04877 am 22008893u 450 991014184240332120221206100914.090-04-25372-610.1163/9789004253728(CKB)2670000000395239(SSID)ssj0000507561(PQKBManifestationID)11358166(PQKBTitleCode)TC0000507561(PQKBWorkID)10546881(PQKB)11237159(MiAaPQ)EBC4636559(OCoLC)808384659(OCoLC)794697713(OCoLC)856976924(nllekb)BRILL9789004253728(oapen)https://directory.doabooks.org/handle/20.500.12854/26714(PPN)174543123(EXLCZ)99267000000039523920111110d2010 uy engurmn#||||||||txtrdacontentcrdamediacrrdacarrierGender, ritual and social formation in West Papua a configurational analysis comparing Kamoro and Asmat /Jan PouwerLeiden - BostonBrill2010Leiden :KITLV Press,2010.1 online resource (x, 300 pages) illustrations, mapsVerhandelingen van het Koninklijk Instituut voor Taal-, Land- en Volkenkunde ;258Includes glossary, bibliographical references (pages [281]-288) and index.Preliminary Material -- Chapter I: Prologue -- Chapter II: The ‘female’ contribution to life: Ema Kame rituals -- Chapter III: The ‘male’ contribution to life: Kaware ritual -- Chapter IV: The initiation of male adolescents -- Chapter V: Marking death -- Chapter VI: The theory of comparison and the context of the rituals -- Chapter VII: Ema Kame and Emak Cem -- Chapter VIII: Honouring the dead: Asmat display and performance -- Chapter IX: Male to female: Social opposition versus communal solidarity -- Chapter X: Initiating young males and commemorating the dead: On nose piercing and spirit poles -- Chapter XI: Asmat headhunting and the initiation of male adolescents -- Chapter XII: Conclusions -- Chapter XIII: Epilogue -- Glossary -- Bibliography -- Index.This study, based on a lifelong involvement with New Guinea, compares the culture of the Kamoro (18,000 people) with that of their eastern neighbours, the Asmat (40,000), both living on the south coast of West Papua, Indonesia. The comparison, showing substantial differences as well as striking similarities, contributes to a deeper understanding of both cultures. Part I looks at Kamoro society and culture through the window of its ritual cycle, framed by gender. Part II widens the view, offering in a comparative fashion a more detailed analysis of the socio-political and cosmo-mythological setting of the Kamoro and the Asmat rituals. Next is a systematic comparison of the rituals. The comparison includes a cross-cultural, structural analysis of relevant myths. This publication is of interest to scholars and students in Oceanic studies and those drawn to the comparative study of cultures. Jan Pouwer (1924) started his career as a government anthropologist in West New Guinea in the 1950s and 1960s, with periods of intensive fieldwork, in particular among the Kamoro. A distinguished anthropologist, he held professorships at universities around the world.Verhandelingen van het Koninklijk Instituut voor Taal-, Land- en Volkenkunde258.Mimika (Indonesian people)Asmat (Indonesian people)Asmat (Indonesian people)fastEthnologyfastManners and customsfastMimika (Indonesian people)fastRitualfastSex rolefastSocial conditionsfastPapua Barat (Indonesia)Social conditionsPapua Barat (Indonesia)Social life and customsIndonesiaPapua Baratfastindonesiapapua cultureoceanic studiesanthropologygender studiesAsmat peopleCanoeHeadhuntingKamoroKamoro languageSagoMimika (Indonesian people)Asmat (Indonesian people)Asmat (Indonesian people)Ethnology.Manners and customs.Mimika (Indonesian people)Ritual.Sex role.Social conditions.953.0049912Pouwer Jan800895NL-LeKBNL-LeKBUkMaJRUBOOK9910141842403321Gender, ritual and social formation in West Papua2010447UNINA05354nam 2200661 450 991081240550332120200520144314.01-118-95849-7(CKB)3710000000377848(EBL)1895166(SSID)ssj0001495350(PQKBManifestationID)11874025(PQKBTitleCode)TC0001495350(PQKBWorkID)11450283(PQKB)11220604(MiAaPQ)EBC1895166(Au-PeEL)EBL1895166(CaPaEBR)ebr11034356(CaONFJC)MIL770077(OCoLC)905490497(PPN)243410182(EXLCZ)99371000000037784820150406h20152015 uy| 0engur|n|---|||||txtccrPhishing dark waters the offensive and defensive sides of malicious e-mails /Christopher Hadnagy, Michele Fincher ; foreword by Robin DreekeIndianapolis, Indiana :Wiley,[2015]©20151 online resource (227 p.)Description based upon print version of record.1-119-18362-6 1-118-95847-0 Includes bibliographical references and index.Cover; Title Page; Copyright; Contents; Chapter 1 An Introduction to the Wild World of Phishing; Phishing 101; How People Phish; Examples; High-Profile Breaches; Phish in Their Natural Habitat; Phish with Bigger Teeth; Spear Phishing; Summary; Chapter 2 The Psychological Principles of Decision-Making; Decision-Making: Small Bits; Cognitive Bias; Physiological States; External Factors; The Bottom Line About Decision-Making; It Seemed Like a Good Idea at the Time; How Phishers Bait the Hook; Introducing the Amygdala; The Guild of Hijacked Amygdalas; Putting a Leash on the AmygdalaWash, Rinse, RepeatSummary; Chapter 3 Influence and Manipulation; Why the Difference Matters to Us; How Do I Tell the Difference?; How Will We Build Rapport with Our Targets?; How Will Our Targets Feel After They Discover They've Been Tested?; What Is Our Intent?; But the Bad Guys Will Use Manipulation . . .; Lies, All Lies; P Is for Punishment; Principles of Influence; Reciprocity; Obligation; Concession; Scarcity; Authority; Consistency and Commitment; Liking; Social Proof; More Fun with Influence; Our Social Nature; Physiological Response; Psychological ResponseThings to Know About ManipulationSummary; Chapter 4 Lessons in Protection; Lesson One: Critical Thinking; How Can Attackers Bypass This Method?; Lesson Two: Learn to Hover; What If I Already Clicked the Link and I Think It's Dangerous?; How Can Attackers Bypass This Method?; Lesson Three: URL Deciphering; How Can Attackers Bypass This Method?; Lesson Four: Analyzing E-mail Headers; How Can Attackers Bypass This Method?; Lesson Five: Sandboxing; How Can Attackers Bypass This Method?; The "Wall of Sheep," or a Net of Bad Ideas; Copy and Paste Your Troubles Away; Sharing Is CaringMy Mobile Is SecureA Good Antivirus Program Will Save You; Summary; Chapter 5 Plan Your Phishing Trip: Creating the Enterprise Phishing Program; The Basic Recipe; Why?; What's the Theme?; The Big, Fat, Not-So-Legal Section; Developing the Program; Setting a Baseline; Setting the Difficulty Level; Writing the Phish; Tracking and Statistics; Reporting; Phish, Educate, Repeat; Summary; Chapter 6 The Good, the Bad, and the Ugly: Policies and More; Oh, the Feels: Emotion and Policies; The Definition; The Bad; Making It "Good"; The Boss Is Exempt; The Definition; The Bad; Making It "Good"I'll Just Patch One of the HolesThe Definition; The Bad; Making It "Good"; Phish Just Enough to Hate It; The Definition; The Bad; Making It "Good"; If You Spot a Phish, Call This Number; The Definition; The Bad; Making It "Good"; The Bad Guys Take Mondays Off; The Definition; The Bad; Making It "Good"; If You Can't See It, You Are Safe; The Definition; The Bad; Making It "Good"; The Lesson for Us All; Summary; Chapter 7 The Professional Phisher's Tackle Bag; Commercial Applications; Rapid7 Metasploit Pro; ThreatSim; PhishMe; Wombat PhishGuru; PhishLine; Open Source ApplicationsSET: Social-Engineer ToolkitAn essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or cloPhishingIdentity theftPhishing.Identity theft.363.25363.259680973Hadnagy Christopher1657205Fincher MicheleMiAaPQMiAaPQMiAaPQBOOK9910812405503321Phishing dark waters4082130UNINA01943nam0 22004573i 450 VAN027459020240516111335.706N978303082458720240409d2021 |0itac50 baengCH|||| |||||Bayesian Optimization with Application to Computer ExperimentsTony Pourmohamad, Herbert K. H. LeeChamSpringer2021x, 104 p.ill.24 cm001VAN01029162001 SpringerBriefs in statistics210 Berlin [etc.]Springer2011-68-XXComputer science [MSC 2020]VANC019670MF62-XXStatistics [MSC 2020]VANC022998MFBayesian InferenceKW:KBayesian NetworkKW:KBlack box optimizationKW:KComputer modelsKW:KConstrained optimizationKW:KGaussian processesKW:KNetwork modelsKW:KProbability and Statistics in Computer ScienceKW:KSequential experimental designKW:KSimulatorKW:KSurrogate modelingKW:KCHChamVANL001889PourmohamadTonyVANV2270231073221LeeHerbert K. H.VANV227024614504Springer <editore>VANV108073650ITSOL20240614RICAhttps://doi.org/10.1007/978-3-030-82458-7E-book – Accesso al full-text attraverso riconoscimento IP di Ateneo, proxy e/o ShibbolethBIBLIOTECA DEL DIPARTIMENTO DI MATEMATICA E FISICAIT-CE0120VAN08NVAN0274590BIBLIOTECA DEL DIPARTIMENTO DI MATEMATICA E FISICA08CONS e-book 8157 08eMF8157 20240412 Bayesian Optimization with Application to Computer Experiments4148988UNICAMPANIA03498oas 2201153 a 450 991032945890332120251106213014.01099-0747(DE-599)ZDB2002340-6(DE-599)2002353-4(OCoLC)43969746(CONSER) 2001212357(CKB)954928624317(EXLCZ)9995492862431720000503b19851999 sy aengurmnu||||||||txtrdacontentcrdamediacrrdacarrierApplied stochastic models and data analysis[Chichester] ;[New York, N.Y.] John Wiley & Sons-©1999Refereed/Peer-reviewedPrint version: Applied stochastic models and data analysis (DLC_ 86643430 (OCoLC)11241541 8755-0024 Appl. stoch. models data anal.Stochastic analysisPeriodicalsStochastic processesPeriodicalsProbabilitiesPeriodicalsMathematical statisticsPeriodicalsIndustrial statisticsPeriodicalsCommercial statisticsPeriodicalsAnalyse stochastiquePériodiquesProcessus stochastiquesPériodiquesStatistique industriellePériodiquesStatistique commercialePériodiquesProbabilitésPériodiquesIndustrial statisticsfast(OCoLC)fst00971751Commercial statisticsfast(OCoLC)fst00869640Mathematical statisticsfast(OCoLC)fst01012127Probabilitiesfast(OCoLC)fst01077737Stochastic analysisfast(OCoLC)fst01133499Stochastic processesfast(OCoLC)fst01133519Anàlisi de sèries temporalsthubEstadística matemàticathubProbabilitatsthubPeriodicals.fastRevistes electròniques.thubStochastic analysisStochastic processesProbabilitiesMathematical statisticsIndustrial statisticsCommercial statisticsAnalyse stochastiqueProcessus stochastiquesStatistique industrielleStatistique commercialeProbabilitésIndustrial statistics.Commercial statistics.Mathematical statistics.Probabilities.Stochastic analysis.Stochastic processes.Anàlisi de sèries temporals.Estadística matemàtica.Probabilitats.519 $2 13OH1OH1NSDOCLCQMYGOCLCQOCLIULMYGOCLCQOCLCFVT2OCLCQOCLCEUKMGBOCLCQU3WOCLCQAU@OCLCOOCLCQOCLSFBUHLUEJOCLCLOCLCQJOURNAL9910329458903321Applied stochastic models and data analysis434906UNINA