1.

Record Nr.

UNINA9910130469803321

Autore

Caneva Caterina

Titolo

Museo Masaccio d'arte sacra a Cascia di Reggello [[electronic resource] ] : guida alla visita del museo e alla scoperta del territorio / / a cura di Caterina Caneva

Pubbl/distr/stampa

Firenze, : Polistampa, 2007

ISBN

88-596-0200-9

Descrizione fisica

267 p. : col. ill

Collana

Piccoli, grandi musei / Ente Cassa di risparmio di Firenze ; ; 10

Altri autori (Persone)

CanevaCaterina

Disciplina

708

Soggetti

Art - Italy - Reggello

Christian art and symbolism - Italy - Reggello

Lingua di pubblicazione

Italiano

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Museum guide.

Text in English and Italian.

Cascia di Reggello, near Florence (Tuscany).

Nota di bibliografia

Includes bibliographical references.



2.

Record Nr.

UNINA9910815351103321

Titolo

Chinese cybersecurity and defense / / edited by Daniel Ventre

Pubbl/distr/stampa

London, [England] ; ; Hoboken, New Jersey : , : ISTE : , : Wiley, , 2014

©2014

ISBN

1-119-00900-6

1-119-00901-4

Descrizione fisica

1 online resource (321 p.)

Collana

ISTE

Disciplina

005.8

Soggetti

Computer security

Internet - Security measures

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Includes index.

Nota di contenuto

Cover; Title Page; Copyright; Contents; Author Biographies; Introduction; Chapter 1: China's Internet Development and Cyber security - Policies and Practices; 1.1. Introduction; 1.2. Internet development in China: an overview; 1.3. China's policies towards Internet development; 1.3.1. From the very beginning of its development,China's Internet has been closely linked to the Chinese economy, and was programmed and integrated into its macro economic development blueprints

1.3.2. In addition to lending full policy support to Internet development, China also invests heavily in building Internet infrastructures 1.3.3. The Chinese government actively promotes the R&D of next-generation Internet (NGI); 1.3.4. China practices a policy of managing cyber affairs in line with law, adhering to the principles of scientific and effective administration in its Internet governance; 1.4. Cyber legislation and Internet administration; 1.4.1. Basic principles and practices of Internet administration in China; 1.4.1.1. Laws and regulations on Internet administration

1.4.1.2. The leading role of the Chinese government in Internet administration 1.4.1.3. Industry self-regulation; 1.4.1.4. Public supervision through special websites; 1.4.2. Guaranteeing the free and secure flow of information in cyberspace; 1.4.2.1. Guaranteeing



Citizens' Freedom of Speech on the Internet; 1.4.2.1.1. Constitutional guarantee; 1.4.2.1.2. Public supervision via the Internet; 1.4.2.1.3. CCDI website for public supervision; 1.4.2.1.4. Protecting citizens' online privacy; 1.4.2.1.5. Guaranteeing online safety for minors; 1.4.2.2. Protecting Internet Security

1.5. Cyber security and diplomacy: an international perspective 1.5.1. Cyber policy dialogue and consultation; 1.5.2. Regional cyber cooperation; 1.5.3. Track II cyber diplomacy; 1.5.4. Legal cooperation in combating cyber crimes; 1.5.5. Technical cooperation; 1.5.5.1. CNCERT; 1.5.5.2. CNNIC; 1.5.5.3. ISC; 1.5.6. Office for Cyber Affairs of the MFA; 1.6. A cyber security strategy in the making?; 1.6.1. Significance of the Internet for China; 1.6.2. Goals and objectives; 1.6.3. Cyber threat landscape; 1.6.4. Means for strategic goals; 1.7. Conclusion

Chapter 2: PLA Views on Informationized Warfare, Information Warfare and Information Operations 2.1. The evolution of Chinese military thinking; 2.2. The growing importance of information; 2.3. Information operations; 2.3.1. Command and control missions; 2.3.2. Offensive information missions; 2.3.2.1. Information coercion/information deterrence; 2.3.2.2. Information blockade; 2.3.2.3. Information misdirection; 2.3.2.4. Information contamination; 2.3.2.5. Information paralysis; 2.3.3. Defensive information missions; 2.3.4. Information support and safeguarding missions

2.4. Key types of information operations

Sommario/riassunto

Cyber defense has become, over the past five years, a major issue on the international scene. China, by the place it occupies, is the subject of attention: it is observed, criticized, and designated by many states as a major player in the global cyber-insecurity. The United States is building their cyber defense strategy against what they call the ""Chinese threat."" It is therefore important to better understand today''s challenges related to cyber dimension in regard of the rise of China.Contributions from international researchers provide cross perspectives on China, its strategies and policy



3.

Record Nr.

UNINA9910974322803321

Autore

Howes Andy

Titolo

Improving the context for inclusion : personalising teacher development through collaborative action research / / Andy Howes, Sam Fox and Sue Davies

Pubbl/distr/stampa

New York, : Routledge, 2009

ISBN

1-134-02755-9

1-282-32481-0

9786612324819

0-203-87513-3

Edizione

[1st ed.]

Descrizione fisica

1 online resource (209 p.)

Collana

Improving Learning

Altri autori (Persone)

FoxSam

DaviesSue

Disciplina

371.9/0460941

Soggetti

Inclusive education - Great Britain

School improvement programs - Great Britain

Action research in education - Great Britain

Teachers - In-service training - Great Britain

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Book Cover; Title; Copyright; Contents; Series editor's preface; Acknowledgements; Part I What are the issues?; Chapter 1 Inclusion is a challenge; Part II What does the research tell us?; Chapter 2 Teachers are the solution; Chapter 3 Action research for inclusion; Chapter 4 What helped teachers; Chapter 5 The impact for young people; Chapter 6 What makes effective facilitation?; Part III What are the implications?; Chapter 7 Improving the context for inclusion; Appendix: How was the research carried out?; References; Index

Sommario/riassunto

This timely book addresses the need for increasing multi-agency capacity in schools, as the success of initiatives such as 'Every Child Matters' or 'personalised learning' depends on teachers understanding the challenges faced by young people in learning effectively and happily in their school. The authors of this thought-provoking book present and analyse case studies of collaborative action research, illustrating what is needed in practice for teachers to engage with



inclusion for the benefit of their pupils and themselves. The essential elements of success with inclusion are revea