| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910157409703321 |
|
|
Autore |
Haskell Molly |
|
|
Titolo |
Steven Spielberg : A Life in Films / / Molly Haskell |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
New Haven, CT : , : Yale University Press, , [2017] |
|
©2017 |
|
|
|
|
|
|
|
|
|
ISBN |
|
0-300-18693-2 |
0-300-18982-6 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (245 pages) |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Motion picture producers and directors - United States |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
Frontmatter -- Contents -- Preface -- 1. Beginnings and the Lost Ark -- 2. Steve Bites His Nails and Hears Voices -- 3. Arcadia: The Best and Worst of Times -- 4. The Kid with the Briefcase -- 5. Jaws "Open Wide" -- 6. Close Encounters of the Third Kind -- 7. 1941 and Raiders of the Lost Ark -- 8. E.T., Poltergeist, and Twilight Zone -- 9. Indiana Jones and the Temple of Doom and The Color Purple -- 10. Empire of the Sun -- 11. Indiana Jones and the Last Crusade, Always, and Hook -- 12. Schindler's List, Jurassic Park, and the Shoah Foundation -- 13. Amistad and The Lost World: Jurassic Park -- 14. Saving Private Ryan and A.I. -- 15. Minority Report and Catch Me If You Can -- 16. The Terminal, War of the Worlds, and Munich -- 17. Indiana Jones and the Kingdom of the Crystal Skull, The Adventures of Tintin, and War Horse -- 18. Lincoln and Bridge of Spies -- Notes -- Index |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
A film-centric portrait of the extraordinarily gifted movie director whose decades-long influence on American popular culture is unprecedented "Everything about me is in my films," Steven Spielberg has said. Taking this as a key to understanding the hugely successful moviemaker, Molly Haskell explores the full range of Spielberg's works for the light they shine upon the man himself. Through such powerhouse hits as Close Encounters of the Third Kind, E.T., Jurassic Park, and Indiana Jones, to lesser-known masterworks like A.I. and |
|
|
|
|
|
|
|
|
|
|
|
|
|
Empire of the Sun, to the haunting Schindler's List, Haskell shows how Spielberg's uniquely evocative filmmaking and story-telling reveal the many ways in which his life, work, and times are entwined. Organizing chapters around specific films, the distinguished critic discusses how Spielberg's childhood in non-Jewish suburbs, his parents' traumatic divorce, his return to Judaism upon his son's birth, and other events echo in his work. She offers a brilliant portrait of the extraordinary director-a fearful boy living through his imagination who grew into a man whose openness, generosity of spirit, and creativity have enchanted audiences for more than 40 years. |
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910795111403321 |
|
|
Autore |
Kaustubh Dhondge |
|
|
Titolo |
Lifecycle IoT Security for Engineers |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Norwood : , : Artech House, , 2021 |
|
©2021 |
|
|
|
|
|
|
|
|
|
ISBN |
|
1-5231-4587-0 |
1-63081-804-6 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (219 pages) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Internet of things - Security measures |
Internet of things - Industrial applications |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Sommario/riassunto |
|
This comprehensive resource provides a thorough introduction to the security risks, attack vectors and vulnerabilities an Internet of things (IoT) product and its network can face at different phases of its lifecycle. The risks at each stage of the development and operations (DevOps) lifecycle of an IoT product are analyzed. Examples of recent, relevant security threats faced by the industry are discussed and why the security breach happened, how it was resolved, and what could have been done to avoid them will be explained. Readers will learn the |
|
|
|
|
|
|
|
|
|
|
best practices to secure their IoT products, and networks in a holistic way. IoT and the diverse and unique nature of IoT applications across the commercial and industrial landscape, are introduced, including the need for securing IoT. The lifecycle of IoT security, specifically the security implementations that need to be carried out at various stages in the operational process of an IoT service are presented, as well as the security requirements during the planning, security integration, operational, maintenance, and planned discontinuation phase of an IoT service. The vulnerabilities in IoT, the various attack vectors exploited by attackers, and preventive measures that can be undertaken to avoid these security attacks are also explored. Readers are acclimated with various steps that must be undertaken to prepare for IoT security attacks, and techniques that can be employed to detect them. Key challenges involved with implementing appropriate levels of security in IoT due to heterogeneity, interoperability, human errors, and commercial factors are discussed, as well as the need for regulatory guidance for the IoT industry and highlights specific examples of regulations in leading markets across the globe. |
|
|
|
|
|
| |