LEADER 02810nam 2200613Ia 450 001 9910975260903321 005 20200520144314.0 010 $a1-283-09814-8 010 $a9786613098146 010 $a0-19-979254-2 035 $a(CKB)2560000000072655 035 $a(EBL)684600 035 $a(OCoLC)714569774 035 $a(SSID)ssj0000524759 035 $a(PQKBManifestationID)12250433 035 $a(PQKBTitleCode)TC0000524759 035 $a(PQKBWorkID)10488080 035 $a(PQKB)11346176 035 $a(Au-PeEL)EBL684600 035 $a(CaPaEBR)ebr10464230 035 $a(CaONFJC)MIL309814 035 $a(OCoLC)531718868 035 $a(FINmELB)ELB162469 035 $a(MiAaPQ)EBC684600 035 $a(EXLCZ)992560000000072655 100 $a20100222d2011 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 14$aThe performance of 16th-century music $elearning from the theorists /$fby Anne Smith 205 $a1st ed. 210 $aNew York $cOxford University Press$dc2011 215 $a1 online resource (257 p.) 300 $aDescription based upon print version of record. 311 08$a0-19-974261-8 311 08$a0-19-974262-6 320 $aIncludes bibliographical references and index. 327 $aCover; About the Companion Web Site; Preface; Contents; 1. Introduction; 2. Part-Book versus Score Culture; 3. Solmization; 4. Metric Hierarchy, Articulation, and Rhythmic Flexibility; 5. Cadences; 6. Mode; 7. The Rhetoric of Counterpoint; 8. What Skills Were Expected of Professional Musicians?; 9. Score Culture; 10. Conclusion; Appendix: Modal Characteristics; Bibliography; Index 330 $aMost modern performers, trained on the performance practices of the Classical and Romantic periods, come to the music of the Renaissance with well-honed but anachronistic ideas. Fundamental differences between 16th-century repertoire and that of later epochs thus tend to be overlooked-yet it is just these differences which can make a performance truly stunning. The Performance of 16th-Century Music will enable the performer to better understand this music and advance their technical and expressive abilities. Early music specialist Anne Smith outlines several major areas of technical knowledge 606 $aPerformance practice (Music)$xHistory$y16th century 606 $aMusic$xPerformance$xHistory$y16th century 615 0$aPerformance practice (Music)$xHistory 615 0$aMusic$xPerformance$xHistory 676 $a781.4/309031 700 $aSmith$b Anne$f1951-$01851654 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910975260903321 996 $aThe performance of 16th-century music$94445835 997 $aUNINA LEADER 05413nam 22005055 450 001 996673176103316 005 20250809130201.0 010 $a3-032-00635-X 024 7 $a10.1007/978-3-032-00635-6 035 $a(MiAaPQ)EBC32257279 035 $a(Au-PeEL)EBL32257279 035 $a(CKB)40158918900041 035 $a(DE-He213)978-3-032-00635-6 035 $a(EXLCZ)9940158918900041 100 $a20250809d2025 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAvailability, Reliability and Security $eARES 2025 International Workshops, Ghent, Belgium, August 11?14, 2025, Proceedings, Part III /$fedited by Bart Coppens, Bruno Volckaert, Vincent Naessens, Bjorn De Sutter 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (544 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v15996 311 08$a3-032-00637-6 327 $a18th International Workshop on Digital Forensics (WSDF 2025): Forensic Insights into Windows 11?s Capability Access Manager Artifacts -- Reconstructing File Versions and Timestamps: Challenges and Guidelines in Network Forensics -- Measuring the effectiveness of keyword lists in digital forensics -- Money on My Mind: Forensic Investigation of Venmo Payment App -- Forensic Analysis of AI Systems - A Replika ?AI Companion? Example -- An AI-Based Network Forensic Readiness Framework for Resource-Constrained Environments -- Mapping the Research Landscape - An Exploratory Analysis of AI Applications in Digital Forensics -- The impact of anti-forensic techniques on data-driven digital forensics: anomaly detection case study. 14th International Workshop on Cyber Crime (IWCC 2025): Generating Deepfakes with Stable Diffusion, ControlNet, and LoRA -- Towards Creating a Darknet Image Database -- Hello, won?t you tell me your name?: Investigating Anonymity Abuse in IPFS -- Countering Financial Cyber Crime: New Method for Subsequent Steps Analysis in Large Complex Graphs of Financial Transactions -- From Sign-Up to Multi-Million Revenues: A Deep Dive into Vendors on Darknet Marketplaces. 9th International Workshop on Cyber Use of Information Hiding (CUING 2025): Contextual Coherence Evaluation of Perfectly Secure Steganography in Text Documents -- Robust Hashing meets Inpainting -- Describing Steganography Hiding Methods by Combining Pre-Existing Methodology -- Calyptography: Secure Secret Storage Inspired by Cryptography and Steganography -- An Independent Secure Authentication System against False Positive/Negative attacks in SVD Based Watermarking: Design and Implementation -- Entropy-Aware Secret Data Embedding for Network Storage Channels -- ReWaP: Reversible Watermarking and Paillier Encryption Approach for Privacy-Preserving Smart Meter. 330 $aThis four-volume set LNCS 15994-15997 constitutes the proceedings of the ARES 2025 International Workshops on Availability, Reliability and Security, held under the umbrella of the 20th International conference on Availability, Reliability and Security, ARES 2025, which took place in Ghent, Belgium, during August 11-14, 2025. The 79 full papers presented in this book were carefully reviewed and selected from 173 submissions. They contain papers of the following workshops: Part I: First International Workshop on Artificial Intelligence, Cyber and Cyber-Physical Security (AI&CCPS 2025); 8th International Symposium for Industrial Control System and SCADA Cyber Security Research (ICS-CSR 2025); First Workshop on Sustainable Security and Awareness For nExt Generation InfRastructures (SAFER 2025); 4th Workshop on Cybersecurity in Industry 4.0 (SecIndustry 2025). Part II: 6th Workshop on Recent Advances in Cyber Situational Awareness and Data-Centric Approaches (CSA 2025); First International Workshop on Responsible Data Governance, Privacy, and Digital Transformation (RDGPT 2025); 22nd International Workshop on Trust, Privacy and Security in the Digital Society (TrustBus 2025). Part III: 18th International Workshop on Digital Forensics (WSDF 2025); 14th International Workshop on Cyber Crime (IWCC 2025); 9th International Workshop on Cyber Use of Information Hiding (CUING 2025). Part IV: First International Workshop on Cybersecurity and Privacy Risk Assessments (CPRA 2025); Second International Workshop on Emerging Digital Identities (EDId 2025); Second International Workshop on Security and Privacy Enhancing Technologies for Multimodal Data (SPETViD 2025); 6th International Workshop on Graph-based Approaches for CyberSecurity (GRASEC 2025); 5th International Workshop on Behavioral Authentication for System Security (BASS 2025). 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v15996 606 $aData protection 606 $aData and Information Security 615 0$aData protection. 615 14$aData and Information Security. 676 $a005.8 700 $aCoppens$b Bart$01840373 701 $aVolckaert$b Bruno$01840374 701 $aNaessens$b Vincent$01840320 701 $aDe Sutter$b Bjorn$01840321 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996673176103316 996 $aAvailability, Reliability and Security$94419896 997 $aUNISA