03592nam 2200721Ia 450 991046233280332120200520144314.01-283-54074-697866138531961-61168-301-7(CKB)2670000000246586(EBL)1085107(OCoLC)808670081(SSID)ssj0000744552(PQKBManifestationID)11378845(PQKBTitleCode)TC0000744552(PQKBWorkID)10844865(PQKB)10743279(MiAaPQ)EBC1085107(MdBmJHUP)muse18921(Au-PeEL)EBL1085107(CaPaEBR)ebr10603782(CaONFJC)MIL385319(EXLCZ)99267000000024658620120229d2012 uy 0engur|n|---|||||txtccrTime and the digital[electronic resource] connecting technology, aesthetics, and a process philosophy of time /Timothy Scott BarkerHanover, N.H. Dartmouth College Pressc20121 online resource (249 p.)Interfaces, studies in visual cultureDescription based upon print version of record.1-61168-299-1 Includes bibliographical references (p. 215-225) and index.Title Page; Contents; Illustrations; Acknowledgments; Introduction; Whitehead and Deleuze; Trains, Telephones, Televisions; Mediation; Time, Process, and Multi-temporality; 1 | Experimenting with Time; Convergences; Performing Digital Aesthetics; Technology as Temporalizing; 2 | Time and Process; Process; Whitehead's Time; What Is an Event?; Perceiving Events; 3 | Deleuze's Timeand Serres's Multi-temporality; What Deleuze Reads in Bergson; The Virtual; Serres's Time and Digital "Presentness"; A Time That Moves Sideways; 4 | The Time of David Claerbout, Bill Viola, and Dan GrahamThe Time of David ClaerboutThe Time of Bill Viola; The Time of Dan Graham; 5 | Events & Interactive Aesthetics; The Event and Present; The Story Is Like a River . . .; Time and T_Visionarium; Re-presenting Events; Rethinking the User: Humans and Technology; 6 | Technology, Aesthetics, & Deleuze's Virtual; Time and the Virtual; Delays and Movement; Extensions, Entanglements, and Prehension; 7 | A Unison of Becoming; The Effect of Relations; A Digital Extensive Continuum; The Digital Past; Time, Process, and Databases; 8 | Databases and Time; Multi-temporality and Frames; Organizing TemporalityEvents and the ArchiveThe Database in Time; The Database and Temporal Relationships; Reterritorializing Data; Databases and the Extension of Occasions; Conclusion; Notes; Bibliography; IndexAn original consideration of the temporal in digital art and aestheticsInterfaces: Studies in Visual CultureHuman-computer interactionDigital mediaPhilosophySpace and timeAestheticsTechnology and the artsElectronic books.Human-computer interaction.Digital mediaPhilosophy.Space and time.Aesthetics.Technology and the arts.004.01/9004.019Barker Timothy Scott978777MiAaPQMiAaPQMiAaPQBOOK9910462332803321Time and the digital2230984UNINA04715nam 22008175 450 99646634370331620210430124634.03-030-12786-910.1007/978-3-030-12786-2(CKB)4100000007598268(DE-He213)978-3-030-12786-2(MiAaPQ)EBC5924607(PPN)233799761(EXLCZ)99410000000759826820190130d2019 u| 0engurnn#008mamaatxtrdacontentcrdamediacrrdacarrierComputer Security[electronic resource] ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers /edited by Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis1st ed. 2019.Cham :Springer International Publishing :Imprint: Springer,2019.1 online resource (X, 233 p. 108 illus., 78 illus. in color.)Security and Cryptology ;11387Includes index.3-030-12785-0 This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2018, and the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2018, held in Barcelona, Spain, in September 2018, in conjunction with the 23rd European Symposium on Research in Computer Security, ESORICS 2018. The CyberICPS Workshop received 15 submissions from which 8 full papers were selected for presentation. They cover topics related to threats, vulnerabilities and risks that cyber-physical systems and industrial control systems face; cyber attacks that may be launched against such systems; and ways of detecting and responding to such attacks. From the SECPRE Workshop 5 full papers out of 11 submissions are included. The selected papers deal with aspects of security and privacy requirements assurance and evaluation; and security requirements elicitation and modelling.Security and Cryptology ;11387Seguridad informáticaDelitos por ordenadorComputersLaw and legislationComputer organizationSoftware engineeringApplication softwareSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Computer Crimehttps://scigraph.springernature.com/ontologies/product-market-codes/I28070Legal Aspects of Computinghttps://scigraph.springernature.com/ontologies/product-market-codes/I24059Computer Systems Organization and Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13006Software Engineeringhttps://scigraph.springernature.com/ontologies/product-market-codes/I14029Information Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040Seguridad informáticaDelitos por ordenadorComputers.Law and legislation.Computer organization.Software engineering.Application software.Systems and Data Security.Computer Crime.Legal Aspects of Computing.Computer Systems Organization and Communication Networks.Software Engineering.Information Systems Applications (incl. Internet).005.8Katsikas Sokratis Kedthttp://id.loc.gov/vocabulary/relators/edtCuppens Frédéricedthttp://id.loc.gov/vocabulary/relators/edtCuppens Noraedthttp://id.loc.gov/vocabulary/relators/edtLambrinoudakis Costasedthttp://id.loc.gov/vocabulary/relators/edtAntón Annieedthttp://id.loc.gov/vocabulary/relators/edtGritzalis Stefanosedthttp://id.loc.gov/vocabulary/relators/edtMylopoulos Johnedthttp://id.loc.gov/vocabulary/relators/edtKalloniatis Christosedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996466343703316Computer & security878224UNISA