1.

Record Nr.

UNISA990006127060203316

Autore

CARBONARA, Pasquale

Titolo

4.1: Composizione degli edifici : sez. 9., Edifici e impianti per lo sport / Pasquale Carbonara

Pubbl/distr/stampa

Torino : Unione tipografico-editrice torinese, 1971

Descrizione fisica

1093 p., [6] p. di tav. : ill. ; 26 cm

Disciplina

720.351

Soggetti

Architettura - Enciclopedie

Collocazione

720.351 CAR/4.1

Lingua di pubblicazione

Italiano

Formato

Materiale a stampa

Livello bibliografico

Monografia

2.

Record Nr.

UNINA9910817183903321

Autore

Baum Matthew <1965->

Titolo

War and democratic constraint : how the public influences foreign policy / / Matthew A. Baum, Philip B. K. Potter

Pubbl/distr/stampa

Princeton, New Jersey : , : Princeton University Press, , 2015

©2015

ISBN

0-691-16523-8

1-4008-6647-2

Edizione

[Course Book]

Descrizione fisica

1 online resource (275 ) : illustrations, tables

Classificazione

POL011000POL016000POL028000SOC052000

Disciplina

327.1

Soggetti

International relations - Public opinion

International relations - Decision making - Citizen participation

Political participation

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Bibliographic Level Mode of Issuance: Monograph

Nota di bibliografia

Includes bibliographical references and index.



Nota di contenuto

Frontmatter -- CONTENTS -- List of Figures and Tables -- Acknowledgments -- Chapter 1. Introduction: Looking for Democratic Constraint -- Chapter 2. Democracies Are Not Created Equal: A Theory of Democratic Constraint -- Chapter 3. Democratic Constraint, the Democratic Peace, and Conflict Initiation -- Chapter 4. Looking for Audience Costs in All the Wrong Places: Constraint and Reciprocation -- Chapter 5. Willing and Politically Able: Democratic Constraint and Coalition Joining -- Chapter 6. Downs Meets the Press: How Party Systems Shape the News -- Chapter 7. Coalition Stories: Cases from the Iraq Coalition -- Chapter 8. Conclusion: Information, Constraint, and Democratic Foreign Policy -- References -- Index

Sommario/riassunto

Why do some democracies reflect their citizens' foreign policy preferences better than others? What roles do the media, political parties, and the electoral system play in a democracy's decision to join or avoid a war? War and Democratic Constraint shows that the key to how a government determines foreign policy rests on the transmission and availability of information. Citizens successfully hold their democratic governments accountable and a distinctive foreign policy emerges when two vital institutions-a diverse and independent political opposition and a robust media-are present to make timely information accessible.Matthew Baum and Philip Potter demonstrate that there must first be a politically potent opposition that can blow the whistle when a leader missteps. This counteracts leaders' incentives to obscure and misrepresent. Second, healthy media institutions must be in place and widely accessible in order to relay information from whistle-blowers to the public. Baum and Potter explore this communication mechanism during three different phases of international conflicts: when states initiate wars, when they respond to challenges from other states, or when they join preexisting groups of actors engaged in conflicts.Examining recent wars, including those in Afghanistan and Iraq, War and Democratic Constraint links domestic politics and mass media to international relations in a brand-new way.



3.

Record Nr.

UNINA9910963392403321

Autore

Gibson Darril

Titolo

Microsoft Windows Security : Essentials / / Darril Gibson

Pubbl/distr/stampa

Hoboken, : Wiley, 2011

Indiana, : Wiley, 2011

ISBN

1-283-17725-0

9786613177254

1-118-11454-X

Edizione

[1st ed.]

Descrizione fisica

1 online resource (374 p.)

Collana

Sybex serious skills

Essentials (Indianapolis, Ind.)

Disciplina

005.8

621.3916076

Soggetti

Electronic data processing personnel - Certification

Computer networks - Examinations

Computer networks -- Examinations -- Study guides

Computer security - Examinations

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di contenuto

Microsoft Windows Security Essentials; Introduction; Who Should Read This Book; What You Will Learn; Prerequisites; What You Need; What Is Covered in This Book; Chapter 1: Understanding Core Security Principles; Understanding Risk; Exploring the Security Triad; Protecting Against Loss of Confidentiality; Protecting Against Loss of Availability; Protecting Against Loss of Integrity; Implementing a Defense-in-Depth Security Strategy; Enforcing the Principle of Least Privilege; Hardening a Server; Reducing the Attack Surface; Keeping a System Updated; Enabling the Firewall

Installing Antivirus Software Chapter 2: Understanding Malware and Social Engineering; Comparing Malware; Viruses; Worms; Trojan Horses; Buffer-Overflow Attacks; Spyware; Understanding the Threat; Protecting Against Malware; Using Antivirus Software; Using Microsoft Security Essentials on Desktops; Thwarting Social-Engineering Attacks; Social Engineering in Person; Social Engineering with a Phone Call;



Recognizing Phishing Attempts; Recognizing Pharming; Protecting Email; Chapter 3: Understanding User Authentication; Comparing the Three Factors of Authentication

Using Passwords for Authentication Comparing Password Attack Methods; Creating Strong Passwords; Enforcing Strong Passwords; Exploring Account Lockout Policies; Unlocking an Account; Resetting a Password; Changing a Password; Creating a Password-Reset Disk; Using Smart Cards and Token Devices for Authentication; Using Biometrics for Authentication; Starting Applications with Run As Administrator; Preventing Time Skew with Kerberos; Identifying RADIUS Capabilities; Identifying Unsecure Authentication Protocols; LM; NTLM (NTLMv1); Chapter 4: Securing Access with Permissions

Comparing NTFS Permissions Identifying Basic NTFS Permissions; Identifying Advanced NTFS Permissions; Combining Permissions; Enabling and Disabling Permission Inheritance; Moving and Copying Files; Comparing NTFS and FAT; Exploring Share Permissions; Identifying Share Permissions; Combining NTFS and Share Permissions; Identifying Active Directory Permissions; Viewing Active Directory Users and Computers; Comparing NTFS and Active Directory Permissions; Viewing Active Directory Permissions; Assigning Registry Permissions; Chapter 5: Using Audit Policies and Network Auditing

Exploring Audit Policies Exploring Object Access Auditing; Comparing Account Logon and Logon Events; Exploring Directory Service Access Auditing; Understanding Account Management Auditing; Understanding System Events Auditing; Understanding Privilege Use Auditing; Understanding Policy Change Auditing; Understanding Process Tracking; Enabling Auditing; Enabling Object Access Auditing; Enabling Directory Service Access Auditing; Viewing Audit Information; Managing Security Logs; Saving Audit Information; Securing Audit Information; Auditing a Network with MBSA; Installing MBSA; Running MBSA

Chapter 6: Protecting Clients and Servers

Sommario/riassunto

Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be