| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA990002733180403321 |
|
|
Autore |
Bergen, Garret Lawrence |
|
|
Titolo |
Organizational Relations and Management A ction. / by G.L. Berger and W.V. Haney. |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
New York : McGraw-Hill, 1966 |
|
|
|
|
|
|
|
Locazione |
|
|
|
|
|
|
Collocazione |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
2. |
Record Nr. |
UNISA996389151603316 |
|
|
Autore |
Champante John, Sir, <d. 1708.> |
|
|
Titolo |
The case of Sr John Champante, Kt. respond [[electronic resource] ] : to the appeal of Sir Robert Dashwood, Knight and Baronet, Sir Samuel Dashwood Kt. John Perry and Edward Noel, surviving executors of George Dashwood, Esq; deceased appellants |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Altri autori (Persone) |
|
DashwoodRobert, Sir, <1662-1734.> |
|
|
|
|
|
|
Soggetti |
|
Finance, Public - Ireland |
Complex litigation - England |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Lpro copy found with items from the 1680s; May 1685 is latest date in text. |
Reproduction of original in the Folger Shakespeare Library, Washington, D.C. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
|
|
|
|
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910969847903321 |
|
|
Titolo |
Consequences and control / / Albert J. Reiss, Jr., and Jeffrey A. Roth, editors |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Washington, D.C., : National Academy Press, 1994 |
|
|
|
|
|
|
|
ISBN |
|
9786610193585 |
9781280193583 |
1280193581 |
9780309586801 |
0309586801 |
9780585030227 |
0585030227 |
|
|
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (viii, 397 pages) : illustrationa |
|
|
|
|
|
|
Collana |
|
Understanding and preventing violence ; ; v.4 |
|
|
|
|
|
|
Altri autori (Persone) |
|
ReissAlbert J |
RothJeffrey A. <1945-> |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Violence - United States - Prevention |
Violence - United States |
Violent crimes - United States |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
"Panel on the Understanding and Control of Violent Behavior, Committee on Law and Justice, Commission on Behavioral and Social Sciences and Education, National Research Council." |
|
|
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and indexes. |
|
|
|
|
|
|
Nota di contenuto |
|
Understanding and Preventing Violence -- Copyright -- Contents -- Foreword -- Public Perceptions and Reactions to Violent Offending and Victimization -- INTRODUCTION -- FEAR OF VICTIMIZATION -- CONCEPTUAL ISSUES -- MEASURING FEAR -- SURVEY RESEARCH ON FEAR -- OFFENSE-SPECIFIC FEAR -- SOCIAL DISTRIBUTION OF FEAR -- OTHER CORRELATES -- CUES TO DANGER -- Dangerous Places -- Dangerous Persons -- Other Cues -- FEAR AND PRIOR VICTIMIZATION -- CONSEQUENCES OF FEAR -- SURVEY DATA ON THE CONSEQUENCES OF FEAR -- COLLECTIVE RESPONSES -- FEAR IN BROADER CONTEXT -- SOURCES OF INFORMATION ON VIOLENCE -- NEWS COVERAGE OF CRIME -- CRITICISMS OF MEDIA NEWS COVERAGE -- CRIME AS ENTERTAINMENT -- EFFECTS OF MEDIA COMMUNICATIONS -- |
|
|
|
|
|
|
|
|
|
INTERPERSONAL DIFFUSION OF CRIME NEWS -- PERCEIVED SERIOUSNESS OF OFFENSES -- PUBLIC OPINION ON CRIMINAL JUSTICE -- NORMATIVE EVALUATIONS OF PUNISHMENT -- VICTIM, OFFENDER, AND RESPONDENT CHARACTERISTICS -- ETHNOPENOLOGIES -- PUBLIC CONFIDENCE IN THE CRIMINAL JUSTICE SYSTEM -- FUTURE RESEARCH -- FEAR OF VICTIMIZATION -- OTHER ISSUES -- NOTE -- REFERENCES -- The Costs and Consequences of Violent Behavior in the United States -- INTRODUCTION -- IMPORTANCE OF ESTIMATING COSTS -- Comparison of Aggregate Crime Costs to Other Social Ills -- Comparison of Harm by Type of Victimization -- Benefit-Cost Analysis of Policy Options -- CONCEPTUAL FRAMEWORK FOR ESTIMATING COSTS AND CONSEQUENCES -- MONETARY VERSUS NONMONETARY COSTS -- Interdependency of Cost Categories -- Offsetting Benefits of Victimization -- Efficient Versus Inefficient Costs -- Fixed, Average, and Marginal Costs -- Real Versus Opportunity Costs -- Victim Assistance and Other Cost-Reducing Costs -- Time Frame for Cost Estimation -- COSTS AND CONSEQUENCES OF VIOLENT BEHAVIOR -- Direct Consequences of Violent Behavior -- Society's Response to Violent Behavior -- Offender Costs. |
COST OF CRIME AND INJURY LITERATURE -- Approaches to Measuring the Cost of Injury -- Cost of Crime Literature -- Cost of Injury Literature -- THE COST OF VIOLENT BEHAVIOR -- COST OF VICTIM TREATMENT AND OTHER DIRECT COSTS -- Medical Care -- Mental Health Care -- Monetary Losses to Victims: Cash and Property -- Indirect Monetary and Nonmonetary Losses -- EMERGENCY RESPONSE TO VICTIMIZATION -- Victim Services -- Police Response Administrative Costs -- Emergency Transport -- VICTIM PRODUCTIVITY COSTS -- PROGRAM ADMINISTRATION COSTS -- Health and Life Insurance Claims -- Income Transfer Programs -- Property Insurance Claims -- Legal Costs Associated With Tort Claims -- Pain, Suffering, and Quality of Life Costs for Nonfatal Victims -- Evidence Using the Compensation Approach -- Evidence Using Willingness to Pay -- RISK OF DEATH -- QUALITY OF LIFE OF FAMILY MEMBERS OF VICTIM -- Increased Work Load of Family Members -- Loss of Companionship/Consortium -- Psychological Injury to Family Member -- PSYCHOLOGICAL TRAUMA TO WITNESSES OF VIOLENT BEHAVIOR -- INJURIES CAUSED BY EARLIER VICTIMS -- COST OF SOCIETY'S RESPONSE TO VIOLENT BEHAVIOR -- PRECAUTIONARY MEASURES AND FEAR OF CRIME -- Monetary Expenditures for Crime Prevention -- Crime Prevention Behavior -- Fear of Crime -- CRIMINAL JUSTICE SYSTEM COSTS -- Investigation, Prosecution, and Court-Related Costs -- Legal Fees Associated With Criminal Justice System -- Cost of Sanctions -- Victim and Witness Interaction With Criminal Justice System -- OTHER NONCRIMINAL JUSTICE PROGRAMS -- INCARCERATED OFFENDER COSTS -- COST OF "OVERDETERRENCE -- COST OF "JUSTICE -- OFFENDER COSTS -- SUMMARY OF COST ESTIMATES -- WHO PAYS FOR VICTIM INJURIES? -- SUMMARY OF RESULTS AND SUGGESTIONS FOR FUTURE RESEARCH -- ACKNOWLEDGMENTS -- NOTES -- REFERENCES. |
Violence and Intentional Injuries: Criminal Justice and Public Health Perspectives on an Urgent National Problem -- INTRODUCTION -- CRIMINAL VIOLENCE" AND "INTENTIONAL INJURIES": DIFFERENT PERCEPTIONS OF A SHARED CONCERN -- THE COMMON CONCERN: INTERPERSONAL VIOLENCE -- SIGNIFICANT ASPECTS OF INTERPERSONAL VIOLENCE -- Criminal Justice Emphasis on the Offender -- Public Health Focus on the Victim -- PROBLEMS RELATED TO INTERPERSONAL VIOLENCE -- Violence and "Nonviolent" Crimes -- Violence and Relationships -- TOWARD A SYNTHESIS -- ''INTENTIONS OF OFFENDERS" AND "RISK FACTORS FOR VIOLENCE": TWO DIFFERENT |
|
|
|
|
|
|
|
|
CAUSAL PARADIGMS -- CRIMINAL JUSTICE: THE INTENTIONS OF OFFENDERS -- PUBLIC HEALTH: AN EPIDEMIOLOGIC APPROACH -- Vectors, Hosts, and Environments -- Timing of Interventions -- Complex Sociological Prevention -- SOCIOLOGICAL AND CRIMINOLOGICAL ANALYSES -- Spatial and Temporal Location of Crimes -- Situational Analyses of Crime Causation -- Criminogenic Commodities -- DANGEROUS OFFENDERS AS VECTORS OF VIOLENCE -- WIDENING CRIMINAL JUSTICE CONCEPTIONS OF CAUSATION -- FAVORED POLICY APPROACHES -- REACTIVE VERSUS PREVENTIVE APPROACHES -- PREVENTIVE APPROACHES IN CRIMINAL JUSTICE -- Deterrence, Incapacitation, and Rehabilitation -- Juvenile Delinquency Prevention -- Controlling Criminogenic Commodities -- Situational Approaches to Crime Control -- PUBLIC HEALTH APPROACHES TO VIOLENCE PREVENTION -- Violence in the Context of Relations -- Innovative Approaches to Youth Violence -- Environmental Approaches to Prevention -- Cultural Approaches to Violence Prevention -- LAW VERSUS EDUCATION IN BEHAVIORAL APPROACHES -- TOWARD A SYNTHESIS -- RESOURCES: TROOPS, ANALYSTS, AND COMMUNITY LEADERS -- WHO HAS THE TROOPS? -- PUBLIC HEALTH CONTRIBUTIONS TO THE FIGHT -- KEY VALUES: JUSTICE VERSUS HEALTH -- NOTE -- REFERENCES. |
Predicting Violent Behavior and Classifying Violent Offenders -- INTRODUCTION -- TECHNICAL ASPECTS OF PREDICTION AND CLASSIFICATION -- DISTINCTIONS BETWEEN PREDICTION AND CLASSIFICATION -- MEASURES OF QUALITY -- Validity -- Reliability -- Accuracy -- CLASSIFICATION AND PREDICTION METHODS -- Formal and Informal Methods -- Selection Bias -- Determining the Importance of Potential Predictive Factors -- CORRELATES AND CAUSES OF VIOLENCE -- CLASSIFICATION -- PURPOSES AND POPULATIONS CLASSIFIED -- TYPES OF CLASSIFICATION -- Psychological Tests-Rapid Assessments -- Psychological Tests-Multivariate Scaling Techniques -- Psychiatric Classifications -- Correctional Classification -- Clinical Predictions -- Official Record Data -- Self-Reports -- Epidemiologic Studies -- Observational Studies -- CONGRUENT FINDINGS ABOUT INDIVIDUALS CLASSIFIED AS VIOLENT PERSONS -- PREDICTION -- METHODOLOGICAL CRITIQUE -- Censoring Events -- Sample Selection Bias -- Statistical Limitations -- Efficient Use of Data -- PREDICTING VIOLENT BEHAVIOR -- Occurrence Models -- Rate of Violence Models -- ACCURACY OF PREDICTION -- SUMMARY OF OUR REVIEW OF THE PREDICTION OF VIOLENCE -- RESEARCH AGENDA -- POLICY IMPLICATIONS -- NOTES -- REFERENCES -- Incarceration and Violent Crime: 1965-1988 -- DATA -- PRISON POPULATIONS -- FACTORS CONTRIBUTING TO CHANGING INCARCERATION RATES -- CHANGES IN OFFENDING -- CHANGES IN SANCTION POLICIES -- Arrest Risk per Crime, qa -- Certainty and Severity of Imprisonment -- IDENTIFYING THE COMPONENTS OF CHANGE IN INCARCERATION RATES -- SUMMARY -- CRIME CONTROL EFFECTS OF INCARCERATION FOR VIOLENT CRIMES -- INCAPACITATION OF VIOLENT CRIMES -- Individual Offending Frequency -- Heterogeneity in Individual Offending Frequencies -- Career Length (L) -- Incapacitation Under Offender Heterogeneity and Finite Careers. |
Remaining Sources of Bias in Incapacitation Estimates -- DETERRENCE AND INCAPACITATION -- Exploratory Estimates of Deterrence Effects -- Remaining Sources of Bias in Deterrence Estimates -- POLICY CHOICES IN EXPANDING INCARCERATION -- CONCLUSION -- NOTES -- REFERENCES -- Index. |
|
|
|
|
|
|
|
|
|
|
|
|
|
4. |
Record Nr. |
UNINA9911019407803321 |
|
|
Autore |
Boucadair Mohamed |
|
|
Titolo |
Inter-asterisk exchange (IAX) deployment scenarios in SIP-enabled networks / / Mohamed Boucadair |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Chichester, U.K., : Wiley, 2009 |
|
|
|
|
|
|
|
ISBN |
|
9786612010798 |
9781282010796 |
1282010794 |
9780470742181 |
0470742186 |
9780470742198 |
0470742194 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (275 p.) |
|
|
|
|
|
|
Collana |
|
Wiley series in communications networking & distributed systems |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Internet telephony |
Computer network protocols |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Foreword -- Terminology and Definitions -- Acronyms and Abbreviations -- Acknowledgement -- 1 Introduction -- 1.1 General Introduction -- 1.2 On Voice over IP and Telephony over IP -- 1.3 Context -- 1.4 Enhancement Strategies to Solve SIP Issues -- 1.5 IAX: Towards Lightweight Telephony Architectures -- 1.6 IAX and Standardisation -- 1.7 Rationale -- 1.8 What This Book is Not -- 1.9 Structure of the Book -- 2 The IAX Protocol at a Glance -- 2.1 What Does IAX Stand For? -- 2.2 Is IAX Specific to the Asterisk Platform? -- 2.3 What is the Difference between IAX2 and IAX? -- 2.4 Why another New VoIP Protocol? -- 2.5 How Does IAX Solve VoIP Pains? -- 2.6 How is Calls Multiplexing Achieved? -- 2.7 And What About Demultiplexing? -- 2.8 What Port Number Does IAX Use? -- 2.9 What Transport Protocol Does IAX Use? -- 2.10 Is IAX a Reliable Protocol? -- 2.11 How Does IAX Ensure Reliability? -- 2.12 Is there an IAX Registration Procedure? -- 2.13 Does IAX Registration Differ from SIP Registration? -- 2.14 How |
|
|
|
|
|
|
|
|
|
Are Media Streams Transported in IAX? -- 2.15 Is CODEC Negotiation Supported by IAX? -- 2.16 Is On-Fly CODEC Change Possible During a Call? -- 2.17 IAX: a Path-Coupled or Decoupled Protocol? -- 2.18 Can IAX be Aware of the Status of the Network Load? -- 2.19 What About Security? -- 2.20 Could IAX Devices Be Managed? -- 2.21 Is Firmware Version Updating Supported by IAX? -- 2.22 Can IAX Be Extended to Offer New Features? -- 2.23 How is an IAX Resource Identified? -- 2.24 What Does an IAX URI Look Like? -- 2.25 Is it Possible to Set a Call Involving Several IAX Servers? -- 2.26 Is it Possible to Discover the Location of an IAX Resource? -- 2.27 What Is DUNDi? -- 2.28 What Is TRIP? -- 2.29 What Is ENUM? -- References -- Further Reading -- Part One: IAX Protocol Specifications -- 3 IAX Uniform Resource Identifier -- 3.1 Introduction -- 3.2 Format of IAX Uniform Resource Identifiers -- 3.3 Examples of IAX Uniform Resource Identifiers -- 3.4 Comparing IAX Uniform Resource Identifiers. |
3.5 IAX Uniform Resource Identifiers and ENUM -- References -- Further Reading -- 4 IAX Frames -- 4.1 Introduction -- 4.2 Full Frames -- 4.3 Mini Frames -- 4.4 Meta Frames -- 4.5 Encrypted Frames -- 4.6 Conclusion -- References -- Further Reading -- 5 IAX Information Elements -- 5.1 Introduction -- 5.2 List of IAX Information Elements -- 5.3 Example of IAX Information Element Traces -- References -- Further Reading -- 6 IAX Messages -- 6.1 Introduction -- 6.2 Taxonomy of IAX Messages -- 6.3 IAX Requests/Responses -- 6.4 IAX Functional Categories -- 6.5 IAX Media Frames -- 6.6 IAX Reliable/Unreliable Messages -- References -- Further Reading -- 7 IAX Connectivity Considerations -- 7.1 Introduction -- 7.2 IAX Transport Protocol -- 7.3 IAX Port Number -- 7.4 IAX Call Multiplexing and Demultiplexing -- 7.5 IAX Reliability Mechanism -- 7.6 Authentication and Encryption -- 7.7 Conclusion -- References -- Further Reading -- 8 IAX Operations -- 8.1 Introduction -- 8.2 Provisioning and Firmware Download -- 8.3 Registration -- 8.4 Call Setup -- 8.5 Call Tear-Down -- 8.6 Call Monitoring -- 8.7 Call Optimisation -- 8.8 Conclusion -- References -- Further Reading -- Part Two: Discussion and Analysis -- 9 IAX and Advanced Services -- 9.1 Introduction -- 9.2 CODEC Negotiation -- 9.3 Video Sessions -- 9.4 Negotiation of Several Media Types in the Same IAX Session -- 9.5 Presence Services -- 9.6 Instant Messaging -- 9.7 Topology Hiding -- 9.8 Mobility -- 9.9 Miscellaneous -- 9.10 Conclusion -- References -- Further Reading -- 10 Multi-IAX Servers Environment -- 10.1 Introduction -- 10.2 Focus -- 10.3 Discovery of IAX Resources -- 10.4 Setting End-to-End Calls -- 10.5 Load Balancing -- 10.6 Path-Coupled and Path-Decoupled Discussion -- 10.7 Forking -- 10.8 Route Symmetry -- 10.9 Conclusion -- References -- 11 IAX and NAT Traversal -- 11.1 Introduction -- 11.2 Structure -- 11.3 NAT Types -- 11.4 IAX and NAT Traversal Discussion -- 11.5 Operational Considerations -- 11.6 Conclusion -- References. |
Further Reading -- 12 IAX and Peer-to-Peer Deployment Scenarios -- 12.1 Introduction -- 12.2 Scope -- 12.3 A P2P Solution for Corporate Customers -- 12.4 Conclusion -- References -- Further Reading -- 13 IAX and IPv6 -- 13.1 Introduction -- 13.2 Context and Assumptions -- 13.3 Service Migration to IPv6 -- 13.4 Structure -- 13.5 The IP Address Exhaustion Problem -- 13.6 IPv6: a Long-Term Solution -- 13.7 Why IPv6 May Be Problematic for Telephony Signalling Protocols: the SIP Example -- 13.8 IAX: an IP Version-Agnostic Protocol? -- 13.9 Deployment of IAX Services in a 'Pure' IPv6 Environment -- 13.10 Heterogeneous Environment -- 13.11 Conclusion -- References -- Further Reading -- 14 IAX: Towards a Lightweight SBC? -- 14.1 Introduction -- 14.2 IP Telephony Administrative Domain -- 14.3 |
|
|
|
|
|
|
|
|
|
Deployment Scenarios -- 14.4 Deployment Contexts -- 14.5 Service Limitations Caused by SBCs -- 14.6 Functional Decomposition -- 14.7 Taxonomy of SBC Functions in an SIP Environment -- 14.8 Validity of these Functions in an IAX Architecture -- 14.9 Conclusion -- References -- Further Reading -- Part Three: Deployment Scenarios in SIP-Based Environments -- 15 Scenarios for the Deployment of IAX-Based Conversational Services -- 15.1 SIP Complications -- 15.2 Structure -- 15.3 Beyond the 'SIP-Centric' Era -- 15.4 Methodology -- 15.5 Overall Context -- 15.6 Architectural Requirements -- 15.7 Brief Comparison -- 15.8 Taxonomy -- 15.9 Introducing IAX into Operational Networks -- 15.10 Conclusion. / -- References -- 16 IAX in the Access Segment of SIP-Based Service Architectures -- 16.1 Introduction -- 16.2 A 'High-Level' Description of the Interworking Function -- 16.3 Examples of Call Flows -- 16.4 Bandwidth Optimisation: An Extension to SIP -- 16.5 Conclusion -- References -- 17 Validation Scenario -- 17.1 Overview -- 17.2 Configuring Asterisk Servers -- 17.3 Configuring the SIP Express Router (SER) -- 17.4 User Agent Configuration -- 17.5 Conclusion -- Further Reading -- Index. |
|
|
|
|
|
|
Sommario/riassunto |
|
Find out how IAX can complement SIP to overcome complications encountered in current SIP-based communications Written by an expert in the field of telecommunications, this book describes the Inter-Asterisk Exchange protocol (IAX) and its operations, discussing the main characteristics of the protocol including NAT traversal, security, IPv6 support, interworking between IPv4 and IPv6, interworking with SIP and many others. The author presents the ways in which IAX can be activated so as to avoid complications such as NAT and the presence of intermediary boxes in operational architectures. This book analytically demonstrates the added values of IAX protocol compared to existing ones, while proposing viable deployment scenarios that assess the behavior of the protocol in operational networks. Key Features: . Promotes a viable alternative protocol to ease deployment of multimedia services. Analyses the capabilities of the IAX protocol and its ability to meet VoIP service provider requirements, and provides scenarios of introducing IAX within operational architectures. Addresses the advantages and disadvantages of SIP, and Details the features of IAX that can help, in junction with SIP, to overcome various disadvantages of SIP. Explores the added values of IAX protocol compared to existing protocols. Discusses the compatibility of new adopted architectures and associated protocols This book will be a valuable reference for service providers, protocol designers, vendors and service implementers. Lecturers and advanced students computer science, electrical engineering and telecoms courses will also find this book of interest. |
|
|
|
|
|
|
|
| |