| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910455848603321 |
|
|
Autore |
Aldridge David <1947-> |
|
|
Titolo |
Health, the individual, and integrated medicine [[electronic resource] ] : revisiting an aesthetic of health care / / David Aldridge |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
New York ; ; London, : Jessica Kingsley Publishers, 2004 |
|
|
|
|
|
|
|
ISBN |
|
1-283-90441-1 |
1-84642-644-8 |
|
|
|
|
|
|
|
|
Edizione |
[1st American ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (225 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Alternative medicine |
Integrated delivery of health care |
Medical anthropology |
Medicine - Research - Philosophy |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Making and taking health care decisions -- Lifestyle, charismatic ideology and a praxis aesthetic -- The clinical assessment of acupuncture for asthma -- Of ethics and education: strategies for curriculum development -- Aesthetics and the individual in the practice of medical research -- Clinical research, the individual patient, and the limits of randomized controlled trials -- A community approach to cancer in families -- Music therapy references relating to cancer and palliative care -- Music therapy and spirituality: a transcendental understanding of suffering -- Prayer and spiritual healing in medical settings -- A qualitative research perspective on healing -- The breath in healing -- Music therapy and neurological rehabilitation: recognition and the performed body in an ecological niche -- Guidelines for clinical research. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
How do we decide on the most effective way to heal ourselves or our patients? Complementary therapies are a vital part of any integrated approach to health which incorporates specialist and layperson knowledge. In this book, David Aldridge examines cultural understandings of illness and medicines. He provides a critique of |
|
|
|
|
|
|
|
|
|
|
|
|
|
orthodox methods used to assess treatment, and advocates a more pluralistic approach to medical research and practice, encompassing the physical, psychological, spiritual and social dimensions of a person's life. To assess medical research in a range of situations, Aldridge |
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910455451403321 |
|
|
Autore |
Kennedy Charles H. |
|
|
Titolo |
The business privacy law handbook / / Charles H. Kennedy |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Boston : , : Artech House, , ©2008 |
|
[Piscataqay, New Jersey] : , : IEEE Xplore, , [2008] |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (340 p.) |
|
|
|
|
|
|
Collana |
|
Artech House telecommunications series |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Business records - Law and legislation - United States |
Data protection - Law and legislation - United States |
Privacy, Right of - United States |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di contenuto |
|
Information about consumers and customers -- Collection and use of personal information on the internet -- Data protection: the evolving obligation of business to protect personal information -- If your organization is a financial institution: the Gramm-Leach-Biley Act and other financial privacy legislation -- If your organization is an electronic communication service provider: the Electronic Communications Privacy Act and Stored Communication Act -- If your organization is a provider of health care, health insurance, or related services -- Doing business in-or with-Europe: the European Union Data Protection Directive -- Information about job applicants and employees -- The hiring process -- Internal investigations and other aspects of the employment relationship -- Surveillance of employees and employee communications -- Telemarketing -- Fax advertising -- |
|
|
|
|
|
|
|
|
|
|
|
|
|
Spam: the regulation of commercial e-mail -- Monitoring and recording customer communications -- Other U.S. privacy laws -- Selected federal and state privacy statutes and regulations -- Key provisions of state secure disposal laws, data security laws, and data security breach notification laws. |
|
|
|
|
|
|
Sommario/riassunto |
|
This authoritative handbook serves as your one-stop guide to understanding and complying with the complex, evolving world of corporate privacy law. You find guidance on collecting and using customer information, learn how to comply with data protection laws and understand the industry-specific obligations of banks, healthcare providers, communications companies and other lines of business. |
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910781479003321 |
|
|
Autore |
Gibson Darril |
|
|
Titolo |
Microsoft Windows Security [[electronic resource] ] : Essentials / / Darril Gibson |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Hoboken, : Wiley, 2011 |
|
Indiana, : Wiley, 2011 |
|
|
|
|
|
|
|
|
|
ISBN |
|
1-283-17725-0 |
9786613177254 |
1-118-11454-X |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (374 p.) |
|
|
|
|
|
|
Collana |
|
Sybex serious skills |
Essentials (Indianapolis, Ind.) |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Electronic data processing personnel - Certification |
Computer networks - Examinations |
Computer networks -- Examinations -- Study guides |
Computer security - Examinations |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di contenuto |
|
Microsoft Windows Security Essentials; Introduction; Who Should Read This Book; What You Will Learn; Prerequisites; What You Need; What Is |
|
|
|
|
|
|
|
|
|
|
|
Covered in This Book; Chapter 1: Understanding Core Security Principles; Understanding Risk; Exploring the Security Triad; Protecting Against Loss of Confidentiality; Protecting Against Loss of Availability; Protecting Against Loss of Integrity; Implementing a Defense-in-Depth Security Strategy; Enforcing the Principle of Least Privilege; Hardening a Server; Reducing the Attack Surface; Keeping a System Updated; Enabling the Firewall |
Installing Antivirus Software Chapter 2: Understanding Malware and Social Engineering; Comparing Malware; Viruses; Worms; Trojan Horses; Buffer-Overflow Attacks; Spyware; Understanding the Threat; Protecting Against Malware; Using Antivirus Software; Using Microsoft Security Essentials on Desktops; Thwarting Social-Engineering Attacks; Social Engineering in Person; Social Engineering with a Phone Call; Recognizing Phishing Attempts; Recognizing Pharming; Protecting Email; Chapter 3: Understanding User Authentication; Comparing the Three Factors of Authentication |
Using Passwords for Authentication Comparing Password Attack Methods; Creating Strong Passwords; Enforcing Strong Passwords; Exploring Account Lockout Policies; Unlocking an Account; Resetting a Password; Changing a Password; Creating a Password-Reset Disk; Using Smart Cards and Token Devices for Authentication; Using Biometrics for Authentication; Starting Applications with Run As Administrator; Preventing Time Skew with Kerberos; Identifying RADIUS Capabilities; Identifying Unsecure Authentication Protocols; LM; NTLM (NTLMv1); Chapter 4: Securing Access with Permissions |
Comparing NTFS Permissions Identifying Basic NTFS Permissions; Identifying Advanced NTFS Permissions; Combining Permissions; Enabling and Disabling Permission Inheritance; Moving and Copying Files; Comparing NTFS and FAT; Exploring Share Permissions; Identifying Share Permissions; Combining NTFS and Share Permissions; Identifying Active Directory Permissions; Viewing Active Directory Users and Computers; Comparing NTFS and Active Directory Permissions; Viewing Active Directory Permissions; Assigning Registry Permissions; Chapter 5: Using Audit Policies and Network Auditing |
Exploring Audit Policies Exploring Object Access Auditing; Comparing Account Logon and Logon Events; Exploring Directory Service Access Auditing; Understanding Account Management Auditing; Understanding System Events Auditing; Understanding Privilege Use Auditing; Understanding Policy Change Auditing; Understanding Process Tracking; Enabling Auditing; Enabling Object Access Auditing; Enabling Directory Service Access Auditing; Viewing Audit Information; Managing Security Logs; Saving Audit Information; Securing Audit Information; Auditing a Network with MBSA; Installing MBSA; Running MBSA |
Chapter 6: Protecting Clients and Servers |
|
|
|
|
|
|
Sommario/riassunto |
|
Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be |
|
|
|
|
|
|
|
| |