LEADER 02933nam 22004455 450 001 9910480134403321 005 20210817000959.0 010 $a0-300-19030-1 024 7 $a10.12987/9780300190304 035 $a(CKB)3710000000828807 035 $a(MiAaPQ)EBC4603501 035 $a(DE-B1597)540479 035 $a(DE-B1597)9780300190304 035 $a(OCoLC)889795217 035 $a(EXLCZ)993710000000828807 100 $a20200505h20142014 fg 0 101 0 $aeng 135 $aurcnu|||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 14$aThe History of Rock 'n' Roll in Ten Songs /$fGreil Marcus 210 1$aNew Haven, CT :$cYale University Press,$d[2014] 210 4$d©2014 215 $a1 online resource (321 pages) 311 0 $a0-300-18737-8 320 $aIncludes discography, bibliographical references and index. 327 $tFront matter --$tContents --$tShake Some Action --$tTransmission --$tIn the Still of the Nite --$tAll I Could Do Was Cry --$tCrying, Waiting, Hoping --$tMoney (That's What I Want) 1959-1963 --$tThis Magic Moment --$tGuitar Drag --$tTo Know Him Is to Love Him --$tNotes --$tAcknowledgments --$tIndex 330 $aOne of our finest critics gives us an altogether original history of rock 'n' roll Unlike all previous versions of rock 'n' roll history, this book omits almost every iconic performer and ignores the storied events and turning points that everyone knows. Instead, in a daring stroke, Greil Marcus selects ten songs recorded between 1956 and 2008, then proceeds to dramatize how each embodies rock 'n' roll as a thing in itself, in the story it tells, inhabits, and acts out-a new language, something new under the sun. "Transmission" by Joy Division. "All I Could Do Was Cry" by Etta James and then Beyoncé. "To Know Him Is to Love Him," first by the Teddy Bears and almost half a century later by Amy Winehouse. In Marcus's hands these and other songs tell the story of the music, which is, at bottom, the story of the desire for freedom in all its unruly and liberating glory. Slipping the constraints of chronology, Marcus braids together past and present, holding up to the light the ways that these striking songs fall through time and circumstance, gaining momentum and meaning, astonishing us by upending our presumptions and prejudices. This book, by a founder of contemporary rock criticism-and its most gifted and incisive practitioner-is destined to become an enduring classic. 606 $aRock music$xHistory and criticism 608 $aElectronic books. 615 0$aRock music$xHistory and criticism. 676 $a782.4216609 700 $aMarcus$b Greil$4aut$4http://id.loc.gov/vocabulary/relators/aut$0678877 801 0$bDE-B1597 801 1$bDE-B1597 906 $aBOOK 912 $a9910480134403321 996 $aThe History of Rock 'n' Roll in Ten Songs$92449194 997 $aUNINA LEADER 05360nam 22007575 450 001 9910298966503321 005 20200705094043.0 010 $a3-319-13329-2 024 7 $a10.1007/978-3-319-13329-4 035 $a(CKB)3710000000306187 035 $a(SSID)ssj0001386042 035 $a(PQKBManifestationID)11769136 035 $a(PQKBTitleCode)TC0001386042 035 $a(PQKBWorkID)11349839 035 $a(PQKB)11653969 035 $a(DE-He213)978-3-319-13329-4 035 $a(MiAaPQ)EBC6284097 035 $a(MiAaPQ)EBC5587533 035 $a(Au-PeEL)EBL5587533 035 $a(OCoLC)899249179 035 $a(PPN)183097823 035 $a(EXLCZ)993710000000306187 100 $a20141126d2014 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aAd Hoc Networks $e6th International ICST Conference, ADHOCNETS 2014, Rhodes, Greece, August 18-19, 2014, Revised Selected Papers /$fedited by Natalie Mitton, Antoine Gallais, Melike Erol Kantarci, Symeon Papavassiliou 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (IX, 266 p. 112 illus.) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-8211 ;$v140 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-13328-4 327 $aInterest-based forwarding for satisfying user preferences in vehicular networks -- Traffic-Aware Access-Points Deployment Strategies for VANETS -- A Social-based Approach for Message Dissemination in Vehicular Ad Hoc Networks -- Intelligent Transportation Systems - Maybe, But Where Are My Agents -- On the usefulness of information hiding techniques for wireless sensor networks security -- Evaluation of Malware Spreading in Wireless Multihop Networks with Churn -- Security and Privacy-preserving Mechanism for Aggregator based Vehicle-to-Grid Network -- An Improved TCP for Reduced Packet Delay in IEEE 802.11s-based Smart Grid AMI Networks -- A Cluster-based and On-demand routing algorithm for Large-Scale Multi-hop Wireless Sensor Networks -- Social OLSR: A social based routing algorithm for Mobile Ad Hoc Networks -- Improving Stability in QoS Routing for Ad-Hoc Networks -- Content Centricity in Constrained Cellular-Assisted D2D Communications -- Adaptive Transmit Power Adjustment Technique for ZigBee Network under Wi-Fi Interference -- Channel Switching Cost-Aware Resource Allocation for Multi-hop Cognitive Radio Networks with a Single Transceiver -- Connectivity Provisioning Using Cognitive Channel Selection in Vehicular Networks -- Using location services to autonomously drive flying mobile sinks in Wireless Sensor Networks -- Validation and Evaluation of the Chosen Path Planning Algorithm for Localization of Nodes Using an Unmanned Aerial Vehicle in Disaster Scenarios -- Structural Health Monitoring of Infrastructure using Wireless Sensor System -- A low-overhead localized target coverage algorithm in wireless sensor networks -- Connectivity restoration and amelioration in wireless ad-hoc networks: A practical solution. 330 $aThis book constitutes the thoroughly refereed proceedings of the 6th International Conference on Ad Hoc Networks, ADHOCNETS 2014, held in Rhodes, Greece, in August 2014. The 16 regular and invited papers presented were carefully selected and reviewed from numerous submissions and cover a wide range of applications, such as mobile ad hoc networks, sensor networks, vehicular networks, intelligent transportation systems, wireless sensor networks security. 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-8211 ;$v140 606 $aComputer science 606 $aComputer networks 606 $aComputers, Special purpose 606 $aComputer security 606 $aComputer Science, general$3https://scigraph.springernature.com/ontologies/product-market-codes/I00001 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSpecial Purpose and Application-Based Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I13030 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 615 0$aComputer science. 615 0$aComputer networks. 615 0$aComputers, Special purpose. 615 0$aComputer security. 615 14$aComputer Science, general. 615 24$aComputer Communication Networks. 615 24$aSpecial Purpose and Application-Based Systems. 615 24$aSystems and Data Security. 676 $a004 702 $aMitton$b Natalie$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGallais$b Antoine$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKantarci$b Melike Erol$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPapavassiliou$b Symeon$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910298966503321 996 $aAd Hoc Networks$91961598 997 $aUNINA