1.

Record Nr.

UNINA9910464792503321

Autore

Knickerbocker Scott

Titolo

Ecopoetics : the language of nature, the nature of language / / Scott Knickerbocker

Pubbl/distr/stampa

Amherst, [Massachusetts] ; ; Boston, [Massachusetts] : , : University of Massachusetts Press, , 2012

©2012

ISBN

1-61376-198-8

Descrizione fisica

1 online resource (x, 203 p. )

Disciplina

811/.50936

Soggetti

American poetry - 20th century - History and criticism

Nature conservation in literature

Ecocriticism

Philosophy of nature in literature

Electronic books.

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Bibliographic Level Mode of Issuance: Monograph

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Introduction: The language of nature, the nature of language -- Wallace Stevens, eco-aesthete -- Elizabeth Bishop's strange reality -- Richard Wilbur's natural artifice -- Sylvia Plath's physical words -- Conclusion: Organic formalism and contemporary poetry.

Sommario/riassunto

"Ecocritics and other literary scholars interested in the environment have tended to examine writings that pertain directly to nature and to focus on subject matter more than expression. In this book, Scott Knickerbocker argues that it is time for the next step in ecocriticism: scholars need to explore the figurative and aural capacity of language to evoke the natural world in powerful ways.

Ecopoetics probes the complex relationship between artifice and the natural world in the work of modern American poets - in particular Wallace Stevens, Elizabeth Bishop, Richard Wilbur, and Sylvia Plath. These poets relate to nature as a deep wellspring of meaning, although they all avoid using language the way most nature writers do, merely to reflect or refer directly to the world. Each of these poets, in his or her own distinct way, employs instead what Knickerbocker terms sensuous



poesis, the process of rematerializing language through sound effects and other formal devices as a sophisticated response to nonhuman nature.

Rather than attempt to erase the artifice of their own poems, to make them seem more natural and thus supposedly closer to nature, the poets in this book unapologetically embrace artifice - not for its own sake but in order to perform and enact the natural world. Indeed, for them, artifice is natural. In examining their work, Knickerbocker charts a new direction for ecocriticism."--pub. desc.

2.

Record Nr.

UNISA996387813503316

Autore

Peacham Henry <1576?-1643?>

Titolo

The compleat gentleman [[electronic resource] ] : Fashioning him absolute, in the most necessarie and commendable qualities concerning minde or bodie, that may be required in a noble gentleman. Whereunto is annexed a description of the order of a maine battaile, or pitched field, eight seuerall wayes: as also certaine necessarie instructions concerning the art of fishing, with other additions. By Henry Peacham, Master of Arts, sometime of Trinitie Colledge in Cambridge

Pubbl/distr/stampa

London, : Printed [by G. Wood] for Francis Constable, and are to be sold at his shop in Pauls Church-yard, at the signe of the Crane, 1627

Edizione

[[The second impression much inlarged].]

Descrizione fisica

[14], 124, 129-227, [2], 300-301, [5] p. : ill. (woodcuts)

Soggetti

Education

Courtesy

Heraldry

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

With an additional title page, engraved, which bears the edition statement. It is signed "Fr. Delaram. sculp. Anno 1626". Variant 1: engraved title imprint gives Constable's address as "ye Greene man in Leaden hall street right over Billeter lane"; the foot of the right pedestal has "sculp. Anno 1625".

Printer's name from STC.

Variant 2: with an additional dedication to the Duke of Buckingham, with his coat of arms.



Identified as STC 19502a on UMI microfilm reel 661.

Reproduction of the originals in the Folger Shakespeare Library and Minnesota University Library.

Appears at reel 661 (Folger Shakespeare Library copy) and at reel 1355 (Minnesota University Library copy).

Sommario/riassunto

eebo-0173

3.

Record Nr.

UNINA9910703448803321

Titolo

Climate change impacts in the United States, highlights : U.S. national climate assessment / / U.S. Global Change Research Program

Pubbl/distr/stampa

Washington, DC : , : U.S. Global Change Research Program, , 2014

Washington, DC : , : U.S. Government Printing Office

Edizione

[Revised October 2014.]

Descrizione fisica

1 online resource (iv, 137 pages) : illustrations, maps

Soggetti

Climatic changes - United States

Climatic changes

Greenhouse gases - Risk assessment

Climatic changes - Risk assessment

Global environmental change

Global warming

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Title from title screen (viewed June 14, 2016).

"First published May 2014."

Nota di bibliografia

Includes bibliographical references (pages 107-137).



4.

Record Nr.

UNINA9910410653503321

Autore

Xiao Yang

Titolo

Security in distributed, grid, mobile, and pervasive computing / / Yang Xiao

Pubbl/distr/stampa

2007

Boca Raton, FL : , : Auerbach Publishers, , [2007]

©2007

ISBN

9786611127787

9781000218930

1000218937

9780429119347

0429119348

9781281127785

1281127787

9780849379253

0849379253

Edizione

[1 ed.]

Descrizione fisica

1 online resource (436 p.)

Classificazione

COM032000COM043000COM048000

Disciplina

005.8

Soggetti

Computer security

Mobile computing - Security measures

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Front cover; Contents; Preface; About the Editor; Contributors; Part I: Security in Distributed Computing; Chapter 1. Security for Content Distribution Networks - Concepts, Systems and Research Issues; Chapter 2. Key Management and Agreement in Distributed Systems; Chapter 3. Securing Design Patterns for Distributed Systems; Part II: Security in Mobile Computing; Chapter 4. Pragmatic Security for Constrained Wireless Networks; Chapter 5. Authentication in Wireless Networks; Chapter 6. Intrusion Detection in Wireless Sensor Networks

Chapter 7. False Data Detection and Secure Data Aggregation in Wireless Sensor NetworksChapter 8. Privacy and Anonymity in Mobile Ad Hoc Networks; Chapter 9. Security Issues in the IEEE 802.15.1



Bluetooth Wireless Personal Area Networks; Part III: Security in Grid Computing; Chapter 10. State-of-the-Art Security in Grid Computing; Chapter 11. Unifying Grid and Organizational Security Mechanisms; Chapter 12. Grid Security Architecture: Requirements, Fundamentals, Standards and Models; Chapter 13. A Trust-Based Access Control Management Framework for a Secure Grid Environment

Chapter 14. Distributed Computing Grids-Safety and SecurityPart IV: Security in Pervasive Computing; Chapter 15. Security Solutions for Pervasive Healthcare; Chapter 16. Wireless Sensor Network Security: A Survey; Index; Back cover

Sommario/riassunto

Despite recent dramatic advances in computer security regarding the proliferation of services and applications, security threats are still major impediments in the deployment of these services. Paying serious attention to these issues, "Security in Distributed, Grid, Mobile, and Pervasive Computing" focuses on the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. A rich and useful presentation of strategies for security issues, the book covers each computing area in separate sections. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems.; The next section focuses on security in mobile computing and wireless networks, covering wireless authentication methods, secure data aggregation, and anonymous routing protocol.; After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security. With more and more vital information stored on computers, security professionals need to know how to combat threats and complications. Offering strategies to tackle these issues, this book provides essential security information for researchers, practitioners, educators, and graduate students in the field.