LEADER 03176nam 2200649 a 450 001 9910785390203321 005 20230207213849.0 010 $a0-8166-6807-8 035 $a(CKB)2670000000052465 035 $a(EBL)592807 035 $a(OCoLC)670429695 035 $a(SSID)ssj0000410608 035 $a(PQKBManifestationID)11309568 035 $a(PQKBTitleCode)TC0000410608 035 $a(PQKBWorkID)10350230 035 $a(PQKB)10689856 035 $a(MiAaPQ)EBC592807 035 $a(MdBmJHUP)muse38778 035 $a(Au-PeEL)EBL592807 035 $a(CaPaEBR)ebr10421844 035 $a(CaONFJC)MIL522984 035 $a(EXLCZ)992670000000052465 100 $a20081016d2009 ub 0 101 0 $aeng 135 $aur|||||||nn|n 181 $ctxt 182 $cc 183 $acr 200 10$a194X$b[electronic resource] $earchitecture, planning, and consumer culture on the American home front /$fAndrew M. Shanken 210 $aMinneapolis $cUniversity of Minnesota Press$dc2009 215 $a1 online resource (279 p.) 225 1 $aArchitecture, landscape, and American culture series 300 $aDescription based upon print version of record. 311 $a0-8166-5366-6 311 $a0-8166-5365-8 320 $aIncludes bibliographical references (p. 233-244) and index. 327 $aIntroduction: planning the postwar architect -- The culture of planning: the rhetoric and imagery of home front anticipation -- Old cities, new frontiers: mature economy theory and the language of renewal -- Advertising nothing, anticipating nowhere: architects and consumer culture -- The end of planning: the building boom and the invention of normalcy -- Afterword -- Appendix: wartime advertising campaigns. 330 $aDuring the Second World War, American architecture was in a state of crisis. The rationing of building materials and restrictions on nonmilitary construction continued the privations that the profession had endured during the Great Depression. At the same time, the dramatic events of the 1930's and 1940's led many architects to believe that their profession-and society itself-would undergo a profound shift once the war ended, with private commissions giving way to centrally planned projects. The magazine Architectural Forum coined the term "194X" to encapsulate this wartime vision of postwar 410 0$aArchitecture, landscape, and American culture series. 606 $aArchitecture and society$zUnited States$xHistory$y20th century 606 $aArchitecture$zUnited States$xPlanning 606 $aArchitecture$zUnited States$xHistory$y20th century 606 $aCity planning$zUnited States$xHistory$y20th century 607 $aUnited States$xSocial conditions$y1945- 615 0$aArchitecture and society$xHistory 615 0$aArchitecture$xPlanning. 615 0$aArchitecture$xHistory 615 0$aCity planning$xHistory 676 $a307.1/216097309045 700 $aShanken$b Andrew Michael$f1968-$01484316 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910785390203321 996 $a194X$93702903 997 $aUNINA LEADER 04981nam 22006253u 450 001 9910777088703321 005 20230124181445.0 035 $a(CKB)1000000000002788 035 $a(EBL)3410565 035 $a(SSID)ssj0000672820 035 $a(PQKBManifestationID)11362656 035 $a(PQKBTitleCode)TC0000672820 035 $a(PQKBWorkID)10636364 035 $a(PQKB)10362281 035 $a(MiAaPQ)EBC3410565 035 $a(EXLCZ)991000000000002788 100 $a20151005d2002|||| u|| | 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aExamInsight For CompTIA Security+ Certification (SY0-101)$b[electronic resource] 205 $a2nd ed. 210 $aFriendswood $cTotalRecall Publications$d2002 215 $a1 online resource (570 p.) 300 $aDescription based upon print version of record. 311 $a1-59095-672-9 327 $a""ExamInsight For Exam SY0-101""; ""About the Authors""; ""Contributing Authors and Editors""; ""About the Book""; ""Other Resources""; ""Table of Contents""; ""Frequently Asked Questions""; ""Preface and Acknowledgments""; ""How To Read This Book""; ""Icon Alerts""; ""Security+ 2002 Exam Specifics""; ""Introduction""; ""Chapter 0000: Read.Me""; ""The biggest challenge in security is people5.""; ""0.1Youa???re saveda???.If""; ""0.2Hacker vs. Cracker""; ""0.3Security Tao""; ""0.4Security Checklist""; ""0.5Security""; ""Technical Oxymoron""; ""0.6Resources""; ""0.7SpyWare""; ""0.8Summary"" 327 $a""Chapter 0001: Domain 1.0:""""General Security Concepts (30%)""; ""Getting Ready - Questions""; ""Getting Ready - Answers""; ""1.0 General Security Concepts""; ""1.1 Access Control""; ""1.1.1 MAC/DAC/RBAC""; ""Mandatory Access Control""; ""Discretionary Access Control""; ""Role-Based Access Control""; ""1.2 Authentication""; ""1.2.1 Kerberos""; ""How does Kerberos authentication work?""; ""1.2.2 CHAP""; ""1.2.3 Certificates""; ""1.2.4 Username/Password""; ""1.2.5 Tokens""; ""1.2.6 Multi-Factor""; ""1.2.7 Mutual Authentication""; ""1.2.8 Biometrics"" 327 $a""1.3 Non-essential Services and Protocols""""""; ""Pop Quiz 0000.00""; ""1.4 Attacks""; ""1.4.1 DoS/DDoS""; ""An early DDoS attack""; ""How and why do these attacks work?""; ""What can I do?""; ""1.4.2 Backdoors""; ""Whata???s a Rootkit?""; ""How do backdoors get onto a system?""; ""How do we stop back doors?""; ""1.4.3 Spoofing""; ""How TCP/IP permits spoofing""; ""Problem #1""; ""Problem #2 a???""; ""Types of spoofing""; ""How can we protect our network from spoofing?""; ""1.4.4 Man in the Middle""; ""1.4.5 Replay""; ""1.4.6 TCP/IP Hijacking""; ""1.4.7 Weak Keys""; ""1.4.8 Mathematical"" 327 $a""1.4.9 Social Engineering""""1.4.10 Birthday""; ""1.4.11 Password Guessing""; ""1.4.11.1 Brute Force""; ""1.4.11.2 Dictionary""; ""1.4.12 Software Exploitation""; ""Buffer overflows""; ""NaA?v?e web applications""; ""1.5 Malicious Code""; ""1.5.1 Viruses""; ""1.5.2 Trojan Horses""; ""1.5.3 Logic Bombs""; ""1.5.4 Worms""; ""1.6 Social Engineering""; """"; ""Pop Quiz 0001.00""; ""1.7 Auditing""; """"; ""Configuration and Log Analysis""; ""System/Network Scanning""; ""1.8 Summary""; ""1.9Success Questions""; ""Success Answers""; ""Chapter 0010: Domain 2.0:""; ""Communication Security (20%)"" 327 $a""Getting Ready a??? Questions""""Getting Ready a??? Answers""; ""2.0 Communication Security""; ""2.1 Remote Access""; ""2.1.1 802.1X""; ""Why is 802.1X needed?""; ""What is 802.1X?""; ""2.1.2 VPN""; ""2.1.3 RADIUS""; ""2.1.4 TACACS/XTACACS/TACACS+""; ""2.1.5 L2TP/PPTP""; ""PPTP""; ""TCP/IP Background Information""; ""L2TP""; ""2.1.6 SSH""; ""2.1.7 IPSEC""; ""IPSec packet types""; ""Transport and Tunnel Modes of IPSec""; ""IPSec and Encryption""; ""IPSec vs. DoS Attacks""; ""IPSec Interoperability""; ""2.1.8 Vulnerabilities""; ""2.2 Email""; ""2.2.1 S/MIME""; ""2.2.2 PGP"" 327 $a""2.2.3 Vulnerabilities"" 606 $aComputer networks -- Security measures -- Examinations -- Study guides 606 $aComputer security -- Examinations -- Study guides 606 $aElectronic books. -- local 606 $aElectronic data processing personnel -- Certification 606 $aEngineering & Applied Sciences$2HILCC 606 $aComputer Science$2HILCC 615 4$aComputer networks -- Security measures -- Examinations -- Study guides. 615 4$aComputer security -- Examinations -- Study guides. 615 4$aElectronic books. -- local. 615 4$aElectronic data processing personnel -- Certification. 615 7$aEngineering & Applied Sciences 615 7$aComputer Science 676 $a005.8/076 700 $aHouser$b Tcat$01529330 801 0$bAU-PeEL 801 1$bAU-PeEL 801 2$bAU-PeEL 906 $aBOOK 912 $a9910777088703321 996 $aExamInsight For CompTIA Security+ Certification (SY0-101)$93773506 997 $aUNINA