Narrow your search
Listing 1 - 5 of 5
Sort by
Guerrillas and terrorists
Author:
ISBN: 0821440098 0585075751 9780585075754 082140590X 9780821405901 0821405926 9780821405925 9780821440094 Year: 1980 Publisher: Chicago Ohio University Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Terrorism and guerrilla warfare, whether justified as resistance to oppression or condemned as disrupting the rule of law, are as old as civilization itself. The power of the terrorist, however, has been magnified by modern weapons, including television, which he has learned to exploit. To protect itself, society must understand the terrorist and what he is trying to do; thus Dr. Clutterbuck's purpose in writing this book: "to contribute to the understanding and cooperation between the police, the public and the media."


Book
Missionare der Gewalt : Lebensläufe deutscher Terroristen im Kaiserreich
Authors: ---
ISBN: 3783210801 Year: 1980 Publisher: Heidelberg Kriminalistik Verlag

Set theory and its logic
Author:
ISBN: 0674042425 9780674042421 9780674802070 9780674165496 0196266106 9780196266107 0674165497 0674802071 0674802063 0674262492 Year: 1980 Publisher: Cambridge (Mass.): Belknap,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Meg Logan has not been farther than two miles from home in six years. She has agoraphobia, a debilitating anxiety disorder that entraps its sufferers in the fear of leaving safe havens such as home. Paradoxically, while at this safe haven, agoraphobics spend much of their time ruminating over past panic experiences and imagining similar hypothetical situations. In doing so, they create a narrative that both describes their experience and locks them into it. Constructing Panic offers an unprecedented analysis of one patient's experience of agoraphobia. In this novel interdisciplinary collaboration between a clinical psychologist and a linguist, the authors probe Meg's stories for constructions of emotions, actions, and events. They illustrate how Meg uses grammar and narrative structure to create and recreate emotional experiences that maintain her agoraphobic identity. In this work Capps and Ochs propose a startling new view of agoraphobia as a communicative disorder. Constructing Panic opens up the largely overlooked potential for linguistic and narrative analysis by revealing the roots of panic and by offering a unique framework for therapeutic intervention. Readers will find in these pages hope for managing panic through careful attention to how we tell the story of our lives.

Infinite matrices of operators
Author:
ISBN: 0387097635 1441935304 9786611875749 1281875740 0387097643 3540097635 3540386513 3540097643 3540389466 9783540097648 Year: 1980 Volume: 786 Publisher: Berlin: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The ease of access, relative anonymity, and borderless nature of the Internet has allowed widespread computer-based crime – or cybercrime – to proliferate rapidly. Law enforcement and international security organizations, along with governments and the private sector, have only recently begun to appreciate the scope, severity and transnational nature of this problem. In recent years, organizations have begun to emerge and evolve in a progressively collaborative ecosystem of vested international bodies seeking to address these challenges in unique, innovative ways. This study attempts to address a series of questions regarding the current state of cyber security. What does the international landscape of cyber security look like today? What are these organizations actually doing? Are they succeeding? What measureable progress has been made in developing a supportive ecosystem of global cyber security? Are these organizations presenting practical, innovative, collaborative, and sustainable solutions to address these issues? Global Initiatives to Secure Cyberspace: An Emerging Landscape is designed for a professional audience composed of researchers, practitioners and the government, focusing on a secure cyberspace industry. Advanced-level students in computer science will also find this book suitable. .

Keywords

Cartography --Data processing --Congresses. --- Computer graphics --Congresses. --- Image processing --Congresses. --- Optical data processing --Congresses. --- Computer security --- Computer networks --- Cyberterrorism --- Telecommunications --- Computer Science --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Security measures --- Prevention --- Computer security. --- Security measures. --- Prevention. --- Attacks on computers --- Computer attacks --- Cyber attacks --- Cyber terrorism --- Cyber war --- Cyberwarfare --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Computer network security --- Network security, Computer --- Security of computer networks --- Protection of computer systems --- Protection --- 681.3*I42 --- #TCPW P4.5 --- 681.3*I33 --- Compression (coding): approximate methods exact coding (Image processing)--See also {681.3*E4} --- Database management: security integrity protection--See also {?681.5*E5} --- Picture/image generation: digitizing and scanning display algorithms viewing algorithms (Computer graphics) --- Graphics utilities: picture desciption languages software support (Computer graphics) --- 681.3*I34 Graphics utilities: picture desciption languages software support (Computer graphics) --- 681.3*I33 Picture/image generation: digitizing and scanning display algorithms viewing algorithms (Computer graphics) --- 681.3*H2m Database management: security integrity protection--See also {?681.5*E5} --- 681.3*I42 Compression (coding): approximate methods exact coding (Image processing)--See also {681.3*E4} --- Infinite matrices. --- Summability theory. --- Computer science. --- Computer organization. --- Computer communication systems. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer Science. --- Systems and Data Security. --- Computer Communication Networks. --- Data Encryption. --- Information Systems Applications (incl. Internet). --- Data Structures, Cryptology and Information Theory. --- Computer Systems Organization and Communication Networks. --- Information systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Organization, Computer --- Informatics --- Science --- Distributed processing --- #TCPW P4.0 --- #TCPW P4.2 --- 681.3*A0 --- 681.3*H2m --- 681.3*I34 --- 681.3*I34 Graphics utilities: picture desciption languages; software support (Computer graphics) --- Graphics utilities: picture desciption languages; software support (Computer graphics) --- 681.3*I33 Picture/image generation: digitizing and scanning; display algorithms; viewing algorithms (Computer graphics) --- Picture/image generation: digitizing and scanning; display algorithms; viewing algorithms (Computer graphics) --- 681.3*A0 General --- General --- 681.3*I42 Compression (coding): approximate methods; exact coding (Image processing)--See also {681.3*E4} --- Compression (coding): approximate methods; exact coding (Image processing)--See also {681.3*E4} --- 681.3*H2m Database management: security; integrity; protection--See also {?681.5*E5} --- Database management: security; integrity; protection--See also {?681.5*E5} --- Operator theory --- Computer crimes --- Terrorism --- Operator theory. --- Computer graphics --- Cartography --- Infographie --- Cartographie --- Data processing --- Informatique --- Data structures (Computer scienc. --- Computer network architectures. --- Cryptology. --- Data Structures and Information Theory. --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Computer vision. --- Models and Principles. --- Image Processing and Computer Vision. --- Machine vision --- Vision, Computer --- Artificial intelligence --- Image processing --- Pattern recognition systems --- Matrices. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Matrices --- Théorèmes taubériens --- Suites et series --- Sommabilite

Listing 1 - 5 of 5
Sort by