Listing 1 - 10 of 35 | << page >> |
Sort by
|
Choose an application
Theory of knowledge --- Relativity --- Relativity. --- Relativism --- Knowledge, Theory of --- Reality --- Relationism
Choose an application
Choose an application
Aesthetics --- Being --- Esthetica --- Esthétique --- Etre (Philosophie) --- Hermeneutics --- Hermeneutiek --- Herméneutique --- Ontologie --- Ontology --- Zijn (Filosofie) --- Zijnsleer --- Aesthetics. --- Hermeneutics. --- Ontology.
Choose an application
Music --- Musique --- --Philosophie --- --Philosophy and aesthetics --- Philosophy and aesthetics. --- 78.81 --- -Art music --- Art music, Western --- Classical music --- Musical compositions --- Musical works --- Serious music --- Western art music --- Western music (Western countries) --- Philosophy and aesthetics --- Music - Philosophy and aesthetics --- Philosophie --- -Philosophy and aesthetics
Choose an application
165.723 --- Cultural relativism --- Ethical relativism --- Moral relativism --- Relativism, Ethical --- Relativity (Ethics) --- Ethics --- Ethics, Evolutionary --- Relativism, Cultural --- Ethnology --- Ethnopsychology --- Relativity --- Relativisme --- Cultural relativism. --- Ethical relativism. --- 165.723 Relativisme
Choose an application
In this book, Michael Krausz addresses the concept of interpretation in the visual arts, the emotions, and the self. He examines competing ideals of interpretation, their ontological entanglements, reference frames, and the relation between elucidation and self-transformation. The series Interpretation and Translation explores philosophical issues of interpretation and its cultural objects. It also addresses commensuration and understanding among languages, conceptual schemes, symbol systems, reference frames, and the like. The series publishes theoretical works drawn from philosophy, rhetoric, linguistics, anthropology, religious studies, art history, and musicology.
Hermeneutics. --- Interpretation, Methodology of --- Criticism --- Criticism. --- Evaluation of literature --- Literary criticism --- Literature --- Rhetoric --- Aesthetics --- Technique --- Evaluation
Choose an application
This book presents a fictional dialogue among four former college friends about Oneness and self-realization. News of the sudden death of a relative occasions their discussion. One friend, a devotee of the Advaita or non-duality school of Hindu philosophy, seeks to short-circuit the pain and suffering characteristically associated with anxieties about human mortality. According to her, to be is to be the ultimate ineffable undifferentiated Being, the birthless and the deathless—the One. The other friends, whose philosophical attitudes are broadly pragmatist, relativist, and realist, inquire into her views. While the pragmatist looks to the advaitist for guidance about meditative practices, she does not renounce human existence. She welcomes the joys and satisfactions as well as the burdens and pains of human existence. In turn, the relativist is skeptical about theories that aim to reach beyond one’s historical, cultural or personal frame of reference. On his view, to be is to be in relationship, especially with other human beings. Finally, the realist seeks objective, frame-independent truth. In addition, he holds that the world is comprised of individual objects and their properties. Accordingly, he finds the idea of Oneness to be incomprehensible.
Self-realization. --- Fulfillment (Ethics) --- Self-fulfillment --- Ethics --- Success --- Satisfaction
Choose an application
Uses real-life information security incidents to explain how to reduce the risks of information security breaches and, crucially, what to do when they occur. Now updated to cover ISO27001:2013.
Computer security. --- Hacking. --- Computer networks --- Management --- Business & Economics --- Management Theory --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Computer hacking --- Computer programming --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Security measures. --- Protection --- Security measures
Choose an application
Choose an application
Listing 1 - 10 of 35 | << page >> |
Sort by
|