Title:
Jokes and targets Christie Davies.
Author:
Davies, Christie.
ebrary, Inc.
General Notes:
Includes bibliographical references and index.
Introduction : why study jokes and targets? -- Mind over matter: a general theory of jokes about the stupid and the canny -- Blondes, sex, and the French -- Jewish women and Jewish men -- Sex between men : places, occupations, and classes -- The great American lawyer joke cycle -- The rise of the Soviet joke and the fall of the Soviet Union -- Conclusion.
Electronic reproduction. Palo Alto, Calif. : ebrary, 2011. Available via World Wide Web. Access may be limited to ebrary affiliated libraries.
Publisher:
Indiana University Press,
Publication Place:
Bloomington [Ind.] :
ISBN:
9780253356192 (cloth : alk. paper)
9780253223029 (pbk. : alk. paper)
9780253001726 (e-book)
Subject:
Wit and humor -- Social aspects.
Wit and humor -- Psychological aspects.
Wit and humor -- Political aspects.
Electronic books.
Contents:
Introduction : why study jokes and targets? -- Mind over matter: a general theory of jokes about the stupid and the canny -- Blondes, sex, and the French -- Jewish women and Jewish men -- Sex between men : places, occupations, and classes -- The great American lawyer joke cycle -- The rise of the Soviet joke and the fall of the Soviet Union -- Conclusion.
Physical Description:
x, 314 p.
Electronic Location:
http://site.ebrary.com/lib/excellence/Doc?id=10481740
Publication Date:
2011.
Title:
J. Metals
Journal of Metals.
JOM.
JOM (Warrendale, Pa. : 1989).
General Notes:
Chemical abstracts
Engineering index annual
Engineering index monthly
International aerospace abstracts
Nuclear science abstracts
Selected water resources abstracts
Publisher:
Metallurgical Society of AIME,
Publication Place:
New York, etc.,
ISSN:
0148-6608
Subject:
Metals -- Periodicals.
Metallurgy -- Periodicals.
Physical Description:
12 v. ill.
Location/SubLocation:
JUST
AABU
YU
Publication Date:
1977-1988.
Title:
J. Metals
Journal of Metals.
JOM.
JOM (Warrendale, Pa. : 1989).
General Notes:
Chemical abstracts
Engineering index annual
Engineering index monthly
International aerospace abstracts
Nuclear science abstracts
Selected water resources abstracts
Publisher:
Metallurgical Society of AIME,
Publication Place:
New York, etc.,
ISSN:
0148-6608
Subject:
Metals -- Periodicals.
Metallurgy -- Periodicals.
Physical Description:
12 v. ill.
Location/SubLocation:
JUST
AABU
YU
Publication Date:
1977-1988.
Title:
Jonathan Dean Pioneer in Détente in Europe, Global Cooperative Security, Arms Control and Disarmament / edited by Hans Günter Brauch, Teri Grimwood.
SpringerBriefs on Pioneers in Science and Practice,
SpringerBriefs on Pioneers in Science and Practice,
Author:
Brauch, Hans Günter. editor.
Grimwood, Teri. editor.
SpringerLink (Online service)
General Notes:
Biography Jonathan Dean.- Bibliography of Jonathan Dean’s Work -- Beyond First Use (1982) -- MBFR: From Apathy to Accord (1983) -- Alternative Defense: Answer to NATO’s Central Front Problems? (1987/1988) -- Berlin (1988) -- A Crisis Management Center in Europe: Institutional Arrangements (1989) -- Conventional Arms Control in Europe (1990) -- Components of a Post-Cold War Security System for Europe (1990/1992) -- Arms Reduction Blueprint (1991).
Jonathan Dean (1924-2014) was a distinguished U.S. diplomat (1950-1980) and from 1984 to 2007 global security adviser to the Union of Concerned Scientists, Washington, D.C. During the 1980s and 1990s he was a pioneering conceptual thinker, writer and speaker on détente in Europe, global cooperative security, arms control and disarmament. He authored: Watershed in Europe (1987), Meeting Gorbachev’s Challenge (1989) and Ending Europe’s Wars (1994). This volume contains his biography and bibliography, six texts on détente and arms control in Europe in the 1980s: Beyond First Use; MBFR; Alternative Defence; Berlin; A Crisis Management Center; Conventional Arms Control in Europe and six texts on the new security order in Europe since the 1990s: Components of a Post-Cold War Security System for Europe; Constraining Technological Weapons Innovation; NATO Enlargement: Act II; Ten Years after the Wall; Future Security in Space; Rethinking Security: Return to the Grotean Pattern.
Publisher:
Springer International Publishing : Imprint: Springer,
Publication Place:
Cham :
ISBN:
9783319066622
Subject:
Political science.
History.
Political Science and International Relations.
Political science.
History of Science.
Series:
SpringerBriefs on Pioneers in Science and Practice, 19
SpringerBriefs on Pioneers in Science and Practice, 19
Contents:
Biography Jonathan Dean.- Bibliography of Jonathan Dean’s Work -- Beyond First Use (1982) -- MBFR: From Apathy to Accord (1983) -- Alternative Defense: Answer to NATO’s Central Front Problems? (1987/1988) -- Berlin (1988) -- A Crisis Management Center in Europe: Institutional Arrangements (1989) -- Conventional Arms Control in Europe (1990) -- Components of a Post-Cold War Security System for Europe (1990/1992) -- Arms Reduction Blueprint (1991).
Physical Description:
XXI, 225 p. 32 illus., 16 illus. in color. online resource.
Electronic Location:
http://dx.doi.org/10.1007/978-3-319-06662-2
Publication Date:
2014.
Title:
Jonathan Edwards a life / George M. Marsden.
Author:
Marsden, George M., 1939-
ebrary, Inc.
General Notes:
Includes bibliographical references (p. [515]-600) and index.
A time to be born -- The overwhelming question -- The Pilgrim's Progress -- The harmony of all knowledge -- Anxieties -- "A low, sunk estate and condition" -- On Solomon Stoddard's stage -- And on a wider stage -- The mighty works of God and of Satan -- The politics of the Kingdom -- "A city set on a hill" -- God "will revive the flame again, even in the darkest times" -- The hands of God and the hand of Christ -- "He that is not with us is against us" -- Heavenly Elysium -- Conservative revolutionary -- A house divided -- A model town no more -- Colonial wars -- Thy will be done -- I am born to be a man of strife -- The crucible -- The mission -- Frontier struggles -- Wartice -- Against an "almost inconceivably pernicious" doctrine -- Original sin "in this happy age of light and liberty" -- Challenging the presumptions of the Age -- The unfinished masterworks -- The transitory and the enduring.
Electronic reproduction. Palo Alto, Calif. : ebrary, 2013. Available via World Wide Web. Access may be limited to ebrary affiliated libraries.
Publisher:
Yale University Press,
Publication Place:
New Haven :
ISBN:
0300096933 (alk. paper)
Subject:
Congregational churches -- United States -- Clergy -- Biography.
Electronic books.
Edwards, Jonathan, 1703-1758.
Contents:
A time to be born -- The overwhelming question -- The Pilgrim's Progress -- The harmony of all knowledge -- Anxieties -- "A low, sunk estate and condition" -- On Solomon Stoddard's stage -- And on a wider stage -- The mighty works of God and of Satan -- The politics of the Kingdom -- "A city set on a hill" -- God "will revive the flame again, even in the darkest times" -- The hands of God and the hand of Christ -- "He that is not with us is against us" -- Heavenly Elysium -- Conservative revolutionary -- A house divided -- A model town no more -- Colonial wars -- Thy will be done -- I am born to be a man of strife -- The crucible -- The mission -- Frontier struggles -- Wartice -- Against an "almost inconceivably pernicious" doctrine -- Original sin "in this happy age of light and liberty" -- Challenging the presumptions of the Age -- The unfinished masterworks -- The transitory and the enduring.
Physical Description:
xx, 615 p. : ill.
Electronic Location:
http://site.ebrary.com/lib/excellence/Doc?id=10170810
Publication Date:
c2003.
Title:
Security strategies in Linux platforms and applications / Michael Jang and Ric Messier.
Jones & Bartlett Learning information systems security & assurance series
Linux.
Linux.
Jones & Bartlett Learning information systems security & assurance series.
Author:
Jang, Michael H.
Messier, Ric.
General Notes:
Includes bibliographical references and index.
Security threats to Linux -- Basic components of Linux security -- Basic security : facilities through the boot process -- User privileges and permissions -- Filesystems, volumes, and encryption -- Every service is a potential risk -- Networks, firewalls, and more -- Networked filesystems and remote access -- Networked application security -- Kernel security risk mitigation -- Managing security alerts and updates -- Building and maintaining a security baseline -- Testing and reporting -- Detecting and responding to security breaches -- Best practices and emerging technologies.
"The Second Edition of Security Strategies in Linux Platforms and Applications opens with a discussion of risks, threats, and vulnerabilities. Part 2 discusses how to take advantage of the layers of security and the modules associated with AppArmor and SELinux. Part 3 looks at the use of open source and proprietary tools when building a layered security strategy"--
Publisher:
Jones & Bartlett Learning,
Publication Place:
Burlington, MA :
ISBN:
9781284090659
1284090655
Subject:
Operating systems (Computers)
Computer security.
Computer security.
Operating systems (Computers)
Linux.
Linux.
Series:
Jones & Bartlett Learning information systems security & assurance series
Jones & Bartlett Learning information systems security & assurance series.
Edition:
Second edition.
Contents:
Security threats to Linux -- Basic components of Linux security -- Basic security : facilities through the boot process -- User privileges and permissions -- Filesystems, volumes, and encryption -- Every service is a potential risk -- Networks, firewalls, and more -- Networked filesystems and remote access -- Networked application security -- Kernel security risk mitigation -- Managing security alerts and updates -- Building and maintaining a security baseline -- Testing and reporting -- Detecting and responding to security breaches -- Best practices and emerging technologies.
Physical Description:
xxiii, 514 pages : illustrations ;
Publication Date:
[2017]
أ2017
Title:
Security strategies in Linux platforms and applications / Michael Jang and Ric Messier.
Jones & Bartlett Learning information systems security & assurance series
Linux.
Linux.
Jones & Bartlett Learning information systems security & assurance series.
Author:
Jang, Michael H.
Messier, Ric.
General Notes:
Includes bibliographical references and index.
Security threats to Linux -- Basic components of Linux security -- Basic security : facilities through the boot process -- User privileges and permissions -- Filesystems, volumes, and encryption -- Every service is a potential risk -- Networks, firewalls, and more -- Networked filesystems and remote access -- Networked application security -- Kernel security risk mitigation -- Managing security alerts and updates -- Building and maintaining a security baseline -- Testing and reporting -- Detecting and responding to security breaches -- Best practices and emerging technologies.
"The Second Edition of Security Strategies in Linux Platforms and Applications opens with a discussion of risks, threats, and vulnerabilities. Part 2 discusses how to take advantage of the layers of security and the modules associated with AppArmor and SELinux. Part 3 looks at the use of open source and proprietary tools when building a layered security strategy"--
Publisher:
Jones & Bartlett Learning,
Publication Place:
Burlington, MA :
ISBN:
9781284090659
1284090655
Subject:
Operating systems (Computers)
Computer security.
Computer security.
Operating systems (Computers)
Linux.
Linux.
Series:
Jones & Bartlett Learning information systems security & assurance series
Jones & Bartlett Learning information systems security & assurance series.
Edition:
Second edition.
Contents:
Security threats to Linux -- Basic components of Linux security -- Basic security : facilities through the boot process -- User privileges and permissions -- Filesystems, volumes, and encryption -- Every service is a potential risk -- Networks, firewalls, and more -- Networked filesystems and remote access -- Networked application security -- Kernel security risk mitigation -- Managing security alerts and updates -- Building and maintaining a security baseline -- Testing and reporting -- Detecting and responding to security breaches -- Best practices and emerging technologies.
Physical Description:
xxiii, 514 pages : illustrations ;
Publication Date:
[2017]
أ2017
Title:
Fundamentals of information systems security / David Kim, Michael G. Solomon.
ISSA, Information systems security & assurance series
Jones & Bartlett Learning information systems security & assurance series.
Author:
Kim, David (Information technology security consultant), author.
Solomon, Michael (Michael G.), 1963- author.
General Notes:
Includes bibliographical references (pages 522-526) and index.
Preface -- Acknowledgements -- The authors -- Part I. The Need for Information Security : -- 1. Information Systems Security -- 2. The Internet of Things is Changing How We Live -- 3. Malicious Attacks, Threats, and Vulnerabilities -- 4. The Drivers of the Information Security Business -- Part II. Securing Today's Information Systems : -- 5. Access controls -- 6. Security Operations and Administration -- 7. Auditing, Testing, and Monitoring -- 8. Risk, Response, and Recovery -- 9. Cryptography -- 10. Networks and Telecommunications -- 11. Malicious Code and Activity -- Part III. Information Security Standards, Education, Certifications, and Laws : -- 12. Information Security Standards -- 13. Information Systems Security Education and Training -- 14. Information Security Professional Certifications -- 15. U.S. Compliance Laws -- Appendix A. Answer key -- Appendix B. Standard acronyms -- Appendix C. Earning the CompTIA security + certification -- Glossary of key terms -- References -- Index.
"Revised and updated with the latest data in the field, Fundamentals of Information Systems Security, Third Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vulnerabilities associated with the transition to a digital world. Part 2 presents a high level overview of the Security+ Exam and provides students with information as they move toward this certification. The book closes with information on information security standards, education, professional certifications, and compliance laws."--Publisher's website.
Publisher:
Jones & Bartlett Learning,
Publication Place:
Burlington, MA :
ISBN:
9781284116458
128411645X
Subject:
Computer security.
Information resources -- Security measures.
Computer security.
Series:
ISSA, Information systems security & assurance series
Jones & Bartlett Learning information systems security & assurance series.
Edition:
Third edition.
Contents:
Preface -- Acknowledgements -- The authors -- The Need for Information Security : -- Information Systems Security -- The Internet of Things is Changing How We Live -- Malicious Attacks, Threats, and Vulnerabilities -- The Drivers of the Information Security Business -- Securing Today's Information Systems : -- Access controls -- Security Operations and Administration -- Auditing, Testing, and Monitoring -- Risk, Response, and Recovery -- Cryptography -- Networks and Telecommunications -- Malicious Code and Activity -- Information Security Standards, Education, Certifications, and Laws : -- Information Security Standards -- Information Systems Security Education and Training -- Information Security Professional Certifications -- U.S. Compliance Laws -- Appendix A. Answer key -- Appendix B. Standard acronyms -- Appendix C. Earning the CompTIA security + certification -- Glossary of key terms -- References -- Index.
Physical Description:
xxii, 548 pages ;
Formatted Contents Note:
Part I. 1. 2. 3. 4. Part II. 5. 6. 7. 8. 9. 10. 11. Part III. 12. 13. 14. 15.
Publication Date:
[2018]