LEADER 04638nam 2200757 450 001 9910461045403321 005 20210506203256.0 010 $a0-8122-9217-0 024 7 $a10.9783/9780812292176 035 $a(CKB)3710000000553668 035 $a(EBL)4321866 035 $a(SSID)ssj0001590024 035 $a(PQKBManifestationID)16284927 035 $a(PQKBTitleCode)TC0001590024 035 $a(PQKBWorkID)12131527 035 $a(PQKB)11106322 035 $a(MiAaPQ)EBC4321866 035 $a(OCoLC)933442203 035 $a(MdBmJHUP)muse46648 035 $a(DE-B1597)452765 035 $a(OCoLC)1013948761 035 $a(OCoLC)952777217 035 $a(DE-B1597)9780812292176 035 $a(Au-PeEL)EBL4321866 035 $a(CaPaEBR)ebr11149354 035 $a(CaONFJC)MIL882372 035 $a(OCoLC)935259320 035 $a(EXLCZ)993710000000553668 100 $a20160210h20162016 uy 0 101 0 $aeng 135 $aurnnu---|u||u 181 $ctxt 182 $cc 183 $acr 200 10$aDesigning peace $eCyprus and institutional innovations in divided societies /$fNeophytos Loizides 210 1$aPhiladelphia, Pennsylvania :$cUniversity of Pennsylvania Press,$d2016. 210 4$d©2016 215 $a1 online resource (265 p.) 225 1 $aNational and Ethnic Conflict in the Twenty-First Century 300 $aDescription based upon print version of record. 311 $a0-8122-4775-2 320 $aIncludes bibliographical references and index. 327 $tFront matter --$tContents --$tIntroduction: Institutional Innovations in Peace Processes --$t1. A Federal Cyprus? Consociational Failures and Prospects --$t2. The Region's Federal Movements: Why Did (post-)Ottoman States Fail in Sharing Power? --$t3. Innovations in Power-Sharing: The Northern Irish d'Hondt --$t4. The Way Home: Linkages, Reciprocity, and Lessons from Bosnia --$t5. Mandate Peace Referendums: A South African Innovation? --$t6. "Stalemate Theory": A Humanitarian Breakthrough in Cyprus --$t7. Europeanization and Hydrocarbons: Alternative Scenario Planning in the Levant --$tConclusion: Can Divided Societies Learn from Each Other? --$tNotes --$tBibliography --$tIndex --$tAcknowledgments 330 $aWhy do some societies choose to adopt federal settlements in the face of acute ethnic conflict, while others do not? Neophytos Loizides examines how acrimoniously divided Cyprus could re-unify by adopting a federal and consociational arrangement inspiring similar attempts in its region. Loizides asserts that institutional innovation is key in designing peace processes. Analyzing power-sharing in Northern Ireland, the return of displaced persons in Bosnia, and the preparatory mandate referendum in South Africa, he shows how divided societies have implemented novel solutions despite conditions that initially seemed prohibitive. Turning to Cyprus, he chronicles the breakthrough that led to the exhumations of the missing after 2003, and observes that a society's choice of narratives and institutions can overcome structural constraints. While Loizides points to the relative absence of successful federal and consociational arrangements among societies evolving from the "post-Ottoman space," he argues that neither elites nor broader societies in the region must be held hostages to the past. To effect lasting and positive change, Loizides encourages stakeholders in divided societies to be prepared to identify, redesign, and implement innovative new institutions. Examining successful peace mediations and identifying the shared experience and commonalities between Cyprus and other divided societies promises not only to inform the tackling of the Cyprus problem but also to provide transferable knowledge with broader implications for the fields of peace studies and conflict resolution. 410 0$aNational and ethnic conflict in the 21st century. 606 $aEthnic conflict$vCase studies 606 $aPeace-building$vCase studies 606 $aConflict management$zCyprus 606 $aConflict management$vCase studies 606 $aEthnic conflict$zCyprus 607 $aPeace-building, Cypriot 608 $aElectronic books. 615 0$aEthnic conflict 615 0$aPeace-building 615 0$aConflict management 615 0$aConflict management 615 0$aEthnic conflict 676 $a327.1/72095693 700 $aLoizides$b Neophytos$f1974-$01045830 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910461045403321 996 $aDesigning peace$92476708 997 $aUNINA LEADER 00922cam0-2200301---450 001 990005326120403321 005 20231219112654.0 035 $a000532612 100 $a19990604d1955----km-y0itay50------ba 101 0 $aita 102 $aIT 105 $af-------001yy 200 1 $a<>cortile del Salvatore$fMario Rotili 210 $aRoma$cFratelli Palombi$d1955 215 $a45 p., 12 c. di tav.$d20 cm 225 1 $aSaggi e studi dell'Istituto di Storia dell'Arte dell'Universitą di Napoli 610 0 $aNapoli$aCollegio del Salvatore 676 $a720.945731 676 $a726.79094573 700 1$aRotili,$bMario$f<1920-1981>$032751 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990005326120403321 952 $ARCH. BM MISC. 113 (01)a$bARCH. 14553$fFLFBC 952 $a726.79 NAP 2$bST.ARTE S.I.$fFLFBC 959 $aFLFBC 996 $aCortile del Salvatore$9268700 997 $aUNINA LEADER 03347nam 22004815 450 001 9910300743803321 005 20240116112059.0 010 $a9781484238707 010 $a1484238702 024 7 $a10.1007/978-1-4842-3870-7 035 $a(CKB)4100000006674712 035 $a(MiAaPQ)EBC5521337 035 $a(DE-He213)978-1-4842-3870-7 035 $a(PPN)230542735 035 $a(CaSebORM)9781484238707 035 $a(OCoLC)1057830162 035 $a(OCoLC)on1057830162 035 $a(EXLCZ)994100000006674712 100 $a20180920d2018 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCybersecurity Incident Response /$eHow to Contain, Eradicate, and Recover from Incidents /$fby Eric C. Thompson 205 $a1st ed. 2018. 210 1$aBerkeley, CA :$cApress :$cImprint: Apress,$d2018. 215 $a1 online resource (184 pages) 320 $aIncludes bibliographical references. 327 $aChapter 1: The Significance of Incident Response -- Chapter 2: Necessary Prerequisites -- Chapter 3: Incident Response Frameworks -- Chapter 4: Leadership, Teams, and Culture -- Chapter 5: The Incident Response Strategy -- Chapter 6: Cyber Risks and the Attack Lifecycle -- Chapter 7: Detection and Identification of Events -- Chapter 8: Containment -- Chapter 9: Eradication, Recovery, and Post-Incident Review -- Chapter 10: Continuous Monitoring of Incident Response Program -- Chapter 11: Incident Response Story -- Chapter 12: This Is a Full-Time Job -- Appendix A: NIST CSF. 330 $aCreate, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support. Surviving an incident, or a breach, requires the best response possible. This book provides practical guidance for the containment, eradication, and recovery from cybersecurity events and incidents. The book takes the approach that incident response should be a continual program. Leaders must understand the organizational environment, the strengths and weaknesses of the program and team, and how to strategically respond. Successful behaviors and actions required for each phase of incident response are explored in the book. Straight from NIST 800-61, these actions include: Planning and practicing Detection Containment Eradication Post-incident actions What You?ll Learn: Know the sub-categories of the NIST Cybersecurity Framework Understand the components of incident response Go beyond the incident response plan Turn the plan into a program that needs vision, leadership, and culture to make it successful Be effective in your role on the incident response team. 606 $aData protection 606 $aSecurity$3https://scigraph.springernature.com/ontologies/product-market-codes/I28000 615 0$aData protection. 615 14$aSecurity. 676 $a005.8 700 $aThompson$b Eric C$4aut$4http://id.loc.gov/vocabulary/relators/aut$0917128 801 0$bUMI 801 1$bUMI 906 $aBOOK 912 $a9910300743803321 996 $aCybersecurity Incident Response$92528341 997 $aUNINA