LEADER 02842nam 2200589Ia 450 001 9910170995303321 005 20200520144314.0 010 $a1-135-96349-5 010 $a0-203-45505-3 010 $a1-135-96350-9 010 $a1-280-20260-2 010 $a0-203-42932-X 024 7 $a10.4324/9780203429327 035 $a(CKB)111056485548622 035 $a(EBL)166303 035 $a(OCoLC)171117210 035 $a(SSID)ssj0000231941 035 $a(PQKBManifestationID)11220648 035 $a(PQKBTitleCode)TC0000231941 035 $a(PQKBWorkID)10207872 035 $a(PQKB)10463834 035 $a(MiAaPQ)EBC166303 035 $a(OCoLC)52359993 035 $a(EXLCZ)99111056485548622 100 $a19980520d1999 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aRace in the mind of America $ebreaking the vicious circle between Blacks and whites /$fPaul L. Wachtel 210 $aNew York $cRoutledge$d1999 215 $a1 online resource (342 p.) 300 $aDescription based upon print version of record. 311 $a1-138-01154-1 311 $a0-415-92000-0 320 $aIncludes bibliographical references (p. [287]-321) and index. 327 $aBook Cover; Title; Contents; Preface; Introduction The Ironic Dynamics of Race; Talking about Racism How Our Dialogue Gets Short-circuited; Blaming the Victim?; The Debate over Culture; Ideology and IQ Moving beyond the Bell Curve; Is Racism Inevitable? Motivational Foundations of White Racial Attitudes; Prejudice without Intention? ~Cognitive~ Foundations of White Racial Attitudes; The Complexities of the Black Response to Oppression Strengths and Vulnerabilities, Pride and Self-Doubt; Integration, Assimilation, and Separatism The Ambiguities of Identity 327 $aCrime and the Multiple Causes and Effects of InequalitySeparate Neighborhoods, Separate Destinies; Beyond Affirmative Action Toward a Resolution of Our Divisions; Breaking the Cycle of Poverty and Disadvantage Head Starts, Handicaps, and the Importance of Ongoing Life Circumstances; Beyond Black and White; Notes; Index; 330 $aWatchel challenges the orthodoxies that shape black and white opinion and liberal and conservative policies, and applies principles to solving racial tensions that may be applied to other groups beyond the United States. 606 $aRacism$zUnited States$xPsychological aspects 607 $aUnited States$xRace relations$xPsychological aspects 615 0$aRacism$xPsychological aspects. 676 $a305.8/00973 700 $aWachtel$b Paul L.$f1940-$0124889 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910170995303321 996 $aRace in the mind of America$94205000 997 $aUNINA LEADER 05369nam 22008533 450 001 9910410653503321 005 20241107095523.0 010 $a9786611127787 010 $a9781000218930 010 $a1000218937 010 $a9780429119347 010 $a0429119348 010 $a9781281127785 010 $a1281127787 010 $a9780849379253 010 $a0849379253 024 7 $a10.1201/9780849379253 035 $a(CKB)1000000000344813 035 $a(EBL)308468 035 $a(OCoLC)476089258 035 $a(SSID)ssj0000243250 035 $a(PQKBManifestationID)11923097 035 $a(PQKBTitleCode)TC0000243250 035 $a(PQKBWorkID)10321186 035 $a(PQKB)11325343 035 $a(MiAaPQ)EBC308468 035 $a(OCoLC)173376759 035 $a(OCoLC)815543431 035 $a(OCoLC-P)815543431 035 $a(FlBoTFG)9780429119347 035 $a(NjHacI)991000000000344813 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/27558 035 $a(MiAaPQ)EBC7244847 035 $a(Au-PeEL)EBL7244847 035 $a(OCoLC)1202559532 035 $a(ODN)ODN0005562295 035 $a(ScCtBLL)b0425557-07c1-4dbb-aa1c-44f3e1273d2c 035 $a(ScCtBLL)c778b964-640d-4f46-a4c9-a66bc54bf623 035 $a(oapen)doab27558 035 $a(EXLCZ)991000000000344813 100 $a20231110d2007 uy 0 101 0 $aeng 135 $aurun|---uuuuu 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity in distributed, grid, mobile, and pervasive computing /$fYang Xiao 205 $a1 ed. 210 $d2007 210 1$aBoca Raton, FL :$cAuerbach Publishers,$d[2007] 210 4$dİ2007 215 $a1 online resource (436 p.) 300 $aDescription based upon print version of record. 311 08$a0-8493-7921-0 320 $aIncludes bibliographical references and index. 327 $aFront cover; Contents; Preface; About the Editor; Contributors; Part I: Security in Distributed Computing; Chapter 1. Security for Content Distribution Networks - Concepts, Systems and Research Issues; Chapter 2. Key Management and Agreement in Distributed Systems; Chapter 3. Securing Design Patterns for Distributed Systems; Part II: Security in Mobile Computing; Chapter 4. Pragmatic Security for Constrained Wireless Networks; Chapter 5. Authentication in Wireless Networks; Chapter 6. Intrusion Detection in Wireless Sensor Networks 327 $aChapter 7. False Data Detection and Secure Data Aggregation in Wireless Sensor NetworksChapter 8. Privacy and Anonymity in Mobile Ad Hoc Networks; Chapter 9. Security Issues in the IEEE 802.15.1 Bluetooth Wireless Personal Area Networks; Part III: Security in Grid Computing; Chapter 10. State-of-the-Art Security in Grid Computing; Chapter 11. Unifying Grid and Organizational Security Mechanisms; Chapter 12. Grid Security Architecture: Requirements, Fundamentals, Standards and Models; Chapter 13. A Trust-Based Access Control Management Framework for a Secure Grid Environment 327 $aChapter 14. Distributed Computing Grids-Safety and SecurityPart IV: Security in Pervasive Computing; Chapter 15. Security Solutions for Pervasive Healthcare; Chapter 16. Wireless Sensor Network Security: A Survey; Index; Back cover 330 $aDespite recent dramatic advances in computer security regarding the proliferation of services and applications, security threats are still major impediments in the deployment of these services. Paying serious attention to these issues, "Security in Distributed, Grid, Mobile, and Pervasive Computing" focuses on the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. A rich and useful presentation of strategies for security issues, the book covers each computing area in separate sections. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems.; The next section focuses on security in mobile computing and wireless networks, covering wireless authentication methods, secure data aggregation, and anonymous routing protocol.; After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security. With more and more vital information stored on computers, security professionals need to know how to combat threats and complications. Offering strategies to tackle these issues, this book provides essential security information for researchers, practitioners, educators, and graduate students in the field. 606 $aComputer security 606 $aMobile computing$xSecurity measures 615 0$aComputer security. 615 0$aMobile computing$xSecurity measures. 676 $a005.8 676 $a005.8 686 $aCOM032000$aCOM043000$aCOM048000$2bisacsh 700 $aXiao$b Yang$0908674 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910410653503321 996 $aSecurity in Distributed, Grid, Mobile, and Pervasive Computing$92996443 997 $aUNINA