LEADER 02557nam 2200673Ia 450 001 9910462191203321 005 20200520144314.0 010 $a1-4384-0479-4 035 $a(CKB)2670000000233959 035 $a(EBL)3408355 035 $a(SSID)ssj0000607070 035 $a(PQKBManifestationID)11354025 035 $a(PQKBTitleCode)TC0000607070 035 $a(PQKBWorkID)10598555 035 $a(PQKB)10655139 035 $a(MiAaPQ)EBC3408355 035 $a(OCoLC)794701293 035 $a(MdBmJHUP)muse13901 035 $a(Au-PeEL)EBL3408355 035 $a(CaPaEBR)ebr10588906 035 $a(OCoLC)923416017 035 $a(EXLCZ)992670000000233959 100 $a19960816d1997 ub 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aDevils, women, and Jews$b[electronic resource] $ereflections of the other in medieval sermon stories /$fJoan Young Gregg 210 $aAlbany $cState University of New York Press$dc1997 215 $a1 online resource (290 p.) 225 0 $aSUNY series in medieval studies 300 $aDescription based upon print version of record. 311 $a0-7914-3417-6 320 $aIncludes bibliographical references (p. 257-267) and index. 327 $a""Front Matter""; ""Half Title Page""; ""Title Page""; ""Copyright Page""; ""Table of Contents""; ""Preface""; ""Introduction""; ""Content""; ""Devils in Medieval Sermon Stories""; ""Women in Medieval Sermon Stories""; ""Jews in Medieval Sermon Stories""; ""Back Matter""; ""Notes""; ""Abbreviations""; ""Bibliography""; ""Index"" 410 0$aSUNY Series in Medieval Studies 606 $aExempla$xHistory and criticism 606 $aPreaching$zEurope$xHistory$yMiddle Ages, 600-1500 606 $aDemonology$zEurope$xHistory of doctrines$yMiddle Ages, 600-1500 606 $aWomen in Christianity 606 $aChristianity and antisemitism$xHistory 607 $aEurope$xChurch history$y600-1500 607 $aEurope$xSocial life and customs 608 $aElectronic books. 615 0$aExempla$xHistory and criticism. 615 0$aPreaching$xHistory 615 0$aDemonology$xHistory of doctrines 615 0$aWomen in Christianity. 615 0$aChristianity and antisemitism$xHistory. 676 $a251/.08/0902 700 $aGregg$b Joan Young$0893145 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910462191203321 996 $aDevils, women, and Jews$92477750 997 $aUNINA LEADER 02209nam 22004693 450 001 9910154350603321 005 20230808200738.0 010 $a0-8041-4108-8 035 $a(CKB)3710000000971429 035 $a(MiAaPQ)EBC6106585 035 $a(Au-PeEL)EBL6106585 035 $a(OCoLC)940946831 035 $a(EXLCZ)993710000000971429 100 $a20210901d2016 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aFast Metabolism Food Rx $e7 Powerful Prescriptions to Feed Your Body Back to Health 210 1$a :$cPotter/Ten Speed/Harmony/Rodale,$d2016. 210 4$dİ2016. 215 $a1 online resource (284 pages) 311 $a0-8041-4107-X 330 $a"Haylie Pomroy, celebrated nutritionist, and New York Times bestselling author of The Fast Metabolism Diet shares a prescription for total health based on decades of work using food as metabolic medicine. Our bodies are always talking; we just need to learn how to listen to them. Sometimes they whisper to us--our energy is off, our body shape is morphing in ways we don't like. Sometimes they try to give us straight talk, pushing our cholesterol a little higher or we have IBS or indigestion. At other times they're screaming, we're pre-diabetic or full blown, our moods are a mess, and our immune systems confused and attacking us. Every one of these health signals hides a specific kind of metabolic dysfunction, and for each, food is the answer. In her new book, Haylie teaches us that anyone can achieve the body and health they want from the foods that they choose and use"--$cProvided by publisher. 606 $aNutrition 606 $aDiet therapy 606 $aFood preferences 615 0$aNutrition. 615 0$aDiet therapy. 615 0$aFood preferences. 676 $a613.2 686 $aHEA006000$aHEA017000$aHEA024000$2bisacsh 700 $aPomroy$b Haylie$01243188 701 $aAdamson$b Eve$01226688 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910154350603321 996 $aFast Metabolism Food Rx$92883620 997 $aUNINA LEADER 05321oam 2200565I 450 001 9910799931803321 005 20190327110701.0 010 $a0-429-99572-5 010 $a0-429-50404-7 010 $a0-429-99571-7 035 $a(CKB)4100000007650240 035 $a(MiAaPQ)EBC5675759 035 $a(OCoLC)1084727081 035 $a(OCoLC-P)1084727081 035 $a(FlBoTFG)9780429504044 035 $a(EXLCZ)994100000007650240 100 $a20190207h20192019 uy 0 101 0 $aeng 135 $aurcnu|||unuuu 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aMachine learning for computer and cyber security $eprinciples, algorithms, and practices /$feditors, Brij B. Gupta, Michael Sheng 210 1$aBoca Raton :$cCRC Press,$d[2019]. 210 4$dİ2019 215 $a1 online resource (365 pages) 300 $a"A science publishers book." 311 $a1-138-58730-3 320 $aIncludes bibliographical references and index. 327 $aCover; Title Page; Copyright Page; Dedication; Foreword; Acknowledgement; Preface; Table of Contents; 1: A Deep Learning-based System for Network Cyber Threat Detection; 2: Machine Learning for Phishing Detection and Mitigation; 3: Next Generation Adaptable Opportunistic Sensing-based Wireless Sensor Networks: A Machine Learning Perspective; 4: A Bio-inspired Approach to Cyber Security; 5: Applications of a Model to Evaluate and Utilize Users' Interactions in Online Social Networks; 6: A Deep-dive on Machine Learning for Cyber Security Use Cases 327 $a7: A Prototype Method to Discover Malwares in Android-based Smartphones through System Calls8: Metaheuristic Algorithms-based Feature Selection Approach for Intrusion Detection; 9: A Taxonomy of Bitcoin Security Issues and Defense Mechanisms; 10: Early Detection and Prediction of Lung Cancer using Machine-learning Algorithms Applied on a Secure Healthcare Data-system Architecture; 11: Preventing Black Hole Attack in AODV Routing Protocol using Dynamic Trust Handshake-based Malicious Behavior Detection 327 $a12: Detecting Controller Interlock-based Tax Evasion Groups in a Corporate Governance Network13: Defending Web Applications against JavaScript Worms on Core Network of Cloud Platforms; 14: Importance of Providing Incentives and Economic Solutions in IT Security; 15: Teaching Johnny to Thwart Phishing Attacks: Incorporating the Role of Self-efficacy into a Game Application; Index 330 $aWhile Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software and the information stored in it, Cyber Security is a specific, growing field to protect computer networks (offline and online) from unauthorized access, botnets, phishing scams, etc. Machine learning is a branch of Computer Science which enables computing machines to adopt new behaviors on the basis of observable and verifiable data and information. It can be applied to ensure the security of the computers and the information by detecting anomalies using data mining and other such techniques. This book will be an invaluable resource to understand the importance of machine learning and data mining in establishing computer and cyber security. It emphasizes important security aspects associated with computer and cyber security along with the analysis of machine learning and data mining based solutions. The book also highlights the future research domains in which these solutions can be applied. Furthermore, it caters to the needs of IT professionals, researchers, faculty members, scientists, graduate students, research scholars and software developers who seek to carry out research and develop combating solutions in the area of cyber security using machine learning based approaches. It is an extensive source of information for the readers belonging to the field of Computer Science and Engineering, and Cyber Security professionals. Key Features: This book contains examples and illustrations to demonstrate the principles, algorithms, challenges and applications of machine learning and data mining for computer and cyber security. It showcases important security aspects and current trends in the field. It provides an insight of the future research directions in the field. Contents of this book help to prepare the students for exercising better defense in terms of understanding the motivation of the attackers and how to deal with and mitigate the situation using machine learning based approaches in better manner. 606 $aComputer networks$xSecurity measures$xData processing 606 $aComputer security$xData processing 606 $aMachine learning 606 $aArtificial intelligence 615 0$aComputer networks$xSecurity measures$xData processing. 615 0$aComputer security$xData processing. 615 0$aMachine learning. 615 0$aArtificial intelligence. 676 $a006.3/1 702 $aGupta$b Brij$f1982- 702 $aSheng$b Quan Z. 801 0$bOCoLC-P 801 1$bOCoLC-P 906 $aBOOK 912 $a9910799931803321 996 $aMachine learning for computer and cyber security$93873567 997 $aUNINA