LEADER 02789nam 2200553 450 001 9910627292703321 005 20230801234613.0 010 $a1-78064-120-6 035 $a(CKB)3710000000435212 035 $a(EBL)1109763 035 $a(OCoLC)827211854 035 $a(SSID)ssj0000832735 035 $a(PQKBManifestationID)12390721 035 $a(PQKBTitleCode)TC0000832735 035 $a(PQKBWorkID)10935280 035 $a(PQKB)11186296 035 $a(MiAaPQ)EBC1109763 035 $a(EXLCZ)993710000000435212 100 $a20171124h20122012 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 14$aThe behaviour of the domestic cat /$fJohn W. S. Bradshaw, Rachel A. Casey, Sarah L. Brown 205 $a2nd ed. 210 1$aOxfordshire, England ;$aCambridge, Massachusetts :$cCABI,$d2012. 210 4$dİ2012 215 $a1 online resource (261 p.) 300 $aDescription based upon print version of record. 311 $a1-84593-992-1 320 $aIncludes bibliographical references and index. 327 $a""Contents""; ""Preface to the Second Edition""; ""1 The Cat: Domestication and Biology""; ""2 Sensory Abilities""; ""3 Mechanisms of Behaviour""; ""4 Behavioural Development""; ""5 Communication""; ""6 Feeding Behaviour""; ""7 Hunting and Predation""; ""8 Social Behaviour""; ""9 The Cat-Human Relationship""; ""10 Cat Welfare""; ""11 Undesired Behaviour in the Domestic Cat""; ""12 Physiological and Pathological Causes of Behavioural Change""; ""References""; ""Index""; ""A""; ""B""; ""C""; ""D""; ""E""; ""F""; ""G""; ""H""; ""I""; ""J""; ""K""; ""L""; ""M""; ""N""; ""O""; ""P""; ""Q""; ""R"" 327 $a""S""""T""; ""U""; ""V""; ""W"" 330 $aDescribing feline behaviour from both a mechanistic and functional approach, this textbook provides an accessible overview of this fascinating subject. The book begins by addressing physiological, developmental and psychological aspects, with chapters on domestication, the development of the senses, learning, communication and feeding behaviour. The authors then build on this foundation to discuss social behaviour, hunting and predation, cat-human interactions and welfare. Fully updated throughout, this new edition also includes two new chapters on behavioural disorders due to pathologies and 606 $aCats$xBehavior 615 0$aCats$xBehavior. 676 $a636.8 676 $a636.80019 700 $aBradshaw$b John$f1950-$01248280 702 $aCasey$b Rachel A. 702 $aBrown$b Sarah L. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910627292703321 996 $aThe behaviour of the domestic cat$92973091 997 $aUNINA LEADER 04837nam 2200517 450 001 9910786684903321 005 20230803202957.0 010 $a1-937584-81-X 035 $a(CKB)3710000000127395 035 $a(EBL)1681796 035 $a(MiAaPQ)EBC1681796 035 $a(Au-PeEL)EBL1681796 035 $a(OCoLC)881415762 035 $a(EXLCZ)993710000000127395 100 $a20220522d2014 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aBehold a pale farce $ecyberwar, threat inflation, & the malware industrial complex /$fBill Blunden, Violet Cheung 210 1$aWalterville, OR :$cTrine Day,$d[2014] 210 4$dİ2014 215 $a1 online resource (835 p.) 300 $aDescription based upon print version of record. 311 $a1-937584-80-1 327 $aCoverImage; Title Page; Copyright page; Dedication; Epigraph; Table of Contents; Media Massage; Firsthand Experience; The Public Relations Industry; Behold a Pale Farce; Organization; Acknowledgments; The Wonder of it All; Part I - Rampant Hyperbole; A Backdrop of Metaphors; Never Mind: False Alarm; The Madness of Crowds; An Electronic Pearl Harbor; A Cyber-Katrina; The Hiroshima of Cyberwar; A Cyber 9/11; Dissenting Voices; The Executive Responds; Stuxnet; Plan X; Presidential Policy Directive 20; Hacking Foreign Targets for Years; Oz the Great and Powerful; Our Frenemy in Asia 327 $aA Plurality of ActorsRule of Law Breaks Down; The Internet's Frontier Town; Opposing Models for Reform; The Extent of China's Capabilities; Joined at the Hip; Both Sides Keep the Other in Business; The #1 Threat to Economic Security?; Cyberwar as a Misdiagnosis; Dialing 911; Looking Ahead; Part II - A Series of Unfortunate Events; Cybercrime; The Ecosystem; A Snapshot of Cybercrime; The TJX Hack; The Heartland Payment Systems Breach; The DarkMarket Sting; The RBS WorldPay Attack; The Return of the Analyzer; The Ballad of Max Butler; Sony under Siege; The FIS Breach; The Big Picture 327 $aThe Punch LineEspionage; Moonlight Maze; Titan Rain; Operation Byzantine Hades; GhostNet; Joint Strike Fighter Breach; Operation Aurora; Shadows in the Cloud; Night Dragon; RSA and SecurID; Operation Shady RAT; The Nitro Attacks; Targeting Certificate Authorities; Operation Red October; Patterns Emerge; The Scope of U.S. Espionage; The Malware-Industrial Complex; Independent Operators; Spies Abound ...; But Some Groups Spy More Than Others; The Infrastructure; The Financial System; The Power Grid; The Telecoms; Aerospace; The Internet: Denial of Service Attacks; McAfee 327 $aThe Internet: Manipulating TrafficThreat Inflation; Conflicts of Interest; Part III - The Futility of Offensive Solutions; The Quandary of Attribution; Achieving Anonymity Online; The Origins of Tor; The Folly of Attribution; Deterrence; Arms Control Treaties; Shades of Orwell; The Golden Age of Surveillance; The NSA's MUSCULAR project; Opting Into Surveillance; The DHS Monitors Social Media; Corporate Compliance; The Hemisphere Project; A Global Panopticon; Coda: Extorting Privacy; Part IV - The Road to Cyber-Security; The Origins of Cyber-Insecurity; A Layered Perspective; Exciting Causes 327 $aThe Software DepressionPredisposing Causes; Remote Causes; Security for The 1%; Cyber-Security for The 99 Percent; Building Resilient Software; Echoes of Ken Thompson; International Cooperation; Managing Externalities; Catch-22; Strength in Numbers; The Hazards of a Misdiagnosis; Securitization In-Depth; Threat Inflation; The Folly of Deterrence; In Search of Enemies; American Hypocrisy; Subverting Attribution; Turning to Big Brother; Root Causes of Cyber-Insecurity; Cyber-Security for the 1%; Cyber-Security for the 99%; Index 330 $aThis book presents a data-driven message that exposes the cyberwar media campaign being directed by the Pentagon and its patronage networks. By demonstrating that the American public is being coerced by a threat that has been blown out of proportion-much like the run-up to the Gulf War or the global war on terror-this book discusses how the notion of cyberwar instills a crisis mentality that discourages formal risk assessment, making the public anxious and hence susceptible to ill-conceived solutions. With content that challenges conventional no 606 $aInformation warfare 606 $aComputer security$zUnited States 615 0$aInformation warfare. 615 0$aComputer security 676 $a355.343 700 $aBlunden$b Bill$01524146 702 $aCheung$b Violet 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910786684903321 996 $aBehold a pale farce$93764724 997 $aUNINA