| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910647225403321 |
|
|
Titolo |
Collaborative Community Approaches to Addressing Serious Violence / / Jaimee Mallion, Erika Gebo, editors |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
[Place of publication not identified] : , : MDPI - Multidisciplinary Digital Publishing Institute, , 2023 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (108 pages) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
About the Editors vii -- Preface to "Collaborative Community Approaches to Addressing Serious Violence" ix -- Good Lives Model: Importance of Interagency Collaboration in Preventing Violent Recidivism 1 -- Where You From? Examining the Relationship between Gang Migrants and Gang-Related Homicide 15 -- Finding a Suitable Object for Intervention: On Community-Based Violence Prevention in Sweden 29 -- The Feasibility and Acceptability of an Experience-Based Co-Design Approach to Reducing Domestic Abuse 43 -- Collaborative Approaches to Addressing Domestic and Sexual Violence among Black and Minority Ethnic Communities in Southampton: A Case Study of Yellow Door 59 -- Reflections on Increasing the Value of Data on Sexual Violence Incidents against Children to -- Better Prevent and Respond to Sexual Offending in Kenya 73 -- The Kenyan Survivors of Sexual Violence Network: Preserving Memory Evidence with a Bespoke Mobile Application to Increase Access to Vital Services and Justice 83. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
The World Health Organization (2002) classified violence as a leading international public health problem that requires immediate intervention. Violence is a pervasive social problem whose causes and consequences are inextricably linked to individuals, families, institutions, communities, and societies. The negative consequences of violence, and serious violence in particular, reverberate beyond the immediate moment and location of it. By bringing together partners with varied skills, whole-system multiagency approaches are advocated |
|
|
|
|
|
|
|
|
|
|
|
|
|
as the leading means of targeting serious violence. With this context in mind, this Special Issue examines a variety of collaborative, community-based approaches to preventing and reducing serious violence across the global landscape. The contributions from practitioners and researchers focus on the prevention and reduction of serious interpersonal violence in communities. The typologies of serious violence discussed by the collaborators include gang membership, domestic violence, and sexual violence. The contributions address the collaborative nature of serious violence prevention work, recognizing that violence is multicausal and that solutions are needed across various socioecological domains. The contributions describe community-level collaborative approaches to preventing and reducing serious violence. The successes and lessons learned from the approaches are identified, and the applicability of the approaches to other areas are explored. |
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910798523503321 |
|
|
Autore |
Kotipalli Srinivasa Rao |
|
|
Titolo |
Hacking Android : explore every nook and cranny of the Android OS to modify your device and guard it against security threats / / Srinivasa Rao Kotipalli, Mohammed A. Imran |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Birmingham : , : Packt Publishing, , 2016 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st edition] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (376 pages) : color illustrations |
|
|
|
|
|
|
Collana |
|
Community experience distilled |
|
|
|
|
|
|
Soggetti |
|
Operating systems (Computers) - Security measures |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Sommario/riassunto |
|
Explore every nook and cranny of the Android OS to modify your device and guard it against security threats About This Book Understand and counteract against offensive security threats to your applications Maximize your device's power and potential to suit your needs and curiosity See exactly how your smartphone's OS is put together (and |
|
|
|
|
|
|
|
|
|
|
where the seams are) Who This Book Is For This book is for anyone who wants to learn about Android security. Software developers, QA professionals, and beginner- to intermediate-level security professionals will find this book helpful. Basic knowledge of Android programming would be a plus. What You Will Learn Acquaint yourself with the fundamental building blocks of Android Apps in the right way Pentest Android apps and perform various attacks in the real world using real case studies Take a look at how your personal data can be stolen by malicious attackers Understand the offensive maneuvers that hackers use Discover how to defend against threats Get to know the basic concepts of Android rooting See how developers make mistakes that allow attackers to steal data from phones Grasp ways to secure your Android apps and devices Find out how remote attacks are possible on Android devices In Detail With the mass explosion of Android mobile phones in the world, mobile devices have become an integral part of our everyday lives. Security of Android devices is a broad subject that should be part of our everyday lives to defend against ever-growing smartphone attacks. Everyone, starting with end users all the way up to developers and security professionals should care about android security. Hacking Android is a step-by-step guide that will get you started with Android security. You'll begin your journey at the absolute basics, and then will slowly gear up to the concepts of Android rooting, application security assessments, malware, infecting APK files, and fuzzing. On this journey you'll get to grips with various tools and techniques that can be used in your everyday pentests. You'll gain the skills necessary to perform Android application vulnerability assessment and penetration testing and will create an Android pentesting lab. Style and approach This comprehensive guide takes a step-by-step approach and is explained in a conversational and easy-to-follow style. Each topic is explained sequentially in the process of performing a successful penetration test. We also include detailed explanations as well as screensho... |
|
|
|
|
|
| |