LEADER 03899nam 22007812 450 001 9910786157403321 005 20151005020622.0 010 $a1-107-23313-5 010 $a1-139-60970-X 010 $a1-139-62086-X 010 $a1-139-61156-9 010 $a1-107-25519-8 010 $a1-139-61528-9 010 $a1-139-62458-X 010 $a1-139-01536-2 035 $a(CKB)2670000000329873 035 $a(EBL)1113125 035 $a(SSID)ssj0000821328 035 $a(PQKBManifestationID)11436978 035 $a(PQKBTitleCode)TC0000821328 035 $a(PQKBWorkID)10888342 035 $a(PQKB)11143608 035 $a(UkCbUP)CR9781139015363 035 $a(MiAaPQ)EBC1113125 035 $a(Au-PeEL)EBL1113125 035 $a(CaPaEBR)ebr10695367 035 $a(CaONFJC)MIL485880 035 $a(OCoLC)828615426 035 $a(EXLCZ)992670000000329873 100 $a20141103d2013|||| uy| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 12$aA most masculine state $egender, politics and religion in Saudi Arabia /$fMadawi Al-Rasheed$b[electronic resource] 210 1$aCambridge :$cCambridge University Press,$d2013. 215 $a1 online resource (xii, 333 pages) $cdigital, PDF file(s) 225 1 $aCambridge Middle East studies ;$v43 300 $aTitle from publisher's bibliographic system (viewed on 05 Oct 2015). 311 $a0-521-12252-X 311 $a0-521-76104-2 320 $aIncludes bibliographical references and index. 327 $aIntroduction: the 'woman question' in Saudi Arabia -- From religious revival to religious nationalism -- Schooling women: the state as benevolent educator -- Symbols of piety: fatwa on women in the 1980s -- The quest for cosmopolitan modernity -- Women in search of themselves -- Celebrity women novelists and the cosmopolitan fantasy -- Guarding self and nation: women preachers and activists -- Conclusion: light at the end of the tunnel. 330 $aWomen in Saudi Arabia are often described as either victims of patriarchal religion and society or successful survivors of discrimination imposed on them by others. Madawi Al-Rasheed's new book goes beyond these conventional tropes to probe the historical, political and religious forces that have, across the years, delayed and thwarted their emancipation. The book demonstrates how, under the patronage of the state and its religious nationalism, women have become hostage to contradictory political projects that on the one hand demand female piety, and on the other hand encourage modernity. Drawing on state documents, media sources and interviews with women from across Saudi society, the book examines the intersection between gender, religion and politics to explain these contradictions and to show that, despite these restraints, vibrant debates on the question of women are opening up as the struggle for recognition and equality finally gets under way. 410 0$aCambridge Middle East studies ;$v43. 606 $aWomen$zSaudi Arabia$xSocial conditions 606 $aMuslim women$zSaudi Arabia$xSocial conditions 606 $aFeminism$zSaudi Arabia 606 $aFeminism$xReligious aspects$xIslam 606 $aWomen and religion$zSaudi Arabia 606 $aSex role$zSaudi Arabia 606 $aWomen's rights$zSaudi Arabia 615 0$aWomen$xSocial conditions. 615 0$aMuslim women$xSocial conditions. 615 0$aFeminism 615 0$aFeminism$xReligious aspects$xIslam. 615 0$aWomen and religion 615 0$aSex role 615 0$aWomen's rights 676 $a305.4209538 700 $aAl-Rasheed$b Madawi$0674715 801 0$bUkCbUP 801 1$bUkCbUP 906 $aBOOK 912 $a9910786157403321 996 $aA most masculine state$93847533 997 $aUNINA LEADER 02564nam 2200457 450 001 996574686103316 005 20231211115054.0 010 $a1-55937-960-X 035 $a(CKB)5280000000208155 035 $a(NjHacI)995280000000208155 035 $a(EXLCZ)995280000000208155 100 $a20231211d1998 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$a802.5-1998 - IEEE Information Technology - Telecommunications and information exchange between systems - Local and metropolitan area networks$hPart 5, $iToken ring access method and physical layer specifications /$fIEEE Computer Society LAN/MAN Standards Committee [and four others] 210 1$aNew York, N.Y. :$cIEEE,$d1998. 215 $a1 online resource (x, 243 pages) $cillustrations 330 $aThis Local and Metropolitan Area Network standard, ISO/IEC 8802-5:1998, is part of a family of local area network (LAN) standards dealing with the physical and data link layers as defined by the ISO/IEC Open Systems Interconnection Basic Reference Model. Its purpose is to provide compatible interconnection of data procesing equipment by means of a LAN using the token-passing ring access method. 517 $a802.5-1998 - IEEE Information Technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Part 5 606 $aComputer network protocols$xStandards 606 $aComputer network protocols$xStandards$zUnited States 606 $aLocal area networks (Computer networks)$xStandards 606 $aLocal area networks (Computer networks)$xStandards$zUnited States 606 $aMetropolitan area networks (Computer networks)$xStandards 606 $aMetropolitan area networks (Computer networks)$xStandards$zUnited States 615 0$aComputer network protocols$xStandards. 615 0$aComputer network protocols$xStandards 615 0$aLocal area networks (Computer networks)$xStandards. 615 0$aLocal area networks (Computer networks)$xStandards 615 0$aMetropolitan area networks (Computer networks)$xStandards. 615 0$aMetropolitan area networks (Computer networks)$xStandards 676 $a004.62 801 0$bNjHacI 801 1$bNjHacl 906 $aDOCUMENT 912 $a996574686103316 996 $a802.5-1998 - IEEE Information Technology - Telecommunications and information exchange between systems - Local and metropolitan area networks$93650840 997 $aUNISA LEADER 05132nam 22006135 450 001 9910254244603321 005 20251107172753.0 010 $a3-319-31515-3 024 7 $a10.1007/978-3-319-31515-7 035 $a(CKB)3710000000649223 035 $a(EBL)4509028 035 $a(SSID)ssj0001665852 035 $a(PQKBManifestationID)16454474 035 $a(PQKBTitleCode)TC0001665852 035 $a(PQKBWorkID)14999850 035 $a(PQKB)11616485 035 $a(DE-He213)978-3-319-31515-7 035 $a(MiAaPQ)EBC4509028 035 $a(PPN)193444771 035 $a(EXLCZ)993710000000649223 100 $a20160418d2016 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aHiding Data - Selected Topics $eRudolf Ahlswede?s Lectures on Information Theory 3 /$fby Rudolf Ahlswede ; edited by Alexander Ahlswede, Ingo Althöfer, Christian Deppe, Ulrich Tamm 205 $a1st ed. 2016. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2016. 215 $a1 online resource (367 p.) 225 1 $aFoundations in Signal Processing, Communications and Networking,$x1863-8546 ;$v12 300 $aDescription based upon print version of record. 311 08$a3-319-31513-7 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aChapter I A Short Course on Cryptography -- Chapter II Authentication and Secret-Key Cryptology -- Chapter III The Mathematical Background of the Advanced Encryption Standard -- Chapter IV Elliptic Curve Cryptosystems -- Chapter V Founding Cryptography on Oblivious Transfer -- Supplement. 330 $aDevoted to information security, this volume begins with a short course on cryptography, mainly based on lectures given by Rudolf Ahlswede at the University of Bielefeld in the mid 1990s. It was the second of his cycle of lectures on information theory which opened with an introductory course on basic coding theorems, as covered in Volume 1 of this series. In this third volume, Shannon?s historical work on secrecy systems is detailed, followed by an introduction to an information-theoretic model of wiretap channels, and such important concepts as homophonic coding and authentication. Once the theoretical arguments have been presented, comprehensive technical details of AES are given. Furthermore, a short introduction to the history of public-key cryptology, RSA and El Gamal cryptosystems is provided, followed by a look at the basic theory of elliptic curves, and algorithms for efficient addition in elliptic curves. Lastly, the important topic of ?oblivious transfer? is discussed, which is strongly connected to the privacy problem in communication. Today, the importance of this problem is rapidly increasing, and further research and practical realizations are greatly anticipated. This is the third of several volumes serving as the collected documentation of Rudolf Ahlswede?s lectures on information theory. Each volume includes comments from an invited well-known expert. In the supplement to the present volume, Rüdiger Reischuk contributes his insights. Classical information processing concerns the main tasks of gaining knowledge and the storage, transmission and hiding of data. The first task is the prime goal of Statistics. For transmission and hiding data, Shannon developed an impressive mathematical theory called Information Theory, which he based on probabilistic models. The theory largely involves the concept of codes with small error probabilities in spite of noise in the transmission, which is modeled by channels. The lectures presentedin this work are suitable for graduate students in Mathematics, and also for those working in Theoretical Computer Science, Physics, and Electrical Engineering with a background in basic Mathematics. The lectures can be used as the basis for courses or to supplement courses in many ways. Ph.D. students will also find research problems, often with conjectures, that offer potential subjects for a thesis. More advanced researchers may find questions which form the basis of entire research programs. 410 0$aFoundations in Signal Processing, Communications and Networking,$x1863-8546 ;$v12 606 $aComputer science$xMathematics 606 $aMathematical Applications in Computer Science 615 0$aComputer science$xMathematics. 615 14$aMathematical Applications in Computer Science. 676 $a001.539 700 $aAhlswede$b Rudolf$4aut$4http://id.loc.gov/vocabulary/relators/aut$0313411 702 $aAhlswede$b Alexander$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAlthöfer$b Ingo$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDeppe$b Christian$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aTamm$b Ulrich$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910254244603321 996 $aHiding Data - Selected Topics$92497674 997 $aUNINA