The Decades of Modern American Drama series provides a comprehensive survey and study of the theatre produced in each decade from the 1930s to 2009 in eight volumes. Each volume equips readers with a detailed understanding of the context from which work emerged: an introduction considers life in the decade with a focus on domestic life and conditions, social changes, culture, media, technology, industry and political events; while a chapter on the theatre of the decade offers a wide-ranging and thorough survey of theatres, companies, dramatists, new movements and developments in response to the economic and political conditions of the day. The work of the four most prominent playwrights from the decade receives in-depth analysis and re-evaluation by a team of experts, together with commentary on their subsequent work and legacy. A final section brings together original documents such as interviews with the playwrights and with directors, drafts of play scenes, and other previously unpublished material. The major playwrights and their works to receive in-depth coverage in this volume include: * Clifford Odets: Waiting for Lefty (1935), Awake and Sing! (1935) and Golden Boy (1937); * Lillian Hellman: The Children's Hour (1934), The Little Foxes (1939), and Days to Come (1936); * Langston Hughes: Mulatto (1935), Mule Bone (1930, with Zora Neale Hurston) and Little Ham (1936); * Gertrude Stein: Doctor Faustus Lights the Lights (1938), Four Saints in Three Acts (written in 1927, published in 1932) and Listen to Me (1936).
Two mathematicians explore how math fits into everything from art, music, and literature to space probes and game shows. In this vibrant work, which is ideal for both teaching and learning, Apoorva Khare and Anna Lachowska explain the mathematics essential for understanding and appreciating our quantitative world. They show with examples that mathematics is a key tool in the creation and appreciation of art, music, and literature, not just science and technology. The book covers basic mathematical topics from logarithms to statistics, but the authors eschew mundane finance and probability problems. Instead, they explain how modular arithmetic helps keep our online transactions safe, how logarithms justify the twelve-tone scale commonly used in music, and how transmissions by deep space probes are like knights serving as messengers for their traveling prince. Perfect for coursework in introductory mathematics and requiring no knowledge of calculus, Khare and Lachowska’s enlightening mathematics tour will appeal to a wide audience. “A whirlwind tour through mathematics and its applications to the real world, laced with stimulating exercises and fascinating historical insights. Destined to become a classic of mathematical exposition.” —Eli Maor, author of e: the Story of a Number and Trigonometric Delights “Khare and Lachowska introduce bite-size pieces of important math by surrounding them with interesting context, from the Monty Hall problem for probability to a story by Dino Buzzati for velocity. Math treated with seriousness and fun.” —Michael Frame, co-author, with Benoit Mandelbrot, of Fractals, Graphics, and Mathematics Education “An excellent book, well-suited for a thoughtful, quantitatively-rigorous ‘Math for Humanists’ course.” —William Goldbloom Bloch, author of The Unimaginable Mathematics of Borges’ Library of Babel
This book constitutes the refereed proceedings of the 5th International Conference on Cryptology in India, INDOCRYPT 2004, held in Chennai, India in December 2004. The 30 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 181 submissions. The papers are organized in topical sections on cryptographic protocols, applications, stream ciphers, cryptographic Boolean functions, foundations, block ciphers, public key encryption, efficient representations, public key cryptanalysis, modes of operation, signatures, and traitor tracing and visual cryptography.
The Cybersecurity Body of Knowledge explains the content, purpose, and use of eight knowledge areas that define the boundaries of the discipline of cybersecurity. The discussion focuses on, and is driven by, the essential concepts of each knowledge area that collectively capture the cybersecurity body of knowledge to provide a complete picture of the field. This book is based on a brand-new and up to this point unique, global initiative, known as CSEC2017, which was created and endorsed by ACM, IEEE-CS, AIS SIGSEC, and IFIP WG 11.8. This has practical relevance to every educator in the discipline of cybersecurity. Because the specifics of this body of knowledge cannot be imparted in a single text, the authors provide the necessary comprehensive overview. In essence, this is the entry-level survey of the comprehensive field of cybersecurity. It will serve as the roadmap for individuals to later drill down into a specific area of interest. This presentation is also explicitly designed to aid faculty members, administrators, CISOs, policy makers, and stakeholders involved with cybersecurity workforce development initiatives. The book is oriented toward practical application of a computing-based foundation, crosscutting concepts, and essential knowledge and skills of the cybersecurity discipline to meet workforce demands. Dan Shoemaker, PhD, is full professor, senior research scientist, and program director at the University of Detroit Mercy’s Center for Cyber Security and Intelligence Studies. Dan is a former chair of the Cybersecurity & Information Systems Department and has authored numerous books and journal articles focused on cybersecurity. Anne Kohnke, PhD, is an associate professor of cybersecurity and the principle investigator of the Center for Academic Excellence in Cyber Defence at the University of Detroit Mercy. Anne’s research is focused in cybersecurity, risk management, threat modeling, and mitigating attack vectors. Ken Sigler, MS, is a faculty member of the Computer Information Systems (CIS) program at the Auburn Hills campus of Oakland Community College in Michigan. Ken’s research is in the areas of software management, software assurance, and cybersecurity.
The author considers the implications of deeper integration in the international economy for developing countries. She traces the reasons for the developing countries' reversals of earlier policies and demonstrates the importance of the open trading system for them. Anne O. Krueger is professor of economics at Stanford University
This essential reference provides complete coverage of integrated pest management (IPM). With more than 40 recognized experts, the book thoroughly details the rationale and benefits of employing an IPM plan and provides technical information on each aspect from cultural practices to choosing when and how to use chemicals. It also brings together research work on pest problems with information on the practical implementation of the tools. Case studies of successful operations are provided as well.
More than 900 entries, carefully selected, organized, and annotated, and accompanied by informative background material, make this volume a unique and indispensable guide to Chaucer and related studies. The entries are divided into three categories. The first includes materials necessary for the study of Chaucer’s works: complete editions, facsimiles, studies of manuscripts, canon, and dating, works on the poet’s life, language, and learning, and his sources and influences. The second section covers Chaucer’s works. The third contains a selection of secondary works which provide information on the age and the culture in which Chaucer lived; music, the visual arts, economics and politics, rhetoric and poetics, and sciences among the subjects included. Most entries listed are in English, but a few essential studies in French and German are included. Items have been selected not only on the basis of quality but also for importance in the history of scholarship, variety of approach, and specific usefulness to students and beginners.
A New York Times Notable Book A Chicago Tribune Favorite Book of the Year A San Francisco Chronicle Best Book of the Year Ayn Rand’s books have attracted three generations of readers, shaped the Libertarian movement, influenced White House economic policies throughout the Reagan years and beyond, and inspired the Tea Party movement. Yet twenty-eight years after her death, readers know very little about her life. In this seminal biography, Anne C. Heller traces the controversial author’s life from her childhood in Bolshevik Russia to her years as a Hollywood screenwriter, the publication of her blockbuster novels, and the rise and fall of the cult that worshipped her in the 1950s and 1960s. Based on original research in Russia and scores of interviews with Rand’s acquaintances and former acolytes, Ayn Rand and the World She Made is a comprehensive and eye-opening portrait of one of the most significant and improbable figures of the twentieth century.
Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will allow system administrators and security professionals to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access for employees, partners, and customers from a single platform. - Configure Juniper's Instant Virtual Extranet (IVE) - Install and set up IVE through either the command line interface (CLI) or Web-based console - Master the "3 Rs": Realms, Roles, and Resources - Realize the potential of the "3Rs" for endpoint security, sign-in policies, and authorization of servers - Get Inside both the Windows and Java Versions of Secure Application Manager (SAM) - Learn to implement SAM, manage the end-user experience, and troubleshoot SAM in the field - Integrate IVE with Terminal Services and Citrix - Enable terminal services proxy and configure role options, configure Citrix using a custom ICA, configure terminal services resource policies and profiles, and configure terminal services and Citrix using a hosted Java applet - Ensure Endpoint Security - Use Host Checker, Cache Cleaner, Secure Virtual Workspace, and IVE/IDP integration to secure your network - Manage the Remote Access Needs of Your Organization - Configure Web access, file access and telnet/SSH access for remote users and offices - Configure Core Networking Components through the System Menu - Create clusters, manage virtual systems, and monitor logs, reports, and alerts - Create Bullet-Proof Sign-in Policies - Create standard and custom sign-in pages for both user and administrator access and Secure Meeting pages - Use the IVE for Log-Related Tasks - Perform log filtering, log management, syslog exporting, SNMP management, and system resource monitoring and reporting.
In 1806, the Marquess and Marchioness of Stafford opened a gallery at Cleveland House, London, to display their internationally-renowned collection of Old Master paintings to the public. A ticket to the gallery's Wednesday afternoon openings was a sought-after prize, granting access to the collection and the house's dazzling interior in the company of artists, celebrities, and Britain's elite. This book explores the gallery's interior through the lens of its abundant material culture, including paintings in gilded frames, furniture, silver oil lamps, flower arrangements, and the numerous printed catalogues and guidebooks that made the gallery visible to those who might never cross its threshold. Through detailed analysis of these objects and a wide range of other visual, material, textual and archival sources, the book presents the gallery at Cleveland House as a methodological case study on how the display of art in the 19th century was shaped by notions about public and private space, domesticity, and the role art galleries played in the formation of national culture. In doing so, the book also explains how and why magnificent private galleries and the artworks and objects they contained gripped the public imagination during a critical period of political and cultural transformation during and after the Napoleonic Wars. Combining historical, cultural and material analysis, the book will make essential reading for researchers in British art in the Regency period, museum studies, collecting studies, social history, and the histories of interior decoration and design in the 18th and 19th centuries.
CD-ROM includes: Implementations of Secure Shell for UNIX, Windows, and other operating systems; SecureCRT; F-Secure SSH Windows clients; NT port for ssh and sshd clients; VMS client; F-Secure SSH Macintosh clients.
An eclectic mix of the fresh and classic, this thematic introductory literature text contains 47 stories, 143 poems, and 9 plays-ranging from Sophocles to Eliot, from Hawthorne's "Young Goodman Brown" to Hellman's "Julia, " from Shakespeare's King Lear to Shange's for colored girls... Clear, brief introductions to each theme help students focus on ideas they can explore in writing. Discussions of the elements of each genre and of writing about literature supplement the thematic approach.
A fully revised and updated edition complete with a new foreword by the author of the best–selling meditation book for women that the New York Times says ನould be put at the top of the stack'.
1700 Digests of the most important contributions to world literature supplementing the "Thesaurus of Book Digests"[1949], ed. by Hiram Haydn and Edmund Fuller (from the Bookcover).
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.