| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910830985903321 |
|
|
Titolo |
Developmental psychopathology . Volume 2 Developmental neuroscience [[electronic resource] /] / editors, Dante Cicchetti and Donald J. Cohen |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Hoboken, N.J., : John Wiley & Sons, c2006 |
|
|
|
|
|
|
|
ISBN |
|
0-470-93939-7 |
1-280-41136-8 |
9786610411368 |
0-470-04819-0 |
|
|
|
|
|
|
|
|
Edizione |
[2nd ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (896 p.) |
|
|
|
|
|
|
Altri autori (Persone) |
|
CicchettiDante |
CohenDonald J |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Mental illness - Etiology |
Developmental psychology |
Mental illness - Risk factors |
Adjustment (Psychology) |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and indexes. |
|
|
|
|
|
|
Nota di contenuto |
|
DEVELOPMENTAL PSYCHOPATHOLOGY, Second Edition, Volume Two: Developmental Neuroscience; Contents; Preface to Developmental Psychopathology, Second Edition; Chapter 1: The Developing Brain and Neural Plasticity: Implications for Normality, Psychopathology, and Resilience; GOALS OF THIS CHAPTER; PRINCIPLES OF DEVELOPMENTAL NEUROSCIENCE AND DEVELOPMENTAL PSYCHOPATHOLOGY; THE BRAIN AS A DYNAMIC, SELF-ORGANIZING DEVELOPMENTAL SYSTEM; SELF-ORGANIZATION; THE DEVELOPING BRAIN; EXPERIENCE AND BRAIN DEVELOPMENT |
CONTRIBUTION OF BRAIN DEVELOPMENT IN ATYPICAL POPULATIONS TO FURTHERING INSIGHTS INTO TYPICAL NEUROLOGICAL PROCESSESRESILIENCE; EXPERIENCE AND THE BRAIN: A BRIEF HISTORY; NEURAL PLASTICITY; CONCLUSION AND FUTURE DIRECTIONS; ACKNOWLEDGMENTS; REFERENCES; Chapter 2: Collaborative |
|
|
|
|
|
|
|
|
|
|
|
Regulations of Vitality in Early Childhood: Stress in Intimate Relationships and Postnatal Psychopathology; EPIGENISIS OF BODY AND BRAIN FOR HEALTH IN SOCIABILITY AND LEARNING; THE IMPORTANCE OF THE CHILD'S VOLITION IN HUMAN COMPANY; REGULATION: BALANCING THE ENERGY BUDGET OF THE BODY IN ACTION |
STRESS: NATURE, PSYCHOLOGICAL FUNCTIONS, AND STRESS DISORDERSDEVELOPMENT: MUTUAL REGULATIONS IN MORPHOGENESIS OF A HUMAN MIND; EARLY STRESS AND PSYCHOLOGICAL DEVELOPMENT: PROCESSES THAT CAUSE OR RESIST PATHOLOGY; FUTURE DIRECTIONS FOR INFANT MENTAL HEALTH: FOSTERING MOTIVES FOR CONFIDENT REGULATION OF EXPERIENCE IN AFFECTIONATE COMPANIONSHIP; ACKNOWLEDGMENTS; REFERENCES; Chapter 3: Anatomic Brain Imaging Studies of Normal and Abnormal Brain Development in Children and Adolescents; METHODOLOGY; TYPICAL DEVELOPMENT; STUDIES OF ATYPICAL DEVELOPMENT; SUMMARY AND FUTURE DIRECTIONS; REFERENCES |
Chapter 4: Typical and Atypical Human Functional Brain DevelopmentTHREE PERSPECTIVES ON THE FUNCTIONAL DEVELOPMENT OF THE HUMAN BRAIN; ASSUMPTIONS UNDERLYING THE THREE APPROACHES; PREDICTIONS OF THE THREE APPROACHES; BRAIN IMAGING OF TYPICAL DEVELOPMENT; BRAIN IMAGING OF ATYPICAL DEVELOPMENT; EFFECTS OF EARLY ACQUIRED BRAIN DAMAGE; EFFECTS OF ATYPICAL EARLY EXPERIENCE; CONCLUSIONS; FUTURE DIRECTIONS; ACKNOWLEDGMENTS; REFERENCES; Chapter 5: The Development of the Prefrontal Cortex: The Maturation of Neurotransmitter Systems and Their Interactions |
CONSTITUTION AND THE ENVIRONMENT AS DETERMINANTS OF PERSONALITY AND VULNERABILITYTHE CORTICOLIMBIC SYSTEM; DEVELOPMENT OF THE CORTICOLIMBIC SYSTEM; THE ROLE OF THE AMYGDALA IN THE PATHOPHYSIOLOGY OFMENTAL DISORDERS; FUTURE DIRECTIONS; CONCLUSIONS; REFERENCES; Chapter 6: Early Nutritional Deficiencies in Brain Development: Implications for Psychopathology; BASIC PRINCIPLES; OVERVIEW; STUDIES ON PSYCHOPATHOLOGY; PRIMER; PRIMER; FUTURE DIRECTIONS; REFERENCES; Chapter 7: Cognitive Neuroscience and the Prefrontal Cortex: Normative Development and Vulnerability to Psychopathology |
THE PREFRONTAL CORTEX DEFINED |
|
|
|
|
|
|
Sommario/riassunto |
|
This volume applies multiple levels of analysis to neurobiological developmental organization, and functioning in normality and psychopathology. It also covers topics central to a developmental perspective on neuroscience. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910974682203321 |
|
|
Autore |
Glaessner Thomas C |
|
|
Titolo |
Electronic safety and soundness : securing finance in a new age / / Thomas Glaessner, Tom Kellermann, and Valerie McNevin |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Washington, DC, : World Bank, 2004 |
|
|
|
|
|
|
|
ISBN |
|
1-280-08433-2 |
9786610084333 |
1-4175-0059-X |
|
|
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
ix, 174 pages : illustrations ; ; 26 cm |
|
|
|
|
|
|
Collana |
|
World Bank working paper ; ; no. 26 |
|
|
|
|
|
|
Altri autori (Persone) |
|
KellermannTom |
McNevinValerie |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Electronic funds transfers - Security measures |
Electronic security systems |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
Nota di contenuto |
|
Intro -- TABLE OF CONTENTS -- Foreword -- Abstract -- Preface -- Executive Summary -- 1. Introduction to E-Security -- 2. Policy Framework -- 3. Legal and Regulatory Framework (Pillar 1) -- 4. External Monitoring of E-Security Practices (Pillar 2) -- 5. Certifications, Policies, Standards, and Procedures (Pillar 3) -- 6. Twelve Layers of Security (Pillar 4) -- Annexes: -- Annex A: Selected Public E-Security Incidents -- Annex B: Types of E-Fraud -- Annex C: Worldwide E-Security Industry -- Annex D: Risk Management: A Blueprint for Layered Security -- Annex E: Identity Management: Authentication and Non-Repudiation -- Annex F: Wireless Vulnerabilities -- Glossary -- References -- LIST OF BOXES: -- Box 1.1: Money Laundering -- Box 1.2: Selected Country Case Studies -- Box 2.1: G8 Principles for Protecting Critical Information Infrastructures 2003 -- Box 2.2: The Electronic Security Industry: Imperfect Competition -- Box 3.1: Money Transmitters and Internet Service Providers -- Box 4.1: Principles for Managing Risk in Online Banking -- Box 4.2: ISO/IEC 13335 Information Technology-Security Techniques-Guidelines for the Management of IT Security GMITS -- Box 6.1: Instant Messaging -- Box 6.2: Blended Threats -- Box 6.3: Survivable System Development -- |
|
|
|
|
|
|
|
|
|
|
|
Box B.1: Voice-over-IP (VOIP) -- Box B.2: Case Study: Bugbear.B -- Box B.3: Identity Theft: Abraham Abdallah -- Box C.1: Evolution of Technology and International Standards -- Box D.1: BITs Master Security Criteria -- Box D.2: The Future of Access Controls -- Box D.3: Next Generation Instruction Detection System -- Box D.4: SQL Vulnerability -- LIST OF FIGURES: -- Figure 1.1: E-Finance Penetration: 2000 and Projected Rates for 2005 and 2010 -- Figure 1.2: Number of Incidents Reported by CERT, Worldwide -- Figure 6.1: Five Layers of Data Flow -- Figure B.1: Computer Incidents 1990-2002. |
Figure C.1: E-Security Industry and E-Finance -- Figure E.1: Biometric Iris Scan -- Figure E.2: Biometric Fingerprint Scan -- Figure E.3: Access Control Terminal -- Figure E.4: Biometric Facial Scan -- Figure E.5: Keystroking -- Figure E.6: Global Positioning Biometrics -- Figure E.7: Generation of Digital Signatures -- Figure E.8: Authentication Using Digital Certificates and Certificate Authorities -- Figure F.1: A GSM Hack -- Figure F.2: Diagram of a Virtual Private Network -- LIST OF TABLES: -- Table 1.1: Global Connectivity Trends -- Table B.1: Potential Losses from a Denial of Service Attack -- Table F.1: The Wide Range of Mobile Services. |
|
|
|
|
|
|
Sommario/riassunto |
|
Electronic Safety and Soundness and its technical annexes identifies and discusses four key pillars that are necessary to foster a secure electronic environment and the safety and soundness of financial systems worldwide. These pillars are (i) a legal, regulatory, and enforcement framework; (ii) external and internal monitoring of e-security practices; (iii) public-private sector cooperation: and (iv) the business case for practicing layered e-security. This title is intended for policy makers in the area of electronic security and those working with financial services providers. |
|
|
|
|
|
|
|
| |