| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNIPARTHENOPE000013265 |
|
|
Autore |
Pesole, Dino |
|
|
Titolo |
I debiti degli Italiani : quello che ognuno deve sui nostri conti pubblicisapere / Dino Pesole ; prefazione di Innocenzo Cipolletta |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Roma : Editori Riuniti, c1996 |
|
|
|
|
|
|
|
Titolo uniforme |
I debiti degli Italiani |
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Collocazione |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
2. |
Record Nr. |
UNINA9910456952403321 |
|
|
Autore |
Keilser Jan Just |
|
|
Titolo |
OpenVPN 2 Cookbook [[electronic resource] ] : 100 simple and incredibly effective recipes for harnessing the power of the OpenVPN 2 network / / Jan Just Keilser |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Birmingham, : Packt Publishing, c2011 |
|
|
|
|
|
|
|
ISBN |
|
1-283-01292-8 |
9786613012920 |
1-84951-011-3 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (356 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Extranets (Computer networks) |
Operating systems (Computers) |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
|
|
|
|
|
Nota di contenuto |
|
Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Point-to-Point Networks; Introduction; Shortest setup possible; OpenVPN secret keys; Multiple secret keys; Plaintext tunnel; Routing; Configuration files versus the command-line; Complete site-to-site setup; 3-way routing; Chapter 2: Client-server IP-only Networks; Introduction; Setting up the public and private keys; Simple configuration; Server-side routing; Using client-config-dir files; Routing: subnets on both sides; Redirecting the default gateway |
Using an 'ifconfig-pool' blockUsing the status file; Management interface; Proxy-arp; Chapter 3: Client-server Ethernet-style Networks; Introduction; Simple configuration-non-bridged; Enabling client-to-client traffic; Bridging-Linux; Bridging-Windows; Checking broadcast and non-IP traffic; External DHCP server; Using the status file; Management interface; Chapter 4: PKI, Certificates, and OpenSSL; Introduction; Certificate generation; xCA: a GUI for managing a PKI (Part 1); xCA: a GUI for managing a PKI (Part 2); OpenSSL tricks: x509, pkcs12, verify output; Revoking certificates |
The use of CRLsChecking expired/revoked certificates; Intermediary CAs; Multiple CAs: stacking, using --capath; Chapter 5: Two-factor Authentication with PKCS#11; Introduction; Initializing a hardware token; Getting a hardware token ID; Using a hardware token; Using the management interface to list PKCS#11 certificates; Selecting a PKCS#11 certificate using the management interface; Generating a key on the hardware token; Private method for getting a PKCS#11 certificate; Pin caching example; Chapter 6: Scripting and Plugins; Introduction; Using a client-side up/down script |
Windows login greeterUsing client-connect/client-disconnect scripts; Using a 'learn-address' script; Using a 'tls-verify' script; Using an 'auth-user-pass-verify' script; Script order; Script security and logging; Using the 'down-root' plugin; Using the PAM authentication plugin; Chapter 7: Troubleshooting OpenVPN: Configurations; Introduction; Cipher mismatches; TUN versus TAP mismatches; Compression mismatches; Key mismatches; Troubleshooting MTU and tun-mtu issues; Troubleshooting network connectivity; Troubleshooting client-config-dir issues; How to read the OpenVPN log files |
Chapter 8: Troubleshooting OpenVPN: RoutingIntroduction; The missing return route; Missing return routes when 'iroute' is used; All clients function except the OpenVPN endpoints; Source routing; Routing and permissions on Windows; Troubleshooting client-to-client traffic routing; Understanding the 'MULTI: bad source' warnings; Failure when redirecting the default gateway; Chapter 9: Performance Tuning; Introduction; Optimizing performance using 'ping'; Optimizing performance using iperf; OpenSSL cipher speed; Compression tests; Traffic shaping; Tuning UDP-based connections |
Tuning TCP-based connections |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
100 simple and incredibly effective recipes for harnessing the power of the OpenVPN 2 network |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910809491903321 |
|
|
Titolo |
American Mythologies : essays on contemporary literature / / edited by William Blazek and Michael K. Glenday [[electronic resource]] |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Liverpool : , : Liverpool University Press, , 2005 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (viii, 305 pages) : digital, PDF file(s) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
American literature - 20th century - History and criticism |
American literature - Indian authors |
Indian mythology in literature |
Race in literature |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Title from publisher's bibliographic system (viewed on 07 Jul 2017). |
|
|
|
|
|
|
Nota di contenuto |
|
Indians with voices: revisiting Savagism and civilization -- Wild hope: love, money and mythic identity in the novels of Louise Erdich -- Float like a butterfly, sting like a bee: mythologies of representation in selected writings on boxing by Norman Mailer -- The secret sharing: myth and memory in the writing of Jayne Anne Phillips -- The individual's ghost: towards a new mythology of the postmodern -- 'Cheap, on sale, American dream': contemporary Asian American writers' responses to American success mythologies -- 'No way back forever': American western myth in Cormac McCarthy's Border trilogy -- Native American visions of apocalypse: prophecy and protest in the fiction of Leslie Marmon Silko and Gerald Vizenor -- The brave new world of computing in post-war American science fiction -- Mythologies of 'estactic immersion': America, the poem and ethics of lyric in Jorie Graham and Lisa Jarnot -- Whose myth is it anyway? Coyote in the poetry of Gary Snyder and Simon J. Ortiz -- Aging, anxious and apocalyptic: baseball's myths for the millennium -- Finding a voice, telling a story: constructing communal identity in contemporary American women's writing. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This challenging new book looks at the current reinvention of American Studies: a reinvention that, among other things, has put the whole |
|
|
|
|
|
|
|
|
|
|
issue of just what is 'American' and what is 'American Studies' into contention. The collection focuses, in particular, on American mythology. The editors themselves have written essays that examine the connections between mythologies of the United States and those of either classical European or Native American traditions. William Blazek considers Louise Erdrich's Love Medicine novels as chronicles combining Ojibwa mythology and contemporary U.S. culture in ways that reinvest a sense of mythic identity within a multicultural, postmodern America. Michael K Glenday's analysis of Jayne Anne Phillips' work and explores in it the contexts where myth and dream interact with each other. Betty Louise Bell is one of four essayists in this collection who focus their criticism on authors of Native American heritage. In the first part of 'Indians with Voices', Bell carefully argues that Roy Harvey Pearce's seminal Native American studies text Savagism and Civilization fails to acknowledge its white elitist assumptions about what constitutes The American Mind and views Native Americans along a primitive-savage binary that helped to create a twentieth-century 'national mythos of innocence and destiny'. Other essays include Christopher Brookeman's study of the impact of Muhammad Ali on Norman Mailer's non-fiction writing about heavyweight boxing. |
|
|
|
|
|
| |