LEADER 01185nam--2200385---450- 001 990001075520203316 005 20050428152712.0 010 $a88-7448-152-7 035 $a000107552 035 $aUSA01000107552 035 $a(ALEPH)000107552USA01 035 $a000107552 100 $a20020507h20011985km-y0enga50------ba 101 0 $aita 102 $aIT 105 $ay|||z|||001yy 200 1 $aCommedia all'italiana$eparlano i protagonisti$fa cura di Pietro Pintus$ginterviste di Biarese, ... [et al.] 210 $aRoma [etc.]$cGangemi$h1985 215 $a232 p.$d21 cm 606 0 $aCinematografo italiano 606 0 $aCommedia all'italiana 676 $a791.436170945 702 1$aPINTUS,$bPietro 801 0$aIT$bSalbc$cISBD 912 $a990001075520203316 951 $aXIII.2. 1084(XVI I 66)$b139754 LM$cXVI i$d00081590 959 $aBK 969 $aUMA 979 $aSTELLA$b10$c20020507$lUSA01$h0931 979 $aCHIARA$b90$c20020528$lUSA01$h1329 979 $aANGELA$b90$c20020829$lUSA01$h1108 979 $aPATRY$b90$c20040406$lUSA01$h1714 979 $aCOPAT3$b90$c20050428$lUSA01$h1527 996 $aCommedia all'italiana$9979194 997 $aUNISA LEADER 04651nam 2200613 450 001 9910464723003321 005 20211008020400.0 010 $a1-4008-5136-X 024 7 $a10.1515/9781400851362 035 $a(CKB)3710000000092374 035 $a(EBL)1632630 035 $a(OCoLC)871631848 035 $a(SSID)ssj0001211712 035 $a(PQKBManifestationID)11687426 035 $a(PQKBTitleCode)TC0001211712 035 $a(PQKBWorkID)11206521 035 $a(PQKB)10854252 035 $a(MiAaPQ)EBC1632630 035 $a(DE-B1597)447744 035 $a(OCoLC)979905405 035 $a(DE-B1597)9781400851362 035 $a(Au-PeEL)EBL1632630 035 $a(CaPaEBR)ebr10844204 035 $a(CaONFJC)MIL578853 035 $a(EXLCZ)993710000000092374 100 $a20140320h19961996 uy 0 101 0 $aeng 135 $aurnn#---|u||u 181 $ctxt 182 $cc 183 $acr 200 10$aCreating the national pastime $ebaseball transforms itself, 1903-1953 /$fG. Edward White 205 $aCourse Book 210 1$aPrinceton, New Jersey ;$aChichester, [England] :$cPrinceton University Press,$d1996. 210 4$dİ1996 215 $a1 online resource (385 p.) 300 $aIncludes index. 311 0 $a0-691-05885-7 327 $tFront matter --$tContents --$tIllustrations --$tPreface --$tIntroduction --$tChapter One. The Ballparks --$tChapter Two. The Enterprise, 1903-1923 --$tChapter Three. The Rise of the Commissioner: Gambling, the Black Sox, and the Creation of Baseball Heroes --$tChapter Four. The Negro Leagues --$tChapter Five. The Coming of Night Baseball --$tChapter Six. Baseball Journalists --$tChapter Seven. Baseball on the Radio --$tChapter Eight. Ethnicity and Baseball: Hank Greenberg and Joe DiMaggio --$tChapter Nine. The Enterprise, 1923-1953 --$tChapter Ten. The Decline of the National Pastime --$tNotes --$tIndex 330 $aAt a time when many baseball fans wish for the game to return to a purer past, G. Edward White shows how seemingly irrational business decisions, inspired in part by the self-interest of the owners but also by their nostalgia for the game, transformed baseball into the national pastime. Not simply a professional sport, baseball has been treated as a focus of childhood rituals and an emblem of American individuality and fair play throughout much of the twentieth century. It started out, however, as a marginal urban sport associated with drinking and gambling. White describes its progression to an almost mythic status as an idyllic game, popular among people of all ages and classes. He then recounts the owner's efforts, often supported by the legal system, to preserve this image. Baseball grew up in the midst of urban industrialization during the Progressive Era, and the emerging steel and concrete baseball parks encapsulated feelings of neighborliness and associations with the rural leisure of bygone times. According to White, these nostalgic themes, together with personal financial concerns, guided owners toward practices that in retrospect appear unfair to players and detrimental to the progress of the game. Reserve clauses, blacklisting, and limiting franchise territories, for example, were meant to keep a consistent roster of players on a team, build fan loyalty, and maintain the game's local flavor. These practices also violated anti-trust laws and significantly restricted the economic power of the players. Owners vigorously fought against innovations, ranging from the night games and radio broadcasts to the inclusion of African-American players. Nonetheless, the image of baseball as a spirited civic endeavor persisted, even in the face of outright corruption, as witnessed in the courts' leniency toward the participants in the Black Sox scandal of 1919. White's story of baseball is intertwined with changes in technology and business in America and with changing attitudes toward race and ethnicity. The time is fast approaching, he concludes, when we must consider whether baseball is still regarded as the national pastime and whether protecting its image is worth the effort. 606 $aBaseball$zUnited States$xHistory$y20th century 606 $aBaseball$xSocial aspects$zUnited States$xHistory$y20th century 608 $aElectronic books. 615 0$aBaseball$xHistory 615 0$aBaseball$xSocial aspects$xHistory 676 $a796.357/09/041 700 $aWhite$b G. Edward$0307837 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910464723003321 996 $aCreating the national pastime$92446411 997 $aUNINA LEADER 05631oam 2200685 a 450 001 9910781605703321 005 20220603115839.0 010 $a1-283-25821-8 010 $a9786613258212 010 $a1-118-17522-0 035 $a(CKB)2550000000051735 035 $a(EBL)819008 035 $a(OCoLC)759159321 035 $a(SSID)ssj0000642778 035 $a(PQKBManifestationID)11372030 035 $a(PQKBTitleCode)TC0000642778 035 $a(PQKBWorkID)10649105 035 $a(PQKB)10498589 035 $a(Au-PeEL)EBL819008 035 $a(CaPaEBR)ebr10494632 035 $a(CaSebORM)9781118026472 035 $a(MiAaPQ)EBC819008 035 $a(EXLCZ)992550000000051735 100 $a20110818d2011 uy 0 101 0 $aeng 135 $aurgn#---uuuuu 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 14$aThe web application hacker's handbook $efinding and exploiting security flaws /$fDafydd Stuttard, Marcus Pinto 205 $aSecond edition. 210 1$aIndianapolis, IN :$cJohn Wiley & Sons, Inc.,$d[2011]. 210 4$dİ2011 215 $a1 online resource (xxxiii, 878 pages) $cillustrations 300 $aPrevious edition published as: The web application hacker's handbook : discovering and exploiting security flaws. 2008. 300 $aDescription based upon print version of record. 300 $aIncludes index. 311 0 $a1118026470 327 $aThe Web Application Hacker's Handbook; Contents; Introduction; Chapter 1 Web Application (In)security; The Evolution of Web Applications; Common Web Application Functions; Benefits of Web Applications; Web Application Security; ""This Site Is Secure""; The Core Security Problem: Users Can Submit Arbitrary Input; Key Problem Factors; The New Security Perimeter; The Future of Web Application Security; Summary; Chapter 2 Core Defense Mechanisms; Handling User Access; Authentication; Session Management; Access Control; Handling User Input; Varieties of Input; Approaches to Input Handling 327 $aBoundary ValidationMultistep Validation and Canonicalization; Handling Attackers; Handling Errors; Maintaining Audit Logs; Alerting Administrators; Reacting to Attacks; Managing the Application; Summary; Questions; Chapter 3 Web Application Technologies; The HTTP Protocol; HTTP Requests; HTTP Responses; HTTP Methods; URLs; REST; HTTP Headers; Cookies; Status Codes; HTTPS; HTTP Proxies; HTTP Authentication; Web Functionality; Server-Side Functionality; Client-Side Functionality; State and Sessions; Encoding Schemes; URL Encoding; Unicode Encoding; HTML Encoding; Base64 Encoding; Hex Encoding 327 $aRemoting and Serialization FrameworksNext Steps; Questions; Chapter 4 Mapping the Application; Enumerating Content and Functionality; Web Spidering; User-Directed Spidering; Discovering Hidden Content; Application Pages Versus Functional Paths; Discovering Hidden Parameters; Analyzing the Application; Identifying Entry Points for User Input; Identifying Server-Side Technologies; Identifying Server-Side Functionality; Mapping the Attack Surface; Summary; Questions; Chapter 5 Bypassing Client-Side Controls; Transmitting Data Via the Client; Hidden Form Fields; HTTP Cookies; URL Parameters 327 $aThe Referer HeaderOpaque Data; The ASP.NET ViewState; Capturing User Data: HTML Forms; Length Limits; Script-Based Validation; Disabled Elements; Capturing User Data: Browser Extensions; Common Browser Extension Technologies; Approaches to Browser Extensions; Intercepting Traffic from Browser Extensions; Decompiling Browser Extensions; Attaching a Debugger; Native Client Components; Handling Client-Side Data Securely; Transmitting Data Via the Client; Validating Client-Generated Data; Logging and Alerting; Summary; Questions; Chapter 6 Attacking Authentication; Authentication Technologies 327 $aDesign Flaws in Authentication MechanismsBad Passwords; Brute-Forcible Login; Verbose Failure Messages; Vulnerable Transmission of Credentials; Password Change Functionality; Forgotten Password Functionality; ""Remember Me"" Functionality; User Impersonation Functionality; Incomplete Validation of Credentials; Nonunique Usernames; Predictable Usernames; Predictable Initial Passwords; Insecure Distribution of Credentials; Implementation Flaws in Authentication; Fail-Open Login Mechanisms; Defects in Multistage Login Mechanisms; Insecure Storage of Credentials; Securing Authentication 327 $aUse Strong Credentials 330 $aThe highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack 606 $aInternet$xSecurity measures 606 $aComputer security 615 0$aInternet$xSecurity measures. 615 0$aComputer security. 676 $a004 676 $a005.8 700 $aStuttard$b Dafydd$f1972-$01517578 701 $aPinto$b Marcus$f1978-$01517579 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910781605703321 996 $aThe web application hacker's handbook$93754734 997 $aUNINA