As readers of classic Russian literature know, the nineteenth century was a time of pervasive financial anxiety. With incomes erratic and banks inadequate, Russians of all social castes were deeply enmeshed in networks of credit and debt. The necessity of borrowing and lending shaped perceptions of material and moral worth, as well as notions of social respectability and personal responsibility. Credit and debt were defining features of imperial Russia’s culture of property ownership. Sergei Antonov recreates this vanished world of borrowers, bankrupts, lenders, and loan sharks in imperial Russia from the reign of Nicholas I to the period of great social and political reforms of the 1860s. Poring over a trove of previously unexamined records, Antonov gleans insights into the experiences of ordinary Russians, rich and poor, and shows how Russia’s informal but sprawling credit system helped cement connections among property owners across socioeconomic lines. Individuals of varying rank and wealth commonly borrowed from one another. Without a firm legal basis for formalizing debt relationships, obtaining a loan often hinged on subjective perceptions of trustworthiness and reputation. Even after joint-stock banks appeared in Russia in the 1860s, credit continued to operate through vast networks linked by word of mouth, as well as ties of kinship and community. Disputes over debt were common, and Bankrupts and Usurers of Imperial Russia offers close readings of legal cases to argue that Russian courts—usually thought to be underdeveloped in this era—provided an effective forum for defining and protecting private property interests.
This book reviews the current state of understanding concerning edge plasma, which bridges hot fusion plasma, with a temperature of roughly one million degrees Kelvin with plasma-facing materials, which have melting points of only a few thousand degrees Kelvin. In a fact, edge plasma is one of the keys to solution for harnessing fusion energy in magnetic fusion devices. The physics governing the processes at work in the edge plasma involves classical and anomalous transport of multispecies plasma, neutral gas dynamics, atomic physics effects, radiation transport, plasma-material interactions, and even the transport of plasma species within the plasma-facing materials. The book starts with simple physical models, then moves on to rigorous theoretical considerations and state-of-the-art simulation tools that are capable of capturing the most important features of the edge plasma phenomena. The authors compare the conclusions arising from the theoretical and computational analysis with the available experimental data. They also discuss the remaining gaps in their models and make projections for phenomena related to edge plasma in magnetic fusion reactors.
The book discusses the activities involved in developing an Enterprise Continuity Program (ECP) that will cover both Business Continuity Management (BCM) as well as Disaster Recovery Management (DRM). The creation of quantitative metrics for BCM are discussed as well as several models and methods that correspond to the goals and objectives of the International Standards Organisation (ISO) Technical Committee ISO/TC 292 "Security and resilience”. Significantly, the book contains the results of not only qualitative, but also quantitative, measures of Cyber Resilience which for the first time regulates organizations’ activities on protecting their critical information infrastructure. The book discusses the recommendations of the ISO 22301: 2019 standard “Security and resilience — Business continuity management systems — Requirements” for improving the BCM of organizations based on the well-known “Plan-Do-Check-Act” (PDCA) model. It also discusses the recommendations of the following ISO management systems standards that are widely used to support BCM. The ISO 9001 standard "Quality Management Systems"; ISO 14001 "Environmental Management Systems"; ISO 31000 "Risk Management", ISO/IEC 20000-1 "Information Technology - Service Management", ISO/IEC 27001 "Information Management security systems”, ISO 28000 “Specification for security management systems for the supply chain”, ASIS ORM.1-2017, NIST SP800-34, NFPA 1600: 2019, COBIT 2019, RESILIA, ITIL V4 and MOF 4.0, etc. The book expands on the best practices of the British Business Continuity Institute’s Good Practice Guidelines (2018 Edition), along with guidance from the Disaster Recovery Institute’s Professional Practices for Business Continuity Management (2017 Edition). Possible methods of conducting ECP projects in the field of BCM are considered in detail. Based on the practical experience of the author there are examples of Risk Assessment (RA) and Business Impact Analysis (BIA), examples of Business Continuity Plans (BCP) & Disaster Recovery Plans (DRP) and relevant BCP & DRP testing plans. This book will be useful to Chief Information Security Officers, internal and external Certified Information Systems Auditors, senior managers within companies who are responsible for ensuring business continuity and cyber stability, as well as teachers and students of MBA’s, CIO and CSO programs.
Modern cyber systems acquire more emergent system properties, as far as their complexity increases: cyber resilience, controllability, self-organization, proactive cyber security and adaptability. Each of the listed properties is the subject of the cybernetics research and each subsequent feature makes sense only if there is a previous one.Cyber resilience is the most important feature of any cyber system, especially during the transition to the sixth technological stage and related Industry 4.0 technologies: Artificial Intelligence (AI), Cloud and foggy computing, 5G +, IoT/IIoT, Big Data and ETL, Q-computing, Blockchain, VR/AR, etc. We should even consider the cyber resilience as a primary one, because the mentioned systems cannot exist without it. Indeed, without the sustainable formation made of the interconnected components of the critical information infrastructure, it does not make sense to discuss the existence of 4.0 Industry cyber-systems. In case when the cyber security of these systems is mainly focused on the assessment of the incidents' probability and prevention of possible security threats, the cyber resilience is mainly aimed at preserving the targeted behavior and cyber systems' performance under the conditions of known (about 45 %) as well as unknown (the remaining 55 %) cyber attacks.This monograph shows that modern Industry 4.0. Cyber systems do not have the required cyber resilience for targeted performance under heterogeneous mass intruder cyber-attacks. The main reasons include a high cyber system structural and functional complexity, a potential danger of existing vulnerabilities and “sleep” hardware and software tabs, as well as an inadequate efficiency of modern models, methods, and tools to ensure cyber security, reliability, response and recovery.
This timely book offers rare insight into the field of cybersecurity in Russia -- a significant player with regard to cyber-attacks and cyber war. Big Data Technologies for Monitoring of Computer Security presents possible solutions to the relatively new scientific/technical problem of developing an early-warning cybersecurity system for critically important governmental information assets. Using the work being done in Russia on new information security systems as a case study, the book shares valuable insights gained during the process of designing and constructing open segment prototypes of this system. Most books on cybersecurity focus solely on the technical aspects. But Big Data Technologies for Monitoring of Computer Security demonstrates that military and political considerations should be included as well. With a broad market including architects and research engineers in the field of information security, as well as managers of corporate and state structures, including Chief Information Officers of domestic automation services (CIO) and chief information security officers (CISO), this book can also be used as a case study in university courses.
Cyber Security Innovation for the Digital Economy considers possible solutions to the relatively new scientific-technical problem of developing innovative solutions in the field of cyber security for the Digital Economy. The solutions proposed are based on the results of exploratory studies conducted by the author in the areas of Big Data acquisition, cognitive information technologies (cogno-technologies), new methods of analytical verification of digital ecosystems on the basis of similarity invariants and dimensions, and “computational cognitivism,” involving a number of existing models and methods.In practice, this successfully allowed the creation of new entities - the required safe and trusted digital ecosystems - on the basis of the development of digital and cyber security technologies, and the resulting changes in their behavioral preferences. Here, the ecosystem is understood as a certain system of organizations, created around a certain Technological Platform that use its services to make the best offers to customers and access to them to meet the ultimate needs of clients - legal entities and individuals. The basis of such ecosystems is a certain technological platform, created on advanced innovative developments, including the open interfaces and code, machine learning, cloud technologies, Big Data collection and processing, artificial intelligence technologies, etc. The mentioned Technological Platform allows creating the best offer for the client both from own goods and services and from the offers of external service providers in real time.This book contains four chapters devoted to the following subjects:- Relevance of the given scientific-technical problems in the cybersecurity of Digital Economy- Determination of the limiting capabilities- Possible scientific and technical solutions- Organization of perspective research studies in the area of Digital Economy cyber security in Russia.
Providing a clear and systematic description of droplets and spray dynamic models, this book maximises reader insight into the underlying physics of the processes involved, outlines the development of new physical and mathematical models and broadens understanding of interactions between the complex physical processes which take place in sprays. Complementing approaches based on the direct application of computational fluid dynamics (CFD), Droplets and Sprays treats both theoretical and practical aspects of internal combustion engine process such as the direct injection of liquid fuel, subcritical heating and evaporation. Including case studies that illustrate the approaches relevance to automotive applications, it is also anticipated that the described models can find use in other areas such as in medicine and environmental science.
This study is an intellectual biography of Nikolai N. Bolkhovitinov (1930–2008), the prominent Soviet historian who was a pioneering scholar of US history and US–Russian relations. Alongside the personal history of Bolkhovitinov, this study also examines the broader social, cultural, and intellectual developments within the Americanist scholarly community in Soviet and post-Soviet Russia. Using archival documents, numerous studies by Russian and Ukrainian Americanists, various periodicals, personal correspondence, diaries, and more than one hundred interviews, it demonstrates how concepts, genealogies, and images of modernity shaped a national self-perception of the intellectual elites in both nations during the Cold War.
The Americanist community played a vital role in the Cold War, as well as in large part directing the cultural consumption of Soviet society and shaping perceptions of the US. To shed light onto this important, yet under-studied, academic community, Sergei Zhuk here explores the personal histories of prominent Soviet Americanists, considering the myriad cultural influences - from John Wayne's bravado in the film Stagecoach to Miles Davis - that shaped their identities, careers and academic interests. Zhuk's compelling account draws on a wide range of understudied archival documents, periodicals, letters and diaries as well as more than 100 exclusive interviews with prominent Americanists to take the reader from the post-war origins of American studies, via the extremes of the Cold War, thaw and perestroika, to Putin's Russia. Soviet Americana is a comprehensive insight into shifting attitudes towards the US throughout the twentieth century and an essential resource for all Soviet and Cold War historians.
This book describes the thermal and hydrodynamic instabilities appearing in laser-matter interactions at moderate intensities. These instabilities result in the distortion of phase-transition front, dispersion of target material in condensed phase, formation of dissipative surface structures, generation of complex oscillatory evaporation modes, and so on. These effects, in turn, lead to the appearance of liquid droplets in an expanding vapor, non-uniform removal of a solid material, and the enhanced light absorption in the vapor plume. This book focuses on nonresonant interactions. It concentrates on the range of low and moderate laser intensities that are important for technological applications of lasers. Instabilities in Laser-Matter Interaction provides a theoretical background to the interpretation of experimental results and an understanding of the effect of instabilities on the processes of laser technology.
This book acts as a guide to simple models that describe some of the complex fluid dynamics, heat/mass transfer and combustion processes in droplets and sprays. Attention is focused mainly on the use of classical hydrodynamics, and a combination of kinetic and hydrodynamic models, to analyse the heating and evaporation of mono- and multi-component droplets. The models were developed for cases when small and large numbers of components are present in droplets. Some of these models are used for the prediction of time to puffing/micro-explosion of composite water/fuel droplets — processes that are widely used in combustion devices to stimulate disintegration of relatively large droplets into smaller ones. The predictions of numerical codes based on these models are validated against experimental results where possible. In most of the models, droplets are assumed to be spherical; some preliminary results of the generalisation of these models to the case of non-spherical droplets, approximating them as spheroids, are presented.
Cyber immune systems try to mimic the adaptive immune system of humans and animals because of its capability to detect and fend off new, unseen pathogens. Today's current cyber security systems provide an effective defense mechanism against known cyber-attacks but are not so good when it comes to defending against unknown attacks. This book describes the possible development and organization of self-healing computing based on cyber immunity techniques and aimed at working in the new realm of Industry 4.0. Industry 4.0 is the trend towards automation and data exchange in manufacturing technologies and processes which include cyber-physical systems (CPS), the internet of things (IoT), industrial internet of things (IIOT), cloud computing, cognitive computing and artificial intelligence. The book describes the author’s research and development of cyber-immunity systems that will prevent the destruction of critical information infrastructure by future unknown cyber-attacks and thus avoid the significant or catastrophic consequences of such attacks. The book is designed for undergraduate and post-graduate students, for engineers in related fields as well as managers of corporate and state structures, chief information officers (CIO), chief information security officers (CISO), architects, and research engineers in the field of cybersecurity. This book contains four chapters1. Cyber Immunity Concept of the Industry 4.0; 2. Mathematical Framework for Immune Protection of Industry 4.0; 3. Trends and prospects of the development of Immune Protection of Industry 4.0; 4. From detecting cyber-attacks to self-healing Industry 4.0;
While classical orthogonal polynomials appear as solutions to hypergeometric differential equations, those of a discrete variable emerge as solutions of difference equations of hypergeometric type on lattices. The authors present a concise introduction to this theory, presenting at the same time methods of solving a large class of difference equations. They apply the theory to various problems in scientific computing, probability, queuing theory, coding and information compression. The book is an expanded and revised version of the first edition, published in Russian (Nauka 1985). Students and scientists will find a useful textbook in numerical analysis.
Horsemen From Nowhere is a science-fiction story about the arrival on earth of mysterious rose-colored clouds from deep space. Members of the Soviet Antarctic expedition are the first to meet them in a series of inexplicable events. The "clouds" are seen to be removing the Antarctic ice-cap and carrying it off into space. They are capable of reproducing any kind of atomic structure, and this goes for human beings as well. The heroes of the story meet their "counterparts," come upon a duplicated airliner, journey through a modeled city, and fight Gestapo policemen that have been reconstructed from the past by these same mysterious "clouds."Scientists are unable to explain why terrestrial life is being modeled. All attempts to contact the space beings fail. In the end, however, Soviet scientists penetrate the enigma of the rose clouds and establish contact with a highly developed extragalactic civilization. The Abramovs are a father and son writing team. No generational animosity here, as you see! Quite the contrary. One is seventy odd years old, the other only thirty, one is a professional writer, with numerous novels, stories and essays to his credit, the other is an engineer of the breed inspired by Sputnik, and for whom all of Soviet SF that came before serves as but the launching pad for blasting off into the incredible unknown. And, indeed, everything that comes from under their pen - pens? - is steeped in the latest and most unbelievable of hypotheses, in the wildest of fantasies and conjectures
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.