05479nam 2200661Ia 450 991045456530332120200520144314.01-282-59448-6978661259448990-420-2910-21-4416-1702-710.1163/9789042029101(CKB)1000000000786572(EBL)556907(OCoLC)659500224(SSID)ssj0000414967(PQKBManifestationID)11290029(PQKBTitleCode)TC0000414967(PQKBWorkID)10410306(PQKB)11508458(MiAaPQ)EBC556907(nllekb)BRILL9789042029101(Au-PeEL)EBL556907(CaPaEBR)ebr10380537(CaONFJC)MIL259448(EXLCZ)99100000000078657220090703d2009 uy 0engur|n|---|||||txtccrCorpora[electronic resource] pragmatics and discourse : papers from the 29th International Conference on English Language Research on Computerized Corpora (ICAME 29), Ascona, Switzerland, 14-18 May 2008 /edited by Andreas H. Jucker, Daniel Schreier and Marianne HundtAmsterdam ;New York, NY Rodopi20091 online resource (529 p.)Language and computers ;no. 68Description based upon print version of record.90-420-2592-1 Includes bibliographical references and index.Preliminary material /Editors Corpora: Pragmatics and Discourse -- Corpus linguistics, pragmatics and discourse /Andreas H. Jucker , Daniel Schreier and Marianne Hundt -- Historical corpus pragmatics: Focus on speech acts and texts /Thomas Kohnen -- The pragmatics of knowledge and meaning: Corpus linguistic approaches to changing thought-styles in early modern medical discourse /Irma Taavitsainen -- A diachronic perspective on changing routines in texts /Tanja Rütten -- Friends will be “friends”? The sociopragmatics of referential terms in early English letters /Minna Nevala -- Self-reference and mental processes in early English personal correspondence: A corpus approach to changing patterns of interaction /Minna Palander-Collin -- Sort of and kind of in political discourse: Hedge, head of NP or contextualization cue? /Anita Fetzer -- “So er I just sort I dunno I think it’s just because…”: A corpus study of I don’t know and dunno in learners’ spoken English /Karin Aijmer -- On the face of it: How recurrent phrases organize text /Magnus Levin and Hans Lindquist -- Research on fiction dialogue: Problems and possible solutions /Karin Axelsson -- Establishing the EU: The representation of Europe in the press in 1993 and 2005 /Anna Marchi and Charlotte Taylor -- A nightmare of a trip, a gem of a hotel: The study of an evaluative and descriptive frame /Stephen Coffey -- Distinctive words in academic writing: A comparison of three statistical tests for keyword extraction /Magali Paquot and Yves Bestgen -- On the phraseology of Chinese learner spoken English: Evidence of lexical chunks from COLSEC /Naixing Wei -- Frequency of nominalization in Early Modern English medical writing /Jukka Tyrkkö and Turo Hiltunen -- May: The social history of an auxiliary /Arja Nurmi -- Go to V: Literal meaning and metaphorical extensions /Sara Gesuato -- Passive constructions in Fiji English: A corpus-based study /Carolin Biewer -- Subordinating conjunctions in Middle English and Early Modern English religious writing /Ingvilt Marcoe -- A contrastive look at English and Dutch (negative) imperatives /Daniël Van Olmen -- Caribbean ICE corpora: Some issues for fieldwork and analysis /Dagmar Deuber -- Digital Editions for Corpus Linguistics: Representing manuscript reality in electronic corpora /Alpo Honkapohja , Samuli Kaislaniemi and Ville Marttila -- Parser-based analysis of syntax-lexis interactions /Hans Martin Lehmann and Gerold Schneider -- Index /Editors Corpora: Pragmatics and Discourse.This volume presents current state-of-the-art discussions in corpus-based linguistic research of the English language. The papers deal with Present-day English, worldwide varieties of English and the history of the English language. A special focus of the volume are studies in the broad field of corpus pragmatics and corpus-based discourse analysis. It includes corpus-based studies of speech acts, conversational routines, referential expressions and thought styles, as well as studies on the lexis, grammar and semantics of English. And it also includes several studies on technical aspects of corpus compilation, fieldwork and parsing.Language and computers ;no. 68.Corpora (Linguistics)CongressesEnglish languageDiscourse analysisData processingCongressesElectronic books.Corpora (Linguistics)English languageDiscourse analysisData processing420.285Hundt Marianne891036Jucker Andreas H176829Schreier Daniel1971-994368MiAaPQMiAaPQMiAaPQBOOK9910454565303321Corpora2277191UNINA05878nam 22007693u 450 991096339240332120251117090552.01-283-17725-097866131772541-118-11454-X(CKB)2550000000040634(EBL)693645(OCoLC)747412541(SSID)ssj0000539129(PQKBManifestationID)11357033(PQKBTitleCode)TC0000539129(PQKBWorkID)10568613(PQKB)10439950(MiAaPQ)EBC693645(EXLCZ)99255000000004063420131028d2011 uy| 0engur|nu---|||||txtrdacontentcrdamediacrrdacarrierMicrosoft Windows Security Essentials /Darril Gibson1st ed.Hoboken Wiley2011Indiana Wiley20111 online resource (374 p.)Sybex serious skillsEssentials (Indianapolis, Ind.)Description based upon print version of record.1-118-72244-2 1-118-01684-X Microsoft Windows Security Essentials; Introduction; Who Should Read This Book; What You Will Learn; Prerequisites; What You Need; What Is Covered in This Book; Chapter 1: Understanding Core Security Principles; Understanding Risk; Exploring the Security Triad; Protecting Against Loss of Confidentiality; Protecting Against Loss of Availability; Protecting Against Loss of Integrity; Implementing a Defense-in-Depth Security Strategy; Enforcing the Principle of Least Privilege; Hardening a Server; Reducing the Attack Surface; Keeping a System Updated; Enabling the FirewallInstalling Antivirus Software Chapter 2: Understanding Malware and Social Engineering; Comparing Malware; Viruses; Worms; Trojan Horses; Buffer-Overflow Attacks; Spyware; Understanding the Threat; Protecting Against Malware; Using Antivirus Software; Using Microsoft Security Essentials on Desktops; Thwarting Social-Engineering Attacks; Social Engineering in Person; Social Engineering with a Phone Call; Recognizing Phishing Attempts; Recognizing Pharming; Protecting Email; Chapter 3: Understanding User Authentication; Comparing the Three Factors of AuthenticationUsing Passwords for Authentication Comparing Password Attack Methods; Creating Strong Passwords; Enforcing Strong Passwords; Exploring Account Lockout Policies; Unlocking an Account; Resetting a Password; Changing a Password; Creating a Password-Reset Disk; Using Smart Cards and Token Devices for Authentication; Using Biometrics for Authentication; Starting Applications with Run As Administrator; Preventing Time Skew with Kerberos; Identifying RADIUS Capabilities; Identifying Unsecure Authentication Protocols; LM; NTLM (NTLMv1); Chapter 4: Securing Access with PermissionsComparing NTFS Permissions Identifying Basic NTFS Permissions; Identifying Advanced NTFS Permissions; Combining Permissions; Enabling and Disabling Permission Inheritance; Moving and Copying Files; Comparing NTFS and FAT; Exploring Share Permissions; Identifying Share Permissions; Combining NTFS and Share Permissions; Identifying Active Directory Permissions; Viewing Active Directory Users and Computers; Comparing NTFS and Active Directory Permissions; Viewing Active Directory Permissions; Assigning Registry Permissions; Chapter 5: Using Audit Policies and Network AuditingExploring Audit Policies Exploring Object Access Auditing; Comparing Account Logon and Logon Events; Exploring Directory Service Access Auditing; Understanding Account Management Auditing; Understanding System Events Auditing; Understanding Privilege Use Auditing; Understanding Policy Change Auditing; Understanding Process Tracking; Enabling Auditing; Enabling Object Access Auditing; Enabling Directory Service Access Auditing; Viewing Audit Information; Managing Security Logs; Saving Audit Information; Securing Audit Information; Auditing a Network with MBSA; Installing MBSA; Running MBSAChapter 6: Protecting Clients and ServersWindows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to beSerious skillsElectronic data processing personnelCertificationStudy guidesComputer networksExaminationsStudy guidesComputer networks - ExaminationsComputer networks -- Examinations -- Study guidesComputer security - ExaminationsElectronic data processing personnel - CertificationElectronic data processing personnelCertificationComputer networksExaminationsComputer networks - Examinations.Computer networks -- Examinations -- Study guides.Computer security - Examinations.Electronic data processing personnel - Certification.005.8621.3916076Gibson Darril1122631AU-PeELAU-PeELAU-PeELAzTeSBOOK9910963392403321Microsoft Windows Security4456372UNINA