LEADER 02960nam 2200673Ia 450 001 9910463886103321 005 20220204235114.0 010 $a1-280-67822-4 010 $a9786613655158 010 $a1-57233-880-6 035 $a(CKB)3170000000046373 035 $a(EBL)920579 035 $a(OCoLC)794003378 035 $a(SSID)ssj0000658255 035 $a(PQKBManifestationID)11372613 035 $a(PQKBTitleCode)TC0000658255 035 $a(PQKBWorkID)10680871 035 $a(PQKB)10463651 035 $a(MiAaPQ)EBC920579 035 $a(MdBmJHUP)muse15958 035 $a(Au-PeEL)EBL920579 035 $a(CaPaEBR)ebr10563936 035 $a(CaONFJC)MIL365515 035 $a(EXLCZ)993170000000046373 100 $a20111012d2012 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aRace patriotism$b[electronic resource] $eprotest and print culture in the AME Church /$fJulius H. Bailey 205 $a1st ed. 210 $aKnoxville $cUniversity of Tennessee Press$dc2012 215 $a1 online resource (177 p.) 225 0 $aChristian recorder 300 $aDescription based upon print version of record. 311 $a1-57233-845-8 320 $aIncludes bibliographical references (p. [115]-145) and index. 327 $aPublic protest and the emergent Black religious press -- The Christian recorder and the cultivation of a reading culture -- Western Zions -- Should "African" remain in our title? -- The rhetoric of African emigration. 330 $aRace Patriotism: Protest and Print Culture in the A.M.E. Church examines important nineteenth-century social issues through the lens of the AME Church and its publications. This book explores the ways in which leaders and laity constructed historical narratives around varied locations to sway public opinion of the day. Drawing on the official church newspaper, the Christian Recorder, and other denominational and rare major primary sources, Bailey goes beyond previously published works that focus solely on the founding era of the tradition or the eastern seaboard 410 0$aChristian Recorder 606 $aAfrican Americans$xRace identity 606 $aAmerican literature$xAfrican American authors$xHistory and criticism 606 $aBlack people$xRace identity$zUnited States 606 $aChristian literature$xPublishing$zUnited States$xHistory 608 $aElectronic books. 615 0$aAfrican Americans$xRace identity. 615 0$aAmerican literature$xAfrican American authors$xHistory and criticism. 615 0$aBlack people$xRace identity 615 0$aChristian literature$xPublishing$xHistory. 676 $a287/.83 700 $aBailey$b Julius$01039200 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910463886103321 996 $aRace patriotism$92461258 997 $aUNINA LEADER 04703nam 22006975 450 001 9910299574103321 005 20200703152828.0 010 $a3-319-72119-4 024 7 $a10.1007/978-3-319-72119-4 035 $a(CKB)4100000001794698 035 $a(DE-He213)978-3-319-72119-4 035 $a(MiAaPQ)EBC6315036 035 $a(MiAaPQ)EBC5589196 035 $a(Au-PeEL)EBL5589196 035 $a(OCoLC)1021192214 035 $a(PPN)223958182 035 $a(EXLCZ)994100000001794698 100 $a20180130d2018 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPractical Information Security $eA Competency-Based Education Course /$fby Izzat Alsmadi, Robert Burdwell, Ahmed Aleroud , Abdallah Wahbeh, Mahmoud Al-Qudah, Ahmad Al-Omari 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XIII, 314 p. 185 illus., 144 illus. in color.) 300 $aIncludes index. 311 $a3-319-72118-6 327 $aIntroduction -- Information Systems Security -- Malicious Attacks, Threats, and Vulnerabilities -- Access Controls -- Security Operations and Administration -- Auditing, Testing, and Monitoring -- Risk, Response, and Recovery -- Cryptography -- Networks and Telecommunications Security -- Source Code Security -- Information Security Standards -- Information Systems Security Education and Training -- U.S. Compliance Laws -- Conclusion. 330 $aThis textbook presents a practical introduction to information security using the Competency Based Education (CBE) method of teaching. The content and ancillary assessment methods explicitly measure student progress in the three core categories: Knowledge, Skills, and Experience, giving students a balance between background knowledge, context, and skills they can put to work. Students will learn both the foundations and applications of information systems security; safeguarding from malicious attacks, threats, and vulnerabilities; auditing, testing, and monitoring; risk, response, and recovery; networks and telecommunications security; source code security; information security standards; and compliance laws. The book can be used in introductory courses in security (information, cyber, network or computer security), including classes that don?t specifically use the CBE method, as instructors can adjust methods and ancillaries based on their own preferences. The book content is also aligned with the Cybersecurity Competency Model, proposed by department of homeland security. The author is an active member of The National Initiative for Cybersecurity Education (NICE), which is led by the National Institute of Standards and Technology (NIST). NICE is a partnership between government, academia, and the private sector focused on cybersecurity education, training, and workforce development. 606 $aElectrical engineering 606 $aComputer security 606 $aSystem safety 606 $aApplication software 606 $aCommunications Engineering, Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/T24035 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aSecurity Science and Technology$3https://scigraph.springernature.com/ontologies/product-market-codes/P31080 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 615 0$aElectrical engineering. 615 0$aComputer security. 615 0$aSystem safety. 615 0$aApplication software. 615 14$aCommunications Engineering, Networks. 615 24$aSystems and Data Security. 615 24$aSecurity Science and Technology. 615 24$aInformation Systems Applications (incl. Internet). 676 $a005.8 700 $aAlsmadi$b Izzat$4aut$4http://id.loc.gov/vocabulary/relators/aut$0875246 702 $aBurdwell$b Robert$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aAleroud $b Ahmed$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aWahbeh$b Abdallah$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aAl-Qudah$b Mahmoud$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aAl-Omari$b Ahmad$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910299574103321 996 $aPractical Information Security$92512077 997 $aUNINA