You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
None
Introduction : beginning with Stigma -- The Stigma archive -- Just watching -- A sociological periplum -- Doing being deviant -- Afterword : the politics of stigma.
This unique reference offers a quick and convenient overview of the key thinkers in international relations in the twentieth century. The inclusive coverage ranges from politicians such as Lenin and Kissinger, to the most influential figures in feminism, nationalist studies and even historical sociology. Each entry describes the main elements of each thinker's contribution to the study of international relations, provides relevant information on his or her life and career, and lists valuable suggestions for further reading and critical analysis. Political science and journalism students, media professionals and anyone with an interest in modern international relations will want this useful work.
James Henslin has always been able to share the excitement of sociology, with his acclaimed "down-to-earth" approach and personal writing style that highlight the sociology of everyday life and its relevance to students' lives. Adapted for students studying within Australia, this text, now in a second edition, has been made even more relevant and engaging to students. With wit, personal reflection, and illuminating examples, the local author team share their passion for sociology, promote sociology to students and entice them to delve deeper into this exciting science. Six central themes run throughout this text: down-to-earth sociology, globalisation, cultural diversity, critical thinking, the new technology, and the growing influence of the mass media on our lives. These themes are especially useful for introducing the controversial topics that make studying sociology such a lively, exciting activity.
Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly. This is the first comprehensive and integrated treatment of these protocols. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature. As well as a clear and uniform presentation of the protocols this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students.