Delusions of Invulnerability


Book Description

How were the aims of philosophy and the responsibilities of philosophers conceived in ancient Greece and China? How were the learned elite recruited and controlled; how were their speculations and advice influenced by the different types of audiences they faced and the institutions in which they worked? How was a yearning for invulnerability reconciled with a sense of human frailty? In each chapter of this fascinating analysis ancient Greek and Chinese ideas and practices are used as a basis for critical reflections on the predicaments we continue to face today, with a particular focus on the key Greek ideas of the equal participation of all citizens in the political process, and on the key Chinese one of a dedication to the ideal of the welfare of all under heaven




Invulnerability


Book Description

Superman and the Incredible Hulk have thick skin to protect themselves from danger. But could humans achieve the same invulnerability? In this title, reluctant readers will explore superheroes with this amazing ability, as well as different technologies humans have created to mimic the superpower. Engaging text, eye-catching images, and special features will help readers learn the possibilities and limitations of achieving this superhuman ability.




The Invulnerable Child


Book Description

This groundbreaking volume thoroughly explores the intriguing and sometimes baffling phenomenon of positive adaptation to stress by children who live under conditions of extreme vulnerability. Examining the determinants of risk, the development of competence in the midst of hardship, and the nature of stress-resilience, THE INVULNERABLE CHILD will be of profound interests to psychiatrists, developmental and clinical psychologists, social workers, nurses, educators and social scientists, and all those involved in the psychosocial well being of children.




Reducing Adolescent Risk


Book Description

Current policies treat adolescent risk behaviours as separate problems requiring separate solutions, ignoring the overlap of many risk behaviours. This text seeks to move beyond the fractured approach of preventing one kind of behaviour at a time and suggests more comprehensive prevention strategies.




Coping with Negative Life Events


Book Description

"Like a Bridge over Troubled Waters" The surge of current interest in the interface between clinical and social psychology is well illustrated by the publication of a number of general texts and journals in this area, and the growing emphasis in graduate programs on providing training in both disciplines. Although the bene fits of an integrated clinical-social approach have been recognized for a number of years, the recent work in this area has advanced from the oretical extrapolations of social psychological models to clinical issues to theory and research that is based on social principles and conducted in clinical domains. It is becoming increasingly common to find social psy chologists pursuing research with clinical populations and clinical psy chologists investigating variables that have traditionally been in the realm of social psychology. A major area of interface between the two disciplines is in research and theory concerned with how individuals respond to negative events. In addition to the trend toward an integrated clinical-social approach, the growing body of literature in this area reflects the explosion of cur rent interest in the area of health psychology; work by clinical and social psychologists on the topics of stress and coping has been one of the major facets of this burgeoning field. The purpose of the present volume is to provide a common forum for recent advances in the clinical and social literature on responses to negative life outcomes.




The Ethics of Vulnerability


Book Description

As concerns about violence, war, terrorism, sexuality, and embodiment have garnered attention in philosophy, the concept of vulnerability has become a shared reference point in these discussions. As a fundamental part of the human condition, vulnerability has significant ethical import: how one responds to vulnerability matters, whom one conceives as vulnerable and which criteria are used to make such demarcations matters, how one deals with one’s own vulnerability matters, and how one understands the meaning of vulnerability matters. Yet, the meaning of vulnerability is commonly taken for granted and it is assumed that vulnerability is almost exclusively negative, equated with weakness, dependency, powerlessness, deficiency, and passivity. This reductively negative view leads to problematic implications, imperiling ethical responsiveness to vulnerability, and so prevents the concept from possessing the normative value many theorists wish it to have. When vulnerability is regarded as weakness and, concomitantly, invulnerability is prized, attentiveness to one’s own vulnerability and ethical response to vulnerable others remain out of reach goals. Thus, this book critiques the ideal of invulnerability, analyzes the problems that arise from a negative view of vulnerability, and articulates in its stead a non-dualistic concept of vulnerability that can remedy these problems.




Universal Decay: Dead Stars Rule Book, Revised, 2nd Edition


Book Description

Dead Stars is a science fiction horror role-playing game powered by the alternate d20 Universal Decay rules system. Pick a race - from the ever-familiar humans to the amorphous gorbrasch or sleazy helizara - strap on some personal armor and pick up a sliver rifle or get a cerebral computer implant and grab your toolkit. Or both. Then get together with your friends to face a universe of dangers, wonders, opportunities, and quite possibly a messy death. This book contains everything you will need to play or run a game in Dead Stars as well as rules for using the Universal Decay system in alternate genres, incorporating everything from swords and sorcery to vehicle energy weapons, personal armor, nanotechnology and starships.




Security in Communication Networks


Book Description

The 4th International Conference on Security in Communication Networks 2004 (SCN2004)washeldatthe“DioceseHall”oftheArchdioceseofAmal?-Cavade’ Tirreni and the “Armorial Bearings Hall” of the Archbishop Palace in Amal?, Italy, on September 8–10, 2004. Previous conferences also took place in Amal? in 1996, 1999 and 2002. The conference aimed at bringing together researchers in the ?elds of cr- tography and security in communication networks to foster cooperation and the exchange of ideas. The main topics included all technical aspects of data security, including: anonymity,authentication,blockciphers,complexity-basedcryptography,cry- analysis, digital signatures, distributed cryptography, hash functions, identi?- tion,implementations,keydistribution,privacy,publickeyencryption,threshold cryptography, and zero knowledge. The Program Committee, consisting of 21 members, considered 79 papers and selected 26 for presentation; one of them was withdrawn by the authors. These papers were selected on the basis of originality, quality and relevance to cryptography and security in communication networks. Due to the high number of submissions, paper selection was a di?cult and challenging task, and many good submissions had to be rejected. Each subm- sion was refereed by at least three reviewers and some had four reports or more. We are very grateful to all the program committee members, who devoted much e?ort and valuable time to read and select the papers. In addition, we gratefully acknowledge the help of colleagues who reviewed submissions in their areas of expertise. They are all listed on page VII and we apologize for any inadvertent omissions. These proceedings include the revised versions of the 26 accepted papers andtheabstractoftheinvitedtalkbyBartPreneel(ECRYPT:theCryptographic Research Challenges for the Next Decade).




Information Engineering and Applications


Book Description

In past twenty years or so, information technology has influenced and changed every aspect of our lives and our cultures. Without various IT-based applications, we would find it difficult to keep information stored securely, to process information and business efficiently, and to communicate information conveniently. In the future world, ITs and information engineering will play a very important role in convergence of computing, communication, business and all other computational sciences and application and it also will influence the future world's various areas, including science, engineering, industry, business, law, politics, culture and medicine. The International Conference on Information Engineering and Applications (IEA) 2011 is intended to foster the dissemination of state-of-the-art research in information and business areas, including their models, services, and novel applications associated with their utilization. International Conference on Information Engineering and Applications (IEA) 2011 is organized by Chongqing Normal University, Chongqing University, Shanghai Jiao Tong University, Nanyang Technological University, University of Michigan and the Chongqing University of Arts and Sciences, and is sponsored by National Natural Science Foundation of China (NSFC). The objective of IEA 2011 is to will provide a forum for engineers and scientists in academia, industry, and government to address the most innovative research and development . Information Engineering and Applications provides a summary of this conference including contributions for key speakers on subjects such as technical challenges, social and economic issues, and ideas, results and current work on all aspects of advanced information and business intelligence.




Human Insufficiency


Book Description

Human Insufficiency argues that early modern writers depict the human political subject as physically vulnerable in order to naturalize slavery. Representations of Man as a weak creature—“poor” and “bare” in King Lear’s words—strategically portrayed English bodies as needing care from people who were imagined to be less fragile. Drawing on Aristotle’s depictions of the natural master and the natural slave in the Politics, English writers distinguished the fully human political subject from the sub-human Slave who would care for his feeble body. This justification of a nascent slaving economy reinvents the violence of enslaving Afro-diasporic peoples as a natural system of care. Human Insufficiency’s most important contribution to early modern critical race studies is expanding the scope of the human as a racialized category by demonstrating how depictions of Man as a vulnerable species were part of a discourse racializing slavery.