To see the other types of publications on this topic, follow the link: UDP attacks.

Books on the topic 'UDP attacks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'UDP attacks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Brownlow, Michael. Kraken attack! Macmillan Children's Books, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

ill, Carter David A., ed. Snack attack: A tasty pop-up book. Simon and Schuster Books for Young Readers, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Morton, Robert. Sir Rutherford Alcock. Amsterdam University Press, 2024. https://doi.org/10.5117/9789463725293.

Full text
Abstract:
The son of a village doctor, Rutherford Alcock trained in medicine and became a battlefield surgeon, working in Portugal and Spain during the civil wars there in the 1830s. In a major career shift, he entered the consular service, went to China, and ended up as British Minister (the equivalent of today’s ambassador) to Japan and then China. This progression was unique, indeed bizarre, especially as every senior position he got was one he specifically said he did not want. Nonetheless, he was the man who commenced Britain’s relations with Japan and introduced Japan’s arts and crafts to the UK,
APA, Harvard, Vancouver, ISO, and other styles
4

Atkins, Stephen E. The 9/11 Encyclopedia [2 volumes]. Praeger, 2008. http://dx.doi.org/10.5040/9798216190325.

Full text
Abstract:
Horror. Sadness. Protests. Military action. Conspiracy theories. From personal loss to economic upheaval to a paradigm shift in U.S. foreign relations, few events in the past 100 years have impacted American life so greatly as the terrorist attacks of September 11, 2001. This comprehensive two-volume set details every event leading up to 9/11, going back up to a decade prior to the attacks, and including all participants from any place in the world. Also covered are events since the attack that have influenced our understanding of the ordeal. With A-Z entries, descriptive sidebars, and over 40
APA, Harvard, Vancouver, ISO, and other styles
5

Mickolus, Edward F., and Susan L. Simmons. Terrorism, 1996-2001. Greenwood Publishing Group, Inc., 2002. http://dx.doi.org/10.5040/9798216192497.

Full text
Abstract:
The most comprehensive source of global terrorist information is now up-to-date with the latest events, including the devastating attack of September 11, 2001, its aftermath, and the mysterious anthrax letters. This 2-volume set provides meticulous, comprehensive data on every international act of terrorism since 1996, including information on the terrorists and their victims, discussions of the judicial fate of the perpetrators, and details on governmental responses. This is the latest in Mickolus' series of chronologies dating back to 1960 and includes updated information on earlier terroris
APA, Harvard, Vancouver, ISO, and other styles
6

Ward, David, and Paul Wooderson. Automotive Cybersecurity: An Introduction to ISO/SAE 21434. SAE International, 2021. http://dx.doi.org/10.4271/9781468600810.

Full text
Abstract:
Industries, regulators, and consumers alike see cybersecurity as an ongoing challenge in our digital world. Protecting and defending computer assets against malicious attacks is a part of our everyday lives. From personal computing devices to online financial transactions to sensitive healthcare data, cyber crimes can affect anyone. As technology becomes more deeply embedded into cars in general, securing the global automotive infrastructure from cybercriminals who want to steal data and take control of automated systems for malicious purposes becomes a top priority for the industry. Systems a
APA, Harvard, Vancouver, ISO, and other styles
7

Atkins, Stephen, ed. The 9/11 Encyclopedia. 2nd ed. ABC-CLIO, 2011. http://dx.doi.org/10.5040/9798400605918.

Full text
Abstract:
This work offers a sweeping collection of A–Z entries and primary source documents that presents a thorough examination of all the individuals, groups, and events surrounding the 9/11 terrorist attacks. Commemorating the 10th anniversary of the attacks on the World Trade Center and Pentagon,The 9/11 Encyclopedia: Second Editionoffers valuable perspective on this emotionally charged and multidimensional subject. This comprehensive two-volume encyclopedia details the events leading up to the attacks, going back a decade prior to 9/11, and covers all the major players involved. It also examines e
APA, Harvard, Vancouver, ISO, and other styles
8

Springer, Paul J. Cyber Warfare. ABC-CLIO, LLC, 2015. http://dx.doi.org/10.5040/9798400636486.

Full text
Abstract:
This timely handbook traces the development of cyber capabilities from their roots in information warfare and cryptology to their potential military application in combat. Cyber warfare is gaining prominence as a serious tactic in military conflicts throughout the world. And, as the most network-dependent nation on earth, the United States is the most vulnerable. Military expert and author Paul J. Springer examines the many facets of cyber combat—from the threats of information exposure that American civilians encounter on a daily basis, to the concern of keeping up with the capabilities of Ch
APA, Harvard, Vancouver, ISO, and other styles
9

Kachun, Mitch. Michelle Obama, the Media Circus, and America’s Racial Obsession. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252036606.003.0004.

Full text
Abstract:
This chapter shifts the focus to Michelle Obama, a figure whose family's experiences of enslavement, emancipation, and northward migration make her nearly as important a cultural figure as her husband. It explains how media coverage of Michelle Obama during the campaign was shaped not only by Americans' expectations of prospective first ladies, but by a long history of powerful stereotypes of black women and their bodies. While praised and admired by many, Michelle Obama had become a target whose attackers utilized an ever-expanding twenty-four/seven cable news cycle and the unprecedented foru
APA, Harvard, Vancouver, ISO, and other styles
10

Collins, John, and Tamara Dobler, eds. Reply to François Recanati. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198783916.003.0020.

Full text
Abstract:
In his present contribution François Recanati has said some very kind things about me and some very astute things about language. He recognizes something new and important which came into prominence, and enjoyed its heyday, at least in Anglophone philosophy, roughly in a post-war period stretching up to around Austin’s death in 1962. This was a period marked by a new sort of conception of what a philosophical question might be, and how one might coherently be formulated—of what philosophy ought to look like. He recognizes, too, those waiting in the wings to turn the clock back to a time of wha
APA, Harvard, Vancouver, ISO, and other styles
11

Smith, Stanley H. Investigations of the Attack on Pearl Harbor. Greenwood Publishing Group, Inc., 1990. http://dx.doi.org/10.5040/9798216186540.

Full text
Abstract:
This work is designed as a reference tool for researchers investigating the what, when, and why of the Japanese attack on Pearl Harbor in 1941. The book provides, for the first time, a cross-referencing and indexing of the total record of testimony and evidence that was compiled and published by the U.S. Congress following U.S. investigations into the Pearl Harbor attack. Transcripts from the postwar hearings contain significant information about the diplomatic background of the hostilities, the first look at the crypto-analytic activities of the U.S. military, and many of the communications b
APA, Harvard, Vancouver, ISO, and other styles
12

Watson, Cynthia A. U.S. National Security. 2nd ed. ABC-CLIO, 2008. http://dx.doi.org/10.5040/9798216028666.

Full text
Abstract:
A thoroughly up-to-date expert analysis of national security issues in the United States, focusing on the dramatic changes brought about by the attacks of September 11, 2001. Written by one of the nation's foremost security policy analysts, the second edition of U.S. National Security: A Reference Handbook follows the trajectory of American security policy from the Cold War to the World Trade Center attacks to the Bush Administration. It brings the distinctive clarity and objectivity of the first edition to the study of a vastly different world. With over 75 percent new material, U.S. National
APA, Harvard, Vancouver, ISO, and other styles
13

Sica, Emanuele. Military Repression, Civilian Resistance. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252039850.003.0009.

Full text
Abstract:
This chapter examines the events of the summer of 1943, when, in light of the escalation in attacks by local French Resistance fighters, the Italian repressive apparatus stepped up its campaign, alternating massive dragnets and more targeted arrests. It first provides an overview of Italian repression against the occupied population and the local Resistance fighters’ attacks on Italian soldiers. It then considers the intensification of violence in the French Riviera at the end of April 1943, even as commanders of the Fourth Army managed to rein in their subordinates. It also discusses how the
APA, Harvard, Vancouver, ISO, and other styles
14

Tucker, Spencer C., ed. Pearl Harbor. ABC-CLIO, LLC, 2015. http://dx.doi.org/10.5040/9798400695872.

Full text
Abstract:
This book provides students with an understanding of the motives behind the Japanese attack on Pearl Harbor and the consequences of this action on Japan, on the United States, and on the outcome of World War II. This essential reference guide is devoted to one of the most important military events in American history: the Pearl Harbor attack of December 7, 1941, “the day of infamy.” Distinguished military historian Spencer C. Tucker is the editor of this thorough study of the Japanese attack that contains reference entries as well as primary documents and oral histories describing the circumst
APA, Harvard, Vancouver, ISO, and other styles
15

Esposito, John L. What Everyone Needs to Know about Islam. 2nd ed. Oxford University Press, 2011. http://dx.doi.org/10.1093/wentk/9780199794133.001.0001.

Full text
Abstract:
Since the terrorist attacks of September 11th, there has been an overwhelming demand for information about Islam, and recent events - the war in Iraq, terrorist attacks both failed and successful, debates throughout Europe over Islamic dress, and many others - have raised new questions in the minds of policymakers and the general public. This newly updated edition of What Everyone Needs to Know about Islam is the best single source for clearly presented, objective information about these new developments, and for answers to questions about the origin and traditions of Islam. Editor of The Oxfo
APA, Harvard, Vancouver, ISO, and other styles
16

Zhdanova, Mariia, and Dariya Orlova. Ukraine. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190931407.003.0003.

Full text
Abstract:
This chapter examines the state of computational propaganda in Ukraine, focusing on two major dimensions: Ukraine’s response to the challenges of external information attacks, and the use of computational propaganda in internal political communication. Based on interviews with Ukrainian media experts, academics, industry insiders, and bot developers, the chapter explores the scale of the issue and identifies the most common tactics, instruments, and approaches for the deployment of political bots online. The cases described illustrate the misconceptions about fake accounts, paid online comment
APA, Harvard, Vancouver, ISO, and other styles
17

Talbert, Matthew, and Jessica Wolfendale. Introduction. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190675875.003.0001.

Full text
Abstract:
IN THE IRAQI TOWN of Haditha in 2005, US Marines killed 24 Iraqi civilians, including women and children. Charges against six Marines were dropped and a seventh was acquitted. How should we assess this and similar incidents? On the one hand, punishing the Marines might be unreasonable since they were subject to extreme situational pressures leading up to the massacre, including combat stress, exposure to constant attacks, and the loss of one of their own. On the other hand, perhaps they ...
APA, Harvard, Vancouver, ISO, and other styles
18

Stout, Chris E., ed. Terrorism, Political Violence, and Extremism. Praeger, 2017. http://dx.doi.org/10.5040/9798216024491.

Full text
Abstract:
A must-read for psychologists—clinical and academic alike—as well as for political scientists, policy analysts, and others working in the realm of terrorism, political violence, and extremism, this book carefully explores the theories, observations, and approaches of authorities in the field and addresses how and why terrorism has perpetuated for so long. Terrorism is now a regular topic in the news rather than a rare or an unusual occurrence. The possibility of violent terrorist acts constitutes a legitimate safety concern, regardless of one's country of residence: no longer can anyone assume
APA, Harvard, Vancouver, ISO, and other styles
19

Marion, Nancy E., and Jason Twede. Cybercrime. An Imprint of ABC-CLIO, LLC, 2020. http://dx.doi.org/10.5040/9798400636547.

Full text
Abstract:
This important reference work is an extensive, up-to-date resource for students who want to investigate the world of cybercrime or for those seeking further knowledge of specific attacks both domestically and internationally. Cybercrime is characterized by criminal acts that take place in the borderless digital realm. It takes on many forms, and its perpetrators and victims are varied. From financial theft, destruction of systems, fraud, corporate espionage, and ransoming of information to the more personal, such as stalking and web-cam spying as well as cyberterrorism, this work covers the fu
APA, Harvard, Vancouver, ISO, and other styles
20

Cassiman, David, and Wouter Meersseman. Tyrosinemia Type I. Oxford University Press, 2016. http://dx.doi.org/10.1093/med/9780199972135.003.0013.

Full text
Abstract:
Tyrosinemia type 1 (HT-1) is a rare metabolic disorder affecting degradation pathways of the amino acid tyrosine. HT-1 presents with liver, kidney and/or bone disease and can cause acute porphyria attacks. Biochemical diagnosis is made by measuring raised plasma tyrosine and detection of succinylacetone in urine. Long-term management with diet and nitisinone leads to excellent short term results, but since long term effects are largely unknown, life-long treatment and follow-up for liver malignancy, bone disease and kidney disease seem necessary. HT-1 is treatable by liver transplantation.
APA, Harvard, Vancouver, ISO, and other styles
21

Hanioğlu, M. Şükrü. From Wars to the Great War: A Hero Is Born. Princeton University Press, 2018. http://dx.doi.org/10.23943/princeton/9780691175829.003.0005.

Full text
Abstract:
This chapter looks at Mustafa Kemal Atatürk's quest for heroism. As he expressed it in a personal letter to a female friend, he had “grand desires” to render extraordinary services to his homeland. Circumstances, however, were not yet favorable to the realization of that ambition. Up until the Great War, he remained an obscure figure little known outside the circle of young Committee of Union and Progress's (CUP) officers. The German-inspired reorganization of the Ottoman military on the eve of the Great War paved the way for Mustafa Kemal's ascendance. Like many of his colleagues, he agreed w
APA, Harvard, Vancouver, ISO, and other styles
22

Moran, Matthew, Wyn Q. Bowen, and Jeffrey W. Knopf. Coercing Syria on Chemical Weapons. Oxford University PressNew York, NY, 2025. https://doi.org/10.1093/9780197770412.001.0001.

Full text
Abstract:
Abstract This book examines efforts by the United States, sometimes acting with France and the United Kingdom, to respond to Syria’s possession and use of chemical weapons (CW) during that country’s civil war. The responses, across the otherwise very different presidencies of Barack Obama and Donald Trump (in his first term in office), relied heavily on coercion. Policies directed at the ruling Assad regime in Syria attempted to deter CW attacks and to compel Syria into giving up its chemical arsenal. Outcomes were mixed. Efforts to deter CW use failed multiple times, but these failures were p
APA, Harvard, Vancouver, ISO, and other styles
23

Hoogschagen, Edwin. Warplane 13. Lanasta, 2023. http://dx.doi.org/10.5117/9789086162437.

Full text
Abstract:
The CW-21 was designed during the late 1930s. It combined light weight construction with a powerful engine, which resulted in an excellent rate of climb and manoeuvrability, allowing the fighter to quickly reach the height of attacking enemy aircraft, and attack them. The prototype was sent to China as a demonstration copy and an order for three aircraft, plus a further 32 as kits, followed. These would be assembled locally. Only the three production machines arrived in the chaos of war and would never see actual combat. A second modified variant was ordered by the Dutch government and 24 were
APA, Harvard, Vancouver, ISO, and other styles
24

Atherosclerosis: Education for Patients and the Public. Exon Publications, 2025. https://doi.org/10.36255/atherosclerosis.

Full text
Abstract:
Atherosclerosis is a condition in which fatty deposits build up inside the arteries, causing them to narrow and harden, leading to reduced blood flow. This article provides a detailed guide on atherosclerosis, explaining its causes, symptoms, diagnosis, treatment, and long-term management. It begins by defining atherosclerosis and describing how plaque accumulates in the arteries over time, increasing the risk of heart attacks, strokes, and other cardiovascular problems. The article discusses how common this condition is and highlights genetic factors such as the APOE and PCSK9 genes that may
APA, Harvard, Vancouver, ISO, and other styles
25

Riley, Philip F. A Lust for Virtue. Praeger, 2001. http://dx.doi.org/10.5040/9798400680984.

Full text
Abstract:
Midway through his reign, in the critical decade of the 1680s, the lusty image of Louis XIV paled and was replaced by that of a straitlaced monarch committed to locking up blasphemers, debtors, gamblers, and prostitutes in wretched, foul-smelling prisons that dispensed ample doses of Catholic-Reformation virtue. The author demonstrates how this attack on sin expressed the punitive social policy of the French Catholic Reformation and how Louis's actions clarified the legal and moral distinctions between crime and sin. As a hot-blooded young prince, Louis XIV paid little attention to virtue or t
APA, Harvard, Vancouver, ISO, and other styles
26

Ruxton, Graeme D., William L. Allen, Thomas N. Sherratt, and Michael P. Speed. Introduction. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780199688678.003.0001.

Full text
Abstract:
In 2004, the first edition of ‘Avoiding Attack: The Evolutionary Ecology of Crypsis, Warning Signals, and Mimicry’ by Ruxton et al. was published. The book aimed to provide a systematic and up-to-date review and synthesis of widespread anti-predator defences. In it, we focussed on sensorially mediated defences and the many factors that underpin these adaptations, aiming to set out the state-of-understanding in the fascinating world of anti-predator adaptations, and highlight which topics within the field seem most ripe for further investigation....
APA, Harvard, Vancouver, ISO, and other styles
27

Hunt, Paul, and Ian Greaves. Oxford Manual of Major Incident Management. Oxford University Press, 2017. http://dx.doi.org/10.1093/med/9780199238088.001.0001.

Full text
Abstract:
Regrettably, no year passes without some form of major incident occurring somewhere in the United Kingdom. To the traditional threats of transport, industrial, and natural disasters has been added the possibility of a major terrorist atrocity such as the London bombings of 7 July 2005 or the recent marauding gun attacks in Paris. The international situation continues to suggest that the likelihood of further similar attacks is a question of when, rather than if. That said, for most professional responders, a transport incident such as the GNER crash at Great Heck, a chemical incident such as F
APA, Harvard, Vancouver, ISO, and other styles
28

Gaouette, Mark. Cruising for Trouble. ABC-CLIO, LLC, 2010. http://dx.doi.org/10.5040/9798400634673.

Full text
Abstract:
This book offers an alarming inside look at the security preparations of the cruise industry and the potential for cruise ships to be the target for pirates, terrorists, and criminal activity. Cruising for Trouble exposes the acute vulnerability of cruise ships to piracy, terrorism, and crime, both on the high seas and in domestic and foreign ports-of-call. While cruise ships have ramped up in size and passenger capacity to become floating skyscrapers housing as many as 7,000 passengers, and while piracy incidents have increased since 2008 as the world economy has deteriorated, there has been
APA, Harvard, Vancouver, ISO, and other styles
29

Walker, David. Early Works. Edited by Michael Davies and W. R. Owens. Oxford University Press, 2018. http://dx.doi.org/10.1093/oxfordhb/9780199581306.013.43.

Full text
Abstract:
This chapter is concerned with the writings John Bunyan produced in the 1650s. These include two published attacks on the Quakers, Some Gospel-Truths Opened (1656) and A Vindication of the Book Called Some Gospel-Truths Opened (1657); A Few Sighs from Hell (1658), in which he voices a radical sympathy for the poor and oppressed; and his major work of covenant theology, The Doctrine of the Law and Grace Unfolded (1659). These early works are read against the changing context of the late 1640s and the 1650s, up until the Restoration in 1660. It is in the 1650s that Bunyan acquired the literary s
APA, Harvard, Vancouver, ISO, and other styles
30

Tyler, Tom R., and Rick Trinkner. Legal Socialization across the Life Course. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190644147.003.0003.

Full text
Abstract:
Every developing child goes through a series of stages associated with childhood and adolescence. This is the focus of chapter 3. To some extent development is an invariant progression shaped by cognitive and biological growth, and the capacities and limits that exist at any stage of individual growth. At the same time, the progression reflects the unique experience of each individual over their life course, particularly with nonlegal and legal authority figures. Beyond that, every child grows up during a particular period in history that has particular events such as the war in Vietnam or the
APA, Harvard, Vancouver, ISO, and other styles
31

Flood, Dawn Rae. Rape Victims and the Modern Justice System. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252036897.003.0002.

Full text
Abstract:
This chapter provides an overview of the experiences of women as they entered the justice system after reporting sexual attacks prior to the 1960s, when judicial decisions significantly altered trial proceedings. Victims' social differences were muted from a prosecutorial standpoint because of standardized investigative procedures—procedures much more rigorous, if not entirely sensitive, than previously understood by contemporary studies of sexual violence. Racial privilege shaped the majority of these successful prosecutions, in that African American women almost never appeared in court testi
APA, Harvard, Vancouver, ISO, and other styles
32

Wu, Tianyue. Augustine on the Election of Jacob. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198827030.003.0001.

Full text
Abstract:
This essay aims to take up the philosophical challenge of causal determination in divine predestination to human freedom by reconstructing Augustine’s relevant insights to argue that divine predestination still can accommodate our intuitions concerning freedom and moral responsibility today. Section 1 briefly reconstructs the development of Augustine’s reflections on predestination by focusing on his interpretation of the election of Jacob. Section 2 appeals to attacks from the Idle Argument and the Manipulation Argument to present the theoretical difficulties in Augustine’s account. Section 3
APA, Harvard, Vancouver, ISO, and other styles
33

Carr, Madeline. Cyberspace and International Order. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198779605.003.0010.

Full text
Abstract:
When The Anarchical Society was published in 1977, the world was on the doorstep of seismic technological change. Forty years later, the information age has placed cyber security at the centre of many global political concerns including armed conflict and international law. The ongoing difficulties associated with accurately attributing cyber attacks introduce a new dimension of anarchy in international relations. This essay draws on Bull’s ideas about social interplay to explore the problem of attribution in cyberspace. It finds that the difficulties of identifying (even) state actors undermi
APA, Harvard, Vancouver, ISO, and other styles
34

Willis, Jim. The Human Journalist. Greenwood Publishing Group, Inc., 2003. http://dx.doi.org/10.5040/9798400667268.

Full text
Abstract:
Willis examines the many orientations and perspectives of reporters that gather and present the news of the day. Debunking the notion that there are limited perspectives journalists may use, Willis examines up to 15 different orientations that reporters bring to their work. These perspectives run the gamut, from the traditional approach of distancing oneself completely from events and people involved to becoming part of the story's fabric to ascertain the story's true essence. Willis also suggests that, for many stories, it is wholly appropriate for journalists to feel what a non-professional
APA, Harvard, Vancouver, ISO, and other styles
35

Futter, Andrew. The Proliferation of Nuclear Weapons. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198790501.003.0030.

Full text
Abstract:
Since the end of the cold war, the global landscape of weapons of mass destruction has changed considerably. Three additional states have openly acquired a nuclear capability—India, Pakistan, and North Korea—and a fourth, Iran, may be trying to do the same. Meanwhile, other states were forced to give up or agreed to abandon their nuclear capabilities or ambitions. At the same time, the threat of ‘loose nukes’ and the associated challenge of nuclear security have acquired existential significance given the possibility of nuclear terrorism, the impact of the 9/11 terrorist attacks, and the damag
APA, Harvard, Vancouver, ISO, and other styles
36

Krueger, Roberta. Towards Feminism: Christine De Pizan, Female Advocacy, and Women’s Textual Communities in the Late Middle Ages and Beyond. Edited by Judith Bennett and Ruth Karras. Oxford University Press, 2013. http://dx.doi.org/10.1093/oxfordhb/9780199582174.013.031.

Full text
Abstract:
Although "feminist" claims for full legal and political emancipation were nonexistent in the Middle Ages and women had restricted access to education, many elite women throughout Europe left eloquent written testimony of their intellectual and literary gifts. Some women explicitly took up the pen to defend women's honor against misogynistic attacks and to champion their contributions to society. This chapter focuses on the pro-feminine works of Christine de Pizan (1364–1430?), who not only engaged in an epistolary debate with male authorities denouncing the Romance of the Rose as antifeminist,
APA, Harvard, Vancouver, ISO, and other styles
37

Kai, Ambos. Treatise on International Criminal Law. 2nd ed. Oxford University Press, 2022. http://dx.doi.org/10.1093/law/9780192895738.001.0001.

Full text
Abstract:
International Criminal Law and Justice is a flourishing field, with the birth of new international criminal tribunals and both accountability and investigative mechanisms, increasing and consolidated case law, and burgeoning substantive scholarship. This expansion also left its mark in the international crimes and sentencing dealt with in this new edition. The previous edition has been completely revised and updated. The new edition includes largely extended sections on sexual and gender-based crimes; detailed elaborations on the crime of aggression, including its complicated jurisdictional re
APA, Harvard, Vancouver, ISO, and other styles
38

Guitton, Clement. Conclusion. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190699994.003.0008.

Full text
Abstract:
The conclusion starts by summarizing the contributions of this book, before considering what the future of attribution may look like. It briefly analyzes the consequences for privacy of large metadata collection, and the effects on Internet governance of attribution mechanisms being revealed. More specifically, it contends that the potential breaking up of the Internet into multiple ‘Internets’ will reshape the practice of cyber security to some extent, but that the political limitations of attribution will remain very similar. This last chapter also briefly outlines the basis for future work
APA, Harvard, Vancouver, ISO, and other styles
39

Mickolus, Edward F. Terrorism, 2005–2007. Greenwood Publishing Group, Inc., 2008. http://dx.doi.org/10.5040/9798216024446.

Full text
Abstract:
Following previous trends of suicide bombings and violence against Western and local hostages, the 2005-2007 period saw a continuing tide of terrorism. Mickolus catalogues these recent insurgencies and technique, including airplane hijackings, letter bombs, food tampering, and major assassinations. An extension of his other other works, including terrorism dating back to 1980, this comprehensive chronology also provides follow-up material to prior incidents and enumerates their effects on current airport security measures around the world. This volume expertly details key players in each event
APA, Harvard, Vancouver, ISO, and other styles
40

Stole, Inger L. Advertising Navigates the Defense Economy. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252037122.003.0003.

Full text
Abstract:
This chapter analyzes industry strategies for “educating the public” to a view of advertising as socially and economically useful. More specifically, it shows the use of institutional advertising for this purpose and discusses how industry leaders worked behind the scenes to prepare a solid defense of advertising. The chapter explores the challenges faced by the advertising community in the period leading up to the attack on Pearl Harbor and immediately thereafter, including how the industry dealt with new forms of criticism and how it viewed its role in the war economy. The chapter concludes
APA, Harvard, Vancouver, ISO, and other styles
41

Baloh, Robert W. Vertigo. Oxford University Press, 2016. http://dx.doi.org/10.1093/med/9780190600129.001.0001.

Full text
Abstract:
Benign paroxysmal positional vertigo (BPPV) is by far the most common cause of vertigo, and approximately one in five people will have it at some time during their lifetime. Sudden violent spells of vertigo are triggered by a change in position, such as turning over in bed, getting in and out of bed, bending down and straightening up, and extending the head back to look up. During an attack, both eyes oscillate in a characteristic pattern, called nystagmus. Indeed, understanding the mechanism for nystagmus production was key to developing a cure for BPPV. It is difficult to say who exactly des
APA, Harvard, Vancouver, ISO, and other styles
42

Craig, Anne, and Anthea Hatfield. The Complete Recovery Room Book. Oxford University Press, 2020. http://dx.doi.org/10.1093/med/9780198846840.001.0001.

Full text
Abstract:
New technologies are increasingly available for patient care but simple ‘tried and true’ old fashioned methods are still essential. The care that a patient receives in the first hours after surgery is crucial to minimizing the risk of complications such as heart attacks, pneumonia, and blood clots. As the patient awakes from their drug-induced coma, it takes time for them to metabolize and excrete drugs. They remain unable to care for themselves, and are at increased risk of harm. The recovery room staff must manage both comatose and physiologically unstable patients and deal with the immediat
APA, Harvard, Vancouver, ISO, and other styles
43

Stille, Mark. Philippines Naval Campaign 1944–45. Bloomsbury Publishing Plc, 2024. http://dx.doi.org/10.5040/9781472856975.

Full text
Abstract:
The forgotten story of the major naval operations conducted in the Philippines by the US and Japanese navies after Leyte Gulf up to the US invasion of Luzon in January 1945. The events that took place in the aftermath of the Battle of Leyte Gulf in October 1944 are often overlooked by military historians. An impressive array of naval operations continued in the Philippines up to January 1945, which included (on the Japanese side) the largest convoys to a contested island during the war, the first kamikaze campaign, and the second largest Imperial Japanese Navy surface operation during the last
APA, Harvard, Vancouver, ISO, and other styles
44

Edele, Mark. Scenarios. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198798156.003.0004.

Full text
Abstract:
This chapter discusses the various ways in which defectors came across the front line. Scenarios varied. Some defectors came as part of organized desertions of entire units; more came in small groups; and about just as many came alone. The front line could be overcome simply by letting it pass, a particularly viable option in 1941, but also possible later in the war; others exploited holes in the front, used planes or tanks to get across, or absconded after having been sent across the line in an attack or a commando operation. Often, defection was a violent process, which required sometimes de
APA, Harvard, Vancouver, ISO, and other styles
45

de Beauvoir, Simone. Preface to Djamila Boupacha. Translated by Marybeth Timmermann. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252036941.003.0013.

Full text
Abstract:
A twenty-three-year-old Algerian woman and liaison agent for the FLN was imprisoned, tortured, raped with a bottle by French military men, and it’s considered ordinary.1 Since 1954, in the name of suppressing rebellion, then of pacification, we are all accomplices of a genocide that has claimed over a million victims; men, women, old folks and children have been slaughtered: gunned down during search-raids, burned alive in their villages, throats slit or bellies ripped open, many tortured to death. Entire tribes have been left to starve and freeze, at the mercy of beatings and epidemics in the
APA, Harvard, Vancouver, ISO, and other styles
46

Hoveyda, Fereydoun. The Broken Crescent. Greenwood Publishing Group, Inc., 2002. http://dx.doi.org/10.5040/9798216187448.

Full text
Abstract:
Militant Islamic fundamentalists blame the ills of their societies on the West, calling for the overthrow of local governments and the resumption of Jihad against the Infidels. Ambassador Hoveyda explores the historical and contemporary causes of the current wave of militant Islamic fundamentalism. If Western colonization and economic domination of the 19th and 20th centuries are to be blamed for the predicament of Muslim countries, Hoveyda asserts that Muslims also bear a great responsibility for their situation. This book shows how the triumph of fundamentalist interpretations of the Koran i
APA, Harvard, Vancouver, ISO, and other styles
47

Wolfe, Wojtek Mackiewicz. Winning the War of Words. www.praeger.com, 2008. http://dx.doi.org/10.5040/9798216036227.

Full text
Abstract:
Throughout history and especially during contemporary times, presidential rhetoric sets the foreign policy tone not only for Congress but mainly for the American public. Consequently, US foreign policy is actively marketed and spun to the American public. This book describes the marketing strategy of the War on Terror and how that strategy compelled public opinion towards supporting the spread of the War on Terror from Afghanistan to Iraq. The author investigates how President George W. Bush's initial framing of the September 11th attacks provided the platform for the creation of long term pub
APA, Harvard, Vancouver, ISO, and other styles
48

Gunn, Steven. Trade and Tillage. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198802860.003.0005.

Full text
Abstract:
This chapter examines the economic effects of war. Heavy taxation and disrupted export trade threatened recession each time war broke out. Coastal traders and fishing boats were vulnerable to raiders, as was agriculture on the Scottish borders and in the English Pale in Ireland. Yet there was another side to the story. Cloth was bought up to clothe soldiers and food to feed them, while arms traders, iron smelters, horse dealers, fortification builders, and English privateers, who attacked foreign shipping in the Channel and Atlantic, all did well. So did the borderers who raided the Scots for
APA, Harvard, Vancouver, ISO, and other styles
49

Scott, Tom. The Romandie Reconfigured. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198725275.003.0029.

Full text
Abstract:
The restoration of Duke Emmanuel Philibert to Savoy in 1564 led to Bern surrendering lands beyond the Vaud (Gex, western Chablais), while the Valais communes gave up the eastern Chablais. The indebted countess of Neuchâtel allegedly offered to sell her territory to Fribourg in 1543, which would have potentially saved it for Catholicism, but Fribourg was stymied by Bern. The equally indebted Count Michel of Gruyère sought to borrow money in turn from Fribourg and Bern, even offering to sell the county wholesale. In the end Gruyère was partitioned between Fribourg and Bern, as foreshadowed in 15
APA, Harvard, Vancouver, ISO, and other styles
50

Stuart, Casey-Maslen, Clapham Andrew, Giacca Gilles, and Parker Sarah. Art.5 General Implementation. Oxford University Press, 2016. http://dx.doi.org/10.1093/law/9780198723523.003.0009.

Full text
Abstract:
This chapter discusses Article 5 of the ATT. Article 5 sets out the obligation to implement the ATT at the national level, in particular by establishing and maintaining a national control system for the transfer of conventional arms and integral parts and components and for ammunition/munitions. It should be noted that this is the only provision that obliges states parties to set up national mechanisms to regulate conventional arms transfers, as opposed to transfers of parts and components and ammunition/munitions. In addition, Article 5 offers detail on the scope of the treaty outlined in Art
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!