| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910449741903321 |
|
|
Autore |
Ashurst Pamela <1940-, > |
|
|
Titolo |
Understanding women in distress / / Pamela Ashurst and Zaida Hall with contributions from George Christie. [and others] ; [foreword by J.L.T. Birley] |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
London ; ; New York : , : Tavistock/Routledge, , 1989 |
|
|
|
|
|
|
|
ISBN |
|
1-134-97836-7 |
1-280-56722-8 |
9786610567225 |
0-203-13145-2 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (249 p.) |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Women - Mental health |
Women - Psychology |
Motherhood - Psychological aspects |
Depression, Mental |
Stress (Psychology) |
Life Change Events |
Mental Disorders |
Mothers - psychology |
Genital Diseases, Female |
Identification, Psychological |
Stress, Psychological |
Women - psychology |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di contenuto |
|
Book Cover; Title; Copyright; Contents; Authors and contributors; Forword; Introduction; 1. Understanding distress; 2. Women's role and identity; 3. The development of feminine identity and sexuality; 4. On becoming a mother; 5. Bonding and rejection; 6. Hungry womanhood; |
|
|
|
|
|
|
|
|
|
|
|
|
|
7. Womanhood despoiled; 8. Lesbian womanhood; 9. Childless womanhood; 10. Barren womanhood; 11. Motherhood thwarted; 12. Motherhood bereft; 13. Motherhood disappointed; 14. Motherhood depressed; 15. Perverse womanhood; 16. Bereft womanhood; 17. Pairing and parting; 18. Single motherhood; 19. Stepmotherhood |
20. Femininity assaultedCoda; Bibliography; Index |
|
|
|
|
|
|
Sommario/riassunto |
|
Women are usually more in touch with their emotions than men and more readily seek help from professional sources when they encounter stress. The response they meet from doctors and other helping professionals at this point can be vital in determining the best outcome for them. Ashurst and Hall have written this book as a contribution towards a better understanding of the psychological aspects of women's health problems. |
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910790021503321 |
|
|
Titolo |
Information security management handbook / / edited by Harold F. Tipton, Micki Krause Nozaki |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Boca Raton : , : Auerbach Publications, , 2007- |
|
|
|
|
|
|
|
ISBN |
|
0-429-11284-X |
1-283-59665-2 |
9786613909107 |
1-4398-9315-2 |
|
|
|
|
|
|
|
|
Edizione |
[6th ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (495 p.) |
|
|
|
|
|
|
Collana |
|
Information security management handbook ; ; v. 6 |
|
|
|
|
|
|
Altri autori (Persone) |
|
TiptonHarold F |
NozakiMicki Krause |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Computer security - Management |
Data protection |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
Nota di contenuto |
|
Front Cover; Contents; Introduction; Editors; Contributors; Chapter 1: What Business Associates Need to Know about Protected Health |
|
|
|
|
|
|
|
|
|
|
|
Information under HIPAA and HITECH; Chapter 2: E-Mail Security; Chapter 3: Appreciating Organizational Behavior and Institutions to Solidify Your Information Security Program; Chapter 4: The Information Security Auditors Have Arrived, Now What?; Chapter 5: Continuous Monitoring: Extremely Valuable to Deploy within Reason; Chapter 6: Social Networking; Chapter 7: Insider Threat Defense; Chapter 8: Risk Management in Public Key Certificate Applications |
Chapter 9: Server Virtualization: Information Security ConsiderationsChapter 10: Security Requirements Analysis; Chapter 11: CERT Resilience Management Model: An Overview; Chapter 12: Managing Bluetooth Security; Chapter 13: Slash and Burn: In Times of Recession, Do Not Let Emotions Drive Business Decisions; Chapter 15: Application Whitelisting; Chapter 16: Design of Information Security for Large System Development Projects; Chapter 17: Building Application Security Testing into the Software Development Life Cycle; Chapter 19: Format Preserving Encryption |
Chapter 20: Elliptic Curve CryptosystemsChapter 21: Pirating the Ultimate Killer App: Hacking Military Unmanned Aerial Vehicles; Chapter 22: Service-Oriented Architecture; Chapter 23: Cloud Security; Chapter 24: Enterprise Zones of Trust; Chapter 25: Complex Event Processing for Automated Security Event Analysis; Chapter 26: Records Management; Chapter 27: Data Backup Strategies: Traditional versus Cloud; Chapter 28: Managing Advanced Persistent Threats; Chapter 29: Virtualization Forensics; Information Security Management Handbook: Comprehensive Table of Contents; Back Cover |
|
|
|
|
|
|
Sommario/riassunto |
|
Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations. Reporting on the latest developments in information security and recent changes to the (ISC)2® CISSP Common Body of Knowledge (CBK®</SU |
|
|
|
|
|
|
|
| |