LEADER 01412nam--2200457---450 001 990000796540203316 005 20211017194431.0 010 $a88-7989-082-4 035 $a0079654 035 $aUSA010079654 035 $a(ALEPH)000079654USA01 035 $a0079654 100 $a20011210d1994----km-y0ENGy0103----ba 101 $aita 102 $aIT 200 1 $aDialogo sulla modernità$fKarl Lowith e Leo Strauss$gintroduzione di Roberto Esposito$gtraduzione di Alessandro Ferrucci 210 $aRoma$cDonzelli$d1994 215 $a34 p.$d17 cm 225 2 $aSaggine$v5 410 $12001$aSaggine$v5 676 $a193 700 1$aLOWITH,$bKarl$0375663 701 1$aSTRAUSS,$bLeo$0143827 702 1$aESPOSITO,$bRoberto 801 0$aIT$bsalbc$gISBD 912 $a990000796540203316 951 $aII.1.D. 443 (VARIE COLL. 950/5)$b120624 LM$bVARIE COLL.$cUMA 951 $aXV.18.MISC. 6 (FDC LOW)$b7751 FIL$cXV.18.MISC$d544037 959 $aBK 969 $aFIL 969 $aFDECI 979 $aPATTY$b90$c20011210$lUSA01$h1028 979 $c20020403$lUSA01$h1726 979 $aPATRY$b90$c20040406$lUSA01$h1655 979 $aCOPAT4$b90$c20050211$lUSA01$h1446 979 $aDSSP1$b90$c20110221$lUSA01$h1218 979 $c20121027$lUSA01$h1545 979 $c20121027$lUSA01$h1606 979 $c20121027$lUSA01$h1610 996 $aDialogo sulla modernità$9692550 997 $aUNISA LEADER 05661nam 2200793Ia 450 001 9910143283903321 005 20200520144314.0 010 $a1-78268-688-6 010 $a1-280-19952-0 010 $a9786610199525 010 $a0-470-79432-1 010 $a0-470-99689-7 010 $a1-4051-3736-3 035 $a(CKB)1000000000342181 035 $a(EBL)228533 035 $a(OCoLC)299571210 035 $a(SSID)ssj0000126103 035 $a(PQKBManifestationID)11136923 035 $a(PQKBTitleCode)TC0000126103 035 $a(PQKBWorkID)10030921 035 $a(PQKB)10002248 035 $a(MiAaPQ)EBC228533 035 $a(Au-PeEL)EBL228533 035 $a(CaPaEBR)ebr10158779 035 $a(CaONFJC)MIL19952 035 $a(OCoLC)936894997 035 $a(PPN)224542702 035 $a(EXLCZ)991000000000342181 100 $a20040330d2005 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 02$aA companion to feminist geography$b[electronic resource] /$fedited by Lise Nelson & Joni Seager 210 $aMalden, MA ;$aOxford $cBlackwell Pub.$d2005 215 $a1 online resource (637 p.) 225 1 $aBlackwell companions to geography ;$v6 300 $aDescription based upon print version of record. 311 $a1-4051-0186-5 320 $aIncludes bibliographical references and index. 327 $aA Companion to Feminist Geography; Contents; List of Contributors; Acknowledgments; 1 Introduction; Part I Contexts; 2 Situating Gender; 3 Anti-racist Feminism in Geography: An Agenda for Social Action; 4 A Bodily Notion of Research: Power, Difference, and Specificity in Feminist Methodology; 5 Transnational Mobilities and Challenges; Part II Work; 6 Feminist Analyses of Work: Rethinking the Boundaries, Gendering, and Spatiality of Work; 7 Shea Butter, Globalization, and Women of Burkina Faso; 8 Working on the Global Assembly Line 327 $a9 From Migrant to Immigrant: Domestic Workers Settle in Vancouver, Canada10 Borders, Embodiment, and Mobility: Feminist Migration Studies in Geography; 11 The Changing Roles of Female Labor in Economic Expansion and Decline: The Case of the Istanbul Clothing Industry; 12 Female Labor in Sex Trafficking: A Darker Side of Globalization; 13 Changing the Gender of Entrepreneurship; 14 Gender and Empowerment: Creating "Thus Far and No Further" Supportive Structures. A Case from India; Part III City; 15 Feminist Geographies of the "City": Multiple Voices, Multiple Meanings 327 $a16 Spaces of Change: Gender, Information Technology, and New Geographies of Mobility and Fixity in the Early Twentieth-century Information Economy17 Gender and the City: The Different Formations of Belonging; 18 Urban Space in Plural: Elastic, Tamed, Suppressed; 19 Daycare Services Provision for Working Women in Japan; 20 Organizing from the Margins: Grappling with "Empowerment" in India and South Africa; 21 Moving beyond "Gender and GIS" to a Feminist Perspective on Information Technologies: The Impact of Welfare Reform on Women's IT Needs 327 $a22 Women Outdoors: Destabilizing the Public/Private DichotomyPart IV Body; 23 Situating Bodies; 24 Bodies, State Discipline, and the Performance of Gender in a South African Women's Prison; 25 HIV/AIDS Interventions and the Politics of the African Woman's Body; 26 British Pakistani Muslim Women: Marking the Body, Marking the Nation; 27 Transversal Circuits: Transnational Sexualities and Trinidad; Part V Environment; 28 Listening to the Landscapes of Mama Tingo: From the "Woman Question" in Sustainable Development to Feminist Political Ecology in Zambrana-Chacuey, Dominican Republic 327 $a29 Gender Relations beyond Farm Fences: Reframing the Spatial Context of Local Forest Livelihoods30 The New Species of Capitalism: An Ecofeminist Comment on Animal Biotechnology; 31 Siren Songs: Gendered Discourses of Concern for Sea Creatures; 32 Geographic Information and Women's Empowerment: A Breast Cancer Example; 33 Performing a "Global Sense of Place": Women's Actions for Environmental Justice; Part VI State/Nation; 34 Feminist Political Geographies; 35 Gender, Race, and Nationalism: American Identity and Economic Imperialism at the Turn of the Twentieth Century 327 $a36 Virility and Violation in the US "War on Terrorism" 330 $aA Companion to Feminist Geography captures the breadth and diversity of this vibrant and substantive field. Shows how feminist geography has changed the landscape of geographical inquiry and knowledge since the 1970s. Explores the diverse literatures that comprise feminist geography today. Showcases cutting-edge research by feminist geographers. Charts emerging areas of scholarship, such as the body and the nation. Contributions from 50 leading international scholars in the field. Each chapter can be read for its own distincti 410 0$aBlackwell companions to geography ;$v6. 606 $aFeminist geography 606 $aWomen$xSocial conditions 606 $aWomen$xEmployment 606 $aWomen and city planning 606 $aWomen and the environment 615 0$aFeminist geography. 615 0$aWomen$xSocial conditions. 615 0$aWomen$xEmployment. 615 0$aWomen and city planning. 615 0$aWomen and the environment. 676 $a305.42 701 $aNelson$b Lise$0930731 701 $aSeager$b Joni$0930732 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910143283903321 996 $aA companion to feminist geography$92093476 997 $aUNINA LEADER 05986nam 22006975 450 001 9910484365103321 005 20251225205233.0 010 $a3-319-69471-5 024 7 $a10.1007/978-3-319-69471-9 035 $a(CKB)4100000000881987 035 $a(DE-He213)978-3-319-69471-9 035 $a(MiAaPQ)EBC6296565 035 $a(MiAaPQ)EBC5578390 035 $a(Au-PeEL)EBL5578390 035 $a(OCoLC)1008592011 035 $a(PPN)220121621 035 $a(EXLCZ)994100000000881987 100 $a20171022d2017 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyberspace Safety and Security $e9th International Symposium, CSS 2017, Xi?an China, October 23?25, 2017, Proceedings /$fedited by Sheng Wen, Wei Wu, Aniello Castiglione 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (XIV, 532 p. 182 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v10581 311 08$a3-319-69470-7 327 $aDetection of lurkers in Online Social Networks -- Static Taint Analysis Method for Intent Injection Vulnerability in Android Applications -- Achieving Differential Privacy of Data Disclosure from Non-Intrusive Load Monitoring in Smart Grid -- Protecting in-memory data cache with secure enclaves in untrusted cloud -- A New Way for Extracting Region of Interest from Palmprint by Detecting Key Points -- An Anonymization Method to Improve Data Utility for Classification -- Efficient Privacy Preserving Multi-factor Ranking with Approximate Search over Encrypted Big Cloud Data -- A Fair Three-party Contract Singing Protocol Based on Blockchain -- Securely Outsourcing Decentralized Multi-authority Attribute Based Signature -- Efficient CCA2 Secure Revocable Multi-Authority Large-Universe Attribute-Based Encryption -- CloudDPI: Cloud-based Privacy-preserving Deep Packet Inspection via Reversible Sketch -- Cloud Data Integrity Checking with Deduplication for Confidential Data Storage -- Noisy Smoothing Image Source Identification -- Supporting User Authorization Queries in RBAC Systems by Role-Permission Reassignment -- An Information Theory Based Approach for Identifying Inuential Spreaders in Temporal Networks -- Privacy-preserving Comparable Encryption Scheme in Cloud Computing -- Detecting Malicious Nodes in Medical Smartphone Networks through Euclidean Distance-based Behavioral Profiling -- Two-phase Locality-Sensitive Hashing for Privacy-preserving Distributed Service Recommendation -- Trusted Industry Control System based on Hardware Security Module -- A DP Canopy K-means Algorithm for Privacy Preservation of Hadoop Platform -- On Using Wearable Devices to Steal Your Passwords: A Fuzzy Inference Approach -- HypTracker: A Hypervisor to Detect Malwares through System Call Analysis on ARM -- A Fibonacci based batch auditing protocol for cloud data -- A WeChat User Geolocating Algorithm Based on the Relation Between Reported and Actual Distance -- An Online Approach to Defeating Return-Oriented-Programming Attacks -- An Improved Authentication Scheme for the Integrated EPR Information System -- KGBIAC:Knowledge Graph Based Intelligent Alert Correlation Framework -- A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks through Fog Computing -- Predicting Vulnerable Software Components using software network graph -- My Smartphone Knows Your Health Data: Exploiting Android-Based Deception Attacks Against Smartbands -- A novel image encryption scheme using Josephus permutation and image Filtering -- Modeling and Hopf bifurcation analysis of benign worms with quarantine strategy -- Accountable Multi-Authority Ciphertext-Policy Attribute-Based Encryption without Key Escrow and Key Abuse -- Optimization of Cloud Workow Scheduling Based on Balanced Clustering -- DexPro: A Bytecode Level Code Protection System for Android Applications -- Privacy Preserving Authenticating and Billing Scheme for Video Streaming Service -- Secure Role-based Access Control over Outsourced EMRs against Unwanted Leakage -- Users' Perceived Control, Trust and Expectation on Privacy Settings of Smartphone.  . 330 $aThis book constitutes the proceedings of the 9th International Symposium on Cyberspace Safety and Security, CSS 2017, held in Xi?an, China in October 2017. The 31 full papers and 10 short papers presented in this volume were carefully reviewed and selected from 120 submissions. The papers focus on cyberspace safety and security such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v10581 606 $aData protection 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputers and civilization 606 $aData and Information Security 606 $aComputer Communication Networks 606 $aCryptology 606 $aComputers and Society 615 0$aData protection. 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputers and civilization. 615 14$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$aCryptology. 615 24$aComputers and Society. 676 $a005.8 702 $aWen$b Sheng$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWu$b Wei$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCastiglione$b Aniello$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484365103321 996 $aCyberspace Safety and Security$92174991 997 $aUNINA