Managing Time in Relational Databases,
Managing Time in Relational Databases,...
The Mystery of Economic Growth (OISC)
The Mystery of Economic Growth (OISC)...
Jakarta Commons Cookbook
Jakarta Commons Cookbook...
Making War, Forging Revolution: Russia's Continuum of Crisis, 1914-1921
Offering a fundamental reinterpretation of the emergence of the Soviet state, Peter Holquist situates the Bolshevik Revolution within the continuum of mobilization and violence that began with World War I and extended through Russia's civil war. In so doing, Holquist provides a new genealogy for Bolshevik political practices, one that places them clearly among Russian and European wartime measures. From this perspective, the Russian Revolution was no radical rupture with the past, but rather the fulcrum point in a continent-wide era of crisis and violence that began in 1914.
While Tsarist and Revolutionary governments implemented policies for total mobilization common to other warring powers, they did so in a supercharged and concentrated form. Holquist highlights how the distinctive contours of Russian political life set its experience in these years apart from other wartime societies. In pursuit of revolution, statesmen carried over crisis-created measures into political life and then incorporated them into the postwar political structure. Focusing on three particular policies - state management of food; the employment of official violence for political ends; and state surveillance - Holquist demonstrates the interplay of state policy and local implementation, and its impact on the lives of ordinary citizens. Making War, Forging Revolution casts a new light on Russia's revolution and boldly inserts it into the larger story of the Great War and twentieth-century European history....
In today's world, security is a top concern for businesses worldwide. Without a secure computer system, you don't make money, you don't expand, and - bottom line - you don't survive. Cryptography holds great promise as the technology to provide security in cyberspace. Amazingly enough, no literature exists about how to implement cryptography and how to incorporate it into real-world systems. With Practical Cryptography, an author team of international renown provides you with the first hands-on cryptographic product implementation guide, bridging the gap between cryptographic theory and real-world cryptographic applications.
This follow-up guide to the bestselling Applied Cryptography dives in and explains the how-to of cryptography. You'll find discussions on: Practical rules for choosing and using cryptographic primitives, from block ciphers to digital signatures
Implementing cryptographic algorithms and systems in a secure way on today's computers
A consistent design philosophy to ensure that every part of the system achieves the required security level
Why security affects every part of the system, and why it has to be a primary goal of the project
How simple interfaces for cryptographic primitives reduce system complexity and increase system security ...
Functional Programming for Loosely-coupled Multiprocessors
Recent progress in VLSI provides massive parallelism but general purpose parallel computers remain elusive due to limited communications performance. This book proposes a new high level approach to programming that addresses the pragmatic issue of how a computation is distributed across a machine.The book's approach is based on functional programming and has significant advantages over existing comparable approaches, extending the domain of functional programming to include computer architectures in which communication costs are not negligible. It looks at how high-level functional programming languages can be used to specify, reason about, and implement parallel programs for a variety of multiprocessor systems, but in particular a class of loosely coupled multiprocessors whose operation can be described by a process network In these networks the nodes correspond to processes and the arcs to communications channels.A simple language called Caliban is described in which the functional program text is augmented with a declarative description of how processes are partitioned and mapped onto a network of processing elements. The notation gains expressive power by allowing these annotations to be generated by predicates defined in the functional language. Thus, common communications structures have simple and concise definitions as "network forming operators." The main objective of these annotations is to provide an abstract description of the process network specified by the program so that an efficient mapping of processes to processors can be carried out by the compiler. Paul H.J. Kelly is Research Assistant in the Department of Computing at Imperial College, London Functional Programming for Loosely-Coupled Multiprocessors is included in the series Research Monographs in Parallel and Distributed Computing, copublished with Pitman Publishing....
Tuva or Bust! – Richard Feynman?s Last Journey
Tuva or Bust! – Richard Feynman?s Last Journey...
Get Me Out: A History of Childbirth from the Garden of Eden to the Sperm Bank
Making and having babies-what it takes to get pregnant, stay pregnant, and deliver-has mystified women and men for the whole of human history. The birth gurus of ancient times told newlyweds that simultaneous orgasms were necessary for conception and that during pregnancy a woman should drink red wine but not too much and have sex but not too frequently. Over the last one hundred years, depending on the latest prevailing advice, women have taken morphine, practiced Lamaze, relied on ultrasound images, sampled fertility drugs, and shopped at sperm banks. In Get Me Out, the insatiably curious Randi Hutter Epstein journeys through history, fads, and fables, and to the fringe of science, where audacious researchers have gone to extreme measures to get healthy babies out of mothers. Here is an entertaining must-read-and an enlightening celebration of human life....
REST API Design Rulebook
REST API Design Rulebook...
Oracle PL/SQL Programming 6ed
Oracle PL/SQL Programming 6ed...