LEADER 00905nam0-22003251i-450- 001 990000552690403321 005 20001010 010 $a0 08 028330 6 035 $a000055269 035 $aFED01000055269 035 $a(Aleph)000055269FED01 035 $a000055269 100 $a20001010d--------km-y0itay50------ba 101 0 $aita 105 $ay-------001yy 200 1 $aSmall arms and cannons$fC. J. Marchant Smith , P. R. Haslam 210 $aLondon$cBrassey's Publs.$d1982 215 $a23 cm$d202 p. 225 1 $aBrassey's battlefield weapons systems and technology$v5 676 $a623.4'4 700 1$aMarchant Smith,$bC. J.$029899 702 1$aHaslam,$bPaul R. 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990000552690403321 952 $a05 64 84$b211$fDININ 959 $aDININ 996 $aSmall arms and cannons$9320172 997 $aUNINA DB $aING01 LEADER 04517nam 22006135 450 001 9910495966803321 005 20231206212259.0 010 $a9780520919143 010 $a0520919149 010 $a9780585249766 010 $a0585249768 024 7 $a10.1525/9780520919143 035 $a(CKB)110989862154058 035 $a(MH)005271390-3 035 $a(SSID)ssj0000099675 035 $a(PQKBManifestationID)11998625 035 $a(PQKBTitleCode)TC0000099675 035 $a(PQKBWorkID)10014378 035 $a(PQKB)11261591 035 $a(DE-B1597)542905 035 $a(DE-B1597)9780520919143 035 $a(OCoLC)1163878849 035 $a(MiAaPQ)EBC30696859 035 $a(Au-PeEL)EBL30696859 035 $a(OCoLC)1394117209 035 $a(EXLCZ)99110989862154058 100 $a20200707h19951995 fg 0 101 0 $aeng 135 $aur||#|||||||| 181 $ctxt 182 $cc 183 $acr 200 10$aAfghanistan $ethe Soviet invasion and the Afghan response, 1979?1982 /$fM. Hassan Kakar 205 $aReprint 2019 210 1$aBerkeley, CA :$cUniversity of California Press,$d[1995] 210 4$d©1995 215 $a1 online resource (x, 380 p. )$cmaps ; 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a9780520208933 311 08$a0520208935 311 08$a9780520085916 311 08$a0520085914 320 $aIncludes bibliographical references (p. 357-364) and index. 327 $tFront matter --$tContents --$tPreface --$tIntroduction --$t1. The Soviet Invasion of Afghanistan --$t2. Why Did the Soviet Union Invade? --$t3. Under the Soviet Shadow --$t4. Islamic Resistance Organizations --$t5. Nationalist Resistance Organizations --$t6. Urban Uprisings and Their Suppression --$t7. Beginning of the Countrywide Armed Clashes --$t8. A New Type of War Leader: The Case of Logar --$t9. KhAD as an Agency of Suppression --$t10. Military and Administrative Measures for Consolidation of the Government --$t11. Victory at Any Cost --$t12. Elimination of Opponents by Nonmilitary Means --$t13. Genocide Throughout the Country --$t14. Genocide in Districts Around Kabul --$tConclusion --$tEpilogue, 1982-1994 --$tAppendix A. Political Organizations, Factions, and Unions --$tAppendix B. Selected Biographical Sketches --$tAppendix C. Afghan Refugees in Pakistan --$tAppendix D. Telephone Conversation Between Kosygin and Taraki --$tNotes --$tGlossary --$tSelect Bibliography --$tIndex --$tAbout the Author 330 $aFew people are more respected or better positioned to speak on the Soviet invasion of Afghanistan than M. Hassan Kakar. A professor at Kabul University and scholar of Afghanistan affairs at the time of the 1978 coup d'état, Kakar vividly describes the events surrounding the Soviet invasion in 1979 and the encounter between the military superpower and the poorly armed Afghans. The events that followed are carefully detailed, with eyewitness accounts and authoritative documentation that provide an unparalleled view of this historical moment. Because of his prominence Kakar was at first treated with deference by the Marxist government and was not imprisoned, although he openly criticized the regime. When he was put behind bars the outcry from scholars all over the world possibly saved his life. In prison for five years, he continued collecting information, much of it from prominent Afghans of varying political persuasions who were themselves prisoners. Kakar brings firsthand knowledge and a historian's sensibility to his account of the invasion and its aftermath. This is both a personal document and a historical one--Kakar lived through the events he describes, and his concern for human rights rather than party politics infuses his writing. As Afghans and the rest of the world try to make sense of Afghanistan's recent past, Kakar's voice will be one of those most listened to. Few people are more respected or better positioned to speak on the Soviet invasion of Afghanistan than M. Hassan Kakar. A professor at Kabul University and scholar of Afghanistan affairs at the time of the 1978 coup d'état, Kakar vividly describes the eve. 607 $aAfghanistan$xHistory$ySoviet occupation, 1979-1989 676 $a958.104/5 700 $aKakar$b M. Hassan$4aut$4http://id.loc.gov/vocabulary/relators/aut$01208705 801 0$bDE-B1597 801 1$bDE-B1597 906 $aBOOK 912 $a9910495966803321 996 $aAfghanistan$92788707 997 $aUNINA LEADER 05344nam 22006855 450 001 9910349285903321 005 20250426010029.0 010 $a3-030-23128-3 024 7 $a10.1007/978-3-030-23128-6 035 $a(CKB)4100000009152677 035 $a(MiAaPQ)EBC5887802 035 $a(DE-He213)978-3-030-23128-6 035 $a(PPN)26030140X 035 $a(EXLCZ)994100000009152677 100 $a20190828d2019 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCloud Security Auditing /$fby Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (174 pages) 225 1 $aAdvances in Information Security,$x2512-2193 ;$v76 311 08$a3-030-23127-5 327 $a1 Introduction -- 2 Literature Review -- 3 Auditing Security Compliance of Virtualized Infrastructure -- 4 Auditing Virtual Network Isolation across Cloud Layers -- 5 User-Level Runtime Security Auditing for the Cloud -- 6 Proactive Security Auditing in Clouds -- 7 Runtime Security Policy Enforcement in Clouds -- 8 Conclusion. 330 $aThis book provides a comprehensive review of the most up to date research related to cloud security auditing and discusses auditing the cloud infrastructure from the structural point of view, while focusing on virtualization-related security properties and consistency between multiple control layers. It presents an off-line automated framework for auditing consistent isolation between virtual networks in OpenStack-managed cloud spanning over overlay and layer 2 by considering both cloud layers? views. A runtime security auditing framework for the cloud with special focus on the user-level including common access control and authentication mechanisms e.g., RBAC, ABAC and SSO is covered as well. This book also discusses a learning-based proactive security auditing system, which extracts probabilistic dependencies between runtime events and applies such dependencies to proactively audit and prevent security violations resulting from critical events. Finally, this book elaborates the design and implementation of a middleware as a pluggable interface to OpenStack for intercepting and verifying the legitimacy of user requests at runtime. The authors discuss how state-of-the-art security auditing solutions may help increase cloud tenants? trust in the service providers by providing assurance on the compliance with the applicable laws, regulations, policies, and standards. This book introduces the latest research results on both traditional retroactive auditing and novel (runtime and proactive) auditing techniques to serve different stakeholders in the cloud. This book covers security threats from different cloud abstraction levels and discusses a wide-range of security properties related to cloud-specific standards (e.g., Cloud Control Matrix (CCM) and ISO 27017). It also elaborates on the integration of security auditing solutions into real world cloud management platforms (e.g., OpenStack, Amazon AWS and GoogleGCP). This book targets industrial scientists, who are working on cloud or security-related topics, as well as security practitioners, administrators, cloud providers and operators. Researchers and advanced-level students studying and working in computer science, practically in cloud security will also be interested in this book. 410 0$aAdvances in Information Security,$x2512-2193 ;$v76 606 $aData protection 606 $aComputer engineering 606 $aComputer networks 606 $aTelecommunication 606 $aData and Information Security 606 $aComputer Engineering and Networks 606 $aComputer Communication Networks 606 $aCommunications Engineering, Networks 615 0$aData protection. 615 0$aComputer engineering. 615 0$aComputer networks. 615 0$aTelecommunication. 615 14$aData and Information Security. 615 24$aComputer Engineering and Networks. 615 24$aComputer Communication Networks. 615 24$aCommunications Engineering, Networks. 676 $a004.6782 700 $aMajumdar$b Suryadipta$4aut$4http://id.loc.gov/vocabulary/relators/aut$0938806 702 $aMadi$b Taous$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aWang$b Yushun$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aTabiban$b Azadeh$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aOqaily$b Momen$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aAlimohammadifar$b Amir$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aJarraya$b Yosr$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aPourzandi$b Makan$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aWang$b Lingyu$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aDebbabi$b Mourad$4aut$4http://id.loc.gov/vocabulary/relators/aut 906 $aBOOK 912 $a9910349285903321 996 $aCloud Security Auditing$92520057 997 $aUNINA