LEADER 03771nam 22009255 450 001 9910965420303321 005 20240508221926.0 010 $a9786611368081 010 $a9781281368089 010 $a1281368083 010 $a9781403979414 010 $a1403979413 024 7 $a10.1057/9781403979414 035 $a(CKB)1000000000342709 035 $a(EBL)308069 035 $a(OCoLC)560461298 035 $a(SSID)ssj0000232520 035 $a(PQKBManifestationID)11947294 035 $a(PQKBTitleCode)TC0000232520 035 $a(PQKBWorkID)10214753 035 $a(PQKB)11494950 035 $a(DE-He213)978-1-4039-7941-4 035 $a(MiAaPQ)EBC308069 035 $a(Au-PeEL)EBL308069 035 $a(CaPaEBR)ebr10135424 035 $a(CaONFJC)MIL136808 035 $a(Perlego)3497203 035 $a(EXLCZ)991000000000342709 100 $a20151127d2005 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aRandom Destinations $eEscaping the Holocaust and Starting Life Anew /$fby L. Furst 205 $a1st ed. 2005. 210 1$aNew York :$cPalgrave Macmillan US :$cImprint: Palgrave Macmillan,$d2005. 215 $a1 online resource (232 p.) 300 $aDescription based upon print version of record. 311 08$a9781349531455 311 08$a1349531456 311 08$a9781403969750 311 08$a1403969752 320 $aIncludes bibliographical references (p. [203]-207) and index. 327 $aCover; Contents; Acknowledgments; To the Reader; Introduction: "Shards from the Explosion"; LONDON; BRITISH PROVINCES; NEW YORK; U.S. PROVINCES; INDIA; Conclusion: "A Bit in the Middle of Nowhere"; Notes; Bibliography; Index 330 $aRandom Destinations examines how novels and short stories portray those who managed to escape from Central Europe in the 1930s following the rise of Nazism. They faced many concrete and psychological problems at their random destinations: language acquisition, adjustment to different moves, fitting into the community, coming to terms with having been rejected by their homeland, the conflict between the desire to remember and/or forget their past, and, above all, the need to reshape their identities. Their personal struggles are contextualized within their historical situation, both global and specific to their new locale. The book argues that fiction, by taking ordinary escapees' difficulties into account, paradoxically offers a more subtle and true picture than sociological studies, that have tended to foreground the successes of a few outstanding individuals. 606 $aLiterature, Modern$y20th century 606 $aEurope$xHistory 606 $aHistory, Modern 606 $aLiterature$xHistory and criticism 606 $aJudaism 606 $aEuropean literature 606 $aTwentieth-Century Literature 606 $aEuropean History 606 $aModern History 606 $aLiterary History 606 $aJudaism 606 $aEuropean Literature 615 0$aLiterature, Modern 615 0$aEurope$xHistory. 615 0$aHistory, Modern. 615 0$aLiterature$xHistory and criticism. 615 0$aJudaism. 615 0$aEuropean literature. 615 14$aTwentieth-Century Literature. 615 24$aEuropean History. 615 24$aModern History. 615 24$aLiterary History. 615 24$aJudaism. 615 24$aEuropean Literature. 676 $a823/.914093529924 676 $a23/.914093529924 700 $aFurst$b Lilian R$0131726 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910965420303321 996 $aRandom Destinations$94330387 997 $aUNINA LEADER 04275nam 22005535 450 001 9910983033903321 005 20250211115234.0 010 $a9783031830532 010 $a3031830539 024 7 $a10.1007/978-3-031-83053-2 035 $a(CKB)37516007800041 035 $a(MiAaPQ)EBC31903080 035 $a(Au-PeEL)EBL31903080 035 $a(DE-He213)978-3-031-83053-2 035 $a(OCoLC)1501349545 035 $a(EXLCZ)9937516007800041 100 $a20250211d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aResource Management in Cloud Computing $eConcepts and Implementation /$fby Sakshi Patni, Deepika Saxena, Ashutosh Kumar Singh 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (266 pages) 311 08$a9783031830525 311 08$a3031830520 327 $aIntroduction -- Task Scheduling -- Resource Allocation Methods -- Dynamic Resource Allocation Models -- Secure Cloud Resource Management -- Heuristic Models for Optimal Host Selection -- Secure and Energy efficient Cloud Traffic Management Schemes -- Data Security and Leakage Detection Models -- Conclusion and Future Trends. 330 $aThis book addresses fundamental concepts and practical implementations in cloud computing environments, focusing on load balancing and resource management. As cloud computing's popularity grows, expertise in infrastructure management is crucial for delivering flawless subscription-based services and hosted data solutions. The book presents novel models for cloud resource management to improve operational efficiency through better virtual machine (VM) placements. Beginning with task scheduling and resource allocation basics, the book progresses to resource management concepts. It introduces innovative models for dynamic resource allocation, heuristic approaches for optimal host selection, secure resource management frameworks, multi-objective VM allocation schemes, and data security models. A significant contribution is an effective model integrating load balancing, resource management, Quality of Service (QoS), security, and cloud performance for Infrastructure as a Service (IaaS). The book offers innovative methodologies for dynamic resource allocation and service administration in cloud datacenters. It presents traffic management techniques to reduce energy consumption, improve resource utilization, and enhance security through optimized VM placement, with experimental validation. These models improve response time, throughput, resource utilization, energy consumption, and failure node management. Security is addressed through secure VM placement strategies, making it harder for attackers to achieve co-tenancy. A multi-objective approach for secure load balancing optimizes multiple conflicting objectives simultaneously. The book includes cyber-threat countermeasures and provides recommendations for organizations and users. Suitable for senior undergraduate and graduate courses in cloud computing, resource allocation, security, and energy consumption methods, the book includes examples and tutorials using Cloudsim tools for beginners. This helps them understand virtual infrastructure and service design. The methodologies benefit both cloud service providers and customers, offering cost-effective solutions for revenue maximization. The comprehensive approach makes the book valuable for academic study and practical application in cloud computing environments. 606 $aCloud computing 606 $aComputer networks 606 $aCloud Computing 606 $aComputer Communication Networks 615 0$aCloud computing. 615 0$aComputer networks. 615 14$aCloud Computing. 615 24$aComputer Communication Networks. 676 $a004.6782 700 $aPatni$b Sakshi$01785461 701 $aSaxena$b Deepika$01785462 701 $aSingh$b Ashutosh Kumar$01785463 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910983033903321 996 $aResource Management in Cloud Computing$94316991 997 $aUNINA