LEADER 00595nam 2200217zu 450 001 9910918600803321 005 20241221171640.0 010 $a9789811640032 010 $a9811640033 035 $a(CKB)37054908600041 035 $a(EXLCZ)9937054908600041 100 $a20241221|2025uuuu || | 101 0 $aeng 135 $aur||||||||||| 200 00$aPrecision Machining Process and Technology 210 $cSpringer Nature Singapore$d2025 701 $aYang$0379126 906 $aBOOK 912 $a9910918600803321 996 $aPrecision Machining Process and Technology$94305906 997 $aUNINA LEADER 04934nam 2200733Ia 450 001 9910957557503321 005 20251202165454.0 010 $a1-134-03153-X 010 $a1-134-03154-8 010 $a1-282-56902-3 010 $a9786612569029 010 $a0-203-88042-0 024 7 $a10.4324/9780203880425 035 $a(CKB)2550000000006737 035 $a(EBL)481056 035 $a(OCoLC)609855019 035 $a(SSID)ssj0000364274 035 $a(PQKBManifestationID)11257359 035 $a(PQKBTitleCode)TC0000364274 035 $a(PQKBWorkID)10394611 035 $a(PQKB)11469141 035 $a(MiAaPQ)EBC481056 035 $a(Au-PeEL)EBL481056 035 $a(CaPaEBR)ebr10370144 035 $a(CaONFJC)MIL256902 035 $a(OCoLC)610210511 035 $a(FINmELB)ELB152002 035 $a(EXLCZ)992550000000006737 100 $a20081229d2010 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aPerversion and modern Japan $epsychoanalysis, literature, culture /$fedited by Nina Cornyetz and J. Keith Vincent 205 $a1st ed. 210 $aAbingdon, Oxon ;$aNew York $cRoutledge$d2010 215 $a1 online resource (353 p.) 225 1 $aRoutledge Contemporary Japan Series 300 $aDescription based upon print version of record. 311 08$a0-415-69143-5 311 08$a0-415-46910-4 320 $aIncludes bibliographical references (pages [308]-328) and index. 327 $aBook Cover; Title; Copyright; Contents; Figures; Contributors; Introduction: Japan as screen-memory: psychoanalysis and history; 1 Introduction: Bruce Suttmeier: Speculations of murder . . .; 1 Speculations of murder: Ghostly dreams, poisonous frogs and the case of Yokoi Shoichi; 2 Introduction: Carl Cassegard: Japan's lost decade and its two recoveries . . .; 2 Japan's lost decade and its two recoveries: On Sawaragi Noi, Japanese Neo-pop and anti-war activism; 3 Introduction: Yutaka Nagahara: The corporeal principles of the national polity . . . 327 $a3 The corporeal principles of the national polity: The rhetoric of the body of the nation, or the state as memory-apparatus4 Introduction: Ayelet Zohar: Pelluses/Phani . . .; 4 Pelluses/phani: The multiplication, displacement and appropriations of the phallus; 5 Introduction: Nina Cornyetz: Penisular cartography; 5 Penisular cartography: Topology in Nakagami Kenji's Kishu; 6 Introduction: Margherita Long: Two ways to play fort-da . . .; 6 Two ways to play fort-da: In Yoshino with Tanizaki and Freud; 7 Introduction: Gavin Walker: The double scission of Mishima Yukio . . . 327 $a7 The double scission of Mishima Yukio: Limits and anxieties in the autofictional machine8 Introduction: Dawn Lawson: Navigating the inner sea . . .; 8 Navigating the inner sea: Utsumi Bunzo's affects in Ukigumo; 9 Introduction: Irena Hayter: In the flesh . . .; 9 In the flesh: The historical unconscious of Ishikawa Jun's Fugen; 10 Introduction: J. Keith Vincent: Sexuality and narrative in Soseki's Kokoro . . .; 10 Sexuality and narrative in: Soseki's Kokoro: "At last, I was able to read Sensei's letter from beginning to end" 327 $a10 Sexuality and narrative in Soseki's Kokoro: "At last, I was able to read Sensei's letter from beginning to end"11 Introduction: Christopher Hill: Exhausted by their battles with the world . . .; 11 Exhausted by their battles with the world: Neurasthenia and civilization critique in early twentieth-century Japan; 12 Introduction: Kazushige Shingu: Freud, Lacan and Japan; 12 Freud, Lacan and Japan; 13 Introduction: Jonathan E. Abel: Packaging desires . . .; 13 Packaging desires: The unmentionables of Japanese film; References; Index 330 $aHow did nerves and neuroses take the place of ghosts and spirits in Meiji Japan? How does Natsume Soseki's canonical novel Kokoro pervert the Freudian teleology of sexual development? What do we make of Jacques Lacan's infamous claim that because of the nature of their language the Japanese people were unanalyzable? And how are we to understand the re-awakening of collective memory occasioned by the sudden appearance of a Japanese Imperial soldier stumbling out of the jungle in Guam in 1972? In addressing these and other questions, the essays collected here theorize the relation of u 410 0$aRoutledge Contemporary Japan Series 606 $aDeviant behavior$zJapan 606 $aPsychoanalysis and literature$zJapan 615 0$aDeviant behavior 615 0$aPsychoanalysis and literature 676 $a302.5420952 676 $a302.542095209045 701 $aCornyetz$b Nina$01858808 701 $aVincent$b Keith$f1968-$01835472 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910957557503321 996 $aPerversion and modern Japan$94461633 997 $aUNINA LEADER 05283nam 22007695 450 001 9910631082803321 005 20251009103226.0 010 $a9783030972998$b(electronic bk.) 010 $z9783030972981 024 7 $a10.1007/978-3-030-97299-8 035 $a(MiAaPQ)EBC7143441 035 $a(Au-PeEL)EBL7143441 035 $a(CKB)25402004600041 035 $a(PPN)266351883 035 $a(DE-He213)978-3-030-97299-8 035 $a(EXLCZ)9925402004600041 100 $a20221118d2022 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyberwarfare $eThreats to Critical Infrastructure /$fby Kristan Stoddart 205 $a1st ed. 2022. 210 1$aCham :$cSpringer International Publishing :$cImprint: Palgrave Macmillan,$d2022. 215 $a1 online resource (550 pages) 225 1 $aPalgrave Studies in Cybercrime and Cybersecurity,$x2946-2789 311 08$aPrint version: Stoddart, Kristan Cyberwarfare Cham : Springer International Publishing AG,c2022 9783030972981 320 $aIncludes bibliographical references and index. 327 $aIntroduction -- Chapter 1: On Cyberwar: Theorizing cyberwarfare through attacks on critical infrastructure ? Reality, potential and debates -- Chapter 2: Cyberwar: Attacking Critical Infrastructure -- Chapter 3: Gaining Access: Attack and defense methods and legacy systems -- Chapter 4 ? Hacking the human -- Chapter 5: Non and sub-state actors: Cybercrime, terrorism and hackers -- Conclusion. . 330 $a?Kristan Stoddart brings together an outstanding treatise of one of the most important subjects in international security of our times? This book offers innovative insights for scholars interested in the security and strategy of cyberwarfare, as well as those interested in understanding the security dynamics of the modern world more generally.? -Christian Kaunert, Professor of International Security, Dublin City University & University of South Wales. ?This book provides an exciting level of insight and detail into one of the most obscure and less explored areas of cyberspace studies. It is very informative and extremely interesting to read and I am certain it will be a necessary resource for students and academics in the field of cyber-related studies, international politics and beyond.? ? Vasileios Karagiannopoulos, Reader in Cybercrime and Cybersecurity and Director of the Cybercrime Awareness Clinic, University of Portsmouth, UK. This book provides a detailed examination of the threats and dangers facing the West at the far end of the cybersecurity spectrum. It concentrates on threats to critical infrastructure which includes major public utilities. It focusses on the threats posed by the two most potent adversaries/competitors to the West, Russia and China, whilst considering threats posed by Iran and North Korea. The arguments and themes are empirically driven but are also driven by the need to evolve the nascent debate on cyberwarfare and conceptions of ?cyberwar?. This book seeks to progress both conceptions and define them more tightly. This accessibly written book speaks to those interested in cybersecurity, international relations and international security, law, criminology, psychology as well as to the technical cybersecurity community, those in industry, governments, policing, law making and law enforcement, and in militaries (particularly NATO members). Kristan Stoddart is Associate Professor in Cyber Threats in the School of Social Sciences at Swansea University, UK, a member of Swansea?s Cyber Threats Research Centre (CYTREC), and Visiting Professor at the University of South Wales. He currently holds a grant looking at EU resilience Against Hybrid Warfare. From 2014-17, he worked on a £1.2 million project which analyzed SCADA systems and the Cyber Security Lifecycle co-funded by Airbus Group and the Welsh government from which this book draws. 410 0$aPalgrave Studies in Cybercrime and Cybersecurity,$x2946-2789 606 $aComputer crimes 606 $aCriminology 606 $aSecurity, International 606 $aTerrorism 606 $aPolitical violence 606 $aData protection 606 $aPeace 606 $aCybercrime 606 $aCrime Control and Security 606 $aInternational Security Studies 606 $aTerrorism and Political Violence 606 $aData and Information Security 606 $aPeace and Conflict Studies 615 0$aComputer crimes. 615 0$aCriminology. 615 0$aSecurity, International. 615 0$aTerrorism. 615 0$aPolitical violence. 615 0$aData protection. 615 0$aPeace. 615 14$aCybercrime. 615 24$aCrime Control and Security. 615 24$aInternational Security Studies. 615 24$aTerrorism and Political Violence. 615 24$aData and Information Security. 615 24$aPeace and Conflict Studies. 676 $a364.168 676 $a005.8 700 $aStoddart$b Kristan$01234044 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a9910631082803321 996 $aCyberwarfare$92965613 997 $aUNINA