LEADER 02588nam 2200553 450 001 9910464567603321 005 20200520144314.0 010 $a1-306-84970-5 010 $a1-4314-0972-3 035 $a(CKB)3710000000119862 035 $a(EBL)1695128 035 $a(SSID)ssj0001305608 035 $a(PQKBManifestationID)11799418 035 $a(PQKBTitleCode)TC0001305608 035 $a(PQKBWorkID)11257117 035 $a(PQKB)11322272 035 $a(MiAaPQ)EBC1695128 035 $a(Au-PeEL)EBL1695128 035 $a(CaPaEBR)ebr10876214 035 $a(CaONFJC)MIL616221 035 $a(OCoLC)880827313 035 $a(EXLCZ)993710000000119862 100 $a20140612h20142014 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt 182 $cc 183 $acr 200 14$aThe new radicals $ea generational memoir of the 1970s /$fGlenn Moss 210 1$aSunnyside, South Africa :$cJacana,$d2014. 210 4$dİ2014 215 $a1 online resource (311 p.) 300 $aIncludes index. 311 $a1-4314-0973-1 311 $a1-4314-0971-5 327 $aCover; Praise; Title page; Imprint page; Contents; Preface; Abbreviations; 1 Trading places; 2 Radical challenges to liberal politics; 3 Rejecting the Republic - and a detainee dies; 4 The student left takes charge; Picture section 1; 5 The rediscovery of resistance; 6 Release all political prisoners; 7 Students, intellectuals and worker organisation; 8 Unravelling the Industrial Aid Society; Picture section 2; 9 Unavoidably detained; 10 Trials and tribulations; 11 Bookends; Notes; Index; Picture credits; Back cover 330 $aFrom the political ashes of the late 1960's, new and radical initiatives grew with surprising speed in the first half of the 1970's. The New Radicals: A Generational Memoir of the 1970's tells the story of a generation of activists who embraced and developed forms of opposition politics that would have profound consequences. Within six short years, the politics of opposition and resistance had developed from an historical low point to the beginnings of a radicalism which would lead to February 1990 and the first democratic election in 1994. 606 $aExperimental theater$zUnited States$xHistory$y20th century 608 $aElectronic books. 615 0$aExperimental theater$xHistory 676 $a792.022 700 $aMoss$b Glenn$0905679 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910464567603321 996 $aThe new radicals$92025814 997 $aUNINA LEADER 05699nam 22008895 450 001 9910484756803321 005 20251226193557.0 010 $a1-280-38834-X 010 $a9786613566263 010 $a3-642-15152-3 024 7 $a10.1007/978-3-642-15152-1 035 $a(CKB)2670000000045041 035 $a(SSID)ssj0000446852 035 $a(PQKBManifestationID)11267879 035 $a(PQKBTitleCode)TC0000446852 035 $a(PQKBWorkID)10504737 035 $a(PQKB)11761395 035 $a(DE-He213)978-3-642-15152-1 035 $a(MiAaPQ)EBC3065718 035 $a(PPN)14902519X 035 $a(EXLCZ)992670000000045041 100 $a20100830d2010 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aTrust, Privacy and Security in Digital Business $e7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010, Proceedings /$fedited by Sokratis Katsikas, Miguel Soriano 205 $a1st ed. 2010. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2010. 215 $a1 online resource (XII, 252 p. 67 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v6264 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-15151-5 320 $aIncludes bibliographical references. 327 $aInvited Talk -- Usage Control, Risk and Trust -- Prevention Systems -- Attacking Image Recognition Captchas -- An Insider Threat Prediction Model -- A Call Conference Room Interception Attack and Its Detection -- Safe and Efficient Strategies for Updating Firewall Policies -- Privacy I -- A Privacy-Preserving Architecture for the Semantic Web Based on Tag Suppression -- Context-Aware Privacy Design Pattern Selection -- Real-Time Remote Attestation with Privacy Protection -- Private Searching on MapReduce -- Privacy II -- In Search of Search Privacy -- Untraceability and Profiling Are Not Mutually Exclusive -- Privacy Policy Referencing -- Access Control -- Formal Proof of Cooperativeness in a Multi?Party P2P Content Authentication Protocol -- Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation -- An Agent Based Back-End RFID Tag Management System -- Security and Trust Concepts -- Assessing the Usability of End-User Security Software -- Building ISMS through the Reuse of Knowledge -- Mechanizing Social Trust-Aware Recommenders with T-Index Augmented Trustworthiness -- Security for Dynamic Collaborations -- Security for Dynamic Service-Oriented eCollaboration -- Analyzing Information Security Awareness through Networks of Association -- Efficiency Improvement of Homomorphic E-Auction. 330 $aThis book presents the proceedings of the 7th International Conference on Trust, P- vacy and Security in Digital Business (TrustBus 2010), held in Bilbao, Spain during August 30?31, 2010. The conference continued from previous events held in Zaragoza (2004), Copenhagen (2005), Krakow (2006), Regensburg (2007), Turin (2008) and Linz (2009). The recent advances in information and communication technologies (ICT) have raised new opportunities for the implementation of novel applications and the provision of high-quality services over global networks. The aim is to utilize this ?information society era? for improving the quality of life for all citizens, disseminating knowledge, strengthening social cohesion, generating earnings and finally ensuring that organi- tions and public bodies remain competitive in the global electronic marketplace. - fortunately, such a rapid technological evolution cannot be problem-free. Concerns are raised regarding the ?lack of trust? in electronic procedures and the extent to which ?information security? and ?user privacy? can be ensured. TrustBus 2010 brought together academic researchers and industry developers, who discussed the state of the art in technology for establishing trust, privacy and security in digital business. We thank the attendees for coming to Bilbao to participate and debate the new emerging advances in this area. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v6264 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer programming 606 $aElectronic data processing$xManagement 606 $aComputers and civilization 606 $aApplication software 606 $aComputer Communication Networks 606 $aCryptology 606 $aProgramming Techniques 606 $aIT Operations 606 $aComputers and Society 606 $aComputer and Information Systems Applications 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer programming. 615 0$aElectronic data processing$xManagement. 615 0$aComputers and civilization. 615 0$aApplication software. 615 14$aComputer Communication Networks. 615 24$aCryptology. 615 24$aProgramming Techniques. 615 24$aIT Operations. 615 24$aComputers and Society. 615 24$aComputer and Information Systems Applications. 676 $a381.142 686 $a380$a650$a004$2GyFmDB 701 $aKatsikas$b Sokratis K$01754283 701 $aLopez$b Javier$01096793 701 $aSoriano$b Miguel$01754265 712 12$aTrustBus 2010 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484756803321 996 $aTrust, privacy and security in digital business$94190533 997 $aUNINA