LEADER 04204nam 2200769 450 001 9910822432203321 005 20231206203305.0 010 $a1-282-02881-2 010 $a9786612028816 010 $a1-4426-7578-0 024 7 $a10.3138/9781442675780 035 $a(CKB)2430000000011203 035 $a(EBL)4671592 035 $a(SSID)ssj0000298691 035 $a(PQKBManifestationID)11208210 035 $a(PQKBTitleCode)TC0000298691 035 $a(PQKBWorkID)10364129 035 $a(PQKB)11201800 035 $a(CaBNvSL)thg00600576 035 $a(DE-B1597)464535 035 $a(OCoLC)666914977 035 $a(OCoLC)979584758 035 $a(DE-B1597)9781442675780 035 $a(Au-PeEL)EBL4671592 035 $a(CaPaEBR)ebr11257297 035 $a(VaAlCD)20.500.12592/1gpdw6 035 $a(schport)gibson_crkn/2009-12-01/6/417995 035 $a(MiAaPQ)EBC4671592 035 $a(MdBmJHUP)musev2_104843 035 $a(MiAaPQ)EBC3255429 035 $a(EXLCZ)992430000000011203 100 $a20160922h20002000 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aHistory and reading $eTocqueville, Foucault, French studies /$fDominick LaCapra 210 1$aToronto, [Ontario] ;$aBuffalo, [New York] ;$aLondon, [England] :$cUniversity of Toronto Press,$d2000. 210 4$dİ2000 215 $a1 online resource (244 p.) 225 0 $aGreen College Thematic Lecture Series 300 $aIncludes index. 311 $a0-8020-4394-1 311 $a0-8020-8200-9 320 $aIncludes bibliographical references and index. 327 $tFrontmatter --$tContents --$tIntroduction --$t1. History, Reading, and Critical Theory --$t2. Rereading Tocqueville's Old Regime --$t3. Rereading Foucault's 'History of Madness' --$t4. Reconfiguring French Studies --$tIndex. 330 $aIn this study Dominick LaCapra addresses the ongoing concern with the application of theory - namely that of literary studies and linguistics - to contemporary historical research and analysis. History and Reading is an attempt to address the concerns of those scholars who either resist theoretical discussions or disavow the use of interdisciplinary study. LaCapra begins with an extensive discussion of the problem of reading and interpretation as it relates to the understanding of history. The focus then moves to two classic texts that serve as case studies: Alexis de Tocqueville's "Old RTgime and the French Revolution" and Michel Foucault's "Folie et dTraison: Histoire de la folie + l'+ge classique" (partially translated into English as "Madness and Civilization"). In the final chapter, LaCapra deals with the problem of rethinking and reconfiguring French studies, suggesting how this discipline could itself profit from the theoretical innovations for which it has been so important a conduit in the last few decades. LaCapra offers sensitive readings of Tocqueville and Foucault, authors who present vastly different narrative strategies and modes of analysis. Looking at these and other theorists whose work addresses the writing and understanding of history, he considers how their distinctive textual practices have transformed standard modes of interpretation and analysis. A distinguished and widely respected European historian, LaCapra offers a sophisticated consideration of how to combine textual analysis with traditional historical practices, and shows how this practice can be brought to bear on French studies and help to shape its future directions 410 0$aGreen College lecture series 606 $aLiterature and history 606 $aHistory$xMethodology 607 $aFrance$xStudy and teaching 607 $aFrance$xHistoriography 608 $aLivres numeriques. 608 $ae-books. 608 $aElectronic books. 615 0$aLiterature and history. 615 0$aHistory$xMethodology. 676 $a944/.007/2 700 $aLaCapra$b Dominick$f1939-$0122081 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910822432203321 996 $aHistory and reading$93915960 997 $aUNINA LEADER 06893nam 22009255 450 001 9910483105903321 005 20251127151916.0 010 $a1-280-38621-5 010 $a9786613564139 010 $a3-642-12368-6 024 7 $a10.1007/978-3-642-12368-9 035 $a(CKB)2560000000009132 035 $a(SSID)ssj0000399464 035 $a(PQKBManifestationID)11275095 035 $a(PQKBTitleCode)TC0000399464 035 $a(PQKBWorkID)10384362 035 $a(PQKB)11187680 035 $a(DE-He213)978-3-642-12368-9 035 $a(MiAaPQ)EBC3065195 035 $a(PPN)149073321 035 $a(BIP)29244979 035 $a(EXLCZ)992560000000009132 100 $a20100407d2010 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices $e4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings /$fedited by Pierangela Samarati, Michael Tunstall, Joachim Posegga, Konstantinos Markantonakis, Damien Sauveron 205 $a1st ed. 2010. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2010. 215 $a1 online resource (XIII, 386 p. 93 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v6033 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-12367-8 320 $aIncludes bibliographical references and index. 327 $aEmbedded Security -- Efficient and Effective Buffer Overflow Protection on ARM Processors -- Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines -- A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones -- A Smart Card Implementation of the McEliece PKC -- Evaluation Metrics of Physical Non-invasive Security -- Protocols -- Trust in Peer-to-Peer Content Distribution Protocols -- Generic Constructions of Biometric Identity Based Encryption Systems -- Design and Analysis of a Generalized Canvas Protocol -- Highly Constrained Embedded Systems -- Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures -- Practical Schemes for Privacy and Security Enhanced RFID -- MoteAODV ? An AODV Implementation for TinyOS 2.0 -- Security -- Random Number Generation Based on Fingerprints -- Improvements of pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Certificates and SAML -- Fraud Detection for Voice over IP Services on Next-Generation Networks -- Smart Card Security -- Proxy Smart Card Systems -- Can We Support Applications? Evolution in Multi-application Smart Cards by Security-by-Contract? -- Website Credential Storage and Two-Factor Web Authentication with a Java SIM -- Algorithms -- Attribute-Based Encryption with Break-Glass -- On the Security of a Two-Factor Authentication Scheme -- The Design of Secure and Efficient P2PSIP Communication Systems -- Hardware Implementations -- Novel FPGA-Based Signature Matching for Deep Packet Inspection -- Towards Electrical, Integrated Implementations of SIMPL Systems -- A Very Compact Hardware Implementation of the KASUMI Block Cipher -- Embedded Systems -- Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions -- Identification andVerification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions -- Security Analysis of Mobile Phones Used as OTP Generators -- An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks -- Anonymity/Database Security -- The Market Failure of Anonymity Services -- Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios -- Predicting and Preventing Insider Threat in Relational Database Systems. 330 $aThese proceedings contain the papers selected for presentation at the 4th Wo- shop on Information Security Theory and Practice (WISTP 2010), held during April 12-14, 2010 in Passau, Germany. In response to the call for papers, 69 papers were submitted to the wo- shop. These papers were evaluated on the basis of their signi'cance, novelty, and technicalquality. Eachpaper was reviewedby four members of the Program Committee. Reviewing was double-blind meaning that the Program Committee was not able to see the names and a'liations of the authors, and the authors were not told which committee members reviewed which papers. The Program Committee meeting was held electronically, holding intensive discussions over a periodoftwo weeks.Of the papers submitted, 20 full papersand 10shortpapers were selected for presentation at the workshop. This workshop was sponsored by Vodaphone, who also provided a best - per award. We would like to thank this organization for their support, which helped make this workshop possible. Their continued support helps to reduce registration fees and make WISTP a continuing success. WISTP 2010 was also organized in cooperation with the International - sociation for Cryptologic Research (IACR), the IFIP WG 11.2 Pervasive S- tems Security, and ACM SIGSAC. Their support has signi'cantly contributed to raising the pro'le of WISTP, which is re'ected in the number of high-quality submissions that we received. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v6033 606 $aComputer networks 606 $aElectronic data processing$xManagement 606 $aCryptography 606 $aData encryption (Computer science) 606 $aAlgorithms 606 $aData protection 606 $aComputers and civilization 606 $aComputer Communication Networks 606 $aIT Operations 606 $aCryptology 606 $aAlgorithms 606 $aData and Information Security 606 $aComputers and Society 615 0$aComputer networks. 615 0$aElectronic data processing$xManagement. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aAlgorithms. 615 0$aData protection. 615 0$aComputers and civilization. 615 14$aComputer Communication Networks. 615 24$aIT Operations. 615 24$aCryptology. 615 24$aAlgorithms. 615 24$aData and Information Security. 615 24$aComputers and Society. 676 $a005.8 686 $aDAT 179f$2stub 686 $aDAT 260f$2stub 686 $aDAT 460f$2stub 686 $aDAT 465f$2stub 686 $aSS 4800$2rvk 701 $aSamarati$b Pierangela$01430844 712 12$aWISTP 2010 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483105903321 996 $aInformation Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices$94463976 997 $aUNINA