Listing 1 - 10 of 111 | << page >> |
Sort by
|
Choose an application
How well do we really know ancient Egypt? The world of the Egyptians seems so familiar to us: exhibitions of ancient art and archaeological discoveries in the desert sands continue to generate interest and amazement, while Egyptian motifs appear in architecture, in literature, in art works, in advertising, and in films. And yet, this modern reception can sometimes preserve the myths and inaccuracies about ancient Egypt that derive from classical antiquity and the Renaissance. It is only in the last 200 years that we have been able to read for ourselves ancient Egyptian texts and to reveal the true nature of its civilization through excavation. This modern discovery of ancient Egypt is now astonishing us with a culture of incomparable richness and remarkable diversity. This is what the internationally acclaimed Egyptologist Thomas Schneider here attempts to do: he asks "What are the 101 single most important questions about ancient Egypt?" The questions he has chosen-and the answers he provides-challenge almost everything we thought we knew about the ancient civilization in the Nile valley. They range from the surprising ("Why did elite Egyptians not wear beards?") to the profound ("Was ancient Egypt a culture of death?") and the provocative ("What do we still not know about ancient Egypt?") but all the answers will surprise, inspire, and challenge a wide range of readers. In the process, they provide a completely fresh way of looking at all aspects of ancient Egypt-from history, art, and everyday life to religion and ancient attitudes to death and the afterlife
Choose an application
Egyptian language --- Foreign elements --- Etymology --- Names --- Writing, Hieroglyphic --- Middle East --- Languages --- Transliteration into Egyptian --- Names, Personal --- Foreign elements. --- Names. --- Writing, Hieroglyphic. --- Transliteration into Egyptian. --- -Egyptian language --- -Middle East --- -Names, Personal --- -Anthroponomy --- Baby names --- Christian names --- Family names --- Forenames --- Names of families --- Names of persons --- Personal names --- Surnames --- Onomastics --- Afroasiatic languages --- -Names --- -Transliteration into Egyptian --- -Etymology --- Anthroponomy --- Egyptian hieroglyphics --- Hieroglyphics, Egyptian --- Etymology&delete& --- Asia, South West --- Asia, Southwest --- Asia, West --- Asia, Western --- East (Middle East) --- Eastern Mediterranean --- Fertile Crescent --- Levant --- Mediterranean Region, Eastern --- Mideast --- Near East --- Northern Tier (Middle East) --- South West Asia --- Southwest Asia --- West Asia --- Western Asia --- Orient --- Egyptian language - Foreign elements --- Egyptian language - Etymology - Names --- Egyptian language - Writing, Hieroglyphic --- Middle East - Languages - Transliteration into Egyptian
Choose an application
Secure two-party computation, called secure function evaluation (SFE), enables two mutually mistrusting parties, the client and server, to evaluate an arbitrary function on their respective private inputs while revealing nothing but the result. Originally the technique was considered to be too inefficient for practical privacy-preserving applications, but in recent years rapid speed-up in computers and communication networks, algorithmic improvements, automatic generation, and optimizations have enabled their application in many scenarios. The author offers an extensive overview of the most practical and efficient modern techniques used in the design and implementation of secure computation and related protocols. After an introduction that sets secure computation in its larger context of other privacy-enhancing technologies such as secure channels and trusted computing, he covers the basics of practically efficient secure function evaluation, circuit optimizations and constructions, hardware-assisted garbled circuit protocols, and the modular design of efficient SFE protocols. The goal of the author's research is to use algorithm engineering methods to engineer efficient secure protocols, both as a generic tool and for solving practical applications, and he achieves an excellent balance between the theory and applicability. The book is essential for researchers, students and practitioners in the area of applied cryptography and information security who aim to construct practical cryptographic protocols for privacy-preserving real-world applications.
Computer network protocols. --- Computer networks -- Security measures. --- Computer science. --- Data encryption (Computer science). --- Engineering & Applied Sciences --- Computer Science --- Computer networks --- Data encryption (Computer science) --- Security measures. --- Protocols, Computer network --- Computer network security --- Network security, Computer --- Security of computer networks --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer organization. --- Data structures (Computer science). --- Electrical engineering. --- Computer Science. --- Data Structures, Cryptology and Information Theory. --- Computer Systems Organization and Communication Networks. --- Communications Engineering, Networks. --- Computer security --- Cryptography --- Data structures (Computer scienc. --- Computer network architectures. --- Telecommunication. --- Data Structures and Information Theory. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Electric engineering --- Engineering --- Organization, Computer --- Electronic digital computers --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science)
Choose an application
Choose an application
This book provides the first comprehensive introduction to the field of language contact and multilingualism in ancient Egypt before the Greco-Roman period (4th millennium BCE4th c. BCE). It gives a survey of the historical evidence of linguistic interference of Egyptian with languages in Africa, the Near East and the Mediterranean, discusses the different attested phenomena of language contact and offers a case study of foreign language communities in ancient Egypt. Detailed indexes makes this book a rich source of linguistic information for general linguistics and neighboring disciplines.
Languages in contact --- Areal linguistics --- History --- Egypt --- Égypte --- Ägypten --- Egitto --- Egipet --- Egiptos --- Miṣr --- Southern Region (United Arab Republic) --- Egyptian Region (United Arab Republic) --- Iqlīm al-Janūbī (United Arab Republic) --- Egyptian Territory (United Arab Republic) --- Egipat --- Arab Republic of Egypt --- A.R.E. --- ARE (Arab Republic of Egypt) --- Jumhūrīyat Miṣr al-ʻArabīyah --- Mitsrayim --- Egipt --- Ijiptʻŭ --- Misri --- Ancient Egypt --- Gouvernement royal égyptien --- جمهورية مصر العربية --- مِصر --- مَصر --- Maṣr --- Khēmi --- エジプト --- Ejiputo --- Egypti --- Egypten --- מצרים --- United Arab Republic --- Languages --- Langues en contact --- Multilinguisme --- Multilingualism --- Language and languages. --- Languages in contact.
Choose an application
Unlike many standard works on compliance, this book focuses not on the goals, but on the means that enable effective compliance. From the internal perspective of the compliance officer, everyday problems are addressed and solved with the help of concrete, tried-and-tested measures. Based on the tension between profit generation and compliance, ethical principles as well as the appearance of compliance, its handling of contacts and its procedure in the event of violations are also discussed. Psychological and sociological insights broaden the perspective, put people at the center and offer new starting points for designing successful compliance. The content Background and foundation of compliance Decisions, goals and planning Appearance of the compliance officer Supervisors, groups and newcomers to the profession Partners, allies, competitors Audits and training Conflicts, compliance violations and detection Development and perspectives The author Thomas Schneider holds a degree in business administration. After working for many years as an internal auditor for a Dax 40 company, he has been responsible for the compliance management of a medium-sized steel trader in Essen for several years. He regularly publishes articles and books on the subject of compliance and speaks at conferences. The translation was done with the help of artificial intelligence. A subsequent human revision was done primarily in terms of content.
Commercial law. --- Business ethics. --- Business Law. --- Business Ethics. --- Business --- Businesspeople --- Commercial ethics --- Corporate ethics --- Corporation ethics --- Professional ethics --- Wealth --- Business law --- Commerce --- Law, Commercial --- Mercantile law --- Law --- Law merchant --- Maritime law --- Moral and ethical aspects --- Law and legislation --- Compliance auditing. --- Trade regulation --- Evaluation. --- Regulation of trade --- Regulatory reform --- Commercial law --- Consumer protection --- Deregulation --- Auditing
Choose an application
The possibilities and limits of digitalization in general and artificial intelligence in particular are demonstrated in a practice-oriented manner. Ways to generate and secure competitive advantages are presented. The topic is examined from the perspective of the company, the function of controlling and the personal position in controlling. The aim is rather to accompany the reader in the concrete implementation than to present a uniform guide. The content Data security and risk Evaluate rationality, define action and create readiness for change Digitalization, algorithms and agility in controlling Forecasts, strategies and processes Operational developments and innovations The author Thomas Schneider holds a degree in business administration and works as a freelance interim auditor and compliance manager. He has extensive professional experience in controlling, internal auditing and compliance management, both in a Dax-30 group and in medium-sized companies. Publication of numerous professional articles and books. This book is a translation of an original German edition. The translation was done with the help of artificial intelligence (machine translation by the service DeepL.com). A subsequent human revision was done primarily in terms of content, so that the book will read stylistically differently from a conventional translation. .
Accounting. --- Business information services. --- Technological innovations. --- IT in Business. --- Innovation and Technology Management. --- Breakthroughs, Technological --- Innovations, Industrial --- Innovations, Technological --- Technical innovations --- Technological breakthroughs --- Technological change --- Creative ability in technology --- Inventions --- Domestication of technology --- Innovation relay centers --- Research, Industrial --- Technology transfer --- Business --- Business enterprises --- Information services --- Accountancy --- Commerce --- Commercial accounting --- Finance --- Financial accounting --- Bookkeeping --- Accounting --- Auditing --- Data processing. --- Computer audits --- Computerized auditing --- EDP auditing --- Automation
Choose an application
Choose an application
Choose an application
Listing 1 - 10 of 111 | << page >> |
Sort by
|