Sebanyak 1135 item atau buku ditemukan

Sang Penjaga Tauhid

Studi Protes Tirani Kekuasaan 1982-1985

"Karya Fikru Hanif ini membuka polemik yang nyaris tidak pernah diulas oleh media massa saat itu. Karya ini sangat layak untuk dibaca." (Zulhasril Nasir, Guru Besar FISIP Universitas Indonesia) Buku ini penting karena mengangkat topik penolakan keras Abdul Malik Ahmad terhadap penghapusan asas Islam di Muhammadiyah. Buku ini menarik karena mengangkat kembali tokoh sejarah yang berpengaruh dan kontroversial. "It's an originial and interesting study!" (David Reeve, Associate Professor New South Wales University). "Sebagai seorang yang pernah menjadi murid pengajian Buya Malik Ahmad di paruh akhir 80-an, membaca buku ini membuat saya seperti kembali mendengar suara Buya. Terutama, analisisnya yang tajam, serta kekokohan pendiriannya walau bertentangan dengan mayoritas sikap ulama pada masa itu yang terkooptasi hegemoni Order Baru. Sebuah telaah yang layak dibaca." (Akmal Nasery Basral, Sastrawan dan Novelis)

"Karya Fikru Hanif ini membuka polemik yang nyaris tidak pernah diulas oleh media massa saat itu.

Wales and the Crusades

c. 1095-1291

This original study, focussing on the impact of the crusading movement in medieval Wales, considers both the enthusiasm of the Welsh and those living in Wales and its borders for the crusades, as well as the domestic impact of the movement on warfare, literature, politics and patronage. The location of Wales on the periphery of mainstream Europe, and its perceived status as religiously and culturally underdeveloped did not make it the most obvious candidate for crusading involvement, but this study demonstrates that both native and settler took part in the crusades, supported the military orders, and wrote about events in the Holy Land. Efforts were made to recruit the Welsh in 1188, suggesting contemporary appreciation for Welsh fighting skills, even though crusaders from Wales have been overlooked in modern studies. By looking at patterns of participation this study shows how domestic warfare influenced the desire and willingness to join the crusade, and the effect of such absences on the properties of those who did go. The difference between north and south Wales, Marcher lord and native prince, Flemish noble and minor landholder are considered to show how crusading affected a broad spread of society. Finally, the political role of crusading participation as a way to remove potential troublemakers and cement English control over Wales is considered as the close of the peak years of crusading coincided with the final conquest of Wales in 1282.

This original study, focussing on the impact of the crusading movement in medieval Wales, considers both the enthusiasm of the Welsh and those living in Wales and its borders for the crusades, as well as the domestic impact of the movement ...

Embattled Reason, Principled Sentiment and Political Radicalism

Quixotism in English Novels, 1742-1801

The book proposes a new understanding of eighteenth-century Quixotism in English thought and literary production. The world displayed by eighteenth-century English Quixotes reveals a strain of lament and criticism aimed at the rise of commercialism and the pre-eminence of self-interest, religious conformism and imperial designs.

The book proposes a new understanding of eighteenth-century Quixotism in English thought and literary production.

The Truth About Public Speaking

The Essential Truths in 20 Minutes

This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version. Great presenters weren't born that way. They became great by focusing on their message, the needs of the audience, the pattern of organization, and the details of presenting. Persistence, dedication, and a little practice can go a long way toward making you a top-notch public speaker. The details you need to be a great public speaker are straight ahead in these essential truths.

We're all asked to speak on occasion without benefit of any rehearsal (give an
impromptu talk), but on those occasions, the audience knows that you've just
been asked to “say a few words.” Their expectations are low and the demands of
the ...

Cryptographic Hardware and Embedded Systems - CHES 2005

7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings

This book constitutes the refereed proceedings of the 7th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2005, held in Edinburgh, UK in August/September 2005. The 32 revised full papers presented were carefully reviewed and selected from 108 submissions. The papers are organized in topical sections on side channels, arithmetic for cryptanalysis, low resources, special purpose hardware, hardware attacks and countermeasures, arithmetic for cryptography, trusted computing, and efficient hardware.

Nearly half a century ago, military organizations introduced “Tempest” emission-
security test standards to control information leakage from unintentional
electromagnetic emanations of digital electronics. The nature of these emissions
has ...

Cryptographic Hardware and Embedded Systems - CHES 2009

11th International Workshop Lausanne, Switzerland, September 6-9, 2009 Proceedings

This book constitutes the refereed proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2009, held in Lausanne, Switzerland during September 6-9, 2009. The book contains 3 invited talks and 29 revised full papers which were carefully reviewed and selected from 148 submissions. The papers are organized in topical sections on software implementations, side channel analysis of secret key cryptosystems, side channel analysis of public key cryptosystems, side channel and fault analysis countermeasures, pairing-based cryptography, new ciphers and efficient implementations, TRNGs and device identification, hardware trojans and trusted ICs, theoretical aspects, and fault analysis.

Conventional post– manufacturing testing, test generation algorithms and test
coverage metrics cannot be readily extended to hardware Trojan detection. In
this paper, we propose a test pattern generation technique based on multiple ...