You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This text covers the 1997 Milcom conference, which provides technical data on the systems supporting communications operations. It includes such topics as: architecture and protocols; laser communications; information and dissemination; satellite communications; and SATCOM technology."
Classicist Lowell Edmunds and folklorist Alan Dundes both note that “the Oedipus tale is not likely to ever fade from view in Western civilization, [as] the tale continues to pack a critical family drama into a timeless form.” Looking beyond the story related in Sophocles’ drama—the ancient Theban myth of the son who unknowingly kills his father and marries his mother—Oedipus: A Folklore Casebook examines variations of the tale from Africa and South America to Eastern Europe and the Pacific. Taking sociological, psychological, anthropological, and structuralist perspectives, the nineteen essays reveal the complexities and multiple meanings of this centuries-old tale. In addition to...
None
Reflections on the Reality of transient mental illnessThis text uses the case of Albert Dadas, the first diagnosed "mad traveller", to weigh the legitimacy of cultural versus physical symptoms in the diagnosis of psychiatric disorders. The author argues that psychological symptoms find niches where transient illnesses flourish.
None
James McGuire (1803-1872), the son of Patrick McGuire, of the Parish of Castlerahan, County Cavan, Ulster, Ireland and his wife, Bridget Colgan/Culligan (1815-1889) of the same parish, came to America in 1850 via New York City, N.Y. By March of 1850 they were in Highland Twp., Iowa Co., Wisconsin. Couple married 1837 in the Parish of Castlerahan. Descendants and family members live in Wisconsin, Iowa, Minnesota, North Dakota, South Dakota and elsewhere.
Contains papers from a May 2000 symposium, covering all areas of computer security and electronic privacy. Papers were selected on the basis of scientific novelty, importance to the field, and technical quality. Material is in sections on access control, applications to cryptography, achievability of electronic privacy, protocol analysis and design, open source in security, intrusion detection, assurance, and key management. Specific topics include efficient authentication and signing of multicast streams over lossy channels, engineering tradeoffs and the evolution of provably secure protocols, and robust nonproprietary software. Lacks a subject index. Annotation copyrighted by Book News, Inc., Portland, OR.