| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910429960003321 |
|
|
Autore |
Carrol, Alison |
|
|
Titolo |
The return of Alsace to France, 1918-1939 / Alison Carrol |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Oxford, : Oxford University press, 2018 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
VII, 230 p., [1] c. di tav. : ill. ; 24 cm |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Locazione |
|
|
|
|
|
|
Collocazione |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
2. |
Record Nr. |
UNINA9910464226003321 |
|
|
Autore |
Aquila Richard <1946-> |
|
|
Titolo |
The sagebrush trail : western movies and twentieth-century America / / Richard Aquila |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Tucson, [Arizona] : , : The University of Arizona Press, , 2015 |
|
©2015 |
|
|
|
|
|
|
|
|
|
ISBN |
|
0-8165-3154-4 |
0-8165-3178-1 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (384 pages) : illustrations |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Western films - United States - History and criticism |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
|
|
|
|
|
|
|
Nota di contenuto |
|
Prologue. The sagebrush trail -- Part I. The rise of western movies, 1900-1914. The great train robbery : or how early western movies stole America's heart ; Blazing the trail : new directors and the rise of feature westerns ; The big trail : tracking feature westerns through depression and war ; Tumbling tumbleweeds : guns, guitars, and b-western cowboys -- Part II. Transitional westerns on new frontiers, 1945-1963. The searchers : cowboys and containment on the cold war frontier ; Shane : western heroes and the culture of the cold war -- Part III. "New western" horizons, 1964-1999. A fistful of dollars : spaghetti westerns and changing times ; The wild bunch : American westerns on a revisionist trail ; True grit : traditional westerns ride again! ; Silverado : the mythic west at century's end -- Epilogue. Django unchained. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
"The Sagebrush Trail" is a panoramic survey of western movies in the twentieth century, from Edwin Porter's "The Great Train Robbery" (1903) to Clint Eastwood's "The Unforgiven" (1992) and beyond"--Provided by publisher. |
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910449946103321 |
|
|
Autore |
Purser Steve |
|
|
Titolo |
A Practical Guide to Managing Information Security [[electronic resource]] |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Norwood, : Artech House, 2004 |
|
|
|
|
|
|
|
ISBN |
|
1-4175-2032-9 |
1-58053-703-0 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (280 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Computer security |
Computer Science |
Engineering & Applied Sciences |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
|
|
|
|
|
Nota di contenuto |
|
A Practical Guide to Managing Information Security; Contents vii; Preface xiii; Acknowledgments xvii; CHAPTER 1 The need for a proactive approach 1; CHAPTER 2 Management techniques 23; CHAPTER 3 Technical tools 47; CHAPTER 4 A proactive approach: Overview 85; CHAPTER 5 The information-security strategy 109; CHAPTER 6 Policy and standards 131; CHAPTER 7 Process design and implementation 155; CHAPTER 8 Building an IT security architecture 181; CHAPTER 9 Creating a security-minded culture 215; Appendix: Fast risk analysis 241; About the author 249; Index 251 |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This groundbreaking book helps you master the management of information security, concentrating on the proactive recognition and resolution of the practical issues of developing and implementing IT security for the enterprise. Drawing upon the authors' wealth of valuable experience in high-risk commercial environments, the work focuses on the need to align the information security process as a whole with the requirements of the modern enterprise, which involves empowering business managers to manage information security-related risk. Throughout, the book places emphasis on the use of simple, p |
|
|
|
|
|
|
|
| |