LEADER 01318nam 2200349 n 450 001 996391638303316 005 20200824120946.0 035 $a(CKB)1000000000667640 035 $a(EEBO)2248525034 035 $a(UnM)99862519e 035 $a(UnM)99862519 035 $a(EXLCZ)991000000000667640 100 $a19930106d1646 uy | 101 0 $aeng 135 $aurbn||||a|bb| 200 00$aSelect cases of conscience touching vvitches and vvitchcrafts. By Iohn Gaule, preacher of the Word at Great Staughton in the county of Huntington$b[electronic resource] / 210 $aLondon $cPrinted by W. Wilson for Richard Clutterbuck, and are to be sold at his house in Noblestreet$d1646 215 $a[8], 208 p 300 $aAnnotation on Thomason copy: "June 30th". 300 $aReproduction of the original in the British Library. 330 $aeebo-0018 606 $aWitchcraft$vEarly works to 1800 615 0$aWitchcraft 700 $aGaule$b John$f1604?-1687.$01005234 801 0$bCu-RivES 801 1$bCu-RivES 801 2$bCStRLIN 801 2$bWaOLN 906 $aBOOK 912 $a996391638303316 996 $aSelect cases of conscience touching vvitches and vvitchcrafts. By Iohn Gaule, preacher of the Word at Great Staughton in the county of Huntington$92355614 997 $aUNISA LEADER 04189nam 22006255 450 001 9910842491103321 005 20240426003328.0 010 $a9789819998111 010 $a9819998115 024 7 $a10.1007/978-981-99-9811-1 035 $a(MiAaPQ)EBC31209106 035 $a(Au-PeEL)EBL31209106 035 $a(DE-He213)978-981-99-9811-1 035 $a(CKB)30864437400041 035 $a(OCoLC)1427062566 035 $a(EXLCZ)9930864437400041 100 $a20240311d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyber Security and Digital Forensics $eSelect Proceedings of the International Conference, ReDCySec 2023 /$fedited by Nihar Ranjan Roy, Sudeep Tanwar, Usha Batra 205 $a1st ed. 2024. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2024. 215 $a1 online resource (654 pages) 225 1 $aLecture Notes in Networks and Systems,$x2367-3389 ;$v896 311 08$a9789819998104 311 08$a9819998107 327 $aA Modest Approach Toward Cloud Security Hygiene -- A Survey on Path Key Establishment -- Credit Card Fraud Detection using ML Techniques -- Vulnerabilities in Smart contracts of Decentralized Blockchain -- Object Detection using TensorFlow 2 and Amazon Sage Maker -- Multi-Key Fully Homomorphic Encryption Scheme Over Integers -- Hybrid Lightweight Cryptography using AES and ECC for IoT Security -- A Survey: Analysis of Existing Hybrid Cryptographic Techniques -- Cloud based Integrated Real-Time Twitter Grievance Redressal With AWS EC2 and RDS using Machine Learning Approach for Enhanced Security -- Blockchain Based Public Distribution System -- Security Flaw in TCP/IP and Proposed Measures -- Identity Based Designated Verifier Proxy Signature scheme and its Application to Health Care -- Detection of Phishing Link using different Machine Learning Techniques -- Categorizing Tracing Techniques for Network Forensics -- Cloud-Based Object Detection Model using Amazon Rekognition -- Orphanage Channelization System Using Blockchain Technology -- A Review on Quantum key Distribution Protocols, Challenges and Its Applications -- Static Analysis Approach of Malware using Machine Learning -- Chatbot based android application towards security using FCM -- Ensemble Deep Model for Hate Speech Detection -- Accuracy Enhancement For Intrusion Detection Systems Using LSTM Approach -- Cyber Attack Detection Using Machine Learning Technique -- An Investigative study on Security Aspects and Authentication Schemes for Internet of Vehicles. 330 $aThe book contains peer-reviewed papers from the International Conference on Recent Developments in Cyber Security organized by the Center for Cyber Security and Cryptology at Sharda University in June 2023. This volume focuses on privacy and secrecy of information, cryptography, applications and analysis, cyber threat intelligence and mitigation, cyber-physical systems, cyber threat intelligence, quantum cryptography and blockchain technologies and their application, etc. This book is a unique collection of chapters from different areas with a common theme and will be immensely useful to academic researchers and practitioners in the industry. 410 0$aLecture Notes in Networks and Systems,$x2367-3389 ;$v896 606 $aData protection 606 $aTelecommunication 606 $aForensic sciences 606 $aData and Information Security 606 $aCommunications Engineering, Networks 606 $aForensic Science 615 0$aData protection. 615 0$aTelecommunication. 615 0$aForensic sciences. 615 14$aData and Information Security. 615 24$aCommunications Engineering, Networks. 615 24$aForensic Science. 676 $a005.8 700 $aRoy$b Nihar Ranjan$01733096 701 $aTanwar$b Sudeep$0942571 701 $aBatra$b Usha$01733097 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910842491103321 996 $aCyber Security and Digital Forensics$94148133 997 $aUNINA