LEADER 05687nam 22007935 450 001 996466141503316 005 20200706222518.0 010 $a3-540-68963-X 024 7 $a10.1007/11961635 035 $a(CKB)1000000000283888 035 $a(SSID)ssj0000318300 035 $a(PQKBManifestationID)11266630 035 $a(PQKBTitleCode)TC0000318300 035 $a(PQKBWorkID)10308464 035 $a(PQKB)11689258 035 $a(DE-He213)978-3-540-68963-8 035 $a(MiAaPQ)EBC3068507 035 $a(PPN)123140161 035 $a(EXLCZ)991000000000283888 100 $a20100301d2006 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Systems Security$b[electronic resource] $eSecond International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings /$fedited by Aditya Bagchi, Vijayalakshmi Atluri 205 $a1st ed. 2006. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2006. 215 $a1 online resource (XVI, 384 p.) 225 1 $aSecurity and Cryptology ;$v4332 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-68962-1 320 $aIncludes bibliographical references and index. 327 $aInvited Papers -- Privacy in the Electronic Society -- A Data Sharing Agreement Framework -- Password Exhaustion: Predicting the End of Password Usefulness -- Network Monitoring for Security and Forensics -- Data and Application Security -- Fairness Strategy for Multilevel Secure Concurrency Control Protocol -- Optimistic Anonymous Participation in Inter-organizational Workflow Instances -- O2O: Virtual Private Organizations to Manage Security Policy Interoperability -- Privacy Preserving Web-Based Email -- Access Control -- Context-Aware Provisional Access Control -- LRBAC: A Location-Aware Role-Based Access Control Model -- Extending Context Descriptions in Semantics-Aware Access Control -- Specification and Realization of Access Control in SPKI/SDSI -- Key Management and Security in Wireless Networks -- Design of Key Establishment Protocol Using One-Way Functions to Avert insider-replay Attack -- An Efficient Key Assignment Scheme for Access Control in a Hierarchy -- Adaptation of IEEE 802.1X for Secure Session Establishment Between Ethernet Peers -- Secure Data Management in Reactive Sensor Networks -- Threat Analysis, Detection and Recovery -- Security Ontology: Simulating Threats to Corporate Assets -- Two-Stage Credit Card Fraud Detection Using Sequence Alignment -- New Malicious Code Detection Using Variable Length n-grams -- A Dead-Lock Free Self-healing Algorithm for Distributed Transactional Processes -- Cryptography and Encryption -- An Efficient Public Key Cryptosystem Secure Against Chosen Ciphertext Attack -- A Partial Image Encryption Method with Pseudo Random Sequences -- High Capacity Lossless Data Hiding -- An Implementation and Evaluation of Online Disk Encryption for Windows Systems -- Short Papers and Research Reports -- Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract) -- A Survey of Control-Flow Obfuscations -- Filtering Out Unfair Recommendations for Trust Model in Ubiquitous Environments -- Secure Itineraries Framework for Mobile Agent Systems -- Malafide Intension Based Detection of Privacy Violation in Information System -- Design and Development of Malafide Intension Based Privacy Violation Detection System (An Ongoing Research Report) -- Towards a Formal Specification Method for Enterprise Information System Security -- Recent Research on Privacy Preserving Data Mining. 410 0$aSecurity and Cryptology ;$v4332 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aComputer security 606 $aComputers and civilization 606 $aManagement information systems 606 $aComputer science 606 $aInformation storage and retrieval 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aInformation Storage and Retrieval$3https://scigraph.springernature.com/ontologies/product-market-codes/I18032 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aComputer security. 615 0$aComputers and civilization. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aInformation storage and retrieval. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aSystems and Data Security. 615 24$aComputers and Society. 615 24$aManagement of Computing and Information Systems. 615 24$aInformation Storage and Retrieval. 676 $a05.8 702 $aBagchi$b Aditya$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAtluri$b Vijayalakshmi$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aICISS (Conference) 906 $aBOOK 912 $a996466141503316 996 $aInformation Systems Security$9771916 997 $aUNISA LEADER 02538nam 2200469 450 001 9910827661303321 005 20231110221229.0 010 $a2-8062-2026-2 035 $a(CKB)3710000000306932 035 $a(EBL)1869994 035 $a(MiAaPQ)EBC6560366 035 $a(Au-PeEL)EBL6560366 035 $a(OCoLC)1247671854 035 $a(PPN)188689354 035 $a(EXLCZ)993710000000306932 100 $a20220528d2011 uy 0 101 0 $afre 135 $aur|n|---||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$a1984 de George Orwell (fiche de lecture) $eanalyse comple?te et re?sume? de?taille? de l'oeuvre /$fHadrien Seret 210 1$aNamur, Belgium :$cLemaitre Publishing,$d[2011] 210 4$dİ2011 215 $a1 online resource (31 p.) 225 1 $aFiche de Lecture 300 $aDescription based upon print version of record. 311 $a2-8062-1493-9 327 $a1. Re?sume?; Premie?re partie; Seconde partie; Troisie?me partie; 2. E?tude des personnages; Winston Smith; Julia; O' Brien; Big Brother; 3. Cle?s de lecture; 1984, une dystopie du totalitarisme en 3 axes; a) La suppression de l'individualite?; b) La suppression du bonheur humain; c) La suppression de la liberte?; a) Big Brother et le Parti : les the?matiques du pouvoir et du mensonge; b) L'utopie d'une pe?riode ante?rieure : the?mes de l'amour et du passe? ve?ritable.; 4. Pistes de re?flexion; 5. Informations comple?mentaires 330 $a Tout ce qu'il faut savoir sur 1984 d'Orwell ! Retrouvez l'essentiel de l'?uvre dans une fiche de lecture comple?te et de?taille?e, avec un re?sume?, une e?tude des personnages, des cle?s de lecture et des pistes de re?flexion. Re?dige?e de manie?re claire et accessible, la fiche de lecture propose d'abord un re?sume? chapitre par chapitre du roman, puis s'inte?resse aux personnages de Winston Smith et de Julia, ainsi qu'a? O'Brien, partisan du Parti, et e?videmment a? Big Brother. On aborde ensuite le genre de la dystopie, les trois axes du totalitarisme tel qu'il se pre?sente dans 1984, ainsi que les the?matiq 410 0$aFiche de Lecture 606 $aFrench literature 615 0$aFrench literature. 676 $a840 700 $aSeret$b Hadrien$0847095 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910827661303321 996 $a1984 de George Orwell (fiche de lecture)$94116720 997 $aUNINA