device Tracking; Safe Devices Used Against You; Location Tracking and Wearable Technology; Legal and Ethical Concerns; Summary; Chapter 6 - Web Camera and Video Tracking; Camera Tracking; Tracking examples; Security Surveillance Systems (Private Home) 327 $aSecurity Surveillance Systems (Businesses)Security Surveillance Systems (Public); Satellite Surveillance Systems; PC devices and webcams; Creepware; Mobile Devices; Gaming Consoles; Legal and Ethical Concerns; Summary; Chapter 7 - Data Capture and Exploitation; Data Threat; Data Theft and Surveillance; Basic Data Capture Techniques; Data at Rest; Malware Protection; DLP Software; Firewall Systems; Removable Media; Encryption Protection; Data in Motion; Sniffers; Skimmers; Digital Forensics; Devices and Applications; Legal and Ethical Concerns; Summary; Chapter 8 - Protection Methods 327 $aProtect Yourself! 330 $a At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being carried out and shows how to defend against them. Expert author Rob Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. To help you understand how to defend against these attacks, this book describ 606 $aElectronic intelligence 606 $aInternet in espionage 606 $aCyber intelligence (Computer security) 606 $aInternet$xSecurity measures 606 $aComputer crimes 615 0$aElectronic intelligence. 615 0$aInternet in espionage. 615 0$aCyber intelligence (Computer security) 615 0$aInternet$xSecurity measures. 615 0$aComputer crimes. 676 $a327.12 700 $aShimonski$b Robert$0627583 702 $aZenir$b John 702 $aBishop$b Allison 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910787012103321 996 $aCyber reconnaissance, surveillance, and defense$93769871 997 $aUNINA LEADER 04421nam 2200685Ia 450 001 9910787542303321 005 20220304210819.0 010 $a0-8122-0248-1 024 7 $a10.9783/9780812202489 035 $a(CKB)2670000000418198 035 $a(OCoLC)859160676 035 $a(CaPaEBR)ebrary10748453 035 $a(SSID)ssj0001053304 035 $a(PQKBManifestationID)11678282 035 $a(PQKBTitleCode)TC0001053304 035 $a(PQKBWorkID)11114172 035 $a(PQKB)11127913 035 $a(MdBmJHUP)muse26727 035 $a(DE-B1597)449106 035 $a(OCoLC)1013936911 035 $a(OCoLC)979968268 035 $a(DE-B1597)9780812202489 035 $a(Au-PeEL)EBL3442076 035 $a(CaPaEBR)ebr10748453 035 $a(CaONFJC)MIL682356 035 $a(MiAaPQ)EBC3442076 035 $a(EXLCZ)992670000000418198 100 $a20050924d2006 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 10$aMedieval boundaries$b[electronic resource] $erethinking difference in Old French literature /$fSharon Kinoshita 210 $aPhiladelphia $cUniversity of Pennsylvania Press$dc2006 215 $a1 online resource (321 p.) 225 1 $aThe Middle Ages series 300 $aBibliographic Level Mode of Issuance: Monograph 311 0 $a1-322-51074-1 311 0 $a0-8122-3919-9 320 $aIncludes bibliographical references (p. [287]-303) and index. 327 $tFront matter --$tContents --$tIntroduction --$tPART I. EPIC REVISIONS --$t1. "Pagans Are Wrong and Christians Are Right" --$t2. The Politics of Courtly Love --$tPART II. ROMANCES OF ASSIMILATION --$t3. "In the Beginning Was the Road" --$t4. Colonial Possessions --$tPART III. CRISIS AND CHANGE IN THE THIRTEENTH CENTURY --$tIntroduction --$t5. Brave New Worlds --$t6. The Romance of MiscegeNation --$t7. Uncivil Wars --$tConclusion --$tNotes --$tSelected Bibliography --$tIndex --$tAcknowledgments 330 $aIn Medieval Boundaries, Sharon Kinoshita examines the role of cross-cultural contact in twelfth- and early thirteenth-century French literature. Starting from the observation that many of the earliest and best-known works of the French literary tradition are set on or beyond the borders of the French-speaking world, she reads the Chanson de Roland, the lais of Marie de France, and a variety of other texts in an expanded geographical frame that includes the Iberian peninsula, the Welsh marches, and the eastern Mediterranean. In Kinoshita's reconceptualization of the geographical and cultural boundaries of the medieval West, such places become significant not only as sites of conflict but also as spaces of intense political, economic, and cultural negotiation. An important contribution to the emerging field of medieval postcolonialism, Kinoshita's work explores the limitations of reading the literature of the French Middle Ages as an inevitable link in the historical construction of modern discourses of Orientalism, colonialism, race, and Christian-Muslim conflict. Rather, drawing on recent historical and art historical scholarship, Kinoshita uncovers a vernacular culture at odds with official discourses of crusade and conquest. Situating each work in its specific context, she brings to light the lived experiences of the knights and nobles for whom this literature was first composed and-in a series of close readings informed by postcolonial and feminist theory-demonstrates that literary representations of cultural encounters often provided the pretext for questioning the most basic categories of medieval identity. Awarded honorable mention for the 2007 Modern Language Association Aldo and Jeanne Scaglione Prize for French and Francophone Studies 410 0$aMiddle Ages series. 606 $aFrench literature$yTo 1500$xHistory and criticism 606 $aProvenc?al literature$xHistory and criticism 610 $aCultural Studies. 610 $aLiterature. 610 $aMedieval and Renaissance Studies. 615 0$aFrench literature$xHistory and criticism. 615 0$aProvenc?al literature$xHistory and criticism. 676 $a840.9/001 700 $aKinoshita$b Sharon$0518439 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910787542303321 996 $aMedieval boundaries$9841117 997 $aUNINA LEADER 03177nam 22005775 450 001 9910799486003321 005 20251202152214.0 010 $a9783658432034 010 $a3658432039 024 7 $a10.1007/978-3-658-43203-4 035 $a(CKB)29526971900041 035 $a(DE-He213)978-3-658-43203-4 035 $a(MiAaPQ)EBC31094037 035 $a(Au-PeEL)EBL31094037 035 $a(MiAaPQ)EBC31094035 035 $a(Au-PeEL)EBL31094035 035 $a(MiAaPQ)EBC31094036 035 $a(EXLCZ)9929526971900041 100 $a20240103d2023 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCharacterizing Multiparticle Entanglement Using the Schmidt Decomposition of Operators /$fby Sophia Denker 205 $a1st ed. 2023. 210 1$aWiesbaden :$cSpringer Fachmedien Wiesbaden :$cImprint: Springer Spektrum,$d2023. 215 $a1 online resource (VIII, 102 p. 20 illus., 19 illus. in color. Textbook for German language market.) 225 1 $aBestMasters,$x2625-3615 311 08$a9783658432027 320 $aIncludes bibliographical references. 327 $aIntroduction -- Physical and mathematical background -- OSD witnesses for bipartite states -- The OSD witness for the multipartite case -- Schmidt number witnesses -- Conclusion and outlook. 330 $aCharacterizing entanglement is an important issue in quantum information, as it is considered to be a resource for many applications such as quantum key distribution or quantum metrology. One useful tool to detect and quantify entanglement are witness operators. A standard way to construct them is based on the fidelity of pure states and mathematically relies on the Schmidt decomposition of vectors. In this book a method to build entanglement witnesses using the Schmidt decomposition of operators is presented. One can show that these are strictly stronger than the fidelity witnesses. Moreover, the concept can be generalized easily to the multipartite case, and one may use it to quantify the dimensionality of entanglement. Finally, this scheme will be used to provide two algorithms that can be combined to improve given witnesses for multiparticle entanglement. About the author Sophia Denker studied physics at the University of Siegen. Now she is investigating concepts of high dimensional entanglement under the tutelage of Prof. Dr. Otfried Gühne. Her master thesis was awarded with the ?Studienpreis des Landkreises Altenkirchen 2023?. 410 0$aBestMasters,$x2625-3615 606 $aQuantum theory 606 $aQuantum computing 606 $aQuantum Physics 606 $aQuantum Information 615 0$aQuantum theory. 615 0$aQuantum computing. 615 14$aQuantum Physics. 615 24$aQuantum Information. 676 $a539.725 700 $aDenker$b Sophia$01588329 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910799486003321 996 $aCharacterizing Multiparticle Entanglement Using the Schmidt Decomposition of Operators$93877787 997 $aUNINA