LEADER 05627nam 22007333u 450 001 9910457945603321 005 20210108135828.0 010 $a1-134-47911-5 010 $a0-203-50508-5 035 $a(CKB)2550000000097049 035 $a(EBL)182306 035 $a(OCoLC)797918105 035 $a(SSID)ssj0000690883 035 $a(PQKBManifestationID)11405871 035 $a(PQKBTitleCode)TC0000690883 035 $a(PQKBWorkID)10628554 035 $a(PQKB)11209904 035 $a(MiAaPQ)EBC182306 035 $a(EXLCZ)992550000000097049 100 $a20140317d2012|||| u|| | 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aLebanon$b[electronic resource] $eThe Politics of a Penetrated Society 210 $aHoboken $cTaylor and Francis$d2012 215 $a1 online resource (172 p.) 225 1 $aThe Contemporary Middle East 300 $aDescription based upon print version of record. 311 $a0-415-27428-1 311 $a0-415-45747-5 327 $aFront Cover; Lebanon; Copyright Page; Contents; Chronology of Lebanon; Map of Lebanon; Introduction; 1. The formation of the modern Lebanese state; 1.1 The birth of the Lebanese state; The seeds of modern Lebanon (up to 1860); The Mutasarrifiyya (1860-1918); The French mandate period (1919-46); The creation of Le Grand Liban; The institutional foundations of the modern state; Developments during the mandate period; The end of the mandate; The National Pact and the creation of the modern state; 1.2 The functional state; The main features of the political order (1946-75) 327 $aThe confessional elites and the patron-client system The consociational democracy; Susceptibility of the system to external pressures; Dominant themes in the functional state context (1946-75); Adherence to specified institutional norms; Fixed locus of elite politics; Economic prosperity; Presidential ascendancy; Major political developments (1946-75); Khoury's Presidency (1946-52); Chamoun's Presidency (1952-58); Chehab's Presidency (1958-64); Helou's Presidency (1964-70); Franjieh's Presidency (1970-76); Increased PLO presence in Lebanon and the collapse of the Lebanese state. 327 $a1.3 Understanding the collapse of the Lebanese state The different schools of thought; A critical assessment; The weakness of the Lebanese state; Demographic shifts and the power-sharing arrangements; External penetration of the Lebanese system; 2. The civil war: 1975-90; 2.1 Major developments during the civil war period; Phase I: 1975-76 - the decline of the Lebanese state and Syrian intervention; Phase II: 1976-82 - sectarian entrenchment and shifting alliances; Phase III: 1982-85 - the 1982 Israeli invasion and subsequent events; Phase IV: 1985-88 - militia rule. 327 $aPhase V: 1988-90 - "dual government" and the end of the civil war2.2 Critical systemic implications of the civil war; The loss of state authority; Change within the Lebanese elites; Penetration by external actors; Lebanon becomes a pariah state; Economic devastation; 3. The post-war political system; Part I: The Lebanese Political System from 1990 to 2005; 3.1 Continuity and change in the post-war context; Analysis of the Ta'if Accord and its implementation; Systemic weaknesses in the Lebanese political context and the provisions of the Ta'if Accord; Implementation of the Ta'if Accord 327 $aConclusion 3.2 The essential characteristics of the 1990-2005 post-war political system; Syrian hegemony in the Lebanese context; Syria, South Lebanon and the Arab-Israeli conflict; Syria's role in Lebanon and the international community; Other Syrian interests and domestic factors in the Lebanese context; The post-Ta'if character of state institutions; Overview; The Chamber of Deputies; The cabinet; The troika system; Extra-institutional elements in the post-war system; 3.3 Major political developments in the post-war period; The first two post-war governments: 1990-92 327 $aThe 1992 parliamentary elections and the accession of Hariri 330 $aWritten in a clear and systematic manner, this highly topical read fills a conspicuous gap in existing academic literature on the contemporary political environment and society in Lebanon. Divided into two parts, Part One examines the pre-civil war system, the circumstances of its formation, its unique characteristics, its weaknesses and dynamics and Part Two analyses how circumstances resulting from the civil war combined with essential pre-war elements to define the contemporary political processes in Lebanon. 410 4$aThe Contemporary Middle East 606 $aLebanon -- History -- 1946- 606 $aLebanon - History - 1946- 606 $aLebanon -- Politics and government -- 1946- 606 $aLebanon - Politics and government - 1946- 606 $aRegions & Countries - Asia & the Middle East$2HILCC 606 $aHistory & Archaeology$2HILCC 606 $aMiddle East$2HILCC 608 $aElectronic books. 615 4$aLebanon -- History -- 1946-. 615 4$aLebanon - History - 1946-. 615 4$aLebanon -- Politics and government -- 1946-. 615 4$aLebanon - Politics and government - 1946-. 615 7$aRegions & Countries - Asia & the Middle East 615 7$aHistory & Archaeology 615 7$aMiddle East 676 $a956.9204 700 $aNajem$b Tom$0629142 801 0$bAU-PeEL 801 1$bAU-PeEL 801 2$bAU-PeEL 906 $aBOOK 912 $a9910457945603321 996 $aLebanon$92088503 997 $aUNINA LEADER 04681nam 22007695 450 001 9910349293203321 005 20251107152749.0 010 $a3-030-25109-8 024 7 $a10.1007/978-3-030-25109-3 035 $a(CKB)4100000008618247 035 $a(DE-He213)978-3-030-25109-3 035 $a(MiAaPQ)EBC5919015 035 $a(PPN)238489388 035 $a(EXLCZ)994100000008618247 100 $a20190704d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Systems Security and Privacy $e4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papers /$fedited by Paolo Mori, Steven Furnell, Olivier Camp 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (XII, 303 p. 137 illus., 75 illus. in color.) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v977 311 08$a3-030-25108-X 327 $aFine-grained Privacy Control for Fitness and Health Applications using the Privacy Management Platform -- Touch and Move: Incoming Call User Authentication -- Elicitation of Privacy Requirements for the Internet of Things using ACCESSORS -- A Simple Attack on CaptchaStar -- Notify this: Exploiting Android Noti?cations for Fun and Pro?t -- The Current State of the Holistic Privacy and Security Modelling Approach in Business Process and Software Architecture Modelling -- A Critical Security Analysis of the Password-based Authentication -Honeywords System under Code-corruption Attack -- GenVote: Blockchain-based Customizable and Secure Voting Platform -- A Detailed Analysis of the CICIDS2017 Data Set -- Personalising Security Education: Factors In?uencing Individual Awareness and Compliance -- Managing Cybersecurity Break-ins using Bluetooth Low Energy Devices to Verify Attackers: A Practical Study -- On Building a Visualisation Tool for Access Control Policies -- Survey and Guidelines for the Design and Deployment of a Cyber Security Label for SMEs -- Privacy Preserving Collaborative Agglomerative Hierarchical Clustering Construction -- Insights into Unsupervised Holiday Detection from Low-Resolution Smart Metering Data. 330 $aThis book constitutes the revised selected papers of the 4th International Conference on Information Systems Security and Privacy, ICISSP 2018, held in Funchal - Madeira, Portugal, in January 2018. The 15 full papers presented were carefully reviewed and selected from a total of 71 submissions. They are dealing with topics such as data and software security; privacy and confidentiality; mobile systems security; biometric authentication; information systems security and privacy; authentication, privacy and security models; data mining and knowledge discovery; phishing; security architecture and design analysis; security testing; vulnerability analysis and countermeasures; web applications and services. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v977 606 $aData protection 606 $aComputer networks 606 $aComputer engineering 606 $aComputer networks$xSecurity measures 606 $aComputers 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData and Information Security 606 $aComputer Communication Networks 606 $aComputer Engineering and Networks 606 $aMobile and Network Security 606 $aComputing Milieux 606 $aCryptology 615 0$aData protection. 615 0$aComputer networks. 615 0$aComputer engineering. 615 0$aComputer networks$xSecurity measures. 615 0$aComputers. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 14$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$aComputer Engineering and Networks. 615 24$aMobile and Network Security. 615 24$aComputing Milieux. 615 24$aCryptology. 676 $a005.8 676 $a005.8 702 $aMori$b Paolo$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aFurnell$b Steven$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCamp$b Olivier$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910349293203321 996 $aInformation Systems Security and Privacy$92162731 997 $aUNINA