You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Despite its international influence, Polish theatre remains a mystery to many Westerners. This volume attempts to fill in current gaps in English-language scholarship by offering a historical and critical analysis of two of the most influential works of Polish theatre: Jerzy Grotowski’s ‘Akropolis’ and Tadeusz Kantor’s ‘Dead Class’. By examining each director’s representation of Auschwitz, this study provides a new understanding of how translating national trauma through the prism of performance can alter and deflect the meaning and reception of theatrical works, both inside and outside of their cultural and historical contexts.
A call to action that promotes K–12 schools and students as key contributors to climate solutions
Contrary to popular belief, there has never been any shortage of Macintosh-related security issues. OS9 had issues that warranted attention. However, due to both ignorance and a lack of research, many of these issues never saw the light of day. No solid techniques were published for executing arbitrary code on OS9, and there are no notable legacy Macintosh exploits. Due to the combined lack of obvious vulnerabilities and accompanying exploits, Macintosh appeared to be a solid platform. Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post-compromise concealment or dis...
Energy Modeling in Architectural Design demonstrates how design elements can lead to energy savings, to help you reduce the energy footprint of your buildings. In addition to identifying climate opportunities, you’ll also learn fundamental passive design elements for software-agnostic energy modeling of your projects from conception. Using parametric models and testing each element during design will lead you to create beautiful and high-performance buildings. Illustrated with more than 100 color images, this book also includes a pattern guide for high-performance buildings, discusses energy and daylighting optimization, and has a glossary for easy reference.
None
The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, including sandboxing, disaster recovery and high availability, forensic a...
The need for information security management has never been greater. With constantly changing technology, external intrusions, and internal thefts of data, information security officers face threats at every turn. The Information Security Management Handbook on CD-ROM, 2006 Edition is now available. Containing the complete contents of the Information Security Management Handbook, this is a resource that is portable, linked and searchable by keyword. In addition to an electronic version of the most comprehensive resource for information security management, this CD-ROM contains an extra volume's worth of information that is not found anywhere else, including chapters from other security and n...