LEADER 03251nam 2200613 450 001 9910460506503321 005 20200520144314.0 010 $a0-8032-8449-7 010 $a0-8032-8447-0 035 $a(CKB)3710000000529979 035 $a(EBL)4337951 035 $a(SSID)ssj0001592787 035 $a(PQKBManifestationID)16287235 035 $a(PQKBTitleCode)TC0001592787 035 $a(PQKBWorkID)14807831 035 $a(PQKB)10790360 035 $a(MiAaPQ)EBC4337951 035 $a(OCoLC)932124788 035 $a(MdBmJHUP)muse46588 035 $a(Au-PeEL)EBL4337951 035 $a(CaPaEBR)ebr11221259 035 $a(CaONFJC)MIL879335 035 $a(OCoLC)951972015 035 $a(EXLCZ)993710000000529979 100 $a20160629h20162016 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aComing of age in Chicago $ethe 1893 world's fair and the coalescence of American anthropology /$fedited by Curtis M. Hinsley and David R. Wilcox 210 1$aLincoln, [Nebraska] ;$aLondon, [England] :$cUniversity of Nebraska Press,$d2016. 210 4$dİ2016 215 $a1 online resource (460 p.) 300 $aDescription based upon print version of record. 311 $a0-8032-6838-6 320 $aIncludes bibliographical references and index. 327 $aIntro; Title Page; Copyright Page; Dedication; Contents; List of Illustrations; List of Tables; Introduction; Abbreviations; Essay 1. Anthropology as Education and Entertainment; Document A. Franz Boas, "Ethnology at the Exposition"; Document B. Frederic Ward Putnam, "The Columbus Memorial Museum"; Document C. "Man and His Works"; Essay 2. Ambiguous Legacy; Appendix; Document D. William Henry Holmes, "The World's Fair Congress of Anthropology"; Document E. Excerpts from the Diary of Frank Hamilton Cushing at the World's Fair; Document F. Monthly Report of Mr. Frank Hamilton Cushing 327 $aDocument G. The Pueblos at HomeA Visual Interlude; Essay 4. Refracting Images; Essay 5. Relic Hunters in the White City; Document H. Cushing's Analysis of the Hazzard Cliff Dweller Collection; Document I. The Ancient Man; Essay 6. Patrons, Popularizers, and Professionals; Document J. Warren King Moorehead, "The Ancient Man: The Anthropological Exhibit at the World's Fair"; Essay 7. Going National; Appendix; Document K. Daniel Garrison Brinton, "The Aims of Anthropology"; Document L. Franz Boas, "The Limitations of the Comparative Method of Anthropology"; Afterword; Acknowledgments 327 $aBibliographyContributors; Index; About Curtis M. Hinsley; About David R. Wilcox 330 $a"Collection of scholarly essays and primary documents exploring the significance of the 1893 World's Fair and the history of American anthropology"--$cProvided by publisher. 606 $aAnthropology$zUnited States$xHistory 608 $aElectronic books. 615 0$aAnthropology$xHistory. 676 $a301.0973 702 $aHinsley$b Curtis M. 702 $aWilcox$b David R.$f1944- 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910460506503321 996 $aComing of age in Chicago$91915196 997 $aUNINA LEADER 04146nam 2200637Ia 450 001 9910784839003321 005 20230721031002.0 010 $a1-281-91899-7 010 $a9786611918996 010 $a981-277-010-0 035 $a(CKB)1000000000406723 035 $a(EBL)1193126 035 $a(SSID)ssj0000350366 035 $a(PQKBManifestationID)12070751 035 $a(PQKBTitleCode)TC0000350366 035 $a(PQKBWorkID)10355817 035 $a(PQKB)11436404 035 $a(MiAaPQ)EBC1193126 035 $a(WSP)00006513 035 $a(Au-PeEL)EBL1193126 035 $a(CaPaEBR)ebr10698893 035 $a(CaONFJC)MIL191899 035 $a(OCoLC)829713529 035 $a(EXLCZ)991000000000406723 100 $a20100617d2007 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aSecurity in distributed and networking systems$b[electronic resource] /$feditors, Yang Xiao, Yi Pan 210 $aHackensack, NJ $cWorld Scientific$dc2007 215 $a1 online resource (512 p.) 225 1 $aComputer and network security ;$vv. 1 300 $aDescription based upon print version of record. 311 $a981-270-807-3 320 $aIncludes bibliographical references. 327 $apt. 1. Security in internet. ch. 1. Security issues in the TCP/IP suite. ch. 2. New internet threates: an overview of spa, email and spyware. ch. 3. Securing multimedia and VoIP Content with secure real-time transport protocol -- pt. 2. Security in distributed systems. ch. 4. Cover-free families and their applications. ch. 5. Group rekeying in multi-privileged group communications for distributed networking services. ch. 6. Access control policy negotiation for remote hot-deployed grid servoces -- pt. 3. Security in pervasive computing. ch. 7. Low-cost radio frequency identification security. ch. 8. Energy consumption of key distribution in 802.15.4 beacon enabled cluster with sleep management. ch. 9. Security wireless networks using device type identification -- pt. 4. Security in sensor networks. ch. 10. Secuity in distributed sensor network time synchronization services. ch. 11. Key management in wireless sensor networks. ch. 12. Secure network programming in wireless sensor networks -- pt. 5. Secutoy in ad hoc networks. ch. 13. Bootstrapping security in mobile ad hoc networks using identity-based schemes. ch. 14. Hash-Binary-Tree based group key distribution with time-limited node revocation. ch. 15. Efficient authentication schemes for AODV and DSR -- pt. 6. Security in wireless networks. ch. 16. Security in wireless local area networks. ch. 17. Access security in heterogenous wireless networls. ch. 18. Authentication in wireless cellular networks. 330 $aSecurity issues in distributed systems and network systems are extremely important. This edited book provides a comprehensive treatment on security issues in these systems, ranging from attacks to all kinds of solutions from prevention to detection approaches. The books includes security studies in a range of systems including peer-to-peer networks, distributed systems, Internet, wireless networks, Internet service, e-commerce, mobile and pervasive computing. Security issues in these systems include attacks, malicious node detection, access control, authentication, intrusion detection, privacy 410 0$aComputer and network security ;$vv. 1. 606 $aComputer networks$xSecurity measures 606 $aDistributed operating systems (Computers)$xSecurity measures 606 $aElectronic data processing$xDistributed processing 615 0$aComputer networks$xSecurity measures. 615 0$aDistributed operating systems (Computers)$xSecurity measures. 615 0$aElectronic data processing$xDistributed processing. 676 $a005.44 701 $aPan$b Yi$f1960-$0895857 701 $aXiao$b Yang$f1966-$0875841 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910784839003321 996 $aSecurity in distributed and networking systems$93681668 997 $aUNINA