A Secret Shared...


Book Description

Is a secret halved…? High-flying oncologist professor Jack Kincaid isn't convinced by the treatment offered at Dolphin Bay Healing Resort. But if there's the slightest possibility that dolphins can help his little nephew Harry, he needs to give it a chance! Especially when he recognizes beautiful therapist Dr. Kate Martin—the woman he once knew as Cathy! Jack can't help but be intrigued, and he's just as attracted to her as he always was. And when Kate reveals to him the devastating secret that she will do anything to escape, not only does she share her burden, but she starts to open up Jack's locked-away heart, too….




SECRET Shared


Book Description

The romantic, adventurous, and sexually charged sequel to the sizzling bestseller SECRET, where women’s sexual fantasies become reality. “[SECRET] will have you unleashing your inner goddess.”—Romantic Times Still wounded from a recent heartbreak over her boss and lover, Will, Cassie Robichaud throws herself into service with S.E.C.R.E.T., the mysterious organization that changed her forever by bringing her deepest sexual fantasies to life, one step at a time. Now, it’s Cassie’s turn to guide the group’s newest candidate, Dauphine Mason, recruiting men to execute a new set of fantasies. At thirty-one, Dauphine is the proprietor of a New Orleans vintage clothing store. She’s been harboring a crush on Mark Drury, a local rock star, but is too shy to put herself out there with him. She turns to S.E.C.R.E.T. to reignite her sexual flame and find the confidence to risk her heart again with another man. As Cassie worries that the right time will never come for her and Will, she finds inspiration helping Dauphine in S.E.C.R.E.T. Both women navigate the rocky path between their hearts and their passions, hoping to discover what they truly want in life and in love. Don’t miss any of L. Marie Adeline’s steamy S∙E∙C∙R∙E∙T series: SECRET • SECRET SHARED • SECRET REVEALED




A Secret Shared


Book Description

Newbery Medal–winning author Patricia MacLachlan paints a moving portrait of what it means to be a family, the power of love, and the importance of bringing the truth out into the light, in this beautiful and profound story about adoption. Nora and Ben’s younger sister Birdy loves to keep secrets. She surprises her family more than once: She hides a kitten in her room. She writes a beautiful poem. One day Birdy watches her mother spit into a tube, ready to send it off to find out more about herself and where her family came from. Birdy spits into a tube, too, when no one sees her. But when the test results come back, they are a surprise. Birdy is seemingly not related to Nora and Ben’s parents. But if she is adopted, how could that have happened without the children knowing? Nora and Ben must learn when to keep a secret, and who to go to for help—and eventually, how to solve this secret for the entire family.




Others


Book Description

This volume fulfills the author's career-long reflections on radical otherness in literature. J. Hillis Miller investigates otherness through ten nineteenth- and twentieth-century authors: Friedrich Schlegel, Charles Dickens, George Eliot, Anthony Trollope, Joseph Conrad, W. B. Yeats, E. M. Forster, Marcel Proust, Paul de Man, and Jacques Derrida. From the exquisite close readings for which he is celebrated, Miller reaps a capacious understanding of otherness--one reachable not through theory but through literature itself. Otherness has wide valence in contemporary literary and cultural studies and is often understood as a misconception by hegemonic groups of subaltern ones. In a pleasing counter to this, Others conceives of otherness as something that inhabits sameness. Instances of the ''wholly other'' within the familiar include your sense of self or your beloved, your sense of your culture as such, or your experience of literary, theoretical, and philosophical works that belong to your own culture--works that are themselves haunted by otherness. Though Others begins and ends with chapters on theorists, the testimony they offer about otherness is not taken as more compelling than that of such literary works as Dicken's Our Mutual Friend, Conrad's ''The Secret Sharer,'' Yeats's ''Cold Heaven,'' or Proust's Remembrance of Things Past. Otherness, as this book finds it in the writers read, is not an abstract concept. It is an elusive feature of specific verbal constructs, different in each case. It can be glimpsed only through close readings that respect this diversity, as the plural in the title--Others--indicates. We perceive otherness in the way that the unseen--and the characters' emotional responses to it--ripples the conservative ideological surface of Howard's End. We sense it as chaos in Schlegel's radical concept of irony. And we gaze at it in the multiple personifications of Heart of Darkness. Each testifies in its own way to the richness and tangible weight of an otherness close at hand.




An Introduction to Secret Sharing


Book Description

This book provides an introduction to secret sharing, a key technology for practical applications and higher-level cryptographic protocols. This survey analyzes existing work, and systematically presents secret sharing protocols for various adversary models. It provides intuitive as well as formal descriptions of the different types of adversaries, including their computational powers and capabilities. In addition, it then offers guidance and support in selecting the appropriate type of protocol for a given application domain, present representative protocols, and provide useful references for further reading and research. This book aims to support software developers and engineers in realizing highly secure cloud-based applications, and also provides an introduction to the field including some relevant technical background for interested students and computer scientists.




Information Security


Book Description

This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISC 2014, held in Hong Kong, China, in October 2014. The 20 revised full papers presented together with 16 short papers and two invited papers were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on public-key encryption, authentication, symmetric key cryptography, zero-knowledge proofs and arguments, outsourced and multi-party computations, implementation, information leakage, firewall and forensics, Web security, and android security.




Blockchain and Trustworthy Systems


Book Description

This book constitutes the thoroughly refereed post conference papers of the First International Conference on Blockchain and Trustworthy Systems, Blocksys 2019, held in Guangzhou, China, in December 2019. The 50 regular papers and the 19 short papers were carefully reviewed and selected from 130 submissions. The papers are focus on Blockchain and trustworthy systems can be applied to many fields, such as financial services, social management and supply chain management.




Information Security


Book Description

This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC 2011, held in Xi'an, China, in October 2011. The 25 revised full papers were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on attacks; protocols; public-key cryptosystems; network security; software security; system security; database security; privacy; digital signatures.




Big Data


Book Description

Although there are already some books published on Big Data, most of them only cover basic concepts and society impacts and ignore the internal implementation details-making them unsuitable to R&D people. To fill such a need, Big Data: Storage, Sharing, and Security examines Big Data management from an R&D perspective. It covers the 3S desi




Information Systems Security


Book Description

This book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, India, in December 2016. The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 196 submissions. The papers address the following topics: attacks and mitigation; authentication; authorization and information flow control; crypto systems and protocols; network security and intrusion detection; privacy; software security; and wireless, mobile and IoT security.