LEADER 00443nam##22001337##450# 001 9910551542903321 010 $a9788860878472 100 $a########d########u##y0engy50####ba 105 0 $a########00### 200 1 $aMediologia della performance : arti performátiche nell'epoca della riproducibilità digitale / Fabrizio Deriu. 700 $aDeriu, Fabrizio.$0457611 912 $a9910551542903321 996 $aMediologia della performance$9257682 997 $aUNINA LEADER 02732nam 2200577Ia 450 001 9910784501303321 005 20230424180829.0 010 $a0-8166-8984-9 035 $a(CKB)1000000000346963 035 $a(EBL)310446 035 $a(OCoLC)226376783 035 $a(SSID)ssj0000284268 035 $a(PQKBManifestationID)11230211 035 $a(PQKBTitleCode)TC0000284268 035 $a(PQKBWorkID)10261223 035 $a(PQKB)11734360 035 $a(MiAaPQ)EBC310446 035 $a(MdBmJHUP)muse39783 035 $a(Au-PeEL)EBL310446 035 $a(CaPaEBR)ebr10151151 035 $a(CaONFJC)MIL522603 035 $a(EXLCZ)991000000000346963 100 $a19980824h19991999 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 14$aThe social origins of Islam $emind, economy, discourse /$fMohammed A. Bamyeh 210 1$aMinneapolis :$cUniversity of Minnesota Press,$d1999. 210 4$a©1999 215 $a1 online resource (xiii, 316 pages) 300 $aDescription based upon print version of record. 311 0 $a0-8166-3264-2 311 0 $a0-8166-3263-4 320 $aIncludes bibliographical references and index. 327 $aContents; Introduction; Part I: The Ground; ONE. The Ideology of the Horizons; TWO. Socioeconomy and the Horizon of Thought; THREE. Social Time, Death, and the Ideal; FOUR. Pre-Islamic Ontotheology and the Method of Knowledge; FIVE. The Discourse and the Path; Part II: The Faith; SIX. Prophetic Constitution; SEVEN. The House of the Umma and the Spider Web of the Tribe; EIGHT. Austerity, Power, and Worldly Exchange; NINE. In Lieu of a Conclusion: The Origins, the System, and the Accident; Notes; Bibliography; Index 330 $aThe story of the origins of Islam provides a rich and suggestive example of sweeping cultural transformation. Incorporating both innovation and continuity, Islam built upon the existing cultural patterns among the peoples of the Arabian peninsula even as it threatened to eradicate these same patterns. In this provocative interdisciplinary study, Mohammed A. Bamyehcombines perspectives from sociology, literary studies, anthropology, and economic history to examine the cultural ecology that fostered Islam. 606 $aIslam$xOrigin 607 $aArabian Peninsula$xCivilization 607 $aArabian Peninsula$xSocial conditions 615 0$aIslam$xOrigin. 676 $a297 700 $aBamyeh$b Mohammed A$0701750 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910784501303321 996 $aThe social origins of Islam$93864529 997 $aUNINA LEADER 02935nam 22006135 450 001 9910484085003321 005 20251226195221.0 010 $a3-319-11212-0 024 7 $a10.1007/978-3-319-11212-1 035 $a(MiAaPQ)EBC5586502 035 $a(MiAaPQ)EBC6282944 035 $a(PPN)180626477 035 $a(CKB)3710000000227401 035 $a(BIP)52465737 035 $a(DE-He213)978-3-319-11212-1 035 $a(EXLCZ)993710000000227401 100 $a20140814d2014 u| 0 101 0 $aeng 135 $aurnn#||8mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aComputer Security - ESORICS 2014 $e19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II /$fedited by Miroslaw Kutylowski, Jaideep Vaidya 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $axvi, 516p ;$cill 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v8713 300 $aIncludes index. 327 $aCryptography, formal methods and theory of security -- Security services -- Intrusion/anomaly detection and malware mitigation -- Security in hardware -- Systems security -- Network security -- Database and storage security -- Software and application security -- Human and societal aspects of security and privacy. 330 $aThe two-volume set, LNCS 8712 and LNCS 8713 constitutes the refereed proceedings of the 19th European Symposium on Research in Computer Security, ESORICS 2014, held in Wroclaw, Poland, in September 2014 The 58 revised full papers presented were carefully reviewed and selected from 234 submissions. The papers address issues such as cryptography, formal methods and theory of security, security services, intrusion/anomaly detection and malware mitigation, security in hardware, systems security, network security, database and storage security, software and application security, human and societal aspects of security and privacy. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v8713 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aElectronic data processing$xManagement 606 $aData and Information Security 606 $aCryptology 606 $aIT Operations 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aElectronic data processing$xManagement. 615 14$aData and Information Security. 615 24$aCryptology. 615 24$aIT Operations. 676 $a005.8 701 $aKutylowski$b Miroslaw$01350545 701 $aVaidya$b Jaideep$01276751 801 0$bMiAaPQ 801 2$bta 906 $aBOOK 912 $a9910484085003321 996 $aComputer Security - ESORICS 2014$93088786 997 $aUNINA