| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910795601703321 |
|
|
Autore |
Verhagen Arie |
|
|
Titolo |
Ten lectures on cognitive evolutionary linguistics / / Arie Verhagen |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Leiden, Netherlands ; ; Boston, Massachusetts : , : Brill, , [2021] |
|
©2021 |
|
|
|
|
|
|
|
|
|
ISBN |
|
90-04-42235-8 |
9789004422353 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (230 pages) |
|
|
|
|
|
|
Collana |
|
Distinguished Lectures in Cognitive Linguistics |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
Nota di contenuto |
|
Intro -- Contents -- Note on Supplementary Material -- Preface by the Series Editor -- Preface by the Author -- About the Author -- Lecture 1 Usage-based Cognitive Linguistics, Entrenchment and Conventionality -- Lecture 2 The Biological Lens - Behavior, Cognition, Grammar, Meaning -- Lecture 3 The World View of Cultures - Individuals, Communities, and Linguistic Relativity -- Lecture 4 Language as a Tool for Social Cognition 1 - Inferential, Cooperative Communication -- Lecture 5 Language as a Tool for Social Cognition 2 - Complements and Perspective Management -- Lecture 6 Cognition and Semantic Change - The "Folk Model of the Mind" vs. Variation and Change in Causality Marking -- Lecture 7 On the Origins of Language 1 - Cognition and the Emergence of Sound Structure and Its Diversity -- Lecture 8 On the Origins of Language 2 - The Cultural Evolution of Words and Constructions -- Lecture 9 The Dynamics of Language and Social Cognition - Dialogues, Narratives, and Mind Reading -- Lecture 10 Towards an Integrated Science of Language, Cognition, Behavior, and Society -- References -- About the Series Editor -- Websites for Cognitive Linguistics and CIFCL Speakers. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
"In these lectures, Arie Verhagen presents a version of cognitive linguistics that adheres to both the generalization and cognitive commitments that characterized the field from the start, and a biological commitment: understanding language as adaptive behavior |
|
|
|
|
|
|
|
|
|
|
|
|
of (human) organisms in the niche(s) that they inhabit. Drawing on the model of biological explanation ("Tinbergen's four why's"), Verhagen shows how proximate (individual level) and ultimate (population level) explanations apply to several features of language, shedding new light on basic notions like conventionality and entrenchment, norms/rules and habits, etc., and their causal connections. Topics include the relation between language, culture, and thinking, the role of language in social cognition and narrative, the evolution of sound structure and grammar, semantic change, and more"-- |
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910299230603321 |
|
|
Autore |
Beckers Kristian |
|
|
Titolo |
Pattern and Security Requirements : Engineering-Based Establishment of Security Standards / / by Kristian Beckers |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2015.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (489 p.) |
|
|
|
|
|
|
Disciplina |
|
004 |
005.74 |
005.743 |
005.8 |
006 |
658.56 |
|
|
|
|
|
|
|
|
Soggetti |
|
Computer security |
Management information systems |
Computer science |
Quality control |
Reliability |
Industrial safety |
Artificial intelligence |
Computers |
Systems and Data Security |
Management of Computing and Information Systems |
Quality Control, Reliability, Safety and Risk |
Artificial Intelligence |
Models and Principles |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Foreword -- Preface -- Introduction -- Background -- The PEERESS Framework -- The CAST Method for Comparing Security Standards -- Relating ISO 27001 to the Conceptual Framework for Security Requirements Engineering Methods -- Supporting ISO 27001 compliant ISMS Establishment with Si* -- Supporting ISO 27001 Establishment with CORAS -- Supporting Common Criteria Security Analysis with Problem Frames -- Supporting ISO 26262 Hazard Analysis with Problem Frames -- A Catalog of Context-Patterns -- Initiating a Pattern Language for Context-Patterns -- Supporting the Establishment of a cloud-specific ISMS according to ISO 27001 using the Cloud System Analysis Pattern -- Validation and Extension of our Context-Pattern Approach -- Conclusion. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Security threats are a significant problem for information technology companies today. This book focuses on how to mitigate these threats by using security standards and provides ways to address associated problems faced by engineers caused by ambiguities in the standards. The security standards are analysed, fundamental concepts of the security standards presented, and the relations to the elementary concepts of security requirements engineering (SRE) methods explored. Using this knowledge, engineers can build customised methods that support the establishment of security standards. Standards such as Common Criteria or ISO 27001 are explored and several extensions are provided to well-known SRE methods such as Si*, CORAS, and UML4PF to support the establishment of these security standards. Through careful analysis of the activities demanded by the standards, for example the activities to establish an Information Security Management System (ISMS) in compliance with the ISO 27001 standard, methods are proposed which incorporate existing security requirement approaches and patterns. Understanding Pattern and Security Requirements engineering methods is important for software engineers, security analysts, and other professionals that are tasked with establishing a security standard, as well as researchers who aim to investigate the problems with establishing security standards. The examples and explanations in this book are designed to be understandable by all these readers. |
|
|
|
|
|
|
|
| |