Showing all 5 results
The Cartesian Meditations translation is based primarily on the printed text, edited by Professor S. Strasser and published in the first volume of Husserliana: Cartesianische Meditationen und Pariser Vortrage, ISBN 90-247-0214-3. Most of Husserl’s emendations, as given in the Appendix to that volume, have been treated as if they were part of the text. The others have been translated in footnotes. Secondary consideration has been given to a typescript (cited as Typescript C) on which Husserl wrote in 1933: Cartes. Meditationen / Originaltext 1929 / E. Husserl / fur Dorion Cairns. Its use of emphasis and quotation marks conforms more closely to Husserl s practice, as exemplified in works published during his lifetime. In this respect the translation usually follows Typescript C. Moreover, some of the variant readings n this typescript are preferable and have been used as the basis for the translation. Where that is the case, the published text is given or translated in a foornote. The published text and Typescript C have been compared with the French translation by Gabrielle Pfeiffer and Emmanuel Levinas (Paris, Armand Collin, 1931). The use of emphasis and quotation marks in the French translation corresponds more closely to that in Typescript C than to that in the published text. Often, where the wording of the published text and that of Typescript C differ, the French translation indicates that it was based on a text that corresponded more closely to one or the other usually to Typescript C. In such cases the French translation has been quoted or cited in a foornote.
This new Edition of Electronic Commerce is a complete update of the leading graduate level/advanced undergraduate level textbook on the subject. Electronic commerce (EC) describes the manner in which transactions take place over electronic networks, mostly the Internet. It is the process of electronically buying and selling goods, services, and information. Certain EC applications, such as buying and selling stocks and airline tickets online, are reaching maturity, some even exceeding non-Internet trades. However, EC is not just about buying and selling; it also is about electronically communicating, collaborating, and discovering information. It is about e-learning, e-government, social networks, and much more. EC is having an impact on a significant portion of the world, affecting businesses, professions, trade, and of course, people.
This textbook covers the entire Business Process Management (BPM) lifecycle, from process identification to process monitoring, covering along the way process modelling, analysis, redesign and automation. Concepts, methods and tools from business management, computer science and industrial engineering are blended into one comprehensive and inter-disciplinary approach. The presentation is illustrated using the BPMN industry standard defined by the Object Management Group and widely endorsed by practitioners and vendors worldwide.
While the standard solid state topics are covered, the basic ones often have more detailed derivations than is customary (with an empasis on crystalline solids). Several recent topics are introduced, as are some subjects normally included only in condensed matter physics. Lattice vibrations, electrons, interactions, and spin effects (mostly in magnetism) are discussed the most comprehensively. Many problems are included whose level is from “fill in the steps” to long and challenging, and the text is equipped with references and several comments about experiments with figures and tables.
Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today’s designers need a comprehensive understanding of applied cryptography. After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard (DES) and 3DES, the Advanced Encryption Standard (AES), block ciphers, the RSA cryptosystem, public-key cryptosystems based on the discrete logarithm problem, elliptic-curve cryptography (ECC), digital signatures, hash functions, Message Authentication Codes (MACs), and methods for key establishment, including certificates and public-key infrastructure (PKI). Throughout the book, the authors focus on communicating the essentials and keeping the mathematics to a minimum, and they move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations. The authors have considerable experience teaching applied cryptography to engineering and computer science students and to professionals, and they make extensive use of examples, problems, and chapter reviews, while the book’s website offers slides, projects and links to further resources. This is a suitable textbook for graduate and advanced undergraduate courses and also for self-study by engineers.