1.

Record Nr.

UNINA990002053010403321

Autore

Debach, Paul

Titolo

Biological control by natural enemies / Paul Debach

Pubbl/distr/stampa

London, : Cambridge University Press, 1974

ISBN

0-521-09835-1

Descrizione fisica

XII, 323 p. ; 24 cm

Disciplina

632.9

Locazione

DAGEN

FAGBC

Collocazione

61 VII B.6/51

60 632.9 B 74

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di bibliografia

Bibliografia e indici interni: p. 299-307



2.

Record Nr.

UNINA9910144141803321

Autore

Baker Gordon P

Titolo

Wittgenstein [[electronic resource] ] : understanding and meaning . Part 1 Essays / / G.P. Baker & P.M.S. Hacker

Pubbl/distr/stampa

Malden, MA ; ; Oxford, : Blackwell Pub., 2005

ISBN

1-281-32273-3

9786611322731

0-470-75280-7

0-470-75279-3

Edizione

[2nd ed.]

Descrizione fisica

1 online resource (420 p.)

Collana

Analytical commentary on the Philosophical investigations ; ; v. 1

Altri autori (Persone)

HackerP. M. S (Peter Michael Stephan)

Disciplina

192

Soggetti

Philosophy

Language and languages - Philosophy

Semantics (Philosophy)

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Wittgenstein: Understanding and Meaning; Contents; Acknowledgements; Introduction to Part I: Essays; Abbreviations; I The Augustinian conception of language (1); 1. Augustine's picture; 2. The Augustinian family; (a) word-meaning; (b) correlating words with meanings; (c) ostensive explanation; (d) metapsychological corollaries; (e) sentence-meaning; 3. Moving off in new directions; 4. Frege; 5. Russell; 6. The Tractatus; II Explanation (6); 1.Training, teaching and explaining; 2. Explanation and meaning; 3. Explanation and grammar; 4. Explanation and understanding

III The language-game method (7)1. The emergence of the game analogy; 2. An intermediate phase: comparisons with invented calculi; 3. The emergence of the language-game method; 4. Invented language-games; 5. Natural language-games; IV Descriptions and the uses of sentences (18); 1. Flying in the face of the facts; 2. Sentences as descriptions of facts: surface-grammatical paraphrase; 3. Sentences as descriptions: depth-grammatical analysis and descriptive contents; 4. Sentences as instruments; 5. Assertions, questions, commands make contact in language



V Ostensive definition and its ramifications (28)1. Connecting language and reality; 2. The range and limits of ostensive explanations; 3. The normativity of ostensive definition; 4. Samples; 5. Misunderstandings resolved; 6. Samples and simples; VI Indexicals (39); VII Logically proper names (39); 1. Russell; 2. The Tractatus; 3. The criticisms of the Investigations: assailing the motivation; 4. The criticisms of the Investigations: real proper names and simple names; VIII Meaning and use (43); 1. The concept of meaning; 2. Setting the stage

3. Wittgenstein: meaning and its internal relations4. Qualifications; IX Contextual dicta and contextual principles (50); 1. The problems of a principle; 2. Frege; 3. The Tractatus; 4. After the Tractatus; 5. Compositional theories of meaning; 6. Computational theories of understanding; X The standard metre (50); 1. The rudiments of measurement; 2. The standard metre and canonical samples; 3. Fixing the reference or explaining the meaning?; 4. Defusing paradoxes; XI Family resemblance (65); 1. Background: definition, logical constituents and analysis

2. Family resemblance: precursors and anticipations3. Family resemblance: a minimalist interpretation; 4. Sapping the defences of orthodoxy; 5. Problems about family-resemblance concepts; 6. Psychological concepts; 7. Formal concepts; XII Proper names (79); 1. Stage-setting; 2. Frege and Russell: simple abbreviation theories; 3. Cluster theories of proper names; 4. Some general principles; 5. Some critical consequences; 6. The significance of proper names; 7. Proper names and meaning; XIII Turning the examination around: the recantation of a metaphysician (89)

1. Reorienting the investigation

Sommario/riassunto

This is a new edition of the first volume of G.P.Baker and P.M.S. Hacker's definitive reference work on Wittgenstein's Philosophical Investigations. New edition of the first volume of the monumental four-volume Analytical Commentary on the Philosophical Investigations. Takes into account much material that was unavailable when the first edition was written. Following Baker's death in 2002, P.M.S. Hacker has thoroughly revised the first volume, rewriting many essays and sections of exegesis completely. Part One - the Essays - now includes tw



3.

Record Nr.

UNINA9910815693703321

Autore

Liyanage Madhusanka

Titolo

IoT security : advances in authentication / / edited by Madhusanka Liyanage, School of Computer Science, University College, Ireland, Centre for Wireless Communication, University of Oulu, Finland, An Braeken, Industrial Engineering, Vrije Universiteit Brussel, Belgium, Pardeep Kumar, Department of Computer Science, Swansea University, UK, Mika Yliantilla, Centre for Wireless Communication, University of Oulu, Finland

Pubbl/distr/stampa

Hoboken : , : Wiley, , 2020

[Piscataqay, New Jersey] : , : IEEE Xplore, , ©2020

ISBN

1-119-52794-5

1-119-52796-1

1-119-52797-X

Edizione

[1st edition]

Descrizione fisica

1 online resource (318 pages)

Disciplina

005.8

Soggetti

Internet of things - Security measures

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Cover; Title Page; Copyright; Contents; About the Editors; List of Contributors; Preface; Acknowledgments; Part I IoT Overview; Chapter 1 Introduction to IoT; 1.1 Introduction; 1.1.1 Evolution of IoT; 1.2 IoT Architecture and Taxonomy; 1.3 Standardization Efforts; 1.4 IoT Applications; 1.4.1 Smart Home; 1.4.2 Smart City; 1.4.3 Smart Energy; 1.4.4 Healthcare; 1.4.5 IoT Automotive; 1.4.6 Gaming, AR and VR; 1.4.7 Retail; 1.4.8 Wearable; 1.4.9 Smart Agriculture; 1.4.10 Industrial Internet; 1.4.11 Tactile Internet; 1.4.12 Conclusion; Acknowledgement; References; Chapter 2 Abstract; 2.1 Introduction2.2 Attacks and Countermeasures; 2.2.1 Perception Layer; 2.2.1.1 Perception Nodes; 2.2.1.2 Sensor Nodes; 2.2.1.3 Gateways; 2.2.2 Network Layer; 2.2.2.1 Mobile Communication; 2.2.2.2 Cloud Computing; 2.2.2.3 Internet; 2.2.3 Application Layer; 2.2.3.1 Smart Utilities -- Smart Grids and Smart Metering; 2.2.3.2 Consumer Wearable IoT (WIoT) Devices for Healthcare and Telemedicine; 2.2.3.3 Intelligent Transportation; 2.2.3.4 Smart Agriculture; 2.2.3.5 Industrial IoT (IIoT); 2.2.3.6 Smart Buildings,



Environments, and Cities; 2.3 Authentication and Authorization; 2.3.1 Authentication; 2.3.2 Authorization2.3.3 Authentication at IoT Layers; 2.3.3.1 Perception Layer; 2.3.3.2 Network Layer; 2.3.3.3 Application Layer; 2.4 Other Security Features and Related Issues; 2.4.1 The Simplified Layer Structure; 2.4.2 The Idea of Middleware; 2.4.3 Cross-Layer Security Problem; 2.4.4 Privacy; 2.4.5 Risk Mitigation; 2.5 Discussion; 2.6 Future Research Directions; 2.6.1 Blockchain; 2.6.2 5G; 2.6.3 Fog and Edge Computing; 2.6.4 Quantum Security, AI, and Predictive Data Analytics; 2.6.5 Network Slicing; 2.7 Conclusions; References; Part II IoT Network and Communication Authentication; Chapter 3 Symmetric Key-Based Authentication with an Application to Wireless Sensor Networks3.1 Introduction; 3.2 Related Work; 3.3 System Model and Assumptions; 3.3.1 Design Goals; 3.3.2 Setting; 3.3.3 Notations; 3.3.4 Attack Model; 3.4 Scheme in Normal Mode; 3.4.1 Installation Phase; 3.4.1.1 Installation of CH; 3.4.1.2 Installation of CN; 3.4.2 Group Node Key; 3.4.3 Individual Cluster Key; 3.4.3.1 CN to CH; 3.4.3.2 CH to CN; 3.4.4 Pairwise Key Derivation; 3.4.5 Multicast Key; 3.4.5.1 Initiation by CH; 3.4.5.2 Derivation by CNs; 3.4.6 Group Cluster Key; 3.5 Authentication; 3.5.1 Authentication by CN3.5.2 Authenticated Broadcast by the CH; 3.5.3 Authenticated Broadcast by the BS; 3.6 Scheme in Change Mode; 3.6.1 Capture of CN; 3.6.2 Capture of CH; 3.6.3 Changes for Honest Nodes; 3.6.3.1 Key Update for Honest Node Replacement; 3.6.3.2 Node Removal and Addition; 3.7 Security Analysis; 3.7.1 Resistance Against Impersonation Attack; 3.7.2 Resistance Against Node Capture; 3.7.3 Resistance Against Replay Attacks; 3.8 Efficiency; 3.8.1 Number of Communication Phases; 3.8.2 Storage Requirements; 3.8.3 Packet Fragmentation; 3.9 Conclusions; Acknowledgement; References; Chapter 4 Public Key Based Protocols -- EC Crypto

Sommario/riassunto

"The Internet of things (IoT) is the network of physical devices such as vehicles, home appliances sensors, actuators and other electronic devices. The development of internet offers the possibility for these objects to connect and exchange data. Since IoT will pay a major role in our lives, it is important to secure the IoT ecosystem for its value to be realized. Among the various security requirements, authentication to the IoT is importance since it is the first step to prevent the impact of attackers. The book offers an insight into the development of various authentication mechanisms to provide IoT authentication in various levels such as user level, device level and network level. The user-level authentication identifies whether the IoT user is a legitimate user to access the smart object services and what kind of authentication mechanisms can be used. Network level authentication is needed to check the identity of connected IoT devices. This book, therefore, offers reference material which will be important for all relative stakeholders of mobile networks such as network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations and security solution developers"--