| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910798252203321 |
|
|
Titolo |
Peace in the ancient world : concepts and theories / / edited by Kurt A. Raaflaub |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Chichester, England : , : Wiley Blackwell, , 2016 |
|
©2016 |
|
|
|
|
|
|
|
|
|
ISBN |
|
1-118-64514-6 |
1-118-64511-1 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (200 p.) |
|
|
|
|
|
|
Collana |
|
Ancient World : Comparative Histories |
THEi Wiley ebooks |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Peace (Philosophy) - History |
Pacifism - History |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references at the end of each chapters and index. |
|
|
|
|
|
|
|
|
Nota di contenuto |
|
Title Page; Table of Contents; Notes on Contributors; Series Editor's Preface; The Ancient World: Comparative Histories; Introduction; Chapter 1: Abhorring War, Yearning for Peace: The Quest for Peace in the Ancient World; Chapter 2: Concepts of Peace in Ancient Egypt; Chapter 3: Thinking about Peace in Ancient India; Chapter 4: Searching for Peace in the Warring States: Philosophical Debates and the Management of Violence in Early China; Chapter 5: Greek Concepts and Theories of Peace; Chapter 6: Broadening the Scope: Thinking about Peace in the Pre-Modern World |
Chapter 1: Abhorring War, Yearning for PeacePrologue; Five Cases and a Thesis; The Prevalence and Brutality of War in the Ancient World; Visions of Peace; Peace Cults; War Cults; Intellectual Concerns with Peace; Conclusion; Abbreviations; References; Chapter 2: Concepts of Peace in Ancient Egypt; The Egyptian World View: Conflict and Equilibrium; Peacefulness as Moral Value; Cultural Valuation of War and Peace; Terminology; Internal Strife and its Conceptual Treatment; Political Behavior and Foreign Policy; The peace treaty between Egypt and the Hittites; Conclusion; Abbreviations |
|
|
|
|
|
|
|
|
|
|
|
|
|
AbbreviationsReferences; Chapter 6: Broadening the Scope; "Universal Peace" in Ancient Empires; "Inner Peace" and Non-violence in the Axial Age; "Common Peace" Inside and Outside Sovereign States; Conclusion: Explaining Ideas about Peace; Abbreviation; References; Index; End User License Agreement |
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910965389703321 |
|
|
Titolo |
Information security management handbook / / edited by Harold F. Tipton, Micki Krause Nozaki |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Boca Raton : , : Auerbach Publications, , 2007- |
|
|
|
|
|
|
|
ISBN |
|
0-429-11284-X |
1-283-59665-2 |
9786613909107 |
1-4398-9315-2 |
|
|
|
|
|
|
|
|
Edizione |
[6th edition.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (495 p.) |
|
|
|
|
|
|
Collana |
|
Information security management handbook ; ; v. 6 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Computer security - Management |
Data protection |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
Nota di contenuto |
|
Front Cover; Contents; Introduction; Editors; Contributors; Chapter 1: What Business Associates Need to Know about Protected Health Information under HIPAA and HITECH; Chapter 2: E-Mail Security; Chapter 3: Appreciating Organizational Behavior and Institutions to Solidify Your Information Security Program; Chapter 4: The Information Security Auditors Have Arrived, Now What?; Chapter 5: Continuous Monitoring: Extremely Valuable to Deploy within Reason; Chapter 6: Social Networking; Chapter 7: Insider Threat Defense; Chapter 8: Risk Management in Public Key Certificate Applications |
Chapter 9: Server Virtualization: Information Security ConsiderationsChapter 10: Security Requirements Analysis; Chapter 11: CERT Resilience Management Model: An Overview; Chapter 12: |
|
|
|
|
|
|
|
|
|
|
|
Managing Bluetooth Security; Chapter 13: Slash and Burn: In Times of Recession, Do Not Let Emotions Drive Business Decisions; Chapter 15: Application Whitelisting; Chapter 16: Design of Information Security for Large System Development Projects; Chapter 17: Building Application Security Testing into the Software Development Life Cycle; Chapter 19: Format Preserving Encryption |
Chapter 20: Elliptic Curve CryptosystemsChapter 21: Pirating the Ultimate Killer App: Hacking Military Unmanned Aerial Vehicles; Chapter 22: Service-Oriented Architecture; Chapter 23: Cloud Security; Chapter 24: Enterprise Zones of Trust; Chapter 25: Complex Event Processing for Automated Security Event Analysis; Chapter 26: Records Management; Chapter 27: Data Backup Strategies: Traditional versus Cloud; Chapter 28: Managing Advanced Persistent Threats; Chapter 29: Virtualization Forensics; Information Security Management Handbook: Comprehensive Table of Contents; Back Cover |
|
|
|
|
|
|
Sommario/riassunto |
|
Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations. Reporting on the latest developments in information security and recent changes to the (ISC)2® CISSP Common Body of Knowledge (CBK®</SU |
|
|
|
|
|
|
|
| |