LEADER 04331nam 2200541 a 450 001 9910461842703321 005 20200520144314.0 010 $a1-283-20258-1 010 $a9786613202581 010 $a1-4411-0921-8 035 $a(CKB)2670000000106594 035 $a(EBL)742603 035 $a(OCoLC)741691683 035 $a(MiAaPQ)EBC742603 035 $a(Au-PeEL)EBL742603 035 $a(CaPaEBR)ebr10488201 035 $a(CaONFJC)MIL320258 035 $a(OCoLC)893335534 035 $a(EXLCZ)992670000000106594 100 $a20020411d2003 uy 0 101 0 $aeng 135 $aur|n|---||||| 200 00$aUnderstanding religious sacrifice$b[electronic resource] $ea reader /$fedited by Jeffrey Carter 210 $aLondon ;$aNew York $cContinuum$d2003 215 $a1 online resource (480 p.) 225 1 $aControversies in the study of religion 300 $aDescription based upon print version of record. 311 $a0-8264-4879-8 311 $a0-8264-4880-1 320 $aIncludes bibliographical references and index. 327 $aContents; Preface; General Introduction; 1 EDWARD BURNETT TYLOR: From Primitive Culture: Researches in the Development of Mythology, Philosophy, Religion, Language, Arts, and Custom; 2 HERBERT SPENCER: From The Principles of Sociology; 3 WILLIAM ROBERTSON SMITH: From The Religion of the Semites: The Fundamental Institution; 4 JAMES G. FRAZER: From The Golden Bough: A Study in Magic and Religion; 5 HENRI HUBERT and MARCEL MAUSS: From Sacrifice: Its Nature and Function; 6 EDWARD A. WESTERMARCK: From The Origin and Development of the Moral Ideas 327 $a7 EMILE DURKHEIM: From The Elementary Forms of the Religious Life8 SIGMUND FREUD: From Totem and Taboo: Some Points of Agreement between the Mental Lives of Savages and Neurotics; 9 GERARDUS VAN DER LEEUW: From Religion in Essence and Manifestation: A Study in Phenomenology; 10 GEORGES BATAILLE: From The Accursed Share: An Essay on General Economy; 11 ADOLF E. JENSEN: From Myth and Cult among Primitive Peoples; 12 EDWARD E. EVANS-PRITCHARD: ""The Meaning of Sacrifice among the Nuer""; 13 WALTER BURKERT: From Homo Necans: The Anthropology of Ancient Greek Sacrificial Ritual and Myth 327 $a14 RENE? GIRARD: From Violence and the Sacred15 JAN VAN BAAL: ""Offering, Sacrifice and Gift""; 16 VICTOR TURNER: From ""Sacrifice as Quintessential Process: Prophylaxis or Abandonment?""; 17 LUC DE HEUSCH: From Sacrifice in Africa: A Structuralist Approach; 18 VALERIO VALERI: From Kingship and Sacrifice: Ritual and Society in Ancient Hawaii; 19 JONATHAN Z. SMITH: ""The Domestication of Sacrifice""; 20 ROBERT J. DALY: ""The Power of Sacrifice in Ancient Judaism and Christianity""; 21 BRUCE LINCOLN: ""Debreasting, Disarming, Beheading: Some Sacrificial Practices of the Scyths and Amazons"" 327 $a22 NANCY JAY: From Throughout Your Generations Forever: Sacrifice, Religion, and Paternity23 WILLIAM BEERS: From Women and Sacrifice: Male Narcissism and the Psychology of Religion; 24 MAURICE BLOCH: From Prey into Hunter: The Politics of Religious Experience; 25 JON D. LEVENSON: From The Death and Resurrection of the Beloved Son: The Transformation of Child Sacrifice in Judaism and Christianity; Postscript; Selected Bibliography on Sacrifice; Index 330 $aThis volume provides a thorough introduction to the major classic and modern writings dealing with religious sacrifice. Collected here are twenty five influential selections, each with a brief introduction addressing the overall framework and assumptions of its author. As they present different theories and examples of sacrifice, these selections also discuss important concepts in religious studies such as the origin of religion, totemism, magic, symbolism, violence, structuralism and ritual performance. Students of comparative religion, ritual studies, the history of religions, the anthropolo 410 0$aControversies in the study of religion. 606 $aSacrifice 608 $aElectronic books. 615 0$aSacrifice. 676 $a203/.4 701 $aCarter$b Jeffrey$f1963-$0922960 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910461842703321 996 $aUnderstanding religious sacrifice$92070962 997 $aUNINA LEADER 05109nam 22008775 450 001 9910483626203321 005 20251226200537.0 010 $a3-540-79104-3 024 7 $a10.1007/978-3-540-79104-1 035 $a(CKB)1000000000490681 035 $a(SSID)ssj0000318286 035 $a(PQKBManifestationID)11231738 035 $a(PQKBTitleCode)TC0000318286 035 $a(PQKBWorkID)10308728 035 $a(PQKB)10741622 035 $a(DE-He213)978-3-540-79104-1 035 $a(MiAaPQ)EBC3062988 035 $a(MiAaPQ)EBC6426710 035 $a(PPN)123746078 035 $a(Au-PeEL)EBL6426710 035 $a(OCoLC)261324821 035 $a(EXLCZ)991000000000490681 100 $a20100301d2008 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Security Practice and Experience $e4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings /$fedited by Liqun Chen, Yi Mu, Willy Susilo 205 $a1st ed. 2008. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2008. 215 $a1 online resource (XIII, 420 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v4991 300 $aIncludes index. 311 08$a3-540-79103-5 320 $aIncludes bibliographical references and index. 327 $aVerification of Integrity and Secrecy Properties of a Biometric Authentication Protocol -- An On-Line Secure E-Passport Protocol -- Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly -- 1-out-of-n Oblivious Signatures -- A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes -- Private Query on Encrypted Data in Multi-user Settings -- Towards Tamper Resistant Code Encryption: Practice and Experience -- A New Public Key Broadcast Encryption Using Boneh-Boyen-Goh?s HIBE Scheme -- RSA Moduli with a Predetermined Portion: Techniques and Applications -- Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-Offs -- Secure Cryptographic Precomputation with Insecure Memory -- Securing Peer-to-Peer Distributions for Mobile Devices -- Unified Rate Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS Attacks -- Combating Spam and Denial-of-Service Attacks with Trusted Puzzle Solvers -- PROBE: A Process Behavior-Based Host Intrusion Prevention System -- Towards the World-Wide Quantum Network -- Synthesising Monitors from High-Level Policies for the Safe Execution of Untrusted Software -- Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains -- Privacy of Recent RFID Authentication Protocols -- A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection -- An Efficient Countermeasure against Side Channel Attacks for Pairing Computation -- Efficient Arithmetic on Subfield Elliptic Curves over Small Finite Fields of Odd Characteristic -- Secure Computation of the Vector Dominance Problem -- Rational Secret Sharing with Repeated Games -- Distributed Private Matching and Set Operations -- Computational Soundness ofNon-Malleable Commitments -- Square Attack on Reduced-Round Zodiac Cipher -- Analysis of Zipper as a Hash Function -- On the Importance of the Key Separation Principle for Different Modes of Operation. 330 $aThis book constitutes the refereed proceedings of the 4th International Information Security Practice and Experience Conference, ISPEC 2008, held in Sydney, Australia, in May 2008. The papers cover a wide range of topics. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v4991 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aComputers and civilization 606 $aElectronic data processing$xManagement 606 $aInformation storage and retrieval systems 606 $aData and Information Security 606 $aCryptology 606 $aComputer Communication Networks 606 $aComputers and Society 606 $aIT Operations 606 $aInformation Storage and Retrieval 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer networks. 615 0$aComputers and civilization. 615 0$aElectronic data processing$xManagement. 615 0$aInformation storage and retrieval systems. 615 14$aData and Information Security. 615 24$aCryptology. 615 24$aComputer Communication Networks. 615 24$aComputers and Society. 615 24$aIT Operations. 615 24$aInformation Storage and Retrieval. 676 $a005.8 702 $aMu$b Yi, 1955- 702 $aSusilo$b Willy 702 $aChen$b Liqun 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483626203321 996 $aInformation Security Practice and Experience$9772300 997 $aUNINA