| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910480476703321 |
|
|
Autore |
Mazierska Ewa |
|
|
Titolo |
Jerzy Skolimowski [[electronic resource] ] : the cinema of a nonconformist / / Ewa Mazierska |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
New York, : Berghahn Books, 2010 |
|
|
|
|
|
|
|
ISBN |
|
1-282-62715-5 |
9786612627156 |
1-84545-807-9 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (222 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
"Berghahn on film"--Cover. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references (p. [197]-203) and index. |
Includes filmography. |
|
|
|
|
|
|
|
|
Nota di contenuto |
|
Introduction : outsider, nonconformist, a man in-between. From participant to observer : autobiographical discourse in the films of Jerzy Skolimowski -- About a boy : characters, narratives and ideologies in Skolimowski's films -- Between realism and non-realism : the artistic context of Skolimowski's films and their main visual motifs -- In the land of Hamlets and Don Quixotes : Skolimowski's encounters with literature -- 'I don't like obvious film scores' : music and other sounds in Skolimowski's films -- Conclusions. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Jerzy Skolimowski is one of the most original Polish directors and one of only a handful who has gained genuine recognition abroad. This is the first monograph, written in English, to be devoted to his cinema. It covers Skolimowski's career from his early successes in Poland, such as Identification Marks: None and Barrier, through his émigré films, Deep End, Moonlighting and The Lightship, to his return to Poland where, in 2008, he made the internationally acclaimed Four Nights with Anna. Ewa Mazierska addresses the main features of Skolimowski's films, suc |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910827160103321 |
|
|
Autore |
Vasudevan Vinod |
|
|
Titolo |
Application security in the ISO 27001:2013 environment / / Vinod Vasudevan [and five others] |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Ely Cambridgeshire : , : IT Governance Publishing, , 2015 |
|
|
|
|
|
|
|
Edizione |
[Second edition.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (254 pages) : illustrations |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data protection - Standards |
Computer security |
Computer networks - Security measures - Standards |
Information technology - Standards |
Computer software - Reliability |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
Nota di contenuto |
|
Cover; Title; Copyright; Preface; About The Authors; Acknowledgements; Contents; Chapter 1: Introduction To The International Information Security Standards Iso27001 And Iso27002; Chapter 2: The Iso27001 Implementation Project; Chapter 3: Risk Assessment; Chapter 4: Introduction To Application Security Theats; Chapter 5: Application Security And Iso27001; Chapter 6: Attacks On Applications; Chapter 7: Secure Development Lifecycle; Chapter 8: Threat Profiling And Security Testing; Chapter 9: Secure Coding Guidelines; Itg Resources. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book explains how organisations can implement and maintain effective security practices to protect their web applications and the servers on which they reside as part of a wider information security management system by following the guidance set out in the international standard for information security management, ISO27001. Methods used by criminal hackers to attack organisations via their web applications and a detailed explanation of how you can combat such attacks by employing the guidance and controls set out in ISO27001 are provided. This edition is updated to reflect ISO27001:2013 as well as best practices relating to cryptography, including the PCI SSC's |
|
|
|
|
|
|
|
|
|
|
denigration of SSL in favour of TLS. -- Edited summary from book. |
|
|
|
|
|
| |