Kevin Chang – Författare
Visar alla böcker från författaren Kevin Chang. Handla med fri frakt och snabb leverans.
2 produkter
2 produkter
414 kr
Skickas inom 7-10 vardagar
Bob Marley's recordings, some twenty years after his death, still enjoy enormous international popularity. For popular music fans in most of the world, reggae looms so large as to be Jamaica's only music and Marley its consummate musician. In this book, Jamaicans Kevin Chang and Wayne Chen offer a history of reggae, accounting for its rise and devolution. Jamaican music can be roughly divided into four eras, each with a distinctive beat - ska, rocksteady, reggae, and dancehall. Ska dates from about 1960 to mid-1966 and rocksteady from 1966 to 1968, while from 1969 to 1983 reggae was the popular beat. The reggae era had two phases, \u0022early reggae\u0022 up to 1974 and \u0022roots reggae\u0022 up to 1983. Since 1983 dancehall has been the prevalent the prevalent sound. The authors describe each stage in the development of the music, identifying the most popular songs and artists, highlighting the significant social, political, and economic issues as they affected the music scene. While they write from a Jamaican perspective, the intended audience is \u0022any person, local or foreign, interested in an intelligent discussion of reggae music and Jamaica.\u0022 Featuring some four hundred illustrations that range from album covers to rare photos, Reggae Routes profiles the innumerable artists, producers, and recordings that secured an international audience for Jamaican music.Artists discussed: Toots and the Maytals, the Wailers, Gaylads, Desmond Dekker, Delroy Wilson, Alton Ellis, Burning Spear, Itals, Wailing Souls, Skatalites, Heptones, and hundreds more.
Cyber Security
Second International Symposium, CSS 2015, Coeur d'Alene, ID, USA, April 7-8, 2015, Revised Selected Papers
Häftad, Engelska, 2016
550 kr
Skickas inom 10-15 vardagar
This bookconstitutes the refereed proceedings of the Second International Symposium onCyber Security, CSS 2015, held in Coeur d'Alene, ID, USA, in April 2015.The 9revised full papers presented were carefully reviewed and selected from 20papers. The papers reflect four areas of scholarly work: permissions and trustevaluation, implementation and management; cloud and device security andprivacy; social implications of networked and mobile applications; system andprocess assessments for improved cybersecurity.