LEADER 03824nam 2200649 450 001 9910787730603321 005 20230803195208.0 010 $a1-61451-231-0 024 7 $a10.1515/9781614512318 035 $a(CKB)2670000000519636 035 $a(EBL)1046689 035 $a(SSID)ssj0001215341 035 $a(PQKBManifestationID)11708336 035 $a(PQKBTitleCode)TC0001215341 035 $a(PQKBWorkID)11176832 035 $a(PQKB)10407341 035 $a(MiAaPQ)EBC1046689 035 $a(DE-B1597)179088 035 $a(OCoLC)979631652 035 $a(DE-B1597)9781614512318 035 $a(Au-PeEL)EBL1046689 035 $a(CaPaEBR)ebr10838314 035 $a(CaONFJC)MIL574239 035 $a(OCoLC)870590012 035 $a(EXLCZ)992670000000519636 100 $a20140224h20142014 uy| 0 101 0 $aeng 135 $aurnn#---|u||u 181 $ctxt 182 $cc 183 $acr 200 10$aDescriptive grammar of Pashto and its dialects /$fAnne Boyle David ; edited by Claudia M. Brugman 210 1$aBerlin :$cDe Gruyter Mouton,$d[2014] 210 4$d©2014 215 $a1 online resource (530 p.) 225 1 $aMouton-CASL grammar series ;$vvolume 1 300 $aDescription based upon print version of record. 311 0 $a1-306-42988-9 311 0 $a1-61451-303-1 320 $aIncludes bibliographical references and index. 327 $tFront matter --$tForeword --$tSeries Editors' Preface --$tPreface --$tContents --$t1. About this Grammar --$t2. The Pashto Language /$rDavid, Anne Boyle --$t3. Phonology and Orthography /$rMiller, Corey / David, Anne Boyle --$t4. Pashto Dialects /$rMiller, Corey --$t5. Nouns /$rTwist, Alina / David, Anne Boyle --$t6. Adjectives and Other Noun Modifiers /$rFox, Melissa / Twist, Alina --$t7. Pronouns /$rDavid, Anne Boyle --$t8. Verbs /$rDavid, Anne Boyle / Goodman, Sarah --$t9. Adpositions /$rBrugman, Claudia M. --$t10. Other Lexical Elements /$rFox, Melissa / David, Anne Boyle --$t11. Syntax /$rBrugman, Claudia M. / David, Anne Boyle --$tA. Structure of this Grammar /$rMaxwell, Michael / David, Anne Boyle --$tB. Sources of Pashto Data --$tBibliography --$tIndex 330 $aPashto/Pushto/Pukhto is a group of varieties used by as many as 30 million people in Afghanistan and Pakistan, yet a grammar describing these varieties collectively has not been published. The CASL Pashto grammar originates from extensive use of both primary and secondary materials. It attends to features of both spoken and written forms of Pashto and exemplifies the latter generously with naturally-occurring sentences. Detailed descriptions are provided of the phonology and orthography and of the inflectional and derivational morphology applied to all major word classes, with special attention to the complex morphology of verb formation and descriptions of the multiple pronominal systems. Notes on some of the prominent syntactic constructions are provided as a descriptive basis for learners of Pashto and for those interested in syntactic properties characteristic of South Asian languages. For the first time, the highly distinctive Middle dialects, including Waziri, receive attention next to the other major dialect groups. A formal grammar focusing on the morphology is an available companion work. 410 0$aMouton-CASL grammar series ;$vv. 1. 606 $aPushto language$xGrammar 610 $aIndo-European Languages. 610 $aPashto. 615 0$aPushto language$xGrammar. 676 $a491/.5935 700 $aDavid$b Anne Boyle$01472344 701 $aBrugman$b Claudia M$0650885 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910787730603321 996 $aDescriptive grammar of Pashto and its dialects$93685130 997 $aUNINA LEADER 05203nam 2200709 450 001 9910816563003321 005 20231206231354.0 010 $a1-00-333939-5 010 $a1-000-79538-1 010 $a1-003-33939-5 010 $a1-000-79269-2 010 $a87-92982-86-7 035 $a(CKB)3710000000094819 035 $a(EBL)3400126 035 $a(SSID)ssj0001330130 035 $a(PQKBManifestationID)11714081 035 $a(PQKBTitleCode)TC0001330130 035 $a(PQKBWorkID)11327198 035 $a(PQKB)10417190 035 $a(Au-PeEL)EBL3400126 035 $a(CaPaEBR)ebr10852702 035 $a(OCoLC)878145269 035 $a(Au-PeEL)EBL7099483 035 $a(MiAaPQ)EBC3400126 035 $a(MiAaPQ)EBC7099483 035 $a(EXLCZ)993710000000094819 100 $a20230223d2011 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity in next generation mobile networks $eSAE/LTE and WiMAX /$fAnand R. Prasad and Seung-Woo Seo 210 1$aGistrup, Denmark :$cRiver Publishers,$d[2011] 210 4$d©2011 215 $a1 online resource (242 p.) 225 1 $aRiver Publishers Series in Standardisation ;$vVolume 4 300 $aIncludes index. 311 $a87-92329-63-2 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $a""Cover""; ""Contents""; ""Dedication""; ""About the Authors""; ""Preface""; ""1 Introduction""; ""1.1 NGMN""; ""1.1.1 Overview""; ""1.1.2 Security Requirements""; ""1.2 Book Overview""; ""References""; ""2 Security Overview""; ""2.1 Objectives of Information Security""; ""2.1.1 Confidentiality""; ""2.1.2 Integrity""; ""2.1.3 Availability""; ""2.2 Types of Security Attacks""; ""2.2.1 Types of Attacks on Networks""; ""2.2.2 Security on Networks""; ""2.3 Basic Security Functions""; ""2.3.1 Authentication and Authorization""; ""2.3.2 Message Encryption""; ""2.3.3 Digital Signature"" 327 $a""2.3.4 Nonrepudiation""""2.3.5 Privacy Guarantee""; ""2.4 Cryptographic Primitives""; ""2.4.1 Symmetric-Key Cryptography Algorithm""; ""2.4.2 Hash Function and MAC""; ""2.4.3 Public-Key Cryptography Algorithm""; ""2.4.4 Random Number Generator""; ""2.4.5 Key Management""; ""2.4.6 Cryptographic Protocol""; ""2.4.7 Comments""; ""2.5 Extensible Authentication Protocol""; ""2.5.1 General EAP Architecture""; ""2.5.2 EAP Authentication Methods""; ""2.6 AAA Protocols""; ""2.6.1 RADIUS""; ""2.6.2 Diameter""; ""2.7 Conclusion""; ""References""; ""3 Standardization""; ""3.1 3GPP"" 327 $a""3.1.1 Organization""""3.1.2 Standardization Process""; ""3.1.3 Evolution: 3GPP Network and Security""; ""3.2 IEEE 802.16 and WiMAX""; ""3.2.1 IEEE 802.16 Standards""; ""3.2.2 WiMAX ForumA?®""; ""3.2.3 WiMAX Technology Evolution""; ""3.2.4 Security Overview in WiMAX""; ""References""; ""4 System Architecture and Long-Term Evolution Security""; ""4.1 Chapter Overview""; ""4.2 EPS System Overview""; ""4.2.1 Network Elements and Security Functions""; ""4.2.2 Protocol Layers and Security Functions""; ""4.3 Network Attachment""; ""4.4 Tracking Area""; ""4.5 Mobility"" 327 $a""4.6 Idle State Signaling Reduction""""4.7 EPS Identities""; ""4.8 Security Requirements""; ""4.9 Basic Points""; ""4.9.1 Key Hierarchy and Key Lifetime""; ""4.9.2 Security Contexts""; ""4.9.3 NAS Counts and Handling""; ""4.9.4 Cryptographic Algorithms and Usage Overview""; ""4.10 Authentication and Key Agreement (AKA)""; ""4.10.1 Basic Requirements""; ""4.10.2 Authentication Decision and Context Retrieval""; ""4.10.3 Authentication Procedure""; ""4.11 Algorithm Negotiation and Security Activation""; ""4.11.1 Algorithm Negotiation Requirements""; ""4.11.2 Non-access Stratum"" 327 $a""4.11.3 Access Stratum""""4.12 Key Handling at State Change""; ""4.13 Handover Key Handling""; ""4.14 Key Change On-The-Fly""; ""4.15 Connection Reestablishment: Token""; ""4.16 Local Authentication""; ""4.17 Inter-System Mobility""; ""4.17.1 Idle-Mode Mobility""; ""4.17.2 Handover""; ""4.18 Voice Call Continuity""; ""4.19 Emergency Call Security""; ""Bibliography""; ""5 Security in IEEE 802.16e/WiMAX""; ""5.1 Overview""; ""5.1.1 WiMAX Protocol Stack""; ""5.1.2 Architecture of WiMAX Security Sublayer""; ""5.2 Privacy Key Management""; ""5.2.1 Security Associations""; ""5.2.2 PKMv1"" 327 $a""5.2.3 PKMv2"" 330 $aThis book provides a fresh look at those security aspects, with main focus on the latest security developments of 3GPP SAE/LTE and WiMAX. SAE/LTE is also known as Evolved Packet System (EPS). 410 0$aRiver Publishers series of information science and technology ;$vVolume 4. 606 $aIEEE 802.16 (Standard) 606 $aLong-Term Evolution (Telecommunications) 615 0$aIEEE 802.16 (Standard) 615 0$aLong-Term Evolution (Telecommunications) 676 $a005.8 700 $aPrasad$b Anand$01625494 702 $aSo?$b Su?ng-u 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910816563003321 996 $aSecurity in next generation mobile networks$94046499 997 $aUNINA