Kirjahaku
Etsi kirjoja tekijän nimen, kirjan nimen tai ISBN:n perusteella.
1000 tulosta hakusanalla Sade
Dunkle Begierden: Geschichten von Dominanz und Unterwerfung
Marquis Sade; Leopold Sacher-Masoch
Copycat
2025
nidottu
"Philosophy In The Boudoir is the most concise, representative text of all the Marquis de Sade's works, containing his notorious doctrine of libertinage expounded in full, coupled with liberal doses of savage, unbridled eroticism, cruelty and violent sexuality. The renegade philosophies put forward here would later rank among the cornerstones of Andre Breton's surrealist manifesto. This new edition includes "Minski the Cruel, a brand-new, unexpurgated translation of a key episode from de Sade's "Juliette.
This new and improved edition focuses on providing practical information and tools that engineers can use to maximize the profitability and reliability of their fluid catalytic cracking operations. The updated chapters and new content deliver expertise and know-how to an industry that faces significant cost cutting in capital expenditure and R&D, along with the retirement of technical specialists who are taking existing knowledge out of the industry with them. This FCC Handbook provides a valuable easy-to-understand resource for both experienced and inexperienced engineers and anyone else associated with the FCC process. This book gives those who need a quick reference, and gives those who are developing their skills and knowledge trusted information that will help them succeed with their projects.
Optimizing IEEE 802.11i Resource and Security Essentials
Iraj Sadegh Amiri; Parisa Naraei; Iman Saberi
Syngress Media,U.S.
2014
nidottu
In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. The purpose of the research in Optimizing IEE 802.11i Resources and Security Essentials is to determine the issues of the performance in current encryption methods in AES-CCMP in different types of devices and handle it so that an optimized resource usage would be achieved with the required security. Two modes for 802.11i for two different groups of devices is suggested and evaluated with the current encryption method for AES-CCMP to compare the performance. Almost every organization in today's world relies on wireless networks to transmit information, and much of that information should be kept secure. Banking, healthcare, and the military are all vital industries that rely on wireless security for a huge section of their operations. Security experts of today and tomorrow will learn a lot from Optimizing IEE 802.11i Resources and Security Essentials, and it can be used for master level in computer science, information security, wireless network security and cryptography.
A Study of Black Hole Attack Solutions
Iraj Sadegh Amiri; Elahe Fazeldehkordi; Oluwatobi Ayodeji Akanbi
Syngress Media,U.S.
2015
nidottu
Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead.
Theoretical and Experimental Methods for Defending Against DDoS Attacks
Iraj Sadegh Amiri; Mohammad Reza Khalifeh Soltanian
Syngress Media,U.S.
2015
nidottu
Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed Denial of Service (DDoS) is a large scale DoS attack which is distributed in the Internet. Every computer which has access to the Internet can behave as an attacker. Typically bandwidth depletion can be categorized as either a flood or an amplification attack. Flood attacks can be done by generating ICMP packets or UDP packets in which it can utilize stationary or random variable ports. Smurf and Fraggle attacks are used for amplification attacks. DDoS Smurf attacks are an example of an amplification attack where the attacker sends packets to a network amplifier with the return address spoofed to the victim’s IP address. This book presents new research and methodologies along with a proposed algorithm for prevention of DoS attacks that has been written based on cryptographic concepts such as birthday attacks to estimate the rate of attacks generated and passed along the routers. Consequently, attackers would be identified and prohibited from sending spam traffic to the server which can cause DDoS attacks. Due to the prevalence of DoS attacks, there has been a lot of research conducted on how to detect them and prevent them. The authors of this short format title provide their research results on providing an effective solution to DoS attacks, including introduction of the new algorithm that can be implemented in order to deny DoS attacks.
Fluid Catalytic Cracking Handbook: An Expert Guide to the Practical Operation, Design, and Optimization of FCC Units, Fourth Edition, enables readers to maximize the profitability and reliability of fluid catalytic cracking operations by covering all stages of FCC, including their design, operation, troubleshooting and optimization. It includes valuable chapters on FCC Main Fractionator and Gas Plant and Process Engineering Tools that provide engineers with the relevant tools they need to fully optimize processes and operations. This book presents technologies and processes that will improve the profitability and reliability of FCC units, along with lessons from Mr. Sadeghbeigi’s 30 years of field experience. The book provides a valuable reference for experienced engineers, but is also an ideal reference for those who are developing their skills and knowledge base.
This book traces the evolution of environmental principles from their origins as vague political slogans reflecting fears about environmental hazards to their embodiment in enforceable laws. Environmental law has always responded to risks posed by industrial society but the new generation of risks have required a new set of environmental principles, emerging from a combination of public fears, science, ethics, and established legal practice. This book shows how three of the most important principles of modern environmental law grew out of this new age of ecological risk: the polluter pays principle, the preventive principle, and the precautionary principle. Since the first edition was published, the principles of polluter-pays, prevention, and precaution have been encapsulated in a swathe of legislation at domestic and international level. Courts have been invoking environmental law principles in a broad range of cases, on issues including GMOs, conservation, investment, waste, and climate change. As a result, more States are paying heed to these principles as catalysts for improving their environmental laws and regulations. This edition will integrate to a greater extent the relationship between environmental principles and human rights. The book analyses new developments including the EU Charter of Fundamental Rights, the case law of the European Court of Human Rights, which has continuously carved out environmental duties from a number of rights enshrined in the European Convention of Human Rights, and the implementation of the UNECE Convention on Access to Information.
“Why doesn’t my baby sleep better?” weary parents ask. “How can we get more sleep?” There are as many answers to these questions as there are babies and families, says Dr. Avi Sadeh in this helpful and reassuring (some may say indispensable) book. Based on his years of research with sleep-disturbed babies and their sleep-deprived parents, Dr. Sadeh suggests a wide variety of practical solutions to babies’ and young children’s sleep problems.Other experts may recommend one strict approach to changing a baby’s sleep habits, but a single remedy fails to take into account a baby’s uniqueness and the dynamics of his or her family, Dr. Sadeh contends. He helps parents first to understand the natural sleep patterns of babies, and then to consider their own family’s situation and needs. In an accessible style designed to ease anxious parents’ worries, Dr. Sadeh describes the various sleep problems of early childhood, outlines treatment possibilities, and details the pros and cons of each of these choices.This book will appeal not only to sleepless parents seeking relief but also to those who are curious about the most recent findings in children’s sleep research. Dr. Sadeh addresses a full range of questions: What is the importance of sleep to a baby? How do babies in different cultures sleep? How is sleep related to development? What causes Sudden Infant Death Syndrome? How do babies calm themselves? What are the advantages and disadvantages of communal sleeping? With up-to-date answers to these questions and more, Dr. Sadeh offers parents and professionals all the information they need to help babies—and their families—sleep better.
Fractals and Multifractals in the Geosciences
Behnam Sadeghi
Elsevier - Health Sciences Division
2024
nidottu
Fractals and Multifractals in the Geosciences details the application of a wide range of multifractal methods, including many novel ones developed by the author, along with the assessment of uncertainty in sample classification and stability of spatial patterns. This book also provides criteria for selection of the most effective combination of data pre-processing and multifractal modeling to extract desired features or signals in the data. The book specifically aims to introduce, apply, and test novel multifractal models that account directly for changes in relationships between variables, as well as the effects of distance between samples and the source of anomalous metal contents in geoscience samples. Linked to this will be assessment of the effects of different pre-processing of data prior to application of the models and quantification/model uncertainty in geochemical anomaly maps, associated with sample classification and spatial interpolation. Gaussian simulations such as Sequential Gaussian Simulation and Monte Carlo Simulation will be applied to the new multifractal models developed and a suite of existing models, including (simulated) concentration-area, spectrum-area, singularity and other models. Fractals and Multifractals in the Geosciences will be invaluable for mathematical geoscientists, geostatisticians, exploration, applied, urban and environmental geochemists, computational geoscientists, data scientists, and GIS professionals who need to better understand fractal geometry, along with its theory and applications in geochemical anomaly classification to generate maps that are helpful for decision-making for follow-up sampling and explorations.
Integrated Micro-Ring Photonics
Iraj Sadegh Amiri; Abdolkarim Afroozeh; Harith Ahmad
CRC Press
2019
nidottu
Micro-ring resonators (MRRs) are employed to generate signals used for optical communication applications, where they can be integrated in a single system. These structures are ideal candidates for very large-scale integrated (VLSI) photonic circuits, since they provide a wide range of optical signal processing functions while being ultra-compact. Soliton pulses have sufficient stability for preservation of their shape and velocity. Technological progress in fields such as tunable narrow band laser systems, multiple transmission, and MRR systems constitute a base for the development of new transmission techniques. Controlling the speed of a light signal has many potential applications in fiber optic communication and quantum computing. The slow light effect has many important applications and is a key technology for all optical networks such as optical signal processing. Generation of slow light in MRRs is based on the nonlinear optical fibers. Slow light can be generated within the micro-ring devices, which will be able to be used with the mobile telephone. Therefore, the message can be kept encrypted via quantum cryptography. Thus perfect security in a mobile telephone network is plausible. This research study involves both numerical experiments and theoretical work based on MRRs for secured communication.
Advanced Laboratory Testing in Geotechnical Engineering
Hamed Sadeghi; Hossein MolaAbasi
Elsevier - Health Sciences Division
2026
nidottu
Advanced Laboratory Testing in Geotechnical Engineering: From Concepts to Methods delivers a thorough investigation into modern laboratory techniques critical for understanding soil properties and behavior. The book opens by presenting the significance of precise laboratory testing within geotechnical engineering, emphasizing the necessity of standardized procedures to ensure reliability and accuracy. It further introduces the foundational requirements for conducting soil tests, alongside practical applications that demonstrate their value in real-world engineering. This resource is designed to support professionals and researchers in mastering the complexities inherent in testing soil materials for various geotechnical purposes. In addition, the book explores advanced topics such as soil sampling and preservation, detailing methods to maintain sample integrity from field to lab. It covers a spectrum of soil mechanics tests, including conventional, dynamic, and cyclic assessments, as well as specialized techniques for unsaturated soils. Readers gain insights into soil flow characteristics, retention capacity under diverse moisture conditions, physical modeling, and microstructural characterization. These features make the book an indispensable guide for deepening expertise in soil mechanics and for applying cutting-edge laboratory methods to solve complex geotechnical challenges.
Rainbow Reading Level 1 - Making Things: Be Careful Box E
Osman Sadeck
Cambridge University Press
2009
nidottu
This introduces learners to familiar but potentially dangerous situations and to be careful.
Rainbow Reading Level 1 - Making Things: Ziyanda's Flying Machine Box E
Osman Sadeck
Cambridge University Press
2009
nidottu
Ziyanda dreams about escaping from her noisy home on a flying machine into the sky.
Follow the adventure of two Gentoo penguin chicks, Grace and Gabby, growing up on the Island of South Georgia in the Antarctic. Grace and Gabby have many adventures both dangerous and fun, tand they meet many of the other animals that live in the Antarctic as they grow from hatchlings to adults.
Be careful what you see when you shouldn't be looking. Residents of the posh Upstate New York neighborhood of Deer Crossing enjoy all the amenities wealth provides. From drive-up dog-grooming to monthly botox parties, these lucky suburbanites have everything they could ever want. And one thing they don't. Stalker Caroline Case, who wheels her infant along their streets each night with just one goal...to spy on anyone too careless or too foolish to close their window blinds.Convinced the owners of the impressive homes are living a dream existence, the troubled new mom hopes to escape her working-class life by prying secrets from the unsuspecting. But the fairy tale twists into a nightmare when she sees something she shouldn't. Something that shatters her illusions about the people in the privileged community she's obsessed with, even as she begins to doubt what she saw.As Caroline investigates the event, shocking secrets are laid bare, and nothing is as it seems. She knows she must prove something sinister occurred in Deer Crossing or risk letting someone get away with murder.For fans of The Woman in the Window by A. J. Finn, The Breakdown by B. A. Paris, and The Silent Patient by Alex Michaelides.
Be careful what you see when you shouldn't be looking. Residents of the posh Upstate New York neighborhood of Deer Crossing enjoy all the amenities wealth provides. From drive-up dog-grooming to monthly botox parties, these lucky suburbanites have everything they could ever want. And one thing they don't. Stalker Caroline Case, who wheels her infant along their streets each night with just one goal...to spy on anyone too careless or too foolish to close their window blinds.Convinced the owners of the impressive homes are living a dream existence, the troubled new mom hopes to escape her working-class life by prying secrets from the unsuspecting. But the fairy tale twists into a nightmare when she sees something she shouldn't. Something that shatters her illusions about the people in the privileged community she's obsessed with, even as she begins to doubt what she saw.As Caroline investigates the event, shocking secrets are laid bare, and nothing is as it seems. She knows she must prove something sinister occurred in Deer Crossing or risk letting someone get away with murder.For fans of The Woman in the Window by A. J. Finn, The Breakdown by B. A. Paris, and The Silent Patient by Alex Michaelides.