LEADER 03172nam 2200853 450 001 9910791947903321 005 20191128155018.0 010 $a1-84779-786-5 010 $a1-78170-005-2 010 $a1-84779-296-0 035 $a(CKB)2560000000085763 035 $a(EBL)1069722 035 $a(OCoLC)818847534 035 $a(SSID)ssj0000712797 035 $a(PQKBManifestationID)12259068 035 $a(PQKBTitleCode)TC0000712797 035 $a(PQKBWorkID)10650328 035 $a(PQKB)11378738 035 $a(StDuBDS)EDZ0000086961 035 $a(MiAaPQ)EBC1069722 035 $a(Au-PeEL)EBL1069722 035 $a(CaPaEBR)ebr10627255 035 $a(CaONFJC)MIL843697 035 $a(UkMaJRU)992979626608501631 035 $a(DE-B1597)659198 035 $a(DE-B1597)9781847792969 035 $a(PPN)242887759 035 $a(EXLCZ)992560000000085763 100 $a20191128h20132010 fy| 0 101 0 $aeng 135 $aur||#---||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aJohn Donne's performances $esermons, poems, letters and devotions /$fby Margret Fetzer 210 1$aManchester, UK :$cManchester University Press,$d2013. 210 4$dİ2010 215 $a1 online resource (332 pages) $cdigital file(s) 300 $aDescription based upon print version of record. 311 $a0-7190-9561-1 311 $a0-7190-8344-3 320 $aIncludes bibliographical references and index. 327 $aIntroduction : beginning Donne -- Pulpit performances : sermons -- Promethean and protean performances : worldly poems -- Passionate performances : poems erotic and divine -- Patronage performances : letters -- (Inter)personal performances : devotions -- Conclusion : being Don(n)e -- Bibliography -- Index. 330 8 $aThis is a comparative reading of Donne's poetry and prose, which eschews questions of personal or religious sincerity in order to recreate an image of John Donne as a man of many performances. 606 $aPoets, English$yEarly modern, 1500-1700$vCorrespondence 606 $aSermons, English$y17th century$xHistory and criticism 606 $aLiterature$2mup 606 $aLiterary Studies: Poetry & Poets$2bicssc 606 $aLITERARY CRITICISM / Poetry$2bisach 606 $aLiterary studies: poetry & poets$2thema 610 $aDevotions. 610 $aJ. L. Austin. 610 $aJohn Donne. 610 $aearly modern period. 610 $aerotic poetry. 610 $alinguistic performativity. 610 $apatronage seeking. 610 $aperformance. 610 $asermon. 610 $aspeech act theory. 615 0$aPoets, English 615 0$aSermons, English$xHistory and criticism. 615 7$aLiterature 615 7$aLiterary Studies: Poetry & Poets 615 7$aLITERARY CRITICISM / Poetry 615 7$aLiterary studies: poetry & poets 676 $a821.3 686 $a18.05$2bcl 700 $aFetzer$b Margret$01584357 801 2$bUkMaJRU 906 $aBOOK 912 $a9910791947903321 996 $aJohn Donne's performances$93868076 997 $aUNINA LEADER 03755nam 22005653 450 001 9911009185503321 005 20251012110035.0 010 $a9781787783607 010 $a178778360X 035 $a(MiAaPQ)EBC6961991 035 $a(Au-PeEL)EBL6961991 035 $a(CKB)21605407900041 035 $a(BIP)083946840 035 $a(OCoLC)1313074265 035 $a(FR-PaCSA)88973527 035 $a(FRCYB88973527)88973527 035 $a(EXLCZ)9921605407900041 100 $a20220428d2022 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDigital Earth $eCyber Threats, Privacy and Ethics in an Age of Paranoia 205 $a1st ed. 210 1$aEly :$cIT Governance Ltd,$d2022. 210 4$dİ2022. 215 $a1 online resource (108 pages) 311 08$aPrint version: Katz, Sarah Digital Earth Ely : IT Governance Ltd,c2022 9781787783591 327 $aCover -- Title -- Copyright -- About the author -- Acknowledgements -- Contents -- Introduction -- Chapter one: The spike in phishing amid the COVID-19 pandemic -- Key terms for this chapter -- Chaos theory in cyber threat mitigation -- The application of chaos theory to the assessment of phishing attacks -- Chapter two: A glance at the history of phishing mitigation practices -- The risk of phishing to federal health care agencies -- Applications of chaos theory in cyber threat mitigation, including phishing attacks -- Machine learning tools for phishing prevention -- Persuasive factors used in phishing attacks -- User awareness of email legitimacy verification techniques -- Chapter three: The hard truth - How little many users understand about identifying malicious emails -- Tackling email headers -- Next steps: Computer- assisted threat detection -- Chapter four: Disinformation versus misinformation in a post-COVID world -- Global information sharing -- Content moderators -- How to spot misinformation -- Managing content moderation: In theory and practice -- Next steps: Head above water in cyberspace -- Chapter five: Cyber terrorism and the firepower of social media -- Why convey a message to the masses? -- Making it look alluring -- Using social media to attract and recruit -- Next steps: Keep an eye on that friend request -- Chapter six: Drones - A search and rescue solution or the all-seeing eye in the sky? -- The technicalities of civilian privacy in UAV criminal investigation -- San Jose as a case study -- Those opposed -- Those in favor -- Calming the public outcry -- Balancing technological surveillance measures with public interest -- Next steps: Securing the wireless target -- Recent developments -- Chapter seven: Tying it all together -- Appendix A: Bibliography -- Further reading. 330 $aAn accessible introduction to the most prevalent cyber threats in our current climate, this book discusses cyber terrorism, phishing, and ransomware attacks, and provides advice on how to mitigate such threats in our personal and professional lives. 606 $aLAW / Computer & Internet$2bisacsh 606 $aCOMPUTERS / Security / General$2bisacsh 606 $aLAW / Communications$2bisacsh 606 $aLAW / Criminal Law / General$2bisacsh 610 $aMathematics 615 7$aLAW / Computer & Internet 615 7$aCOMPUTERS / Security / General 615 7$aLAW / Communications 615 7$aLAW / Criminal Law / General 676 $a005.8 700 $aKatz$b Sarah$01826457 712 02$aIT Governance Publishing,$4edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911009185503321 996 $aDigital Earth$94394449 997 $aUNINA