LEADER 02510nam 2200577Ia 450 001 9910964357603321 005 20200520144314.0 010 $a9789812619402 010 $a9812619402 035 $a(CKB)1000000000578690 035 $a(EBL)433480 035 $a(OCoLC)609835228 035 $a(SSID)ssj0000366019 035 $a(PQKBManifestationID)11231840 035 $a(PQKBTitleCode)TC0000366019 035 $a(PQKBWorkID)10414716 035 $a(PQKB)10992296 035 $a(MiAaPQ)EBC433480 035 $a(Au-PeEL)EBL433480 035 $a(CaPaEBR)ebr10515540 035 $a(PPN)187310041 035 $a(FR-PaCSA)10276797 035 $a(FRCYB10276797)10276797 035 $a(EXLCZ)991000000000578690 100 $a20070709d2007 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aSoeharto $ethe life and legacy of Indonesia's second president : an authorised biography /$fRetnowati Abdulgani-Knapp 210 $aSingapore $cMarshall Cavendish Editions ;$aTarrytown, NY $cMarshall Cavendish$dc2007 215 $a1 online resource (377 p.) 300 $aDescription based upon print version of record. 311 08$a9789812613400 311 08$a9812613404 320 $aIncludes bibliographical references (p. [364]-367)and index. 327 $acover; ACKNOWLEDGEMENTS; CONTENTS; AUTHOR'S NOTE; Chapter 1; Chapter 2; Chapter 3; Chapter 4; Chapter 5; TIMELINE; ABBREVIATIONS; GLOSSARY; REFERENCES; INDEX 330 $aSOEHARTO: The Life and Legacy of Indonesia's Second President is the biography of a man who rose from a humble farming background to become one of the most important political figures in Asia. This insightful narrative traces his life from his birth in 1921, through his long tenure as president to his present life, one that is far divorced from his former days of glory. It also explores the controversy surrounding the charitable organizations (or Yayasan) which were established during his time in power and their links to the Indonesian conglomerates and his family. As president, he was often d 606 $aPresidents$zIndonesia$vBiography 607 $aIndonesia$xPolitics and government$y1966-1998 615 0$aPresidents 676 $a959.8037092 700 $aAbdulgani-Knapp$b Retnowati$01797522 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910964357603321 996 $aSoeharto$94339873 997 $aUNINA LEADER 05349nam 22007455 450 001 996691666303316 005 20251013130445.0 010 $a3-032-07884-9 024 7 $a10.1007/978-3-032-07884-1 035 $a(MiAaPQ)EBC32344481 035 $a(Au-PeEL)EBL32344481 035 $a(CKB)41633855400041 035 $a(DE-He213)978-3-032-07884-1 035 $a(EXLCZ)9941633855400041 100 $a20251013d2026 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aComputer Security ? ESORICS 2025 $e30th European Symposium on Research in Computer Security, Toulouse, France, September 22?24, 2025, Proceedings, Part I /$fedited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya 205 $a1st ed. 2026. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2026. 215 $a1 online resource (793 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v16053 311 08$a3-032-07883-0 327 $a -- Time-Distributed Backdoor Attacks on Federated Spiking Learning. -- TATA: Benchmark NIDS Test Sets Assessment and Targeted Augmentation. -- Abuse-Resistant Evaluation of AI-as-a-Service via Function-Hiding Homomorphic Signatures. -- PriSM: A Privacy-friendly Support vector Machine. -- Towards Context-Aware Log Anomaly Detection Using Fine-Tuned Large Language Models. -- PROTEAN: Federated Intrusion Detection in Non-IID Environments through Prototype-Based Knowledge Sharing. -- KeTS: Kernel-based Trust Segmentation against Model Poisoning Attacks. -- Machine Learning Vulnerabilities in 6G: Adversarial Attacks and Their Impact on Channel Gain Prediction and Resource Allocation in UC-CF-mMIMO. -- FuncVul: An Effective Function Level Vulnerability Detection Model using LLM and Code Chunk. -- LUMIA: Linear probing for Unimodal and MultiModal Membership Inference Attacks leveraging internal LLM states. -- Membership Privacy Evaluation in Deep Spiking Neural Networks. -- DUMB and DUMBer: Is Adversarial Training Worth It in the Real World?. -- Countering Jailbreak Attacks with Two-Axis Pre-Detection and Conditional Warning Wrappers. -- How Dataset Diversity Affects Generalization in ML-based NIDS. -- Llama-based source code vulnerability detection: Prompt engineering vs Finetuning. -- DBBA: Diffusion-based Backdoor Attacks on Open-set Face Recognition Models. -- Evaluation of Autonomous Intrusion Response Agents In Adversarial and Normal Scenarios. -- Trigger-Based Fragile Model Watermarking for Image Transformation Networks. -- Let the Noise Speak: Harnessing Noise for a Unified Defense Against Adversarial and Backdoor Attacks. -- On the Adversarial Robustness of Graph Neural Networks with Graph Reduction. -- SecureT2I: No More Unauthorized Manipulation on AI Generated Images from Prompts. -- GANSec: Enhancing Supervised Wireless Anomaly Detection Robustness through Tailored Conditional GAN Augmentation. -- Fine-Grained Data Poisoning Attack to Local Differential Privacy Protocols for Key-Value Data. -- The DCR Delusion: Measuring the Privacy Risk of Synthetic Data. -- StructTransform: A Scalable Attack Surface for Safety-Aligned Large Language Models. 330 $aThis four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22?24, 2025. The 100 full papers presented in these proceedings were carefully reviewed and selected from 600 submissions. They were organized in topical sections as follows: AI and Data-Centric Security, Systems and Hardware Security, Privacy, Cryptography and Secure Protocol Design, Blockchain and Financial Security, Privacy Policy and Identity Management, Adversarial and Backdoor Defenses. . 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v16053 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks$xSecurity measures 606 $aComputer networks 606 $aComputer systems 606 $aData and Information Security 606 $aCryptology 606 $aSecurity Services 606 $aMobile and Network Security 606 $aComputer Communication Networks 606 $aComputer System Implementation 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aComputer networks$xSecurity measures. 615 0$aComputer networks. 615 0$aComputer systems. 615 14$aData and Information Security. 615 24$aCryptology. 615 24$aSecurity Services. 615 24$aMobile and Network Security. 615 24$aComputer Communication Networks. 615 24$aComputer System Implementation. 676 $a005.8 700 $aNicomette$b Vincent$01860745 701 $aBenzekri$b Abdelmalek$01860746 701 $aBoulahia-Cuppens$b Nora$01860747 701 $aVaidya$b Jaideep$01276751 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996691666303316 996 $aComputer Security ? ESORICS 2025$94466483 997 $aUNISA