LEADER 02491nam 22005053u 450 001 9910783039003321 005 20230607214826.0 035 $a(CKB)1000000000004817 035 $a(EBL)3384718 035 $a(SSID)ssj0000281592 035 $a(PQKBManifestationID)12052176 035 $a(PQKBTitleCode)TC0000281592 035 $a(PQKBWorkID)10306123 035 $a(PQKB)11774944 035 $a(MiAaPQ)EBC3384718 035 $a(EXLCZ)991000000000004817 100 $a20151005d2002|||| u|| | 101 0 $aeng 181 $ctxt 182 $cc 183 $acr 200 10$aMac OS X Black Book$b[electronic resource] $eThe Reference Guide for Power Users 210 $aPhoenix $cParaglyph Press$d2002 215 $a1 online resource (688 p.) 300 $aDescription based upon print version of record. 311 $a1-932111-07-7 327 $a""About the Authors""; ""Acknowledgments""; ""Contents at a Glance""; ""Table of Contents""; ""Introduction""; ""Chapter 1 Installing Mac OS X""; ""Chapter 2 Working with Mac OS X""; ""Chapter 3 Customizing the User Environment""; ""Chapter 4 Internet Connectivity""; ""Chapter 5 Working with Multiple Users""; ""Chapter 6 Managing Disk and File Systems""; ""Chapter 7 Working with Classic""; ""Chapter 8 Cross- Platform Compatibility""; ""Chapter 9 Mobile Computing""; ""Chapter 10 Printing and Font Management""; ""Chapter 11 File Sharing""; ""Chapter 12 Providing Internet Services"" 327 $a""Chapter 13 Mac OS X Server and NetInfo""""Chapter 14 AppleScript""; ""Chapter 15 Java""; ""Chapter 16 System Security""; ""Chapter 17 Event and System Monitoring Tools""; ""Chapter 18 Troubleshooting""; ""Appendix A Exploring Mac OS X Applications""; ""Appendix B Unix Shell Commands""; ""Appendix C Darwin and Open Source""; ""Appendix D Mac OS Changes and Enhancements""; ""Appendix E Shortcuts and Tricks""; ""Appendix F Additional Resources""; ""Glossary""; ""Index""; ""What's on the CD-ROM"" 606 $aMac OS 606 $aMacintosh (Computer) 606 $aOperating systems (Computers) 615 4$aMac OS. 615 4$aMacintosh (Computer). 615 4$aOperating systems (Computers). 676 $a005.4/469 700 $aBell$b Mark R$01501717 702 $aSteinberg$b Gene 702 $aSuggs$b Deborah 801 0$bAU-PeEL 801 1$bAU-PeEL 801 2$bAU-PeEL 906 $aBOOK 912 $a9910783039003321 996 $aMac OS X Black Book$93856408 997 $aUNINA LEADER 04974nam 2200709 a 450 001 9910954774003321 005 20251117082750.0 010 $a9786613081612 010 $a9780309211567 010 $a0309211565 010 $a9781283081610 010 $a128308161X 010 $a9780309186711 010 $a0309186714 035 $a(CKB)2550000000032881 035 $a(EBL)3378761 035 $a(SSID)ssj0000541948 035 $a(PQKBManifestationID)11330255 035 $a(PQKBTitleCode)TC0000541948 035 $a(PQKBWorkID)10509848 035 $a(PQKB)11526312 035 $a(Au-PeEL)EBL3378761 035 $a(CaPaEBR)ebr10466001 035 $a(CaONFJC)MIL308161 035 $a(OCoLC)923283302 035 $a(MiAaPQ)EBC3378761 035 $a(Perlego)4740377 035 $a(BIP)34392293 035 $a(EXLCZ)992550000000032881 100 $a20110428d2011 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 00$aThreatening communications and behavior $eperspectives on the pursuit of public figures /$fCherie Chauvin, editor ; Board on Behavioral, Cognitive and Senosory Sciences, Division of Behavioral and Social Sciences and Education, National Research Council of the National Academies 205 $a1st ed. 210 $aWashington, D.C. $cNational Academies Press$dc2011 215 $a1 online resource (117 p.) 300 $aThree papers that "review the behavioral and social sciences research on the likelihood that someone who engages in abnormal and/or threatening communications will actually then try to do harm"--P. 1. 311 08$a9780309186704 311 08$a0309186706 320 $aIncludes bibliographical references. 327 $a""Front Matter""; ""Acknowledgments""; ""Contents""; ""Introduction--Philip E. Rubin and Barbara A. Wanchisen""; ""Using Computerized Text Analysis to Assess Threatening Communications and Behavior--Cindy K. Chung and James W. Pennebaker""; ""Communication-Based Research Related to Threats and Ensuing Behavior--H. Dan O'Hair, Daniel Rex Bernard, and Randy R. Roper""; ""Approaching and Attacking Public Figures: A Contemporary Analysis of Communications and Behavior--J. Reid Meloy""; ""Appendix: Biographical Sketches of Contributors"" 330 $aToday's world of rapid social, technological, and behavioral change provides new opportunities for communications with few limitations of time and space. Through these communications, people leave behind an ever-growing collection of traces of their daily activities, including digital footprints provided by text, voice, and other modes of communication. Meanwhile, new techniques for aggregating and evaluating diverse and multimodal information sources are available to security services that must reliably identify communications indicating a high likelihood of future violence. In the context of this changed and changing world of communications and behavior, the Board on Behavioral, Cognitive, and Sensory Sciences of the National Research Council presents this volume of three papers as one portion of the vast subject of threatening communications and behavior. The papers review the behavioral and social sciences research on the likelihood that someone who engages in abnormal and/or threatening communications will actually then try to do harm. The focus is on how the scientific knowledge can inform and advance future research on threat assessments, in part by considering the approaches and techniques used to analyze communications and behavior in the dynamic context of today's world. The papers in the collection were written within the context of protecting high-profile public figures from potential attach or harm. The research, however, is broadly applicable to U.S. national security including potential applications for analysis of communications from leaders of hostile nations and public threats from terrorist groups. This work highlights the complex psychology of threatening communications and behavior, and it offers knowledge and perspectives from multiple domains that contribute to a deeper understanding of the value of communications in predicting and preventing violent behaviors. 606 $aCommunication$xPsychological aspects 606 $aThreat (Psychology) 606 $aPoliticians$xViolence against$xPsychological aspects 615 0$aCommunication$xPsychological aspects. 615 0$aThreat (Psychology) 615 0$aPoliticians$xViolence against$xPsychological aspects. 676 $a302.2 701 $aChauvin$b Cherie$01810935 712 02$aNational Research Council (U.S.).$bBoard on Behavioral, Cognitive, and Sensory Sciences. 712 02$aNational Academies Press (U.S.) 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910954774003321 996 $aThreatening communications and behavior$94362499 997 $aUNINA LEADER 01621nas 2200481 c 450 001 9910893996903321 005 20240201115656.0 035 $a(CKB)5280000000203307 035 $a(DE-599)ZDB2900309-X 035 $a(DE-101)1137024747 035 $a(EXLCZ)995280000000203307 100 $a20170720a20179999 |y | 101 0 $ager 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aBerliner Wespen$eillustriertes humoristisches Wochenblatt 210 31$aBerlin$cZentral- und Landesbibliothek Berlin$aMu?nchen$cMu?nchener Digitalisierungszentrum$d2017- 215 $aOnline-Ressource 300 $aUngeza?hlte Beilagen: Beilage der Berliner Wespen; Berliner Bilderbogen 300 $aVerantwortlicher Redakteur: Julius Stettenheim 300 $aGesehen am 20.07.2017 300 $aDigitalisiert von: Berlin : Zentral- und Landesbibliothek Berlin, 2017 300 $aDigitalisiert von: Mu?nchen : Mu?nchener Digitalisierungszentrum, 2017-2018 300 $aReproduktion 517 $aBerliner Wespen 517 3 $aBerliner Wespen / Beilage 517 3 $aBeilage der Berliner Wespen 517 3 $aBerliner Bilderbogen 517 3 $aIllustriertes humoristisches Wochenblatt 608 $aZeitung$2gnd-content 608 $aRegionalzeitung$2gnd-content 676 $a790 676 $a943 702 $aStettenheim$b Julius$f1831-1916,$4pbd 801 0$b0109 801 1$bDE-101 801 2$b9001 906 $aJOURNAL 912 $a9910893996903321 996 $aBerliner Wespen$94224320 997 $aUNINA