|
Showing 1 - 25 of
81 matches in All Departments
|
California (Hardcover)
John Henry Nash, Ina D. 1842?-1928 Coolbrith
|
R709
Discovery Miles 7 090
|
Ships in 10 - 15 working days
|
|
California (Paperback)
John Henry Nash, Ina D. 1842?-1928 Coolbrith
|
R356
Discovery Miles 3 560
|
Ships in 10 - 15 working days
|
The spell that the West has always exercised on the American people
had its most intense impact on American literature and thought
during the nineteenth century. Smith shows, with vast
comprehension, the influence of the nineteenth-century West in all
its variety and strength, in special relation to social, economic,
cultural, and political forces. He traces the myths and symbols of
the Westward movement such as the general notion of a
Westward-moving Course of Empire, the Wild Western hero, the
virtuous yeoman-farmer--in such varied nineteenth-century writings
as "Leaves of Grass," the great corpus of Dime Novels, and most
notably, Frederick Jackson Turner's "The Frontier in American
History," Moreover, he synthesizes the imaginative expression of
Western myths and symbols in literature with their role in
contemporary politics, economics, and society, embodied in such
forms as the idea of Manifest Destiny, the conflict in the American
mind between idealizations of primitivism on the one hand and of
progress and civilization on the other, the Homestead Act of 1862,
and public-land policy after the Civil War.
The myths of the American West that found their expression in
nineteenth-century words and deeds remain a part of every
American's heritage, and Smith, with his insight into their power
and significance, makes possible a critical appreciation of that
heritage.
Keystone-OpenStack's Identity service-provides secure controlled
access to a cloud's resources. In OpenStack environments, Keystone
performs many vital functions, such as authenticating users and
determining what resources users are authorized to access. Whether
the cloud is private, public, or dedicated, access to cloud
resources and security is essential. This practical guide to using
Keystone provides detailed, step-by-step guidance to creating a
secure cloud environment at the Infrastructure-as-a-Service
layer-as well as key practices for safeguarding your cloud's
ongoing security. Learn about Keystone's fundamental capabilities
for providing Identity, Authentication, and Access Management
Perform basic Keystone operations, using concrete examples and the
latest version (v3) of Keystone's Identity API Understand
Keystone's unique support for multiple token formats, including how
it has evolved over time Get an in-depth explanation of Keystone's
LDAP support and how to configure Keystone to integrate with LDAP
Learn about one of Keystone's most sought-after features-support
for federated identity
|
|