1.

Record Nr.

UNINA9910171000303321

Titolo

Managing mental health care in the community : chaos and containment / / edited by Angela Foster and Vega Zagier Roberts

Pubbl/distr/stampa

London ; ; New York, : Routledge, 1998

ISBN

9786610023721

1-280-02372-4

0-203-36057-5

Edizione

[1st ed.]

Descrizione fisica

1 online resource (261 pages)

Altri autori (Persone)

FosterAngela <1948->

RobertsVega Zagier <1948->

Disciplina

362.2/2/068

Soggetti

Community mental health services - Administration

Mental health services

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Bibliographic Level Mode of Issuance: Monograph

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Front Cover -- Managing Mental Health in the Community -- Copyright Page -- Contents -- List of illustrations -- Notes on contributors -- Preface -- Acknowledgements -- List of abbreviations -- Introduction to the theoretical basis of this book: Angela Foster and Vega Zagier Roberts -- Part I: The move into the community -- 1. Creatures of each other: some historical considerations of responsibility and care, and some present: R.D. Hinshelwood -- 2. 'Not in my backyard': the psychosocial reality of community care: Angela Foster and Vega Zagier Roberts -- 3. When dreams become nightmares: Vega Zagier Roberts -- 4. Is authority a dirty word?: Changing attitudes to care and control: Vega Zagier Roberts -- 5. Psychotic processes and community care: the difficulty in finding the third position: Angela Foster -- Part II: Managing anxiety in the system -- 6. The psychic organization of community care: Jack Nathan -- 7. Thinking about risk: Angela Foster -- 8. The pain of managing: some dynamics of the purchaser/provider split: Tony McCaffrey -- 9. Carers, clients and workers: on the relationship between policy and collusion: Simon Biggs -- 10. The hospital in the community: Vega Zagier Roberts -- Part III: Learning from the experience of face-to-face work -- 11. Integration or



fragmentation: the challenge facing community mental health teams: Angela Foster -- 12. Beyond keyworking: Trinidad Navarro -- 13. Help to do the ordinary: the place of counselling in community care: Angela Foster -- 14. Community, care and quality: a lesson from group psychotherapy: Naomi Landau and Michael Wallbank -- Part IV: Initiatives for empowerment -- 15. A potential for partnership?: Consulting with users of mental health services: Helen Morgan -- 16. Learning to keep one's head: analysis of a training workshop: Angela Foster and Lorenzo Grespi.

17. Space to play: Vega Zagier Roberts -- 18. From understanding to action: Angela Foster and Vega Zagier Roberts -- Index.

Sommario/riassunto

This book aims to encourage reflective practice amongst staff, managers and policy-makers working in the community. Contributors challenge common assumptions and present some tried and tested interventions to improve the quality of care.

2.

Record Nr.

UNINA9910488705003321

Titolo

Cyber Security Cryptography and Machine Learning : 5th International Symposium, CSCML 2021, Be'er Sheva, Israel, July 8–9, 2021, Proceedings / / edited by Shlomi Dolev, Oded Margalit, Benny Pinkas, Alexander Schwarzmann

Pubbl/distr/stampa

Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021

ISBN

3-030-78086-4

Edizione

[1st ed. 2021.]

Descrizione fisica

1 online resource (520 pages)

Collana

Security and Cryptology, , 2946-1863 ; ; 12716

Disciplina

005.82

Soggetti

Data protection

Computer networks

Cryptography

Data encryption (Computer science)

Computer networks - Security measures

Data and Information Security

Computer Communication Networks

Cryptology

Mobile and Network Security

Lingua di pubblicazione

Inglese



Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks -- Adversaries Strike Hard: Adversarial Attacks against Malware Classifiers using Dynamic API Calls as Features -- Privacy-Preserving Coupling of Vertically-Partitioned Databases and Subsequent Training with Gradient Descent -- Principal Component Analysis using CKKS Homomorphic Encryption Scheme -- DepthStAr: Deep Strange Arguments Detection -- Robust Multivariate Anomaly-Based Intrusion Detection System for Cyber-Physical Systems -- Privacy Preserving Password Strength Meters with FHE -- Automatic Detection of Water Stress in Corn Using Image Processing and Deep Learning -- Tortoise and Hares Consensus: the Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies -- Game of Drones - Detecting Spying Drones Using Time Domain Analysis -- Privacy Vulnerability of NeNDS Collaborative Filtering -- Lawful Interception in WebRTC Peer-To-Peer Communication -- Hierarchical Ring Signatures Immune to Randomness Injection Attacks -- Theoretical aspects of a priori on-line assessment of data predictability in applied tasks -- Randomly Rotate Qubits, Compute and Reverse for Weak Measurements Resilient QKD and Securing Entanglement -- Warped Input Gaussian Processes for Time Series Forecasting -- History Binding Signature -- Effective enumeration of infinitely many programs that evade Formal Malware Analysis -- DNS-Morph: UDP-Based Bootstrapping Protocol For Tor -- Polynomial Time k-Shortest Multi-Criteria Prioritized and All-Criteria-Disjoint Paths -- Binding BIKE errors to a key pair -- Fast and Error-Free Negacyclic Integer Convolution using Extended Fourier Transform -- Efficient Secure Ridge Regression from Randomized Gaussian Elimination -- PolyDNN Polynomial Representation of NN for Communication-less SMPC Inference -- Use of Blockchain for ensuring Data Integrity in Cloud Databases -- The Coming AI Hackers -- Turning HATE Into LOVE: Compact Homomorphic Ad Hoc Threshold Encryption for ScalableMPC -- Fully Dynamic Password Protected Secret Sharing: simplifying PPSS operation and maintenance -- Early Detection of In-Memory Malicious Activity based on Run-time Environmental Features -- Software Integrity and Validation using Cryptographic Composability and Computer Vision -- Efficient Generic Arithmetic for KKW: Practical Linear MPC-in-the-Head NIZK on Commodity Hardware without Trusted Setup -- Trust and Verify: A Complexity-Based IoT Behavioral Enforcement Method -- Using a Neural Network to Detect Anomalies given an N-gram Profile -- Meta-X: A Technique for Reducing Communication in Geographically Distributed Computations -- Blindly Follow: SITS CRT and FHE for DCLSMPC of DUFSM -- Implementing GDPR in Social Networks using Trust and Context.

Sommario/riassunto

This book constitutes the refereed proceedings of the 5th International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2021, held in Be'er Sheva, Israel, in July 2021. The 22 full and 13 short papers presented together with a keynote paper in this volume were carefully reviewed and selected from 48 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.