LEADER 01063nam a2200265 i 4500 001 991003220169707536 008 080124s1998 enk b 101 0 eng 020 $a0952973413 035 $ab13650646-39ule_inst 040 $aDip.to Filologia Class. e Scienze Filosofiche$bita 082 00$a265.6 245 00$aHandling sin :$bconfession in the Middle Ages /$cedited by Peter Biller and A.J. Minnis 260 $aWoodbridge, Suffolk ;$aRochester, NY :$bYork Medieval Press,$c1998 300 $aX, 219 p. ;$c24 cm 440 0$aYork studies in medieval theology ;$v2 504 $aContiene riferimenti bibliografici. Indice 650 4$aConfessione (Sacramento)$xStoria$yMedio Evo$vCongressi 700 1 $aBiller, Peter. 700 1 $aMinnis, Alastair J. 907 $a.b13650646$b28-01-14$c24-01-08 912 $a991003220169707536 945 $aLE007 265 BIL 01.01$g1$i2007000142509$lle007$op$pE59.90$q-$rl$s- $t0$u0$v0$w0$x0$y.i14763485$z27-05-08 996 $aHandling sin$91213505 997 $aUNISALENTO 998 $ale007$b24-01-08$cm$da $e-$feng$genk$h0$i0 LEADER 00593oam 2200181z- 450 001 9910694321403321 035 $a(CKB)5860000000027186 035 $a(EXLCZ)995860000000027186 100 $a20231017c2007uuuu -u- - 101 0 $aeng 200 00$aIraq reconstruction : lessons in contracting and procurement / Special Inspector General for Iraq Reconstruction 210 $aWashington 311 $a0-16-079406-4 517 $aIraq reconstruction 906 $aBOOK 912 $a9910694321403321 996 $aIraq reconstruction : lessons in contracting and procurement$93572269 997 $aUNINA LEADER 04732nam 2200445 450 001 9910830906003321 005 20230915041607.0 010 $a1-394-23672-7 010 $a1-394-23670-0 035 $a(CKB)27943498000041 035 $a(MiAaPQ)EBC30682241 035 $a(Au-PeEL)EBL30682241 035 $a(EXLCZ)9927943498000041 100 $a20230915d2023 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aElectronic communication interception technologies and issues of power /$fDaniel Ventre and Philippe Guillot 205 $a1st ed. 210 1$aLondon, England ; Hoboken, NJ :$cISTE Ltd :$cJohn Wiley & Sons, Inc.,$d[2023] 210 4$dİ2023 215 $a1 online resource (259 pages) 311 $a9781786308023 320 $aIncludes bibliographical references and index. 327 $aCover -- Title Page -- Copyright Page -- Contents -- Introduction -- Chapter 1. History and Repertoire of Communication Interception Practices -- 1.1. Military interceptions during the war -- 1.1.1. The interception of telegraphic communications -- 1.1.2. The interception of radio communications -- 1.1.3. Telephone interception -- 1.1.4. The use of SIGINT capabilities -- 1.1.5. Wartime interceptions in cyberspace -- 1.1.6. Drones and interceptions -- 1.2. The interception of international communications: espionage, surveillance, war -- 1.2.1. The interception of telegrams -- 1.2.2. Espionage during the Cold War: satellite, radio, telephone interceptions -- 1.2.3. The interception of international communications: the Echelon program -- 1.2.4. Bulk cyber surveillance -- 1.2.5. Foreign companies in national telecommunication infrastructures -- 1.2.6. Actions over undersea Internet cables -- 1.2.7. Interceptions in planes and airports -- 1.2.8. International interceptions as a product of secret alliances -- 1.3. Interception of diplomatic correspondence -- 1.4. Political surveillance: targeted and bulk interceptions -- 1.4.1. Interception of correspondence -- 1.4.2. Bulk domestic surveillance in East Germany -- 1.4.3. Cyber surveillance in Russia: the SORM system -- 1.4.4. Fixed and mobile telephone tapping -- 1.4.5. The interception of electronic communications in the political sphere -- 1.5. Criminal interceptions -- 1.6. Police, justice: the fight against crime, lawful interceptions -- 1.7. On the usefulness and effectiveness of interceptions -- Chapter 2. The Central Issue of Encryption -- 2.1. The capabilities required for interceptions -- 2.1.1. Material, technological capabilities -- 2.1.2. Human resources -- 2.2. Protecting yourself against the threat of interceptions: encryption -- 2.2.1. The public key revolution. 327 $a2.2.2. Advances in factorization -- 2.2.3. Shor's quantum algorithm -- 2.2.4. The evolution of computing capabilities -- 2.2.5. The evolution of etching precision -- 2.3. Attacking encrypted communications, circumventing the hurdle of encryption -- 2.3.1. Interceptions on encrypted messaging -- 2.3.2. The attacks against keys and PKIs -- 2.3.3. The use of backdoors -- Chapter 3. Power Struggles -- 3.1. State pressure on the industry: cooperation or coercion logics? -- 3.2. The accounts of whistleblowers and their analyses of the balance of power between the state, the citizen and companies -- 3.2.1. The account of Herbert O. Yardley -- 3.2.2. The account of Perry Fellwock (also known as Winslow Peck) -- 3.2.3. The account of Mark Klein -- 3.2.4. The account of James Bamford -- 3.2.5. The account of Babak Pasdar -- 3.2.6. The account of Joseph Nacchio -- 3.2.7. The account of Edward Snowden -- 3.2.8. The account of Julian Assange -- 3.3. Limits imposed on the state's power to control technology -- 3.3.1. The difficult and fragile international regulation of technologies -- 3.3.2. Illicit markets and the circumvention of laws -- 3.4. Trust -- 3.4.1. How much confidence in encryption? -- 3.4.2. The acceleration of calculations as a factor of confidence -- 3.4.3. Abandoning secret methods -- 3.4.4. Provable security -- 3.4.5. The worlds of Impagliazzo -- 3.4.6. The contribution of quantum computing -- 3.5. Conclusion -- 3.5.1. Technologies -- 3.5.2. Actors -- 3.5.3. Interactions or relationships -- Appendices -- References -- Index -- EULA. 606 $aComputers 615 0$aComputers. 676 $a929.605 700 $aVentre$b Daniel$0847420 702 $aGuillot$b Philippe 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910830906003321 996 $aElectronic communication interception technologies and issues of power$93977160 997 $aUNINA