LEADER 02503nam 22006374a 450 001 9910451072903321 005 20200520144314.0 010 $a1-280-48206-0 010 $a0-19-534874-5 010 $a1-4237-4583-3 035 $a(CKB)1000000000404723 035 $a(EBL)281332 035 $a(OCoLC)191924366 035 $a(SSID)ssj0000113507 035 $a(PQKBManifestationID)11133765 035 $a(PQKBTitleCode)TC0000113507 035 $a(PQKBWorkID)10101133 035 $a(PQKB)10396648 035 $a(MiAaPQ)EBC281332 035 $a(Au-PeEL)EBL281332 035 $a(CaPaEBR)ebr10142406 035 $a(CaONFJC)MIL48206 035 $a(OCoLC)935262307 035 $a(EXLCZ)991000000000404723 100 $a20020719d2004 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aBodily sensibility$b[electronic resource] $eintelligent action /$fJay Schulkin 210 $aOxford ; New York $cOxford University Press$dc2004 215 $a1 online resource (201 p.) 225 1 $aSeries in affective science 300 $aDescription based upon print version of record. 311 $a0-19-514994-7 320 $aIncludes bibliographical references (p. 137-177) and index. 327 $aContents; Introduction; Chapter 1 Bodily Representations, Behavior, and the Brain; Chapter 2 Demythologizing the Emotions; Chapter 3 Aesthetic Judgment, Discrepancy, and Inquiry; Chapter 4 Moral Sensibility and Social Cohesion; Chapter 5 Drives and Explanations; Conclusion: Corporeal Representations; Notes; References; Index 330 $aSchulkin presents neuroscientific research demonstrating that thought is not on one side and bodily sensibility on the other; biologically, they are integrated. Schulkin argues that this integration has implications for judgements about art and music, attraction and revulsion, and the perpetual inclination to explain ourselves and our surroundings. 410 0$aSeries in affective science. 606 $aMind and body 606 $aCognition 606 $aHuman information processing 608 $aElectronic books. 615 0$aMind and body. 615 0$aCognition. 615 0$aHuman information processing. 676 $a150 700 $aSchulkin$b Jay$0869275 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910451072903321 996 $aBodily sensibility$92167371 997 $aUNINA LEADER 06001nam 22008535 450 001 9910143615203321 005 20250630171927.0 010 $a3-540-45474-8 024 7 $a10.1007/3-540-45474-8 035 $a(CKB)1000000000211609 035 $a(SSID)ssj0000326131 035 $a(PQKBManifestationID)11255377 035 $a(PQKBTitleCode)TC0000326131 035 $a(PQKBWorkID)10266818 035 $a(PQKB)10140106 035 $a(DE-He213)978-3-540-45474-8 035 $a(MiAaPQ)EBC3071904 035 $a(PPN)155224131 035 $a(EXLCZ)991000000000211609 100 $a20121227d2001 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aRecent Advances in Intrusion Detection $e4th International Symposium, RAID 2001 Davis, CA, USA, October 10-12, 2001 Proceedings /$fedited by Wenke Lee, Ludovic Me, Andreas Wespi 205 $a1st ed. 2001. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2001. 215 $a1 online resource (X, 210 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v2212 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-540-42702-3 320 $aIncludes bibliographical references and index. 327 $aModeling Attacks -- From Declarative Signatures to Misuse IDS -- Logging and IDS Integration -- Application-Integrated Data Collection for Security Monitoring -- Interfacing Trusted Applications with Intrusion Detection Systems -- IDS Cooperation -- Probabilistic Alert Correlation -- Designing a Web of Highly-Configurable Intrusion Detection Sensors -- Aggregation and Correlation of Intrusion-Detection Alerts -- Anomaly Detection -- Accurately Detecting Source Code of Attacks That Increase Privilege -- CDIS: Towards a Computer Immune System for Detecting Network Intrusions -- Intrusion Tolerance -- Autonomic Response to Distributed Denial of Service Attacks -- Legal Aspects -- The Impact of Privacy and Data Protection Legislation on the Sharing of Intrusion Detection Information -- Specification-Based IDS -- Experiences with Specification-Based Intrusion Detection -- System Health and Intrusion Monitoring Using a Hierarchy of Constraints. 330 $aOn behalf of the program committee, it is our pleasure to present to you the proceedings of the fourth Recent Advances in Intrusion Detection Symposium. The RAID 2001program committee received 55 paper submissions from 13 countries. All submissions were carefully reviewed by several members of the program committee on the criteria of scientific novelty, importance to the field, and technical quality. Final selection took place at a meeting held on May 16-17 in Oakland, California. Twelve papers were selected for presentation and publication in the conference proceedings. In addition, nine papers, presenting work in progress, were selected for presentation. The program included both fundamental research and practical issues: imaging and IDS integration, attack modeling, anomaly detection, specification- based IDS, IDS assessment, IDS cooperation, intrusion tolerance, and legal aspects. RAID 2001also hosted two panels, one on ?The Present and Future of IDS Testing Methodologies,? a subject of major concern for all IDS users and designers, and one on ?Intrusion Tolerance,? an emerging research area of increasing importance. Dr. Bill Hancock, Senior Vice President and Chief Security Officer of Exodus Communications, Inc., delivered a keynote speech ?Real world intrusion detection or how not to become a deer in the headlights of an attacker?s car on the information superhighway?. The slides presented by the authors, the 9 papers which are not in the proceedings, and the slides presented by the panelists are available on the website of the RAID symposium series, http://www.raid-symposium.org/. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v2212 606 $aManagement information systems 606 $aComputer science 606 $aComputer engineering 606 $aData encryption (Computer science) 606 $aComputers and civilization 606 $aComputer networks 606 $aOperating systems (Computers) 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputer Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I27000 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputer engineering. 615 0$aData encryption (Computer science) 615 0$aComputers and civilization. 615 0$aComputer networks. 615 0$aOperating systems (Computers) 615 14$aManagement of Computing and Information Systems. 615 24$aComputer Engineering. 615 24$aCryptology. 615 24$aComputers and Society. 615 24$aComputer Communication Networks. 615 24$aOperating Systems. 676 $a005.8 702 $aLee$b Wenke$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMe$b Ludovic$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWespi$b Andreas$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aRAID 2001 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910143615203321 996 $aRecent Advances in Intrusion Detection$9772673 997 $aUNINA