| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA990003468290203316 |
|
|
Autore |
MAZZEI, Franco |
|
|
Titolo |
La rivincita della mano visibile : il modello economico asiatico e l'Occidente / Franco Mazzei, Vittorio Volpi |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Milano : EGEA : Università Bocconi, 2010 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Sviluppo economico - Fattori culturali - Cina [e] Corea del Sud [e] Giappone |
|
|
|
|
|
|
|
|
Collocazione |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910783669003321 |
|
|
Autore |
Sang Ye <1955-> |
|
|
Titolo |
China candid [[electronic resource] ] : the people on the People's Republic / / Sang Ye ; edited by Geremie R. Barmé with Miriam Lang |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berkeley, : University of California Press, 2006 |
|
|
|
|
|
|
|
ISBN |
|
9786612771866 |
1-4237-3147-6 |
1-282-77186-8 |
0-520-93886-0 |
1-59875-800-4 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (365 p.) |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Personal narratives |
China History 1949- |
China Social conditions 1949- |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di contenuto |
|
Front matter -- Contents -- Sang Ye's Conversations with China -- Acknowledgments -- Introduction Words and Saliva -- Part 1. Chairman Mao's Ark -- Part 2. Moonwalking -- Part 3. Unlevel Playing Field -- Part 4. Heaven's Narrow Gate -- Part 5. Mastering New China -- Part 6. Parting Shot -- Translators -- Index |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Leading Chinese journalist Sang Ye follows his successful book Chinese Lives with this collection of absorbing interviews with twenty-six men, women, and children taking the reader into the complex realities of the People's Republic of China today. Through intimate conversations conducted over many years, China Candid provides an alternative history of the nation from its founding as a socialist state in 1949 up to the present. The voices of people who have lived under-and often despite-the Communist Party's rule give a compelling account of life in the maelstrom of China's economic reforms-reforms that are being pursued by a system that remains politically rigid and authoritarian. Artists, politicians, businessmen and -women, former Red Guards, |
|
|
|
|
|
|
|
|
|
|
|
|
migrant workers, prostitutes, teachers, computer geeks, hustlers, and other citizens of contemporary China all speak with frankness and candor about the realities of the burgeoning power of East Asia, the China that will host the 2008 Olympics. Some discuss the corrosive changes that have been wrought on the professional ethics and attitudes of men and women long nurtured by the socialist state. Others recall chilling encounters with the police, the law courts, labor camps, and the army. Providing unique insight into the minds and hearts of people who have firsthand experience of China's tumultuous history, this book adds invaluable depth and dimension to our understanding of this rapidly changing country. |
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910299250803321 |
|
|
Autore |
Lee Newton |
|
|
Titolo |
Counterterrorism and Cybersecurity : Total Information Awareness / / by Newton Lee |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[2nd ed. 2015.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (488 p.) |
|
|
|
|
|
|
Disciplina |
|
004 |
005.7 |
005.8 |
006.312 |
006.7 |
320 |
|
|
|
|
|
|
|
|
Soggetti |
|
Computer security |
Political science |
Data mining |
Application software |
Multimedia systems |
Systems and Data Security |
Political Science |
Data Mining and Knowledge Discovery |
Information Systems Applications (incl. Internet) |
Multimedia Information Systems |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
September 11 Attacks -- U.S. Intelligence Community -- Understanding Terrorism -- Cures for Terrorism -- War and Peace -- The Rise and Fall of Total Information Awareness -- The Afterlife of Total Information Awareness and Edward Snowden's NSA Leaks -- A Two-Way Street of Total Information Awareness -- Cyber Warfare: Weapon of Mass Disruption -- Cyber Attacks, Prevention, and Countermeasures -- Cyber security Training in Medical Centers -- Plan X and Generation Z -- Artificial Intelligence and Data Mining -- Gamification of Penetration Testing -- USB Write Blocking and Forensics -- DARPA's Cyber Grand Challenge (2014-2016). |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
From 9/11 to Charlie Hebdo along with Sony-pocalypse and DARPA's $2 million Cyber Grand Challenge, this book examines counterterrorism and cyber security history, strategies and technologies from a thought-provoking approach that encompasses personal experiences, investigative journalism, historical and current events, ideas from thought leaders and the make-believe of Hollywood such as 24, Homeland and The Americans. President Barack Obama also said in his 2015 State of the Union address, "We are making sure our government integrates intelligence to combat cyber threats, just as we have done to combat terrorism. In this new edition, there are seven completely new chapters, including three new contributed chapters by healthcare chief information security officer Ray Balut and Jean C. Stanford, DEF CON speaker Philip Polstra and security engineer and Black Hat speaker Darren Manners, as well as new commentaries by communications expert Andy Marken and DEF CON speaker Emily Peed. The book offers practical advice for businesses, governments and individuals to better secure the world and protect cyberspace. |
|
|
|
|
|
|
|
| |