Résultats de recherche de titre
Articles 1 à 20 sur 2916
Une jeunesse sous l'Occupation (Document)
Par Alice Mendelson. 2023
Juive d'origine polonaise ayant grandi dans le 18e arrondissement de Paris, Alice Mendelson raconte ses souvenirs de la Seconde Guerre…
mondiale, de la déportation de son père en septembre 1941 au combat pour obtenir justice, après la Libération. Alice, 16 ans, et ses parents sont dénoncés par des voisins, elle et sa mère échappent à la rafle du Vél'd'Hiv et s'engagent dans la Résistance.The counterfeit countess: The jewish woman who rescued thousands of poles during the holocaust
Par Elizabeth B White. 2024
The astonishing story of Dr. Josephine Janina Mehlberg—a Jewish mathematician who saved thousands of lives in Nazi-occupied Poland by masquerading…
as a Polish aristocrat—drawing on Mehlberg's own unpublished memoir. World War II and the Holocaust have given rise to many stories of resistance and rescue, but The Counterfeit Countess is unique. It tells the remarkable, unknown story of "Countess Janina Suchodolska," a Jewish woman who rescued more than 10,000 Poles imprisoned by Poland's Nazi occupiers. Mehlberg operated in Lublin, Poland, headquarters of Aktion Reinhard, the SS operation that murdered 1.7 million Jews in occupied Poland. Using the identity papers of a Polish aristocrat, she worked as a welfare official while also serving in the Polish resistance. With guile, cajolery, and steely persistence, the "Countess" persuaded SS officials to release thousands of Poles from the Majdanek concentration camp. She won permission to deliver food and medicine—even decorated Christmas trees—for thousands more of the camp's prisoners. At the same time, she personally smuggled supplies and messages to resistance fighters imprisoned at Majdanek, where 63,000 Jews were murdered in gas chambers and shooting pits. Incredibly, she eluded detection, and ultimately survived the war and emigrated to the US. Drawing on the manuscript of Mehlberg's own unpublished memoir, supplemented with prodigious research, Elizabeth White and Joanna Sliwa, professional historians and Holocaust experts, have uncovered the full story of this remarkable woman. They interweave Mehlberg's sometimes harrowing personal testimony with broader historical narrative. Like The Light of Days , Schindler's List , and Irena's Children , The Counterfeit Countess is an unforgettable account of inspiring courage in the face of unspeakable crueltyLovers in auschwitz: A true story
Par Keren Blankfeld. 2024
"Mesmerizing and inspirational."—Judy Batalion, New York Times bestselling author of The Light of Days The incredible true story of two…
Holocaust survivors who fell in love in Auschwitz, only to be separated upon liberation and lead remarkable lives apart following the war—and then find each other again more than 70 years later. Zippi Spitzer and David Wisnia were captivated by each other from the moment they first exchanged glances across the work floor. It was the beginning of a love story that could have happened anywhere. Except for one difference: this romance was unfolding in history's most notorious death camp, between two young prisoners whose budding intimacy risked dooming them if they were caught. Incredibly, David and Zippi survived for years beneath the ash-choked skies of Auschwitz. Under the protection of their fellow inmates, their romance grew and deepened, even as their brushes with death mounted and David's luck in particular seemed close to running out. As the war's end finally approached and the time came for them to leave the camp, David and Zippi made plans to meet again. But neither of them could imagine how long their reunion would take or how many lives they would live in the interim. They had no inkling, either, of the betrayals that would await them along the way. But David did suspect that Zippi harbored a secret—one that could explain the mystery of his survival all those years ago. An unbelievable tale of romance, sacrifice, loss, and resilience, Lovers in Auschwitz is a saga of two young people who found themselves trapped inside a waking nightmare of the Nazis' creation, yet who nevertheless discovered a love that sustained them through history's darkest hourBeverly hills spy: The double-agent war hero who helped japan attack pearl harbor
Par Ronald Drabkin. 2024
In the spirit of Ben Macintyre's greatest spy nonfiction, the truly unbelievable and untold story of Frederick Rutland—a debonair British…
WWI hero, flying ace, fixture of Los Angeles society, and friend of Golden Age Hollywood stars—who flipped to become a spy for Japan in the lead-up to the attack on Pearl Harbor. Frederick Rutland was an accomplished aviator, British WWI war hero, and real-life James Bond. He was the first pilot to take off and land a plane on a ship, a decorated warrior for his feats of bravery and rescue, was trusted by the admirals of the Royal Navy, had a succession of aeronautical inventions, and designed the first modern aircraft carrier. He was perhaps the most famous early twentieth-century naval aviator. Despite all of this, and due mostly to class politics, Rutland was not promoted in the new Royal Air Force in the wake of WWI. This ignominy led the disgruntled Rutland to become a spy for the Japanese navy. Plied with riches and given a salary ten times the highest-paid admiral, shuttled between Los Angeles and Tokyo where he lived in large mansions in both Beverly Hills and Yokohama, and insinuating himself into both LA high society and Japan's high command, Rutland would go on to contribute to the Japanese navy with both strategic and technical intelligence. This included scouting trips to Pearl Harbor, investigations of military preparedness, and aircraft technology. All this while living a double life, frequenting private California clubs and hosting lavish affairs for Hollywood stars and military dignitaries in his mansion on the Los Angeles Bird Streets. Supported by recently declassified FBI files and by incorporating unique and rare research through MI5 and Japanese Naval archives that few English speakers have access to, author Ronald Drabkin pieces together to completion, for the first time, this stranger-than-fiction story of one of the most fascinating and enigmatic characters of espionage history. Supplemental enhancement PDF accompanies the audiobookBuilding a cyber risk management program: Evolving security for the digital age
Par Brian Allen. 2024
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for…
designing, developing, and implementing a cyber risk management program that addresses your company's specific needs. Ideal for corporate directors, senior executives, security risk practitioners, and auditors at many levels, this guide offers both the strategic insight and tactical guidance you're looking for. You'll learn how to define and establish a sustainable, defendable, cyber risk management program, and the benefits associated with proper implementation. Cyber risk management experts Brian Allen and Brandon Bapst, working with writer Terry Allan Hicks, also provide advice that goes beyond risk management. You'll discover ways to address your company's oversight obligations as defined by international standards, case law, regulation, and board-level guidance. This book helps you: understand the transformational changes digitalization is introducing, and new cyber risks that come with it; learn the key legal and regulatory drivers that make cyber risk management a mission-critical priority for enterprises; gain a complete understanding of four components that make up a formal cyber risk management program; and implement or provide guidance for a cyber risk management program within your enterpriseGrossly unsanitary living conditions, cruel and abusive treatment by camp officials, the withholding of medical treatment - these were common…
experiences for refugees imprisoned at internment camps in Britain and Canada. Walter Igersheimer's memoir exposes this bleak period in the British and Canadian war record.The Hidden Package
Par Claire Baum. 2024
Almost forty years after the end of the war, Claire Baum opens a package from a stranger in Rotterdam, unleashing…
a flood of repressed memories from her childhood. As Claire delves into her past, she uncovers the personal sacrifice and bravery of her parents, the Dutch resistance and the families that selflessly gave shelter to her and her sister, Ollie. The Hidden Package portrays Claire’s years spent in hiding and pays tribute to all those who played a part in saving her life and ensuring a future for the next generations of her family.Introduction by Carolyne Van Der MeerHacker culture can be esoteric, but this entertaining reference is here to help. Written by a longtime hacker, this fun…
reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From phreaking to deepfakes, and from APT (advanced package tool) to zombie malware, grasping the terminology is crucial to understanding hacker culture and history. This book from Kim Crawley (8 Steps to Better Security) is written in a conversational style and organized from A to Z. If you're just getting started on your hacker journey, you'll find plenty here to guide your learning and help you understand the references and cultural allusions you come across. More experienced hackers will find historical depth, wry humor, and some perhaps surprising facts about familiar cultural touchstones. This book will help you understand the relationship between hacker culture and cybersecurity; get to know the ideas behind the hacker ethos, like "knowledge should be free"; explore topics and publications central to hacker culture, from 2600 Magazine to Cult of the Dead Cow; appreciate the history of cybersecurity; learn about key figures in the history of hacker culture; and understand the difference between hackers and cybercriminalsFrom Guilt to Shame: Auschwitz and After (20/21 #8)
Par Ruth Leys. 2007
Why has shame recently displaced guilt as a dominant emotional reference in the West? After the Holocaust, survivors often reported…
feeling guilty for living when so many others had died, and in the 1960s psychoanalysts and psychiatrists in the United States helped make survivor guilt a defining feature of the "survivor syndrome." Yet the idea of survivor guilt has always caused trouble, largely because it appears to imply that, by unconsciously identifying with the perpetrator, victims psychically collude with power. In From Guilt to Shame, Ruth Leys has written the first genealogical-critical study of the vicissitudes of the concept of survivor guilt and the momentous but largely unrecognized significance of guilt's replacement by shame. Ultimately, Leys challenges the theoretical and empirical validity of the shame theory proposed by figures such as Silvan Tomkins, Eve Kosofsky Sedgwick, and Giorgio Agamben, demonstrating that while the notion of survivor guilt has depended on an intentionalist framework, shame theorists share a problematic commitment to interpreting the emotions, including shame, in antiintentionalist and materialist terms.Google's PageRank and Beyond: The Science of Search Engine Rankings
Par Amy N. Langville, Carl D. Meyer. 2006
Why doesn't your home page appear on the first page of search results, even when you query your own name?…
How do other web pages always appear at the top? What creates these powerful rankings? And how? The first book ever about the science of web page rankings, Google's PageRank and Beyond supplies the answers to these and other questions and more. The book serves two very different audiences: the curious science reader and the technical computational reader. The chapters build in mathematical sophistication, so that the first five are accessible to the general academic reader. While other chapters are much more mathematical in nature, each one contains something for both audiences. For example, the authors include entertaining asides such as how search engines make money and how the Great Firewall of China influences research. The book includes an extensive background chapter designed to help readers learn more about the mathematics of search engines, and it contains several MATLAB codes and links to sample web data sets. The philosophy throughout is to encourage readers to experiment with the ideas and algorithms in the text. Any business seriously interested in improving its rankings in the major search engines can benefit from the clear examples, sample code, and list of resources provided. Many illustrative examples and entertaining asides MATLAB code Accessible and informal style Complete and self-contained section for mathematics reviewNumerical Algorithms for Personalized Search in Self-organizing Information Networks
Par Sep Kamvar. 2011
This book lays out the theoretical groundwork for personalized search and reputation management, both on the Web and in peer-to-peer…
and social networks. Representing much of the foundational research in this field, the book develops scalable algorithms that exploit the graphlike properties underlying personalized search and reputation management, and delves into realistic scenarios regarding Web-scale data.Sep Kamvar focuses on eigenvector-based techniques in Web search, introducing a personalized variant of Google's PageRank algorithm, and he outlines algorithms--such as the now-famous quadratic extrapolation technique--that speed up computation, making personalized PageRank feasible. Kamvar suggests that Power Method-related techniques ultimately should be the basis for improving the PageRank algorithm, and he presents algorithms that exploit the convergence behavior of individual components of the PageRank vector. Kamvar then extends the ideas of reputation management and personalized search to distributed networks like peer-to-peer and social networks. He highlights locality and computational considerations related to the structure of the network, and considers such unique issues as malicious peers. He describes the EigenTrust algorithm and applies various PageRank concepts to P2P settings. Discussion chapters summarizing results conclude the book's two main sections.Clear and thorough, this book provides an authoritative look at central innovations in search for all of those interested in the subject.More stimulating mathematics puzzles from bestselling author Paul NahinHow do technicians repair broken communications cables at the bottom of the…
ocean without actually seeing them? What's the likelihood of plucking a needle out of a haystack the size of the Earth? And is it possible to use computers to create a universal library of everything ever written or every photo ever taken? These are just some of the intriguing questions that best-selling popular math writer Paul Nahin tackles in Number-Crunching. Through brilliant math ideas and entertaining stories, Nahin demonstrates how odd and unusual math problems can be solved by bringing together basic physics ideas and today's powerful computers. Some of the outcomes discussed are so counterintuitive they will leave readers astonished.Nahin looks at how the art of number-crunching has changed since the advent of computers, and how high-speed technology helps to solve fascinating conundrums such as the three-body, Monte Carlo, leapfrog, and gambler's ruin problems. Along the way, Nahin traverses topics that include algebra, trigonometry, geometry, calculus, number theory, differential equations, Fourier series, electronics, and computers in science fiction. He gives historical background for the problems presented, offers many examples and numerous challenges, supplies MATLAB codes for all the theories discussed, and includes detailed and complete solutions.Exploring the intimate relationship between mathematics, physics, and the tremendous power of modern computers, Number-Crunching will appeal to anyone interested in understanding how these three important fields join forces to solve today's thorniest puzzles.Computational Economics
Par David A. Kendrick, P. Ruben Mercado, Hans M. Amman. 2006
The ability to conceptualize an economic problem verbally, to formulate it as a mathematical model, and then represent the mathematics…
in software so that the model can be solved on a computer is a crucial skill for economists. Computational Economics contains well-known models--and some brand-new ones--designed to help students move from verbal to mathematical to computational representations in economic modeling. The authors' focus, however, is not just on solving the models, but also on developing the ability to modify them to reflect one's interest and point of view. The result is a book that enables students to be creative in developing models that are relevant to the economic problems of their times. Unlike other computational economics textbooks, this book is organized around economic topics, among them macroeconomics, microeconomics, and finance. The authors employ various software systems--including MATLAB, Mathematica, GAMS, the nonlinear programming solver in Excel, and the database systems in Access--to enable students to use the most advantageous system. The book progresses from relatively simple models to more complex ones, and includes appendices on the ins and outs of running each program. The book is intended for use by advanced undergraduates and professional economists and even, as a first exposure to computational economics, by graduate students. Organized by economic topics Progresses from simple to more complex models Includes instructions on numerous software systems Encourages customization and creativityThe Silicon Jungle: A Novel of Deception, Power, and Internet Intrigue
Par Shumeet Baluja. 2011
A suspenseful story about the dangers of unknowingly revealing our most intimate thoughts and actions onlineWhat happens when a naive…
intern is granted unfettered access to people's most private thoughts and actions? Stephen Thorpe lands a coveted internship at Ubatoo, an Internet empire that provides its users with popular online services, from a search engine and e-mail, to social networking. When Stephen’s boss asks him to work on a project with the American Coalition for Civil Liberties, Stephen innocently obliges, believing he is mining Ubatoo’s vast databases to protect people unfairly targeted in the name of national security. But nothing is as it seems. Suspicious individuals surface, doing all they can to access Ubatoo’s wealth of confidential information. This need not require technical wizardry—simply knowing how to manipulate a well-intentioned intern may be enough.The Silicon Jungle is a cautionary fictional tale of data mining’s promise and peril. Baluja raises ethical questions about contemporary technological innovations, and how minute details can be routinely pieced together into rich profiles that reveal our habits, goals, and secret desires—all ready to be exploited.Trapped in the Net: The Unanticipated Consequences of Computerization
Par Gene I. Rochlin. 1998
Voice mail. E-mail. Bar codes. Desktops. Laptops. Networks. The Web. In this exciting book, Gene Rochlin takes a closer look…
at how these familiar and pervasive productions of computerization have become embedded in all our lives, forcing us to narrow the scope of our choices, our modes of control, and our experiences with the real world. Drawing on fascinating narratives from fields that range from military command, air traffic control, and international fund transfers to library cataloging and supermarket checkouts, Rochlin shows that we are rapidly making irreversible and at times harmful changes in our business, social, and personal lives to comply with the formalities and restrictions of information systems. The threat is not the direct one once framed by the idea of insane robots or runaway mainframes usurping human functions for their own purposes, but the gradual loss of control over hardware, software, and function through networks of interconnection and dependence. What Rochlin calls the computer trap has four parts: the lure, the snare, the costs, and the long-term consequences. The lure is obvious: the promise of ever more powerful and adaptable tools with simpler and more human-centered interfaces. The snare is what usually ensues. Once heavily invested in the use of computers to perform central tasks, organizations and individuals alike are committed to new capacities and potentials, whether they eventually find them rewarding or not. The varied costs include a dependency on the manufacturers of hardware and software--and a seemingly pathological scramble to keep up with an incredible rate of sometimes unnecessary technological change. Finally, a lack of redundancy and an incredible speed of response make human intervention or control difficult at best when (and not if) something goes wrong. As Rochlin points out, this is particularly true for those systems whose interconnections and mechanisms are so deeply concealed in the computers that no human being fully understands them.Discrete and Computational Geometry
Par Satyan L. Devadoss, Joseph O'Rourke. 2011
An essential introduction to discrete and computational geometryDiscrete geometry is a relatively new development in pure mathematics, while computational geometry…
is an emerging area in applications-driven computer science. Their intermingling has yielded exciting advances in recent years, yet what has been lacking until now is an undergraduate textbook that bridges the gap between the two. Discrete and Computational Geometry offers a comprehensive yet accessible introduction to this cutting-edge frontier of mathematics and computer science.This book covers traditional topics such as convex hulls, triangulations, and Voronoi diagrams, as well as more recent subjects like pseudotriangulations, curve reconstruction, and locked chains. It also touches on more advanced material, including Dehn invariants, associahedra, quasigeodesics, Morse theory, and the recent resolution of the Poincaré conjecture. Connections to real-world applications are made throughout, and algorithms are presented independently of any programming language. This richly illustrated textbook also features numerous exercises and unsolved problems.The essential introduction to discrete and computational geometryCovers traditional topics as well as new and advanced materialFeatures numerous full-color illustrations, exercises, and unsolved problemsSuitable for sophomores in mathematics, computer science, engineering, or physicsRigorous but accessibleAn online solutions manual is available (for teachers only).Software Supply Chain Security
Par Cassie Crossley. 2024
Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability…
can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, also known as software supply chain security, goes well beyond the software development process.This practical book gives you a comprehensive look at security risks and identifies the practical controls you need to incorporate into your end-to-end software supply chain. Author Cassie Crossley demonstrates how and why everyone involved in the supply chain needs to participate if your organization is to improve the security posture of its software, firmware, and hardware.With this book, you'll learn how to:Pinpoint the cybersecurity risks in each part of your organization's software supply chainIdentify the roles that participate in the supply chain—including IT, development, operations, manufacturing, and procurementDesign initiatives and controls for each part of the supply chain using existing frameworks and referencesImplement secure development lifecycle, source code security, software build management, and software transparency practicesEvaluate third-party risk in your supply chainThe NSA Report: Liberty and Security in a Changing World
Par President's Review Group on Intelligence and Communications Technologies, The, Richard A. Clarke, Michael J. Morell, Geoffrey R. Stone, Cass R. Sunstein, Peter Swire. 2014
The official report that has shaped the international debate about NSA surveillance"We cannot discount the risk, in light of the…
lessons of our own history, that at some point in the future, high-level government officials will decide that this massive database of extraordinarily sensitive private information is there for the plucking. Americans must never make the mistake of wholly 'trusting' our public officials."—The NSA ReportThis is the official report that is helping shape the international debate about the unprecedented surveillance activities of the National Security Agency. Commissioned by President Obama following disclosures by former NSA contractor Edward J. Snowden, and written by a preeminent group of intelligence and legal experts, the report examines the extent of NSA programs and calls for dozens of urgent and practical reforms. The result is a blueprint showing how the government can reaffirm its commitment to privacy and civil liberties—without compromising national security.Jews, Germans, and Allies: Close Encounters in Occupied Germany
Par Atina Grossmann. 2007
In the immediate aftermath of World War II, more than a quarter million Jewish survivors of the Holocaust lived among…
their defeated persecutors in the chaotic society of Allied-occupied Germany. Jews, Germans, and Allies draws upon the wealth of diary and memoir literature by the people who lived through postwar reconstruction to trace the conflicting ways Jews and Germans defined their own victimization and survival, comprehended the trauma of war and genocide, and struggled to rebuild their lives. In gripping and unforgettable detail, Atina Grossmann describes Berlin in the days following Germany's surrender--the mass rape of German women by the Red Army, the liberated slave laborers and homecoming soldiers, returning political exiles, Jews emerging from hiding, and ethnic German refugees fleeing the East. She chronicles the hunger, disease, and homelessness, the fraternization with Allied occupiers, and the complexities of navigating a world where the commonplace mingled with the horrific. Grossmann untangles the stories of Jewish survivors inside and outside the displaced-persons camps of the American zone as they built families and reconstructed identities while awaiting emigration to Palestine or the United States. She examines how Germans and Jews interacted and competed for Allied favor, benefits, and victim status, and how they sought to restore normality--in work, in their relationships, and in their everyday encounters. Jews, Germans, and Allies shows how Jews were integral participants in postwar Germany and bridges the divide that still exists today between German history and Jewish studies.Secret Reports on Nazi Germany: The Frankfurt School Contribution to the War Effort
Par Franz Neumann, Herbert Marcuse, Otto Kirchheimer. 2013
A groundbreaking book that gathers key wartime intelligence reportsDuring the Second World War, three prominent members of the Frankfurt School—Franz…
Neumann, Herbert Marcuse, and Otto Kirchheimer—worked as intelligence analysts for the Office of Strategic Services, the wartime forerunner of the CIA. This book brings together their most important intelligence reports on Nazi Germany, most of them published here for the first time.These reports provide a fresh perspective on Hitler's regime and the Second World War, and a fascinating window on Frankfurt School critical theory. They develop a detailed analysis of Nazism as a social and economic system and the role of anti-Semitism in Nazism, as well as a coherent plan for the reconstruction of postwar Germany as a democratic political system with a socialist economy. These reports played a significant role in the development of postwar Allied policy, including denazification and the preparation of the Nuremberg Trials. They also reveal how wartime intelligence analysis shaped the intellectual agendas of these three important German-Jewish scholars who fled Nazi persecution prior to the war.Secret Reports on Nazi Germany features a foreword by Raymond Geuss as well as a comprehensive general introduction by Raffaele Laudani that puts these writings in historical and intellectual context.