Listing 1 - 10 of 10 |
Sort by
|
Choose an application
Throughout history, human societies have been organized preeminently as territories-- politically bounded regions whose borders define the jurisdiction of laws and the movement of peoples. At a time when the technologies of globalization are eroding barriers to communication, transportation, and trade, Once Within Borders explores the fitful evolution of territorial organization as a worldwide practice of human societies. Master historian Charles S. Maier tracks the epochal changes that have defined territories over five centuries and draws attention to ideas and technologies that contribute to territoriality's remarkable resilience. Territorial boundaries transform geography into history by providing a framework for organizing political and economic life. But properties of territory--their meanings and applications--have changed considerably across space and time. In the West, modern territoriality developed in tandem with ideas of sovereignty in the seventeenth century. Sovereign rulers took steps to fortify their borders, map and privatize the land, and centralize their sway over the populations and resources within their domain. The arrival of railroads and the telegraph enabled territorial expansion at home and abroad as well as the extension of control over large spaces. By the late nineteenth century, the extent of a nation's territory had become an index of its power, with overseas colonial possessions augmenting prestige and wealth and redefining territoriality. Turning to the geopolitical crises of the twentieth century, Maier pays close attention to our present moment, asking in what ways modern nations and economies still live within borders and to what degree our societies have moved toward a post-territorial world.--
Political geography --- Territory, National --- Boundaries --- Boundary disputes --- Border disputes --- Disputes, Boundary --- Territorial boundary disputes --- Borders (Geography) --- Boundary lines --- Frontiers --- Geographical boundaries --- International boundaries --- Lines, Boundary --- Natural boundaries --- Perimeters (Boundaries) --- Political boundaries --- Borderlands --- National territory --- Geography, Political --- Human geography --- History. --- Boundaries. --- Boundary disputes. --- Grenze. --- Political geography. --- Politische Geografie. --- Stati --- Territorium. --- Territory, National. --- Territorio --- Storia. --- History
Choose an application
This volume provides an in-depth discussion on the central question – how can people express and survive dissent and disagreement in confined habitats in space? The discussion is an important one because it could be that the systems of inter-dependence required to survive in space are so strong that dissent becomes impossible. John Locke originally said that people have a right to use revolution to overthrow a despotic regime. But if revolution causes violence and damage that causes depressurisation with the risk of killing many people, is it even permissible to have a revolution? How then are people to express their liberty or dissatisfaction with their rulers? The emergence of structures of dissent and disagreement is an essential part of the construction of a framework of liberty in space (revolution is just the extreme example) and thus the topic deserves in-depth and immediate attention. Even today, the way in which we assemble organisations and corporations for the government and private exploration of space must take into account the need for mechanisms to allow people to express dissent.
Psychology --- General ethics --- Social psychology --- Sociology --- International law --- Transport law --- Law --- Personality development --- Physics --- Biology --- psychologie --- sociale psychologie --- sociologie --- biologie --- ethiek --- internationaal recht --- persoonlijkheidsleer --- zeerecht --- fysica --- persoonlijkheidsontwikkeling --- ruimte (astronomie)
Choose an application
Choose an application
Choose an application
This book addresses the diagnosis and treatment of common ocular infections. Relevant pathological principles are described to provide a basis for the understanding of these disorders. The epidemiology of infection as a class of ocular disease and the pathological effects of infectious processes in tissue are discussed in introductory chapters. These fundamentals are explained and reinforced with tables and selected illustrations of tissue pathology. Further chapters by leading clinical specialists describe recommended approaches to infections of the eye and periocular tissues as these conditions occur in adults and children. Illustrative tables and algorithms enhance the discussion, making key principles accessible to the busy clinician. The final chapters provide a guide to relevant microbiological techniques, recommendations for specimen collection and transport, and a survey of antimicrobial therapy for the care of patients with ocular infectious diseases.
Medicine. --- Ophthalmology. --- Pathology. --- Medicine & Public Health. --- Eye --- Diseases. --- Diseases and defects --- Medicine --- Diseases --- Ophthalmology --- Disease (Pathology) --- Medical sciences --- Medicine, Preventive
Choose an application
Enterprise Mac Security is a definitive, expert-driven update of the popular, slash-dotted first edition which was written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, and walkthroughs on securing systems, including the new 10.11 operating system. A common misconception in the Mac community is that Mac’s operating system is more secure than others. While this might be have been true in certain cases, security on the Mac has always still been a crucial issue. With the release of OS X 10.11, the operating system is taking large strides in getting even more secure. Even still, when sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats, whether these have been exploited or not. This book caters to both the beginning home user and the seasoned security professional not accustomed to the Mac, establishing best practices for Mac OS X for a wide audience. The authors of this book are seasoned Mac and security professionals, having built many of the largest network infrastructures for Apple and spoken at both DEFCON and Black Hat on OS X security. What You Will Learn The newest security techniques on Mac OS X from the best and brightest Security details of Mac OS X for the desktop and server, and how to secure these systems The details of Mac forensics and Mac hacking How to tackle Apple wireless security Who This Book Is For This book is for new users, switchers, power users, and administrators that need to make sure their Mac systems are secure.
Computer Science --- Engineering & Applied Sciences --- Computer security. --- Mac OS. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Macintosh Operating System --- Mac OS Sierra --- Mac OS X (Operating system) --- Mac OS X Leopard --- Mac OS X Lion --- Mac OS X Snow Leopard --- Mac OS X Mountain Lion --- Mac OS X Yosemite --- Protection of computer systems --- Protection --- Computer science. --- Computer Science. --- Computer Science, general. --- Informatics --- Science --- Data protection --- Security systems --- Hacking --- Apple computer. --- Apple and iOS. --- Microcomputers
Choose an application
Enterprise Mac Security is a definitive, expert-driven update of the popular, slash-dotted first edition which was written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, and walkthroughs on securing systems, including the new 10.11 operating system. A common misconception in the Mac community is that Mac’s operating system is more secure than others. While this might be have been true in certain cases, security on the Mac has always still been a crucial issue. With the release of OS X 10.11, the operating system is taking large strides in getting even more secure. Even still, when sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats, whether these have been exploited or not. This book caters to both the beginning home user and the seasoned security professional not accustomed to the Mac, establishing best practices for Mac OS X for a wide audience. The authors of this book are seasoned Mac and security professionals, having built many of the largest network infrastructures for Apple and spoken at both DEFCON and Black Hat on OS X security. What You Will Learn The newest security techniques on Mac OS X from the best and brightest Security details of Mac OS X for the desktop and server, and how to secure these systems The details of Mac forensics and Mac hacking How to tackle Apple wireless security Who This Book Is For This book is for new users, switchers, power users, and administrators that need to make sure their Mac systems are secure.
Computer science --- Computer. Automation --- draadloze computernetwerken --- computers --- informatica --- computerkunde --- Apple computer. --- Computer science. --- Apple and iOS. --- Computer Science, general. --- Mac OS.
Choose an application
This book addresses the diagnosis and treatment of common ocular infections. Relevant pathological principles are described to provide a basis for the understanding of these disorders. The epidemiology of infection as a class of ocular disease and the pathological effects of infectious processes in tissue are discussed in introductory chapters. These fundamentals are explained and reinforced with tables and selected illustrations of tissue pathology. Further chapters by leading clinical specialists describe recommended approaches to infections of the eye and periocular tissues as these conditions occur in adults and children. Illustrative tables and algorithms enhance the discussion, making key principles accessible to the busy clinician. The final chapters provide a guide to relevant microbiological techniques, recommendations for specimen collection and transport, and a survey of antimicrobial therapy for the care of patients with ocular infectious diseases.
Pathology --- Ophthalmology --- pathologie --- besmettelijke ziekten --- oftalmologie
Choose an application
Choose an application
Listing 1 - 10 of 10 |
Sort by
|