LEADER 02800nam 22006133u 450 001 9910451806503321 005 20210107012111.0 010 $a1-280-82335-6 010 $a9786610823352 010 $a0-8261-2113-6 035 $a(CKB)1000000000346173 035 $a(EBL)294959 035 $a(OCoLC)437181675 035 $a(SSID)ssj0000329879 035 $a(PQKBManifestationID)11245418 035 $a(PQKBTitleCode)TC0000329879 035 $a(PQKBWorkID)10316690 035 $a(PQKB)10311657 035 $a(MiAaPQ)EBC294959 035 $a(EXLCZ)991000000000346173 100 $a20130418d2006|||| u|| | 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aComparative Treatment Series - Personality Disorders$b[electronic resource] $eA Practitioner's Guide to Comparative Treatments 210 $aNew York $cSpringer Publishing Company$d2006 215 $a1 online resource (313 p.) 300 $aDescription based upon print version of record. 311 $a0-8261-2094-6 327 $aCover; Contents; Contributors; Acknowledgments; CH 1. Introduction: A Review of Borderline Personality Disorder; CH 2. Case History of a Borderline Personality: Linda P.; CH 3. Self-Psychological Treatment; CH 4. Dialetical Behaviour Therapy; CH 5. Cognitive Behavioral Therapy; CH 6. Rational Emotive Behavior Therapy; CH 7. Borderline States and Individual Psychology; CH 8. A Cognitive-Developmental Formulation of BPD; CH 9. A Lacanian Approach; CH 10. Imagery Rescripting and Reprocessing Therapy; CH 11. Unified Therapy with BPD; CH 12. Similarities and Differences in Treatment Modalities 327 $aIndex 330 $aTalks about Borderline personality disorder, a term within the field of clinical psychology which came to possess specific stereotypes and negative meanings. This book applies a variety of modalities to identify treatment goals, including: selecting assessment tools, conceptualizing progression, pinpointing pitfalls, and developing techniques. 606 $aBorderline personality disorder 606 $aPsychiatric Disorders, Individual$2HILCC 606 $aPsychiatry$2HILCC 606 $aHealth & Biological Sciences$2HILCC 608 $aElectronic books. 615 4$aBorderline personality disorder. 615 7$aPsychiatric Disorders, Individual 615 7$aPsychiatry 615 7$aHealth & Biological Sciences 676 $a616.8585206 700 $aFreeman$b Arthur$f1942-$0203304 702 $aStone$b Mark H 702 $aMartin$b Donna 801 0$bAU-PeEL 801 1$bAU-PeEL 801 2$bAU-PeEL 906 $aBOOK 912 $a9910451806503321 996 $aComparative Treatment Series - Personality Disorders$91977915 997 $aUNINA LEADER 01612nas 2200505- 450 001 996439352303316 005 20230323213020.0 011 $a2602-3563 035 $a(OCoLC)1280376531 035 $a(CKB)4100000012031522 035 $a(CONSER)--2023237401 035 $a(EXLCZ)994100000012031522 100 $a20211020a20179999 |-- | 101 0 $atur 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aActa infologica 210 1$a?stanbul :$cIstanbul University Press,$d2017- 215 $a1 online resource 300 $aRefereed/Peer-reviewed 517 1 $aACIN 606 $aComputer science$vPeriodicals 606 $aInformation science$vPeriodicals 606 $aInformation technology$vPeriodicals 606 $aArtificial intelligence$vPeriodicals 606 $aArtificial intelligence$2fast$3(OCoLC)fst00817247 606 $aComputer science$2fast$3(OCoLC)fst00872451 606 $aInformation science$2fast$3(OCoLC)fst00972640 606 $aInformation technology$2fast$3(OCoLC)fst00973089 608 $aPeriodicals.$2fast 615 0$aComputer science 615 0$aInformation science 615 0$aInformation technology 615 0$aArtificial intelligence 615 7$aArtificial intelligence. 615 7$aComputer science. 615 7$aInformation science. 615 7$aInformation technology. 712 02$a?stanbul Üniversitesi.$bEnformatik Bölümü, 906 $aJOURNAL 912 $a996439352303316 996 $aActa Infologica$92562495 997 $aUNISA LEADER 02279oam 2200517zu 450 001 9910376311103321 005 20210807004811.0 010 $a1-4503-1717-0 035 $a(CKB)3460000000103426 035 $a(SSID)ssj0001139263 035 $a(PQKBManifestationID)11618095 035 $a(PQKBTitleCode)TC0001139263 035 $a(PQKBWorkID)11184468 035 $a(PQKB)10863837 035 $a(WaSeSS)IndRDA00013283 035 $a(Association for Computing Machinery)10.1145/2390148 035 $a(EXLCZ)993460000000103426 100 $a20160829d2012 uy 101 0 $aeng 135 $aur||||||||||| 181 $ctxt 182 $cc 183 $acr 200 00$aESAIR'12 : the proceedings of the fifth ACM Workshop on Exploiting Semantic Annotations in Information Retrieval : November 2, 2012, Maui, Hawaii, USA 210 31$a[Place of publication not identified]$cACM$d2012 215 $a1 online resource (22 pages) 225 1 $aACM Conferences 300 $aBibliographic Level Mode of Issuance: Monograph 410 0$aACM Conferences 517 1 $aExploiting Semantic Annotations in Information Retrieval'12 :$ethe proceedings of the fifth Association for Computing Machinery Workshop on Exploiting Semantic Annotations in Information Retrieval : November 2, 2012, Maui, Hawaii, United States of America 517 1 $aProceedings of the fifth Workshop on Exploiting Semantic Annotations in Information Retrieval 606 $aManagement$2HILCC 606 $aBusiness & Economics$2HILCC 606 $aManagement Theory$2HILCC 615 7$aManagement 615 7$aBusiness & Economics 615 7$aManagement Theory 700 $aKamps$b Jaap$0887141 712 02$aAssociation for Computing Machinery Special Interest Group on Hypertext, Hypermedia and Web, 712 02$aAssociation for Computing Machinery Special Interest Group on Information Retrieval, 712 12$aInternational Conference on Information and Knowledge Management$d(21st :$f2012 :$eMaui, Hawaii) 801 0$bPQKB 906 $aBOOK 912 $a9910376311103321 996 $aESAIR'12 : the proceedings of the fifth ACM Workshop on Exploiting Semantic Annotations in Information Retrieval : November 2, 2012, Maui, Hawaii, USA$91981518 997 $aUNINA LEADER 03600nam 22005655 450 001 9910484330603321 005 20251204104252.0 010 $a3-030-60769-0 024 7 $a10.1007/978-3-030-60769-2 035 $a(CKB)4100000011728415 035 $a(DE-He213)978-3-030-60769-2 035 $a(MiAaPQ)EBC6462424 035 $a(PPN)253255937 035 $a(EXLCZ)994100000011728415 100 $a20210122d2021 u| 0 101 0 $aeng 135 $aurnn#---mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAuthentication of Embedded Devices $eTechnologies, Protocols and Emerging Applications /$fedited by Basel Halak 205 $a1st ed. 2021. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2021. 215 $a1 online resource (XV, 188 p. 74 illus., 36 illus. in color.) 311 1 $a3-030-60768-2 327 $aIntroduction -- Integrated Circuit Fingerprinting -- Novel PUF designs for device Identification -- Authentication Protocols: Standards, limitation and research opportunities -- Hardware-based Authentication Protocols for better physical security -- Energy Efficient Authentication Protocols -- Case study 1: Securing Hardware Supply Chain -- Case study 2: GPS spoofing attack detection and survival. 330 $aThis book provides comprehensive coverage of state-of-the-art integrated circuit authentication techniques, including technologies, protocols and emerging applications. The authors first discuss emerging solutions for embedding unforgeable identifies into electronics devices, using techniques such as IC fingerprinting, physically unclonable functions and voltage-over-scaling. Coverage then turns to authentications protocols, with a special focus on resource-constrained devices, first giving an overview of the limitation of existing solutions and then presenting a number of new protocols, which provide better physical security and lower energy dissipation. The third part of the book focuses on emerging security applications for authentication schemes, including securing hardware supply chains, hardware-based device attestation and GPS spoofing attack detection and survival. Provides deep insight into the security threats undermining existing integrated circuit authentication techniques; Includes an in-depth discussion of the emerging technologies used to embed unforgeable identifies into electronics systems; Offers a comprehensive summary of existing authentication protocols and their limitations; Describes state-of-the-art authentication protocols that provide better physical security and more efficient energy consumption; Includes detailed case studies on the emerging applications of IC authentication schemes. 606 $aElectronic circuits 606 $aCooperating objects (Computer systems) 606 $aMicroprocessors 606 $aComputer architecture 606 $aElectronic Circuits and Systems 606 $aCyber-Physical Systems 606 $aProcessor Architectures 615 0$aElectronic circuits. 615 0$aCooperating objects (Computer systems). 615 0$aMicroprocessors. 615 0$aComputer architecture. 615 14$aElectronic Circuits and Systems. 615 24$aCyber-Physical Systems. 615 24$aProcessor Architectures. 676 $a621.3815 702 $aHalak$b Basel 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484330603321 996 $aAuthentication of embedded devices$92844828 997 $aUNINA