1.

Record Nr.

UNINA9910781612303321

Autore

Earl Douglas S

Titolo

Reading Joshua as Christian Scripture / Douglas S. Earl

Pubbl/distr/stampa

Winona Lake, Ind. : , : Eisenbrauns, , 2010

©2010

ISBN

1-57506-631-9

Descrizione fisica

1 online resource (293 p.)

Collana

Journal of theological interpretation supplements ; ; 2

Disciplina

222/.206

Soggetti

Bible. Joshua - Criticism, Interpretation, Etc

Hermeneutik

Rezeption

Exegese

Criticism, interpretation, etc.

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Slightly Revision of the author's thesis (Ph. D.)--Durham University, 2008.

Nota di bibliografia

Includes bibliographical references and indexes.

Nota di contenuto

Reading Joshua as Christian scripture? -- Learning to speak of God through myth : approaching Joshua as myth -- The hermeneutics of reading Joshua as Christian scripture -- Joshua as part of tradition(s) -- The genre of Joshua : codes of production and use of literary conventions -- Understanding the significance of [cherem] -- The text of Joshua -- Reading Joshua -- Drawing it all together : reading Joshua as Christian scripture today.

Sommario/riassunto

"The book of Joshua has been received and used as Christian Scripture throughout Christian history. The challenge today, however, is how Christians should appropriately continue to read Joshua as Scripture, not least in the light of well-known historical and ethical difficulties with the narrative. In Reading Joshua as Christian Scripture, Douglas Earl draws on conceptual resources offered by recent anthropological approaches to myth and combines this with a close literary reading of the text, in order to argue that Joshua is misconstrued when it is treated as a historical account of conquest. Instead, in its ancient Israelite context Joshua functioned to reshape accepted norms of community identity, as reflected in the book of Deuteronomy, by



forming a new "cultural memory." Furthermore, Earl reconsiders the traditional notion of the "spiritual sense" of Scripture in terms of a rich account of symbol and also makes use of the narrative hermeneutics of Paul Ricoeur. The result is a fresh and unexpected reading of Joshua as Christian Scripture that develops the original function of the narrative in a way that resonates with classic premodern readings and is also challenging to contemporary Christian understandings of identity and faithfulness."--Publisher's description.

2.

Record Nr.

UNINA9910786928003321

Titolo

Applied RNAi : from fundamental research to therapeutic applications / / Edited by Patrick Arbuthnot and Marc S. Weinberg

Pubbl/distr/stampa

Norfolk, England : , : Caister Academic Press, , [2014]

©2014

ISBN

1-908230-67-3

Descrizione fisica

1 online resource (266 p.)

Disciplina

572.865

Soggetti

Gene silencing

RNA

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Includes index.

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Contents; Contributors; Preface; Current books of interest; 1: Overview of Biogenesis and Applications of MicroRNA; Introduction; Mammalian microRNA biogenesis; Regulation during normal and potentially pathogenic microRNA biogenesis; Harnessing the RNAi pathway for gene silencing; Augmenting and antagonizing microRNA function; MicroRNA targets as gene regulators and sensors; MicroRNAs as prognostic and diagnostic markers; Conclusion; 2: Non-canonical MicroRNA Biogenesis and Function; Canonical microRNA biogenesis and function; Other small RNA biogenesis pathways

Non-canonical microRNA biogenesisOther RNA modifications; Non-canonical microRNA function; Concluding remarks; 3: Non-coding RNAs and the Epigenetic Control of Gene Expression; Long non-coding



RNAs epigenetic regulators in human cells; Disruption of long antisense ncRNA networks; The therapeutic potential of targeting antisense ncRNAs; Issues with using small antisense ncRNAs therapeutically; 4: From Mice to Men: Towards the Clinical Translation of MicroRNA Technologies for Somatic Cell Reprogramming; Introduction; General evidence for a role of miRNAs in pluripotency and differentiation

Strategies for the identification of pluripotency-associated miRNAsDelivery or expression of miRNAs as novel tools to improve reprogramming; MiRNA-based systems to monitor or control pluripotency and differentiation; Outlook: the road towards clinical translation of human iPSC technologies; 5: Systems Biology Tools to Understand the Role of Host MicroRNAs in Infection: a Closer Look at HIV; Background information; Systems biology tools to investigate differential miRNA expression in HIV infection; A high-content screening approach to evaluate the role of host miRNAs in HIV infection

Conclusions and future prospects6: Synthetic MicroRNA Blocking Agents; Introduction; Anti-miR chemistries; Mechanisms of action and delivery of anti-miRs into cells; Validation of anti-miR activity in cells and assays; Therapeutic anti-miRs and in vivo delivery; MicroRNA sponges for suppression of microRNA activity; Target protectors for inhibition of microRNA-induced mRNA degradation; MicroRNA mimics; Prospects; 7: Exploiting MicroRNAs to Regulate Transgene Expression; Introduction; Using microRNAs avoid immune response to transgene product after gene transfer

Using microRNA to improve cell specificity and escape side-effect of gene transferNovel type of expression system using microRNAs; Conclusion; 8: Use of Artificial MicroRNAs for Gene Silencing; Introduction; Evolution of artificial miRNA as therapeutic agents; Application of amiRNA; Challenges using amiRNAs as therapeutic agents; amiRNA progress to clinic; Conclusions; 9: Harnessing RNAi for the Treatment of Viral Infections; Introduction; RNAi to treat viral hepatitis; RNAi for respiratory viruses; RNAi for haemorrhagic fever viruses; Other viruses targeted by RNAi

RNAi for the treatment of non-viral infections

Sommario/riassunto

Since the discovery of RNA interference (RNAi) in 1998, research on the topic has advanced at an impressive pace. Small RNAs and, in particular, micro RNAs (miRNAs) play a fundamental role in gene regulation through the activation of RNAi. Detailed insights into the mechanisms of RNAi have led to an improved understanding of gene regulation in normal and disease states, and thereby enabled the exploitation of RNAi for a variety of applications. In this book, an international panel of RNAi experts critically reviews the most interesting advances in basic applied RNAi research, highlighting the



3.

Record Nr.

UNINA9910794550503321

Autore

Oppliger Rolf

Titolo

Cryptography 101 : From Theory to Practice

Pubbl/distr/stampa

Norwood : , : Artech House, , 2021

©2021

Edizione

[1st ed.]

Descrizione fisica

1 online resource (679 pages)

Disciplina

005.824

Soggetti

Data encryption (Computer science)

Cryptography

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

Intro -- Cryptography 101: From Theory to Practice -- Contents -- Foreword -- Preface -- References -- Acknowledgments -- Chapter 1 Introduction -- 1.1 CRYPTOLOGY -- 1.2 CRYPTOGRAPHIC SYSTEMS -- 1.2.1 Classes of Cryptographic Systems -- 1.2.2 Secure Cryptographic Systems -- 1.3 HISTORICAL BACKGROUND INFORMATION -- 1.4 OUTLINE OF THE BOOK -- References -- Chapter 2 Cryptographic Systems -- 2.1 UNKEYED CRYPTOSYSTEMS -- 2.1.1 Random Generators -- 2.1.2 Random Functions -- 2.1.3 One-Way Functions -- 2.1.4 Cryptographic Hash Functions -- 2.2 SECRET KEY CRYPTOSYSTEMS -- 2.2.1 Pseudorandom Generators -- 2.2.2 Pseudorandom Functions -- 2.2.3 Symmetric Encryption -- 2.2.4 Message Authentication -- 2.2.5 Authenticated Encryption -- 2.3 PUBLIC KEY CRYPTOSYSTEMS -- 2.3.1 Key Establishment -- 2.3.2 Asymmetric Encryption Systems -- 2.4 FINAL REMARKS -- References -- Part I UNKEYEDC RYPTOSYSTEMS -- Chapter 3 Random Generators -- 3.1 INTRODUCTION -- 3.2 REALIZATIONS AND IMPLEMENTATIONS -- 3.2.1 Hardware-Based Random Generators -- 3.2.2 Software-Based Random Generators -- 3.2.3 Deskewing Techniques -- 3.3 STATISTICAL RANDOMNESS TESTING -- References -- Chapter 4 Random Functions -- 4.1 INTRODUCTION -- 4.2 IMPLEMENTATION -- 4.3 FINAL REMARKS -- Chapter 5 One-Way Functions -- 5.1 INTRODUCTION -- 5.2 CANDIDATE ONE-WAY FUNCTIONS -- 5.2.1 Discrete Exponentiation



Function -- 5.2.2 RSA Function -- 5.2.3 Modular Square Function -- 5.3 INTEGER FACTORIZATION ALGORITHMS -- 5.3.1 Special-Purpose Algorithms -- 5.3.2 General-Purpose Algorithms -- 5.3.3 State of the Art -- 5.4 ALGORITHMS FOR COMPUTING DISCRETE LOGARITHMS -- 5.4.1 Generic Algorithms -- 5.4.2 Nongeneric (Special-Purpose) Algorithms -- 5.4.3 State of the Art -- 5.5 ELLIPTIC CURVE CRYPTOGRAPHY -- 5.6 FINAL REMARKS -- References -- Chapter 6 Cryptographic Hash Functions -- 6.1 INTRODUCTION.

6.2 MERKLE-DAMGARD CONSTRUCTION -- 6.4 EXEMPLARY HASH FUNCTIONS -- 6.4.1 MD4 -- 6.4.2 MD5 -- 6.4.3 SHA-1 -- 6.4.4 SHA-2 Family -- 6.4.5 KECCAK and the SHA-3 Family -- 6.5 FINAL REMARKS -- Part II SECRET KEY CRYPTOSYSTEMS -- Chapter 7 Pseudorandom Generators -- 7.1 INTRODUCTION -- 7.2 EXEMPLARY CONSTRUCTIONS -- 7.3 CRYPTOGRAPHICALLY SECURE PRGs -- 7.3.1 Blum-Micali PRG -- 7.3.2 RSA PRG -- 7.3.3 BBS PRG -- 7.4 FINAL REMARKS -- References -- Chapter 8 Pseudorandom Functions -- 8.1 INTRODUCTION -- 8.2 SECURITY OF A PRF -- 8.3 RELATIONSHIP BETWEEN PRGs AND PRFs -- 8.3.1 PRF-Based PRG -- 8.3.2 PRG-Based PRF -- 8.4 RANDOM ORACLE MODEL -- 8.5 FINAL REMARKS -- References -- Chapter 9 Symmetric Encryption -- 9.1 INTRODUCTION -- 9.1.1 Block and Stream Ciphers -- 9.1.2 Attacks -- 9.2 HISTORICAL PERSPECTIVE -- 9.3 PERFECTLY SECURE ENCRYPTION -- 9.3 PERFECTLY SECURE ENCRYPTION -- 9.4 COMPUTATIONALLY SECURE ENCRYPTION -- 9.5 STREAM CIPHERS -- 9.5.1 LFSR-Based Stream Ciphers -- 9.5.2 Other Stream Ciphers -- 9.6 BLOCK CIPHERS -- 9.6.1 DES -- 9.6.2 AES -- 9.7 MODES OF OPERATION -- 9.7.1 ECB -- 9.7.2 CBC -- 9.7.3 CFB -- 9.7.4 OFB -- 9.7.5 CTR -- 9.8 FINAL REMARKS -- References -- Chapter 10 Message Authentication -- 10.1 INTRODUCTION -- 10.2 INFORMATION-THEORETICALLY SECURE MESSAGE AUTHENTICATION -- 10.3 COMPUTATIONALLY SECURE MESSAGE AUTHENTICATION -- 10.3.1 MACs Using A Symmetric Encryption System -- 10.3.2 MACs Using Keyed Hash Functions -- 10.3.3 Carter-WegmanMACs -- 10.4 FINAL REMARKS -- References -- Chapter 11 Authenticated Encryption -- 11.1 INTRODUCTION -- 11.2 AEAD CONSTRUCTIONS -- 11.2.1 CCM -- 11.2.2 GCM -- 11.3 FINAL REMARKS -- References -- Part III PUBLIC KEY CRYPTOSYSTEMS -- Chapter 12 Key Establishment -- 12.1 INTRODUCTION -- 12.2 KEY DISTRIBUTION -- 12.2.1 Merkle's Puzzles -- 12.2.2 Shamir's Three-Pass Protocol.

12.2.3 Asymmetric Encryption-Based Key Distribution Protocol -- 12.3 KEY AGREEMENT -- 12.4 QUANTUM CRYPTOGRAPHY -- 12.4.1 Basic Principles -- 12.4.2 Quantum Key Exchange Protocol -- 12.4.3 Historical and Recent Developments -- 12.5 FINAL REMARKS -- References -- Chapter 13 Asymmetric Encryption -- 13.1 INTRODUCTION -- 13.2 PROBABILISTIC ENCRYPTION -- 13.2.1 Algorithms -- 13.2.2 Assessment -- 13.3 ASYMMETRIC ENCRYPTION SYSTEMS -- 13.3.1 RSA -- 13.3.2 Rabin -- 13.3.3 Elgamal -- 13.3.4 Cramer-Shoup -- 13.4 IDENTITY-BASED ENCRYPTION -- 13.5 FULLY HOMOMORPHIC ENCRYPTION -- 13.6 FINAL REMARKS -- References -- Chapter 14 Digital Signatures -- 14.1 INTRODUCTION -- 14.2 DIGITAL SIGNATURE SYSTEMS -- 14.2.1 RSA -- 14.2.2 PSS and PSS-R -- 14.2.3 Rabin -- 14.2.4 Elgamal -- 14.2.5 Schnorr -- 14.2.6 DSA -- 14.2.7 ECDSA -- 14.2.8 Cramer-Shoup -- 14.3 IDENTITY-BASED SIGNATURES -- 14.4 ONE-TIME SIGNATURES -- 14.5 VARIANTS -- 14.5.1 Blind Signatures -- 14.5.2 Undeniable Signatures -- 14.5.3 Fail-Stop Signatures -- 14.5.4 Group Signatures -- 14.6 FINAL REMARKS -- References -- Chapter 15 Zero-Knowledge Proofs of Knowledge -- 15.1 INTRODUCTION -- 15.2 ZERO-KNOWLEDGE AUTHENTICATION PROTOCOLS -- 15.2.1 Fiat-Shamir -- 15.2.2 Guillou-Quisquater --



15.2.3 Schnorr -- 15.3 NONINTERACTIVE ZERO-KNOWLEDGE -- 15.4 FINAL REMARKS -- References -- Part IV CONCLUSIONS -- Chapter 16 Key Management -- 16.1 INTRODUCTION -- 16.1.1 Key Generation -- 16.1.2 Key Distribution -- 16.1.3 Key Storage -- 16.1.4 Key Destruction -- 16.2 SECRET SHARING -- 16.2.1 Shamir's System -- 16.2.2 Blakley's System -- 16.2.3 Verifiable Secret Sharing -- 16.2.4 Visual Cryptography -- 16.3 KEY RECOVERY -- 16.4 CERTIFICATE MANAGEMENT -- 16.4.1 Introduction -- 16.4.2 X.509 Certificates -- 16.4.3 OpenPGP Certificates -- 16.4.4 State of the Art -- 16.5 FINAL REMARKS -- References -- Chapter 17 Summary.

17.1 UNKEYED CRYPTOSYSTEMS -- 17.2 SECRET KEY CRYPTOSYSTEMS -- 17.3 PUBLIC KEY CRYPTOSYSTEMS -- 17.4 FINAL REMARKS -- Chapter 18 Outlook -- 18.1 THEORETICAL VIEWPOINT -- 18.2 PRACTICAL VIEWPOINT -- 18.3 PQC -- 18.3.1 Code-based Cryptosystems -- 18.3.2 Hash-based Cryptosystems -- 18.3.3 Lattice-based Cryptosystems -- 18.3.4 Isogeny-based Cryptosystems -- 18.3.5 Multivariate-based Cryptosystems -- 18.4 CLOSING REMARKS -- References -- Appendix A Discrete Mathematics -- A.1 ALGEBRAIC BASICS -- A.1.1 Preliminary Remarks -- A.1.2 Algebraic Structures -- A.1.3 Homomorphisms -- A.1.4 Permutations -- A.2 INTEGER ARITHMETIC -- A.2.1 Integer Division -- A.2.2 Common Divisors and Multiples -- A.2.3 Euclidean Algorithms -- A.2.4 Prime Numbers -- A.2.5 Factorization -- A.2.6 Euler's Totient Function -- A.3 MODULAR ARITHMETIC -- A.3.1 Modular Congruence -- A.3.2 Modular Exponentiation -- A.3.3 Chinese Remainder Theorem -- A.3.4 Fermat's Little Theorem -- A.3.5 Euler's Theorem -- A.3.6 Finite Fields Modulo Irreducible Polynomials -- A.3.7 Quadratic Residuosity -- A.3.8 Blum Integers -- References -- Appendix B Probability Theory -- B.1 BASIC TERMS AND CONCEPTS -- B.2 RANDOM VARIABLES -- B.2.1 Probability Distributions -- B.2.2 Marginal Distributions -- B.2.3 Conditional Probability Distributions -- B.2.4 Expectation -- B.2.5 Independence of Random Variables -- B.2.6 Markov's Inequality -- B.2.7 Variance and Standard Deviation -- B.2.8 Chebyshev's Inequality -- References -- Appendix C  Information Theory -- C.1 INTRODUCTION -- C.2 ENTROPY -- C.2.1 Joint Entropy -- C.2.2 Conditional Entropy -- C.2.3 Mutual Information -- C.3 REDUNDANCY -- C.4 KEY EQUIVOCATION AND UNICITY DISTANCE -- References -- Appendix D Complexity Theory -- D.1 PRELIMINARY REMARKS -- D.2 INTRODUCTION -- D.3 ASYMPTOTIC ORDER NOTATION -- D.4 EFFICIENT COMPUTATIONS -- D.5 COMPUTATIONAL MODELS.

D.6 COMPLEXITY CLASSES -- D.6.1 Complexity Class P -- D.6.2 Complexity Classes NP and coNP -- D.6.3 Complexity Class PP and Its Subclasses -- D.7 FINAL REMARKS -- References -- List of Symbols -- Abbreviations and Acronyms -- About the Author -- Index.



4.

Record Nr.

UNINA9910140933303321

Titolo

Military & aerospace electronics

Pubbl/distr/stampa

[Westborough, MA] : , : [Sentry Pub. Co.]

[Tulsa, Okla.] : , : [PennWell Pub. Co.]

Nashua, NH : , : Endeavor Business Media

Disciplina

623

623/.043/05

Soggetti

Electronics in military engineering

Avionics

Avionique

Periodicals.

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Periodico