04733nam 2200685 a 450 991045401240332120200520144314.00-8147-7738-41-4416-1567-910.18574/9780814777381(CKB)1000000000786050(EBL)865906(OCoLC)779828293(SSID)ssj0000218508(PQKBManifestationID)11912342(PQKBTitleCode)TC0000218508(PQKBWorkID)10220665(PQKB)11184031(MiAaPQ)EBC865906(OCoLC)429904298(MdBmJHUP)muse10404(DE-B1597)546951(DE-B1597)9780814777381(Au-PeEL)EBL865906(CaPaEBR)ebr10313202(EXLCZ)99100000000078605020081212d2009 uy 0engur|n|---|||||txtccrThe passionate Torah[electronic resource] sex and Judaism /edited by Danya RuttenbergNew York New York University Pressc20091 online resource (305 p.)Includes bibliographical references and indexes.0-8147-7605-1 0-8147-7604-3 Frontmatter -- Contents -- Acknowledgments -- Introduction -- 1 Sotah -- 2 Prostitution -- 3 Divorcing Ba’al -- 4 The Sage and the Other Woman -- 5 Intermarriage, Gender, and Nation in the Hebrew Bible -- 6 Good Sex -- 7 The Erotics of Sexual Segregation -- 8 Reclaiming Nidah and Mikveh through Ideological and Practical Reinterpretation -- 9 The Goy of Sex -- 10 A Jewish Perspective on Birth Control and Procreation -- 11 Not Like a Virgin -- 12 Reconsidering Solitary Sex from a Jewish Perspective -- 13 “Created by the Hand of Heaven” -- 14 Toward a New Tzniut -- 15 On the Religious Signifi cance of Homosexuality; or, Queering God, Torah, and Israel -- 16 Heruta’s Ruse -- 17 Love the One You’re With -- 18 Eden for Grown-Ups -- Glossary -- Contributors -- Index of Sources -- Subject Index In this unique collection of essays, some of today’s smartest Jewish thinkers explore a broad range of fundamental questions in an effort to balance ancient tradition and modern sexuality.In the last few decades a number of factors—post-modernism, feminism, queer liberation, and more—have brought discussion of sexuality to the fore, and with it a whole new set of questions that challenge time-honored traditions and ways of thinking. For Jews of all backgrounds, this has often led to an unhappy standoff between tradition and sexual empowerment.Yet as The Passionate Torah illustrates, it is of critical importance to see beyond this apparent conflict if Jews are to embrace both their religious beliefs and their sexuality. With incisive essays from contemporary rabbis, scholars, thinkers, and writers, this collection not only surveys the challenges that sexuality poses to Jewish belief, but also offers fresh new perspectives and insights on the changing place of sexuality within Jewish theology—and Jewish lives. Covering topics such as monogamy, inter-faith relationships, reproductive technology, homosexuality, and a host of other hot-button issues, these writings consider how contemporary Jews can engage themselves, their loved ones, and their tradition in a way that’s both sexy and sanctified.Seeking to deepen the Jewish conversation about sexuality, The Passionate Torah brings together brilliant thinkers in an attempt to bridge the gap between the sacred and the sexual.Contributors: Rebecca Alpert, Wendy Love Anderson, Judith R. Baskin, Aryeh Cohen, Elliot Dorff, Esther Fuchs, Bonna Haberman, Elliot Kukla, Gail Labovitz, Malka Landau, Sarra Lev, Laura Levitt, Sara Meirowitz, Jay Michaelson, Haviva Ner-David, Danya Ruttenberg, Naomi Seidman, and Arthur Waskow.SexReligious aspectsJudaismSexual ethicsModestyReligious aspectsJudaismHomosexualityReligious aspectsJudaismFeminismReligious aspectsJudaismElectronic books.SexReligious aspectsJudaism.Sexual ethics.ModestyReligious aspectsJudaism.HomosexualityReligious aspectsJudaism.FeminismReligious aspectsJudaism.296.3/66Ruttenberg Danya951870MiAaPQMiAaPQMiAaPQBOOK9910454012403321The passionate Torah2487433UNINA01105nam a22002531i 450099100423169970753620031012135617.0031111s1967 gw |||||||||||||||||ger b12559179-39ule_instARCHE-059243ExLDip.to LingueitaA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l.832.6Böckmann, Paul388784Schillers Geisteshaltung als Bedingung seines dramatischen Schaffens /Paul BöckmannDarmstadt :Wissenschaftliche Buchgesellschaft,1967VIII, 163 p. ;23 cmSchiller, Friedrich(1759-1805).b1255917902-04-1413-11-03991004231699707536LE012 BÖC 34012012000087347le012-E0.00-l- 00000.i1301164913-11-03LE012 BÖC 102322012000087408le012-E0.00-l- 00000.i1301165013-11-03Schillers Geisteshaltung als Bedingung seines dramatischen Schaffens174028UNISALENTOle01213-11-03ma -gergw 0207543nam 22007695 450 991048410640332120251107173723.03-319-72389-810.1007/978-3-319-72389-1(CKB)4100000001381785(DE-He213)978-3-319-72389-1(MiAaPQ)EBC6298893(MiAaPQ)EBC5591214(Au-PeEL)EBL5591214(OCoLC)1015336429(PPN)222227885(EXLCZ)99410000000138178520171206d2017 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierSecurity, Privacy, and Anonymity in Computation, Communication, and Storage 10th International Conference, SpaCCS 2017, Guangzhou, China, December 12-15, 2017, Proceedings /edited by Guojun Wang, Mohammed Atiquzzaman, Zheng Yan, Kim-Kwang Raymond Choo1st ed. 2017.Cham :Springer International Publishing :Imprint: Springer,2017.1 online resource (XVIII, 610 p. 200 illus.) Information Systems and Applications, incl. Internet/Web, and HCI,2946-1642 ;106563-319-72388-X Includes bibliographical references and index.Optimized Analysis Based on Improved Mutation and Crossover Operator for Differential Evolution Algorithm -- Revisiting Localization Attacks in Mobile App People-Nearby Services -- Lengthening Unidimensional Continuous-variable Quantum Key Distribution with Noiseless Linear Amplifier -- Research on Internet of Vehicles' Privacy Protection Based on Tamper-Proof with Ciphertext -- An Attack to an Anonymous Certi cateless Group Key Agreement Scheme and its Improvement -- A Space Effcient Algorithm for LCIS Problem -- Improving the Efficiency of Dynamic Programming in Big Data Computing -- Traceable and Complete Fine-Grained Revocable Multi-Authority Attribute-Based Encryption Scheme in Social Network -- The All Seeing Eye: Web to App Intercommunication for Session Fingerprinting in Android -- An Efficient Hierarchical Identity-Based Encryption Scheme for the Key Escrow -- An Improved Pre-Copy Transmission Algorithm in Mobile Cloud Computing -- Motivation of DDOS Attack-Aware Link Assignment between Switches to SDN Controllers -- TIM: A Trust Insurance Mechanism for Network Function Virtualization Based on Trusted Computing -- Personalized Semantic Location Privacy Preservation Algorithm Based on Query Processing Cost Optimization -- Smartphone Bloatware: An Overlooked Privacy Problem -- An ECC-Based off-line Anonymous Grouping-proof Protocol -- PCSD: A Tool for Android Malware Detection -- Authorship Analysis of Social Media Contents Using Tone and Personality Features -- Privacy-Preserving Handover Authentication Protocol from Lightweight Identity-Based Signature for Wireless Networks -- Spatial Outlier Information Hiding Algorithm Based on Complex Transformation -- A Reputation Model Considering Repurchase Behavior and Mechanism Design to Promote Repurchase -- Chinese Named Entity Recognition Based on B-LSTM Neural Network with Additional Features -- Amplified Locality-Sensitive Hashing for Privacypreserving Distributed Service Recommendation -- Learn to Accelerate Identifying New TestCases in Fuzzing -- Service Selection Based on User Privacy Risk Evaluation -- An Efficient Lattice-Based Proxy Signature with Message Recovery -- FABAC: A Flexible Fuzzy Attribute-Based Access Control Mechanism -- Security Analysis and Improvement of An Anonymous Attribute-Based Proxy Re-encryption -- Relacha: Using Associative Meaning for Image Captcha Understandability -- Identification of Natural Images and Computer Generated Graphics Based on Multiple LBPs in Multicolor Spaces -- A Formal Android Permission Model Based on the B Method -- S-SurF: An Enhanced Secure Bulk Data Dissemination in Wireless Sensor Networks -- MCloud: Efficient Monitoring Framework for Cloud Computing Platforms -- Secure Vibration Control of Flexible Arms based on Operators' Behaviors -- A New Color Image Encryption Scheme Based on Chaotic Hénon Map and Lü System -- A Distributed Authentication Protocol using Identity-based Encryption and Blockchain for LEO Network -- A Detection System for Distributed DoS Attacks Based on Automatic Extraction of Normal Mode and Its Performance Evaluation -- A Unified Model for Detecting Privacy Leakage on Android -- Multi-party Security Computation with Differential Privacy Over Outsourced Data -- REW-SMT: A New Approach for Rewriting XACML Request with Dynamic Big Data Security Policies -- Decoupling Security Services from IaaS Cloud Through Remote Virtual Machine Introspection -- Privacy Preserving Hierarchical Clustering over Multi-Party Data Distribution -- Improving MQTT by Inclusion of Usage Control -- Using JSON to Specify Privacy Preserving-enabled Attribute-based Access Control Policies -- Comprehensive Diversity in Recommender Systems -- Towards Intelligent System Wide Information Management for Air Traffic Management -- A Security Risk Management Model for Cloud Computing Systems: Infrastructure As A Service. .This book constitutes the refereed proceedings of the 10th International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage, SpaCCS 2017, held in Guangzhou, China, in December 2017. The 47 papers presented in this volume were carefully reviewed and selected from 140 submissions. They deal with research findings, achievements, innovations and perspectives in information security and related fields covering topics such as security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage.Information Systems and Applications, incl. Internet/Web, and HCI,2946-1642 ;10656Data protectionComputer networksComputer engineeringCryptographyData encryption (Computer science)Artificial intelligenceData and Information SecurityComputer Communication NetworksComputer Engineering and NetworksCryptologyArtificial IntelligenceData protection.Computer networks.Computer engineering.Cryptography.Data encryption (Computer science).Artificial intelligence.Data and Information Security.Computer Communication Networks.Computer Engineering and Networks.Cryptology.Artificial Intelligence.004Wang Guojunedthttp://id.loc.gov/vocabulary/relators/edtAtiquzzaman Mohammededthttp://id.loc.gov/vocabulary/relators/edtYan Zhengedthttp://id.loc.gov/vocabulary/relators/edtChoo Kim-Kwang Raymondedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910484106403321Security, Privacy, and Anonymity in Computation, Communication, and Storage2295526UNINA