03915nam 2200733 450 991082683240332120230111204602.00-8232-5748-70-8232-6155-70-8232-5751-70-8232-5749-510.1515/9780823257515(CKB)3710000000323690(EBL)3239958(StDuBDS)EDZ0001193197(MiAaPQ)EBC3239958(DE-B1597)555208(DE-B1597)9780823257515(OCoLC)900889133(MdBmJHUP)muse58930(MiAaPQ)EBC1961779(Au-PeEL)EBL3239958(CaPaEBR)ebr10998993(CaONFJC)MIL727812(OCoLC)923764345(Au-PeEL)EBL1961779(EXLCZ)99371000000032369020150109h20152015 uy 0engur|nu---|u||urdacontentrdamediardacarrierFigures of a changing world metaphor and the emergence of modern culture /Harry Berger, JrFirst EditionNew York :Fordham University Press,2015.©20151 online resource (174 p.)Includes index.1-322-96530-7 0-8232-5747-9 Includes bibliographical references and index.Front matter --contents --acknowledgments --one. Two Figures: (1) Metaphor --two. Two Figures: (2) Metonymy --three. Making Metaphors, Seeing Metonymies --four. Metonymy, Metaphor, and Perception: De Man and Nietzsche --five. Metaphor, Metonymy, and Redundancy --six. The Semiotics of Metaphor and Metonymy: Umberto Eco --seven. Frost and Roses: The Disenchantment of a Reluctant Modernist --eight. Metaphor and the Anxiety of Fictiveness: St. Augustine --nine. Metaphor and Metonymy in the Middle Ages: Aquinas and Dante --ten. Sacramental Anxiety in the Late Middle Ages: Hugh of St. Victor, the Abbot Suger, and Dante --eleven. Ulysses as Modernist: From Metonymy to Metaphor in Shakespeare’s Troilus and Cressida --notes --indexFigures of a Changing World offers a dramatic new account of cultural change, an account based on the distinction between two familiar rhetorical figures, metonymy and metaphor. The book treats metonymy as the basic organizing trope of traditional culture and metaphor as the basic organizing trope of modern culture. On the one hand, metonymies present themselves as analogies that articulate or reaffirm preexisting states of affairs. They are guarantors of facticity, a term that can be translated or defined as fact-like-ness. On the other hand, metaphors challenge the similarity they claim to establish, in order to feature departures from preexisting states of affairs. On the basis of this distinction, the author argues that metaphor and metonymy can be used as instruments both for the large-scale interpretation of tensions in cultural change and for the micro-interpretation of tensions within particular texts. In addressing the functioning of the two terms, the author draws upon and critiques the work of Friedrich Nietzsche, Roman Jakobson, Christian Metz, Paul Ricoeur, Umberto Eco, Edmund Leach, and Paul de Man.EvolutionChangeConnotation.De-fictionalizing.Denotation.Fictionalizing.Metaphor.Metonymy.Traditional and Modern Attitudes.Evolution.Change.116Berger HarryJr.,1924-2021,1272722MiAaPQMiAaPQMiAaPQBOOK9910826832403321Figures of a changing world3946159UNINA04754nam 2200685Ia 450 991081591890332120240418094532.01-281-79003-697866117900350-08-091953-7(CKB)1000000000555914(EBL)365617(OCoLC)437233568(SSID)ssj0000197908(PQKBManifestationID)11187939(PQKBTitleCode)TC0000197908(PQKBWorkID)10169283(PQKB)11470402(MiAaPQ)EBC365617(Au-PeEL)EBL365617(CaPaEBR)ebr10251243(CaONFJC)MIL179003(EXLCZ)99100000000055591420070904d2008 uy 0engur|n|---|||||txtccrMaritime security an introduction /Michael McNicholas1st ed.Amsterdam ;Boston Elsevier/Butterworth Heinemannc20081 online resource (470 p.)Butterworth-Heinemann homeland security seriesDescription based upon print version of record.0-12-370859-1 Includes bibliographical references and index.Front Cover; Maritime Security An Introduction; Copyright Page; Dedication Page; Table of Contents; About the Author; Contributors; Preface; Acknowledgments; Chapter 1: Commercial Seaports and Modes of Maritime Transport; Chapter 2: Documentation, Financial Transactions, and Business Entities in Commercial Maritime Transportation; Summary; Chapter 3: International and U.S. Maritime Security Regulation and Programs; Objectives; Introduction; The ISPS Code; Amendments to SOLAS; WCO's Framework of Standards to Secure and Facilitate Global Trade; U.S. Laws and ProgramsMaritime Transportation Security Act (MTSA)Customs-Trade Partnership Against Terrorism (C-TPAT); C-TPAT Security Criteria for Sea Carriers; Business Partner Requirements; Security Procedures; Container Security; Physical Access Controls; Personnel Security; Procedural Security; Security Training and Awareness; Physical Security; Information Technology Security; Security Assessment, Response, and Improvement; Summary; Chapter 4: Vulnerabilities in the Cargo Supply Chain; Objectives; Introduction; Vulnerabilities and Their Potential Impact; Lessons Learned from the Drug WarRecommended Security Practices at the Production/Loading PhaseManufacturer, Factory, and Plant; Recommended Security Practices at the Export Phase; Carriers and Seaports; Recommended Security Practices at the Importation/Distribution Phase; Ports of Entry and Importers; Special Vulnerabilities in the Maritime Environment; Cargo Theft; Internal Conspiracies and Techniques Used to Circumvent Security; Container Seals; ""Red Flags"" of Possible Criminal/Terrorist Surveillance; Summary; Chapter 5: Plagues of the Seas: Piracy and Stowaways; Objectives; Definition and Historical BeginningsHighlights of Recent Cases of PiracyTactics and Techniques in Piracy; Chapter 6: Drug Smuggling via Maritime Cargo, Containers, and Vessels; Chapter 7: Terrorism and Commercial Maritime Transportation; Chapter 8: A Strategic Blueprint for World-Class Seaport Security; Chapter 9: Port Security Management; Chapter 10: Threat Mitigation Strategies; Chapter 11: Information Security and Assurance; Further Reading; Glossary; IndexThe commercial maritime sector is highly vulnerable to theft and piracy, and presents a probable target for a major terrorist attack. The best way to prevent losses is to apply lessons learned in another arena--the struggle to curb drug smuggling. This effort has shown that successes can be achieved when effective and comprehensive security measures and procedures are implemented at key initial links in the cargo supply chain. The integrity and security of whole system are improved when efforts are focused at the primary ""choke point"" - the load seaports and their ships. This book Butterworth-Heinemann homeland security series.Merchant marineSecurity measuresShippingSecurity measuresMarine terminalsSecurity measuresMerchant marineSecurity measures.ShippingSecurity measures.Marine terminalsSecurity measures.387.16387.16 22387.16McNicholas Michael1685402MiAaPQMiAaPQMiAaPQBOOK9910815918903321Maritime security4057512UNINA