LEADER 02447nam 22004093u 450 001 9910455029603321 005 20210108075936.0 035 $a(CKB)1000000000767432 035 $a(EBL)432897 035 $a(OCoLC)369179450 035 $a(MiAaPQ)EBC432897 035 $a(EXLCZ)991000000000767432 100 $a20131216d2009|||| u|| | 101 0 $aeng 135 $aur|n|---||||| 200 10$aDemanding Respect$b[electronic resource] $eThe Evolution of the American Comic Book 210 $aPhiladelphia $cTemple University Press$d2009 215 $a1 online resource (260 p.) 300 $aDescription based upon print version of record. 311 $a1-59213-442-4 327 $aContents; Acknowledgments; Introduction: The Evolution of the American Comic Book; 1 The Early Industrial Age I: Pulp Logic and the Rise of the American Comic Book; 2 The Early Industrial Age II: The Crusade Against Comic Books and the End of the Comic Book Boom; 3 The Late Industrial Age: The Return of the Superhero and the First Comic Book Rebellion; 4 From the Late Industrial to the Heroic Age: Comic Book Fandom and the Mainstream Pulp Rebellion; 5 The Heroic Age II: Alternative Comics and a Rebellion from the Margins 327 $a6 The Heroic Age III: New Movements, Winning Respect, and the Rise of the Graphic NovelConclusion: The Development of an Art Form; Notes; Index 330 $aHow is it that comic books-the once reviled form of lowbrow popular culture-are now the rage for Hollywood blockbusters, the basis for bestselling video games, and the inspiration for literary graphic novels? In Demanding Respect, Paul Lopes immerses himself in the discourse and practices of this art and subculture to provide a social history of the American comic book over the last 75 years. Lopes analyzes the cultural production, reception, and consumption of American comic books throughout American history. He charts the rise of superheroes, the proliferation of 606 $aComic books, strips, etc - United States - History and criticism 608 $aElectronic books. 615 4$aComic books, strips, etc - United States - History and criticism. 676 $a741.5/973 676 $a741.5973 676 $a808 700 $aLopes$b Paul$0943210 801 0$bAU-PeEL 801 1$bAU-PeEL 801 2$bAU-PeEL 906 $aBOOK 912 $a9910455029603321 996 $aDemanding Respect$92128754 997 $aUNINA LEADER 06076nam 2200553 450 001 9910632994203321 005 20221223172949.0 010 $a1-00-333749-X 010 $a1-000-79218-8 010 $a1-003-33749-X 035 $a(CKB)5840000000093682 035 $a(NjHacI)995840000000093682 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/94279 035 $a(MiAaPQ)EBC7245161 035 $a(Au-PeEL)EBL7245161 035 $a(EXLCZ)995840000000093682 100 $a20221223d2019 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aChallenges in Cybersecurity and Privacy $ethe European Research Landscape /$fedited by Jorge Bernal Bernabe and Antonio Skarmeta 210 $cTaylor & Francis$d2019 210 1$aDenmark :$cRiver Publishers :$cCRC Press,$d2019. 215 $a1 online resource (xli, 328 pages) $cillustrations 311 $a1-000-79550-0 311 $a87-7022-088-3 327 $a1.Introducing the European Research Landscape on Cybersecurity and Privacy 2. Key Innovations in ANASTACIA: Advanced Networked Agents for Security and Trust Assessment in CPS / IOT Architectures 3. Statistical analysis and economic models for enhancing cyber-security in SAINT 4. The YAKSHA project 5. The FORTIKA edge solution for Automating SMEs Security 6. CYBECO: Supporting cyber-insurance from a behavioural choice perspective 7. Cyber Threat Intelligence from European-wide sensor network in SISSDEN 8. CIPSEC- Enhancing Critical Infrastructure Protection with innovative SECurity framework 9. A cybersecurity situational awareness and information sharing solution for local public administrations based on advanced big data analysis: The CS-AWARE project 10. Complex project to develop real tools for fighting counter terrorism: Real-time Early Detection and Alert System for Online Terrorist Content based on Natural Language Processing, Social Network Analysis, Artificial Intelligence and Complex Event 11. TRUESSEC: Trustworthiness Label Recommendations 12. An overview on ARIES: Reliable European Identity Ecosystem 13. The LIGHTest Project: Overview, Reference Architecture and Trust Scheme Publication Authority 14. Secure and Privacy-Preserving Identity and Access Management in CREDENTIAL 15. FutureTrust -- Future Trust Services for Trustworthy Global Transactions 16. LEPS. Leveraging eID in the Private Sector 330 $aCybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT, since they present additional vulnerabilities due to their constrained capabilities, their unattended nature and the usage of potential untrustworthiness components. Likewise, identity-theft, fraud, personal data leakages, and other related cyber-crimes are continuously evolving, causing important damages and privacy problems for European citizens in both virtual and physical scenarios.In this context, new holistic approaches, methodologies, techniques and tools are needed to cope with those issues, and mitigate cyberattacks, by employing novel cyber-situational awareness frameworks, risk analysis and modeling, threat intelligent systems, cyber-threat information sharing methods, advanced big-data analysis techniques as well as exploiting the benefits from latest technologies such as SDN/NFV and Cloud systems. In addition, novel privacy-preserving techniques, and crypto-privacy mechanisms, identity and eID management systems, trust services, and recommendations are needed to protect citizens' privacy while keeping usability levels.The European Commission is addressing the challenge through different means, including the Horizon 2020 Research and Innovation program, thereby financing innovative projects that can cope with the increasing cyberthreat landscape. This book introduces several cybersecurity and privacy research challenges and how they are being addressed in the scope of 15 European research projects.Each chapter is dedicated to a different funded European Research project, which aims to cope with digital security and privacy aspects, risks, threats and cybersecurity issues from a different perspective. Each chapter includes the project's overviews and objectives, the particular challenges they are covering, research achievements on security and privacy, as well as the techniques, outcomes, and evaluations accomplished in the scope of the EU project.The book is the result of a collaborative effort among relative ongoing European Research projects in the field of privacy and security as well as related cybersecurity fields, and it is intended to explain how these projects meet the main cybersecurity and privacy challenges faced in Europe. Namely, the EU projects analyzed in the book are: ANASTACIA, SAINT, YAKSHA, FORTIKA, CYBECO, SISSDEN, CIPSEC, CS-AWARE. RED-Alert, Truessec.eu. ARIES, LIGHTest, CREDENTIAL, FutureTrust, LEPS. Challenges in Cybersecurity and Privacy - the European Research Landscape is ideal for personnel in computer/communication industries as well as academic staff and master/research students in computer science and communications networks interested in learning about cyber-security and privacy aspects. 606 $aComputer security 606 $aComputer crimes$xPrevention 606 $aPrivacy, Right of 607 $aEurope$2fast 610 $aComputer security 610 $aOnline safety and behaviour 615 0$aComputer security. 615 0$aComputer crimes$xPrevention. 615 0$aPrivacy, Right of. 676 $a323.448 700 $aBernabe$b Jorge Bernal$4edt$01354993 702 $aSkarmeta$b Antonio 702 $aBernabe$b Jorge Bernal 801 0$bNjHacI 801 1$bNjHacl 906 $aBOOK 912 $a9910632994203321 996 $aChallenges in Cybersecurity and Privacy$93358906 997 $aUNINA