Published By
Created On
5 Jun 2021 08:39:10 UTC
Transaction ID
Cost
Safe for Work
Free
Yes
More from the publisher
49738
Author: Philip Rosen
File Type: pdf
This resource guide will help readers locate over 800 first-person accounts, fiction, poetry, art interpretations, and music by Holocaust victims and survivors, as well as videos relating the testimony and experiences of Holocaust survivors. In addition to the few well-known writers, artists, and musicians whose work so eloquently captures their experience during the Holocaust, this guide will introduce the reader to the lives and work of more than 250 lesser known or unrecognized writers, artists, and musicians from many countries who documented their experience of persecution at the hands of the Nazis. This guide will help students gain firsthand knowledge of what it was like to experience the Holocaust and how ordinary people coped and created art and meaning from the ashes of their lives.The entry on each writer, artist, and musician features a biographical sketch and list of his or her works, with full bibliographic data. Entries on literature and videos are annotated and include recommendations for age-appropriateness. The work is divided into five parts writers of memoirs, diaries and fiction poets artists composers and musicians and videos that feature testimony by survivors. Each part features an introductory overview of the artists and art created in that genre out of Holocaust experience. Title, artistwriter, and nationality indexes will help the reader select materials, and an index organized by age-appropriate levels will help teachers and librarians to select literature and videos for students.From BooklistRosen and Apfelbaum have collected a diverse group of more than 800 works into a resource designed for librarians, teachers, and students. Each of the works creators is a Holocaust victim or survivor. Some were in camps, others in partisan groups, and others spent years in hiding. Many of the names are easily recognizable, others not known at all.Five chapters cover memoirs, diaries, and fiction poetry art music and videos. Following an overview, entries within each chapter are arranged alphabetically by the creators names. Age-level suggestions are provided for narratives and videos, although many of these indicate ages younger than those for which the piece is actually intended. Entries include biographical information and noncritical summaries of each title. Where applicable, poetry entries include anthology citations, art entries include institutions where the work can be viewed, and music entries give sources for obtaining the music.Persons are unevenly cross-referenced if they appear in more than one chapter. Often the reference is only from one chapter to another. For example, although Elie Wiesel appears in both the memoirs, diaries, and fiction chapter and the poetry chapter, the cross-reference appears only in the latter. Under some headings the index provides an unwieldy and hard-to-read list of names and page numbers under others only a long string of page numbers is offered. Some broad categories in the index, such as artworks and poetry, might have been better placed in appendixes.In spite of these flaws, this volume will be valuable to all who are researching the Holocaust. Its strength lies in the inclusion of materials not often found elsewhere. Even the most knowledgeable Holocaust educator may not be aware of some of the works that are represented. RBB American Library Association. ltReview.,.helps researchers find 800 first-person accounts, fiction, poetry, art interpretations and music by Holocaust victims and survivors... This will be a helpful resource to those who are teaching the Holocaust, as well as in literature, music and art classes that wish to add these authors and artists to those they presently study. The brevity of the entries will help students who have less interest in reading longer introductions.-Gale Reference for Students
Transaction
Created
3 weeks ago
Content Type
Language
application/pdf
English
78845
Author: Mohssen Mohammed
File Type: pdf
As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to accomplish this using honeypots and routers. It discusses honeypot concepts and architecture as well as the skills needed to deploy the best honeypot and router solutions for any network environment. Honeypots and Routers Collecting Internet Attacks begins by providing a strong grounding in the three main areas involved in Internet security ul l Computer networks technologies, routing protocols, and Internet architecture l l Information and network security concepts, challenges, and mechanisms l l System vulnerability levels network, operating system, and applications l ul The book then details how to use honeypots to capture network attacks. A honeypot is a system designed to trap an adversary into attacking the information systems in an organization. The book describes a technique for collecting the characteristics of the Internet attacks in honeypots and analyzing them so that their signatures can be produced to prevent future attacks. It also discusses the role of routers in analyzing network traffic and deciding whether to filter or forward it. The final section of the book presents implementation details for a real network designed to collect attacks of zero-day polymorphic worms. It discusses the design of a double-honeynet system architecture, the required software tools, and the configuration process using VMware. With the concepts and skills you learn in this book, you will have the expertise to deploy a honeypot solution in your network that can track attackers and provide valuable information about their source, tools, and tactics. **About the Author Mohssen Mohammed received his B.Sc. (Honors) degree in Computer Science from Computer Man College for Computer Studies (Future University), Khartoum, Sudan, in 2003. In 2006, he received his M.Sc. degree in Computer Science from the Faculty of Mathematical Sciences, University of Khartoum, Sudan. In 2012, he received his PhD in Electrical Engineering from Cape Town University, South Africa. He has published several papers at top international conferences such as GLOBECOM and MILCOM. He has served as a Technical Program Committee member in numerous international conferences, such as ICSEA 2010 and ICNS 2011. He received the University of Cape Town prize for International Scholarship for Academic Merit (2007, 2008, and 2009). From 2005 to 2012, he worked as a permanent academic staff member at the University of Juba, South of Sudan. He is now working as Assistant Professor in the College of Computer Science & Information Technology, Bahri University, Khartoum, Sudan. His research interest includes network security, especially intrusion detection and prevention systems, honeypots, firewalls, and malware detection methods. hr Habib-ur Rehman completed his doctoral studies in 2009 at the Technische Universitaet Carolo Wilhelmina zu Braunschweig, Germany. Earlier, he obtained his MS degree in 2004 from the Lahore University of Management Sciences, Lahore, Pakistan. He worked as an Assistant Professor at the National Textile University, Faisalabad, Pakistan, and National University of Computer and Emerging Sciences, Islamabad, Pakistan. Since early 2012, he has been teaching at the Al-Imam Muhammad Ibn Saud Islamic University, Riyadh, KSA. His primary research interests are the design and development of network protocols, schemes, and models for mobile and ad hoc networks. He has focused on the issues of routing, MAC, streaming, security, and information sharing in his research. He has also supervised undergrad students in the development of useful Android applications.
Transaction
Created
3 weeks ago
Content Type
Language
application/pdf
English
146603
Author: Herbert L. Blitzer
File Type: pdf
Understanding Forensic Digital Imaging offers the principles of forensic digital imaging and photography in a manner that is straightforward and easy to digest for the professional and student. It provides information on how to photograph any setting that may have forensic value, details how to follow practices that are acceptable in court, and recommends what variety of hardware and software are most valuable to a practitioner. In addition to chapters on basic topics such as light and lenses, resolution, and file formats, the book contains forensic-science-specific information on SWGIT and the use of photography in investigations and in court. Of particular note is Chapter 17, Establishing Quality Requirements, which offers information on how to create a good digital image, and is more comprehensive than any other source currently available. A companion website offers exercises for the student and practicing professional. ullCovers topics that are of vital importance to the practicing professionalllServes as an up-to-date reference in the rapidly evolving world of digital imagingllUses clear and concise language so that any reader can understand the technology and science behind digital imaginglulFrom the Back CoverThe science of digital imaging can be divided into two separate branches the techniques that explain how to use and create digital images, and the technical knowledge that is necessary to design cameras, computers, and software. The expert witness should be a skilled practitioner in the techniques and have enough understanding of the technical knowledge to answer hard questions that might be asked in court. Understanding Forensic Digital Imaging is the first book to address both types of knowledge, offering a comprehensive and thorough approach to the subject of digital imaging, providing the reader with necessary information about the techniques and a solid understanding of the technology.Providing information on the basics of photography, while also covering the complex concepts particular to forensic science, Understanding Forensic Digital Imaging is a one-stop resource for the forensic expert. With its unparalleled coverage of digital imaging - including a chapter on establishing quality requirements that is more comprehensive than any other source currently available - this book is an essential read for any forensic expert who is required to work with digital images and testify in court. Key Features Covers topics that are of vital importance to the practicing professional Serves as an up-to-date reference in the rapidly evolving world of digital imaging Uses clear and concise language so that any reader can understand the technology and science behind digital imaging Offers a chapter on Establishing Quality Requirements, which offers more comprehensive coverage than is currently available in any other source About the AuthorHerbert Blitzer is the Founder and Executive Director of the Institute for Forensic Imaging in Indianapolis. Previously he served as a special assistant to the Mayor of Indianapolis, where he was assigned to work with the Indianapolis Police Department. Prior to that, he spent 33 years working for the Eastman Kodak Company, where he served as an engineer and strategic manager. At one point he managed the Companys Law Enforcement Marketing program. He has published numerous articles in trade journals and, with Jack Jacobia, authored Forensic Digital Imaging and Photography.Karen Stein-Ferguson is president of Digital Data Forensics, LLC in Clearwater, Florida. She is a native of Indiana where she graduated from Purdue University with a BS in mathematics and earned her MBA with honors from Indiana University. After graduation, Ms. Stein-Ferguson worked in industry as a systems analyst, business engineer, partner in a software development firm, and other executive management roles. She spent 20 years managing technology departments for several Indiana businesses and Indiana state government agencies. After 15 challenging years in technology, Ms. Stein-Ferguson earned her law degree from Indiana University School of Law in Indianapolis and was admitted to the Indiana Bar in 1994. She accomplished this milestone while working fulltime as the Chief Information Officer at Indianapolis largest law firm. In 2004 Ms. Stein-Ferguson added computer forensics to her skill set and is a certified computer examiner through International Society of Forensic Computer Examiners (ISFCE). Computer forensics compliments all her experiences and background perfectly. Ms. Stein-Ferguson is licensed to practice law in the state of Indiana. She is a member of the Indiana State Bar Association, the St. Petersburg Bar Association, the Clearwater Bar Association, International Society of Forensic Computer Examiners, and the American Academy of Forensic Sciences. She is a board member of the Indiana Forensic Science Initiative and Vice-Chair of the General Practice Section of the Indiana State Bar Association. Additionally, Ms. Stein-Ferguson is active in several business organizations and does speaking engagements on computer forensics and legal technology issues in business and the practice of law.Dr. Jeffrey Huang recently joined Raytheon Company IISRIS in supporting the Department of Homeland Security US-VISIT program. Before Dr. Huang joined Raytheon, he was an assistant professor of Computer Science at Purdue School of Science with joint appointment at the Indiana University School of Informatics, Bioinformatics Program at Indiana University Purdue University Indianapolis. Dr. Huangs research areas include computer vision, pattern recognition, and machine learning on the applications of biometrics, video surveillance, and bioinformatics. During Huangs academic appointment, he received several research grants as a PI or co-PI from National Institute of Justice (NIJ) and National Institute of Health (NIH). His funded projects are related to facial biometrics, video surveillance, and forensic applications. For past 8 years, Dr. Huang taught various computer science courses in the university, including graduate level courses of Data Mining, Biometric Computing, and Bioinformatics. He received Indiana University Trustee Teaching Award in 2003 and was elected as the favorite professor of Computer Science in 2005. Dr. Huang published more than 40 articles in biometric research field. He is a member of IEEE, ACM, and Biometrics Consortium.
Transaction
Created
3 weeks ago
Content Type
Language
application/pdf
English