1.

Record Nr.

UNINA9910449741903321

Autore

Ashurst Pamela <1940-, >

Titolo

Understanding women in distress / / Pamela Ashurst and Zaida Hall with contributions from George Christie. [and others] ; [foreword by J.L.T. Birley]

Pubbl/distr/stampa

London ; ; New York : , : Tavistock/Routledge, , 1989

ISBN

1-134-97836-7

1-280-56722-8

9786610567225

0-203-13145-2

Descrizione fisica

1 online resource (249 p.)

Altri autori (Persone)

HallZaida <1925->

Disciplina

362.83

616.89/0088042

Soggetti

Women - Mental health

Women - Psychology

Motherhood - Psychological aspects

Depression, Mental

Stress (Psychology)

Life Change Events

Mental Disorders

Mothers - psychology

Genital Diseases, Female

Identification, Psychological

Stress, Psychological

Women - psychology

Electronic books.

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di contenuto

Book Cover; Title; Copyright; Contents; Authors and contributors; Forword; Introduction; 1. Understanding distress; 2. Women's role and identity; 3. The development of feminine identity and sexuality; 4. On becoming a mother; 5. Bonding and rejection; 6. Hungry womanhood;



7. Womanhood despoiled; 8. Lesbian womanhood; 9. Childless womanhood; 10. Barren womanhood; 11. Motherhood thwarted; 12. Motherhood bereft; 13. Motherhood disappointed; 14. Motherhood depressed; 15. Perverse womanhood; 16. Bereft womanhood; 17. Pairing and parting; 18. Single motherhood; 19. Stepmotherhood

20. Femininity assaultedCoda; Bibliography; Index

Sommario/riassunto

Women are usually more in touch with their emotions than men and more readily seek help from professional sources when they encounter stress. The response they meet from doctors and other helping professionals at this point can be vital in determining the best outcome for them. Ashurst and Hall have written this book as a contribution towards a better understanding of the psychological aspects of women's health problems.

2.

Record Nr.

UNINA9910790021503321

Titolo

Information security management handbook / / edited by Harold F. Tipton, Micki Krause Nozaki

Pubbl/distr/stampa

Boca Raton : , : Auerbach Publications, , 2007-

ISBN

0-429-11284-X

1-283-59665-2

9786613909107

1-4398-9315-2

Edizione

[6th ed.]

Descrizione fisica

1 online resource (495 p.)

Collana

Information security management handbook ; ; v. 6

Altri autori (Persone)

TiptonHarold F

NozakiMicki Krause

Disciplina

658

658/.0558

Soggetti

Computer security - Management

Data protection

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

"An Auerbach book."

Nota di bibliografia

Includes bibliographical references.

Nota di contenuto

Front Cover; Contents; Introduction; Editors; Contributors; Chapter 1: What Business Associates Need to Know about Protected Health



Information under HIPAA and HITECH; Chapter 2: E-Mail Security; Chapter 3: Appreciating Organizational Behavior and Institutions to Solidify Your Information Security Program; Chapter 4: The Information Security Auditors Have Arrived, Now What?; Chapter 5: Continuous Monitoring: Extremely Valuable to Deploy within Reason; Chapter 6: Social Networking; Chapter 7: Insider Threat Defense; Chapter 8: Risk Management in Public Key Certificate Applications

Chapter 9: Server Virtualization: Information Security ConsiderationsChapter 10: Security Requirements Analysis; Chapter 11: CERT Resilience Management Model: An Overview; Chapter 12: Managing Bluetooth Security; Chapter 13: Slash and Burn: In Times of Recession, Do Not Let Emotions Drive Business Decisions; Chapter 15: Application Whitelisting; Chapter 16: Design of Information Security for Large System Development Projects; Chapter 17: Building Application Security Testing into the Software Development Life Cycle; Chapter 19: Format Preserving Encryption

Chapter 20: Elliptic Curve CryptosystemsChapter 21: Pirating the Ultimate Killer App: Hacking Military Unmanned Aerial Vehicles; Chapter 22: Service-Oriented Architecture; Chapter 23: Cloud Security; Chapter 24: Enterprise Zones of Trust; Chapter 25: Complex Event Processing for Automated Security Event Analysis; Chapter 26: Records Management; Chapter 27: Data Backup Strategies: Traditional versus Cloud; Chapter 28: Managing Advanced Persistent Threats; Chapter 29: Virtualization Forensics; Information Security Management Handbook: Comprehensive Table of Contents; Back Cover

Sommario/riassunto

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations. Reporting on the latest developments in information security and recent changes to the (ISC)2® CISSP Common Body of Knowledge (CBK®</SU