| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910782904603321 |
|
|
Autore |
Ashurst Pamela <1940-, > |
|
|
Titolo |
Understanding women in distress / / Pamela Ashurst and Zaida Hall with contributions from George Christie. [and others] ; [foreword by J.L.T. Birley] |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
London ; ; New York : , : Tavistock/Routledge, , 1989 |
|
|
|
|
|
|
|
ISBN |
|
1-134-97835-9 |
1-134-97836-7 |
1-280-56722-8 |
9786610567225 |
0-203-13145-2 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (249 p.) |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Women - Mental health |
Women - Psychology |
Motherhood - Psychological aspects |
Depression, Mental |
Stress (Psychology) |
Life Change Events |
Mental Disorders |
Mothers - psychology |
Genital Diseases, Female |
Identification, Psychological |
Stress, Psychological |
Women - psychology |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di contenuto |
|
Book Cover; Title; Copyright; Contents; Authors and contributors; Forword; Introduction; 1. Understanding distress; 2. Women's role and identity; 3. The development of feminine identity and sexuality; 4. On becoming a mother; 5. Bonding and rejection; 6. Hungry womanhood; |
|
|
|
|
|
|
|
|
|
|
|
|
|
7. Womanhood despoiled; 8. Lesbian womanhood; 9. Childless womanhood; 10. Barren womanhood; 11. Motherhood thwarted; 12. Motherhood bereft; 13. Motherhood disappointed; 14. Motherhood depressed; 15. Perverse womanhood; 16. Bereft womanhood; 17. Pairing and parting; 18. Single motherhood; 19. Stepmotherhood |
20. Femininity assaultedCoda; Bibliography; Index |
|
|
|
|
|
|
Sommario/riassunto |
|
Women are usually more in touch with their emotions than men and more readily seek help from professional sources when they encounter stress. The response they meet from doctors and other helping professionals at this point can be vital in determining the best outcome for them. Ashurst and Hall have written this book as a contribution towards a better understanding of the psychological aspects of women's health problems. |
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910842491103321 |
|
|
Autore |
Roy Nihar Ranjan |
|
|
Titolo |
Cyber Security and Digital Forensics : Select Proceedings of the International Conference, ReDCySec 2023 / / edited by Nihar Ranjan Roy, Sudeep Tanwar, Usha Batra |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
|
|
Edizione |
[1st ed. 2024.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (654 pages) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Networks and Systems, , 2367-3389 ; ; 896 |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data protection |
Telecommunication |
Forensic sciences |
Data and Information Security |
Communications Engineering, Networks |
Forensic Science |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
|
|
|
|
|
Nota di contenuto |
|
A Modest Approach Toward Cloud Security Hygiene -- A Survey on Path Key Establishment -- Credit Card Fraud Detection using ML Techniques -- Vulnerabilities in Smart contracts of Decentralized Blockchain -- Object Detection using TensorFlow 2 and Amazon Sage Maker -- Multi-Key Fully Homomorphic Encryption Scheme Over Integers -- Hybrid Lightweight Cryptography using AES and ECC for IoT Security -- A Survey: Analysis of Existing Hybrid Cryptographic Techniques -- Cloud based Integrated Real-Time Twitter Grievance Redressal With AWS EC2 and RDS using Machine Learning Approach for Enhanced Security -- Blockchain Based Public Distribution System -- Security Flaw in TCP/IP and Proposed Measures -- Identity Based Designated Verifier Proxy Signature scheme and its Application to Health Care -- Detection of Phishing Link using different Machine Learning Techniques -- Categorizing Tracing Techniques for Network Forensics -- Cloud-Based Object Detection Model using Amazon Rekognition -- Orphanage Channelization System Using Blockchain Technology -- A Review on Quantum key Distribution Protocols, Challenges and Its Applications -- Static Analysis Approach of Malware using Machine Learning -- Chatbot based android application towards security using FCM -- Ensemble Deep Model for Hate Speech Detection -- Accuracy Enhancement For Intrusion Detection Systems Using LSTM Approach -- Cyber Attack Detection Using Machine Learning Technique -- An Investigative study on Security Aspects and Authentication Schemes for Internet of Vehicles. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
The book contains peer-reviewed papers from the International Conference on Recent Developments in Cyber Security organized by the Center for Cyber Security and Cryptology at Sharda University in June 2023. This volume focuses on privacy and secrecy of information, cryptography, applications and analysis, cyber threat intelligence and mitigation, cyber-physical systems, cyber threat intelligence, quantum cryptography and blockchain technologies and their application, etc. This book is a unique collection of chapters from different areas with a common theme and will be immensely useful to academic researchers and practitioners in the industry. |
|
|
|
|
|
|
|
| |