| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910456405003321 |
|
|
Autore |
Edwards Derek |
|
|
Titolo |
Discourse and cognition [[electronic resource] /] / Derek Edwards |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
|
|
|
|
ISBN |
|
1-85702-290-4 |
0-8039-7697-6 |
1-4462-2669-7 |
1-282-55917-6 |
9786612559174 |
0-85702-290-3 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (367 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Discursive psychology |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references (p. [325]-347) and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Cover; Table of Contents; 1 - An Informal Introduction; 2 - Cognitivism and Cognition; 3 - Discourse and Reality; 4 - Talk as Action; 5 - Shared Knowledge; 6 - Scripts and Dispositions; 7 - Emotion; 8 - Categories I: Language and Perception; 9 - Categories II: Bodily Experience and Folk Psychology; 10 - Narrative: Stories and Rememberings; 11 - Membership: Children, Animals and Machines; Appendix: Transcription Symbols; References; Index |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
In a reappraisal of some of the deepest debates in psychology this book details how the dominant cognitive approach to the subject of language fails, and makes a compelling case for understanding it as a kind of activity, as discourse. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910726295403321 |
|
|
Autore |
Farahmandi Farimah |
|
|
Titolo |
CAD for Hardware Security / / by Farimah Farahmandi, M. Sazadur Rahman, Sree Ranjani Rajendran, Mark Tehranipoor |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2023.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (415 pages) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Electronic circuits |
Internet of things |
Microprocessors |
Computer architecture |
Electronic Circuits and Systems |
Internet of Things |
Processor Architectures |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Introduction -- CAD for Information Leakage Assessment -- CAD for Power Side Channel Leakage Assessment -- CAD for Electromagnetic Radiation Leakage Assessment -- CAD for Timing Leakage Assessment -- CAD for Fault Injection Attack Analysis -- CAD for Obfuscation -- CAD for Watermarking -- CAD for HW Metering -- CAD for Detecting HLS Vulnerabilities -- CAD for Counterfeit Detection and Prevention -- CAD for Trojan Detection and Prevention -- CAD for Physical Assurance -- CAD for Anti-Probing -- CAD for Formal Security Verification -- CAD for Reverse Engineering. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book provides an overview of current hardware security problems and highlights how these issues can be efficiently addressed using computer-aided design (CAD) tools. Authors are from CAD developers, IP developers, SOC designers as well as SoC verification experts. Readers will gain a comprehensive understanding of SoC security vulnerabilities and how to overcome them, through an efficient combination of proactive countermeasures and a wide variety of CAD |
|
|
|
|
|
|
|
|
|
|
solutions. Offers techniques to protect hardware designs from a variety of vulnerabilities using CAD; Provides a comprehensive introduction to current SoC security vulnerabilities at different levels of abstraction; Discusses CAD-based approaches and their application to SoC security issues at various levels of design abstraction. |
|
|
|
|
|
| |