Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

The Post-traumatic Theatre of Grotowski and Kantor
  • Language: en
  • Pages: 420

The Post-traumatic Theatre of Grotowski and Kantor

  • Type: Book
  • -
  • Published: 2014-10-01
  • -
  • Publisher: Anthem Press

Despite its international influence, Polish theatre remains a mystery to many Westerners. This volume attempts to fill in current gaps in English-language scholarship by offering a historical and critical analysis of two of the most influential works of Polish theatre: Jerzy Grotowski’s ‘Akropolis’ and Tadeusz Kantor’s ‘Dead Class’. By examining each director’s representation of Auschwitz, this study provides a new understanding of how translating national trauma through the prism of performance can alter and deflect the meaning and reception of theatrical works, both inside and outside of their cultural and historical contexts.

Students, Schools, and Our Climate Moment
  • Language: en
  • Pages: 180

Students, Schools, and Our Climate Moment

A call to action that promotes K–12 schools and students as key contributors to climate solutions

Records and Briefs of the United States Supreme Court
  • Language: en
  • Pages: 416

Records and Briefs of the United States Supreme Court

  • Type: Book
  • -
  • Published: 1832
  • -
  • Publisher: Unknown

None

OS X Exploits and Defense
  • Language: en
  • Pages: 348

OS X Exploits and Defense

  • Type: Book
  • -
  • Published: 2011-04-18
  • -
  • Publisher: Elsevier

Contrary to popular belief, there has never been any shortage of Macintosh-related security issues. OS9 had issues that warranted attention. However, due to both ignorance and a lack of research, many of these issues never saw the light of day. No solid techniques were published for executing arbitrary code on OS9, and there are no notable legacy Macintosh exploits. Due to the combined lack of obvious vulnerabilities and accompanying exploits, Macintosh appeared to be a solid platform. Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post-compromise concealment or dis...

Energy Modeling in Architectural Design
  • Language: en
  • Pages: 281

Energy Modeling in Architectural Design

Energy Modeling in Architectural Design demonstrates how design elements can lead to energy savings, to help you reduce the energy footprint of your buildings. In addition to identifying climate opportunities, you’ll also learn fundamental passive design elements for software-agnostic energy modeling of your projects from conception. Using parametric models and testing each element during design will lead you to create beautiful and high-performance buildings. Illustrated with more than 100 color images, this book also includes a pattern guide for high-performance buildings, discusses energy and daylighting optimization, and has a glossary for easy reference.

America's Future
  • Language: en
  • Pages: 490

America's Future

  • Type: Book
  • -
  • Published: 1979
  • -
  • Publisher: Unknown

None

Information Security Management Handbook, Volume 4
  • Language: en
  • Pages: 1018

Information Security Management Handbook, Volume 4

  • Type: Book
  • -
  • Published: 2002-12-26
  • -
  • Publisher: CRC Press

The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion

Virtualization for Security
  • Language: en
  • Pages: 378

Virtualization for Security

  • Type: Book
  • -
  • Published: 2009-02-24
  • -
  • Publisher: Syngress

One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, including sandboxing, disaster recovery and high availability, forensic a...

Information Security Management Handbook on CD-ROM, 2006 Edition
  • Language: en
  • Pages: 4346

Information Security Management Handbook on CD-ROM, 2006 Edition

  • Type: Book
  • -
  • Published: 2006-04-06
  • -
  • Publisher: CRC Press

The need for information security management has never been greater. With constantly changing technology, external intrusions, and internal thefts of data, information security officers face threats at every turn. The Information Security Management Handbook on CD-ROM, 2006 Edition is now available. Containing the complete contents of the Information Security Management Handbook, this is a resource that is portable, linked and searchable by keyword. In addition to an electronic version of the most comprehensive resource for information security management, this CD-ROM contains an extra volume's worth of information that is not found anywhere else, including chapters from other security and n...

The Mining Almanack for ...
  • Language: en
  • Pages: 606

The Mining Almanack for ...

  • Type: Book
  • -
  • Published: 1849
  • -
  • Publisher: Unknown

None