LEADER 00740nam0 2200217 450 001 000012726 005 20080611131659.0 100 $a20080611d1963----km-y0itay50------ba 101 0 $aeng 102 $aUS 105 $ay-------001yy 200 1 $aHuman resources and economic growth$fedited by Marian Crites Alexander-Frutschi 210 $aMenlo Park [Calif.]$cStanford Research Institute$d1963 215 $aXV, 398 p.$d25 cm 702 1$aAlexander-Frutschi,$bMarian Crites 712 02$aStanford Research Institute :$bInternational Development Center 801 0$aIT$bUNIPARTHENOPE$c200806$gRICA$2UNIMARC 912 $a000012726 951 $a040/5$b1597$cNAVA2 996 $aHuman resources and economic growth$91202932 997 $aUNIPARTHENOPE LEADER 03940nam 22006615 450 001 9910964738803321 005 20220117221108.0 010 $a9789460919480 010 $a9460919480 024 7 $a10.1007/978-94-6091-948-0 035 $a(CKB)2670000000281366 035 $a(EBL)3034739 035 $a(SSID)ssj0000878531 035 $a(PQKBManifestationID)11474940 035 $a(PQKBTitleCode)TC0000878531 035 $a(PQKBWorkID)10836311 035 $a(PQKB)11031124 035 $a(DE-He213)978-94-6091-948-0 035 $a(MiAaPQ)EBC3034739 035 $a(OCoLC)827212325 035 $a(nllekb)BRILL9789460919480 035 $a(MiAaPQ)EBC1083738 035 $a(Au-PeEL)EBL3034739 035 $a(CaPaEBR)ebr10614807 035 $a(Au-PeEL)EBL1083738 035 $a(PPN)168343118 035 $a(EXLCZ)992670000000281366 100 $a20121026d2012 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aBeing and Learning $eA Poetic Phenomenology of Education /$fby Eduardo M. Duarte 205 $a1st ed. 2012. 210 1$aRotterdam :$cSensePublishers :$cImprint: SensePublishers,$d2012. 215 $a1 online resource (415 p.) 300 $aDescription based upon print version of record. 311 08$a9789460919473 311 08$a9460919472 311 08$a9789460919466 311 08$a9460919464 320 $aIncludes bibliographical references and indexes. 327 $aPreliminary Material -- Introduction -- Evocative Questioning -- The Calling of Socrates -- The Way of Lao-Tzu -- Plato?s ?Allegory of the Cave? -- The Dwelling of Heraclitus -- Aristotle?s Critique -- The Saying of the Sage -- Meditative Thinking -- Zarathustra?s Descent -- The Improvisational Art of Teaching/Learning -- (Re) Turning to the Originary Question -- Index of Names -- Key Terms. 330 $a?Education is not an art of putting sight into the eye that can already see, but one of turning the eye towards the proper gaze of Being. That?s what must be managed!? Plato insists. This claim is the take-off point for Eduardo Duarte?s meditations on the metaphysics and ontology of teaching and learning. In Being and Learning he offers an account of learning as an attunement with Being?s dynamic presencing and unconcealment, which Duarte explores as the capacity to respond and attend to the matter that stands before us, or, in Arendtian terms, to love the world, and to be with others in this world. This book of ?poetic thinking? is a chronicle of Duarte?s ongoing exploration of the question of Being, a philosophical journey that has been guided primarily through a conversation with Heidegger, and which also includes the voices of Plato, Aristotle, Heraclitus, Nietzsche, as well Lao Tzu and the Buddha, among others. In Being and Learning, Duarte undertakes a ?phenomenology of the original?: a writing that consciously and conspicuously interrupts the discursive field of work in philosophy of education. As the late Reiner Schurmann described this method: ?it recalls the ancient beginnings and it anticipates a new beginning, the possible rise of a new economy among things, words and actions.? Being and Learning is a work of parrhesia: a composition of free thought that disrupts the conventional practice of philosophy of education, and thereby open up gaps and spaces of possibility in the arrangement of words, concepts, and ideas in the field. With this work Eduardo Duarte is initiating new pathways of thinking about education. 606 $aEducation 606 $aEducation 615 0$aEducation. 615 14$aEducation. 676 $a370 700 $aDuarte$b Eduardo M$0791535 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910964738803321 996 $aBeing and learning$91769355 997 $aUNINA LEADER 05066nam 22004815 450 001 9910917779503321 005 20250504110111.0 010 $a9798868809477$b(electronic bk.) 010 $z9798868809460 024 7 $a10.1007/979-8-8688-0947-7 035 $a(MiAaPQ)EBC31827146 035 $a(Au-PeEL)EBL31827146 035 $a(CKB)36976043700041 035 $a(DE-He213)979-8-8688-0947-7 035 $a(CaSebORM)9798868809477 035 $a(OCoLC)1478590932 035 $a(OCoLC-P)1478590932 035 $a(EXLCZ)9936976043700041 100 $a20241212d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 14$aThe Cybersecurity Trinity $eArtificial Intelligence, Automation, and Active Cyber Defense /$fby Donnie W. Wendt 205 $a1st ed. 2024. 210 1$aBerkeley, CA :$cApress :$cImprint: Apress,$d2024. 215 $a1 online resource (410 pages) 311 08$aPrint version: Wendt, Donnie W. The Cybersecurity Trinity Berkeley, CA : Apress L. P.,c2024 9798868809460 327 $aChapter 1: AI is Everywhere -- Chapter 2: Overview of AI and ML -- Chapter 3: AI for Defense -- Chapter 4: ML in an Adversarial Environment -- Chapter 5: Combatting AI Threats -- Chapter 6: The Need for Speed ? The Driving Forces of Security Automation -- Chapter 7: The OODA Loop -- Chapter 8: Common SOAR Use Cases -- Chapter 9: Strategies for Success (and Failure) -- Chapter 10: Active Cyber Defense -- Chapter 11: The OODA Loop Revisited -- Chapter 12: Deception -- Chapter 13: The Cybersecurity Trinity. 330 $aThis book explores three crucial topics for cybersecurity professionals: artificial intelligence (AI), automation, and active cyber defense (ACD). The Cybersecurity Trinity will provide cybersecurity professionals with the necessary background to improve their defenses by harnessing the combined power of these three concepts. The book is divided into four sections, one addressing each underlying concept and the final section discussing integrating them to harness their full potential. With the expected growth of AI and machine learning (ML), cybersecurity professionals must understand its core concepts to defend AI and ML-based systems. Also, most cybersecurity tools now incorporate AI and ML. However, many cybersecurity professionals lack a fundamental understanding of AI and ML. The book's first section aims to demystify AI and ML for cybersecurity practitioners by exploring how AI and ML systems work, where they are vulnerable, and how to defend them. Next, we turn our attention to security automation. Human-centered cyber defense processes cannot keep pace with the threats targeting organizations. Security automation can help defenders drastically increase the speed of detection and response. This section will discuss core use cases that security teams can implement, including intelligence processing, incident triage, detection, and response. This section will end with strategies for a successful security automation implementation and strategies that can lead to failure. Accelerating the defense is but one side of the equation. Defenders can also implement ACD methods to disrupt and slow the attacker. Of course, ACD spans a broad spectrum, including some that could raise legal and ethical concerns. This section will explore some ACD methods and discuss their applicability, as well as the need to include business, legal, and ethical considerations when implementing them. Security teams often treat AI, automation, and ACD as disparate solutions, addressing specific problems. However, there is much overlap, and security teams must develop a cohesive approach to realize the full potential. The last section combines these three concepts to form a comprehensive strategy. The resulting strategy will have AI as the foundation, incorporating automation to speed up defense and ACD to disrupt the attacker. What You Will Learn: Understand the many uses of AI and ML and the concepts underpinning these technologies. Learn how to protect AI and ML systems by recognizing the vulnerabilities throughout their lifecycle. Integrate AI and ML-based systems to enhance cybersecurity. Develop security automation processes to enhance situation awareness, speed the time to respond, and increase the bandwidth of the limited security operations staff. Develop an ACD strategy to slow the attackers while minimizing legal and ethical concerns. Design a comprehensive strategy with AI as the foundation, incorporating automation to speed up defense and ACD to disrupt the attacker. 606 $aComputer security 606 $aArtificial intelligence$xSecurity measures 615 0$aComputer security. 615 0$aArtificial intelligence$xSecurity measures. 676 $a005.8 700 $aWendt$b Donnie W$01779956 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a9910917779503321 996 $aThe Cybersecurity Trinity$94303626 997 $aUNINA