-
1
A new art of brewing beer, ale, and other sorts of liquors : so as to render them more healthfull to the body and agreeable to nature, and to keep them longer from souring, with less trouble and charge then generally practised, which will be a means to prevent those torturing distempers of the stone, gravel, gout, and dropsie : together with easie experiments for making excellent drinks with apples, currans, goodberries, cherries, herbs, seeds, and hay &c., and the way to preserve eggs five or six months from being musty or rotten : wih an appendix how to make fruit trees constantly fruitful : also a way how every one may purge themselves with common salad herbs and roots, and a method how to prevent constiveness in the body /
Published 1690CONNECT
Electronic eBook -
2
Photography after photography : gender, genre, and history /
Published 2017Table of Contents: CONNECT
Electronic eBook -
3
Biopolitics of the more-than-human : forensic ecologies of violence /
Published 2020Table of Contents: “…Zoopolitics of the Cage -- Biopolitical Modalities of the More-Than-Human and Their Forensic Ecologies -- Animal Excendence and Inanimal Torture -- Drone Sparagmos…”
CONNECT
Electronic eBook -
4
Mechanical sound : technology, culture, and public problems of noise in the twentieth century /
Published 2008Table of Contents: “…Listening to technology -- Infernal din, heavenly tunes : repertoires of dramatizing sound -- A continuous buzz : the ongoing charge of industrial noise -- Instruments of torture : traffic noise as uncivilized behavior -- The art of noises : the celebration and control of mechanical sound in music -- A wall of sound : the gramophone, the radio, and the noise of neighbors -- A booming business : the search for a practical aircraft noise index -- A sound history of technological culture.…”
CONNECT
CONNECT
Electronic eBook -
5
Towards a vegan-based ethic : dismantling neo-colonial hierarchy through an ethic of lovingkindness /
Published 2020Table of Contents: “…-- The Nazis' Human Holocaust and the Extreme Extermination of Animal Beings at the Hands of "Science" -- Animal Entertainment-Fun or Torture? -- Pullman Porters -- Circuses and Marine Parks -- Final Thoughts.…”
CONNECT (1 user limit)
Electronic eBook -
6
Familiar faces : photography, memory and Argentina's disappeared /
Published 2024CONNECT
Electronic eBook -
7
Press Photography Award 1942-1998 : From Joe Rosenthal and Horst Faas to Moneta Sleet and Stan Grossfeld /
Published 2017Table of Contents: “…1972 a Spot Award. About Shocking Tortures and Killings of People in Bangladesh in 1971 --…”
CONNECT
Electronic eBook -
8
Getting the picture : the visual culture of the news /
Published 2015Table of Contents: “…Abigail Solomon-Godeau, Collective Self-Representation and the News: Torture at Abu-Ghraibc) News Picture Time11. Jordan Bear, Adrift: The Time and Space of the News in Ge;ricault's Le Radeau de La Me;duse12. …”
Book -
9
A study of black hole attack solutions : on AODV routing protocol in MANET /
Published 2016Table of Contents: “…2.13.1 Categorizations of MANET Attacks2.13.2 Black Hole Attack in MANETs; 2.13.3 Black Hole Attack in AODV; 2.13.4 Black Hole Attack in OLSR; 2.13.5 Other Attacks in MANETs; 2.13.5.1 Gray Hole Attack; 2.13.5.2 Flooding Attack; 2.13.5.3 Selfish Node; 2.13.5.4 Wormhole Attack; 2.13.5.5 Sleep Deprivation Torture Attack; 2.13.5.6 Jellyfish Attack; 2.13.5.7 Modification Attack; 2.13.5.8 Misrouting Attack; 2.13.5.9 Impersonation Attack; 2.13.5.10 Routing Table Overflow Attack; 2.14 Related Studies; 2.15 Investigated Solutions; 2.16 Intrusion Detection System (IDSAODV); 2.17 Evaluation Metrics…”
CONNECT
Electronic eBook -
10
A study of black hole attack solutions : on AODV routing protocol in MANET /
Published 2016Table of Contents: “…2.13.1 Categorizations of MANET Attacks2.13.2 Black Hole Attack in MANETs; 2.13.3 Black Hole Attack in AODV; 2.13.4 Black Hole Attack in OLSR; 2.13.5 Other Attacks in MANETs; 2.13.5.1 Gray Hole Attack; 2.13.5.2 Flooding Attack; 2.13.5.3 Selfish Node; 2.13.5.4 Wormhole Attack; 2.13.5.5 Sleep Deprivation Torture Attack; 2.13.5.6 Jellyfish Attack; 2.13.5.7 Modification Attack; 2.13.5.8 Misrouting Attack; 2.13.5.9 Impersonation Attack; 2.13.5.10 Routing Table Overflow Attack; 2.14 Related Studies; 2.15 Investigated Solutions; 2.16 Intrusion Detection System (IDSAODV); 2.17 Evaluation Metrics.…”
CONNECT
Electronic eBook -
11
-
12
The Flying Man : Hugo Junkers and the Dream of Aviation /
Published 2016CONNECT
CONNECT
Electronic eBook