| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910130469803321 |
|
|
Autore |
Caneva Caterina |
|
|
Titolo |
Museo Masaccio d'arte sacra a Cascia di Reggello [[electronic resource] ] : guida alla visita del museo e alla scoperta del territorio / / a cura di Caterina Caneva |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Firenze, : Polistampa, 2007 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Collana |
|
Piccoli, grandi musei / Ente Cassa di risparmio di Firenze ; ; 10 |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Art - Italy - Reggello |
Christian art and symbolism - Italy - Reggello |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Museum guide. |
Text in English and Italian. |
Cascia di Reggello, near Florence (Tuscany). |
|
|
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910815351103321 |
|
|
Titolo |
Chinese cybersecurity and defense / / edited by Daniel Ventre |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
London, [England] ; ; Hoboken, New Jersey : , : ISTE : , : Wiley, , 2014 |
|
©2014 |
|
|
|
|
|
|
|
|
|
ISBN |
|
1-119-00900-6 |
1-119-00901-4 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (321 p.) |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer security |
Internet - Security measures |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
Cover; Title Page; Copyright; Contents; Author Biographies; Introduction; Chapter 1: China's Internet Development and Cyber security - Policies and Practices; 1.1. Introduction; 1.2. Internet development in China: an overview; 1.3. China's policies towards Internet development; 1.3.1. From the very beginning of its development,China's Internet has been closely linked to the Chinese economy, and was programmed and integrated into its macro economic development blueprints |
1.3.2. In addition to lending full policy support to Internet development, China also invests heavily in building Internet infrastructures 1.3.3. The Chinese government actively promotes the R&D of next-generation Internet (NGI); 1.3.4. China practices a policy of managing cyber affairs in line with law, adhering to the principles of scientific and effective administration in its Internet governance; 1.4. Cyber legislation and Internet administration; 1.4.1. Basic principles and practices of Internet administration in China; 1.4.1.1. Laws and regulations on Internet administration |
1.4.1.2. The leading role of the Chinese government in Internet administration 1.4.1.3. Industry self-regulation; 1.4.1.4. Public supervision through special websites; 1.4.2. Guaranteeing the free and secure flow of information in cyberspace; 1.4.2.1. Guaranteeing |
|
|
|
|
|
|
|
|
|
|
|
Citizens' Freedom of Speech on the Internet; 1.4.2.1.1. Constitutional guarantee; 1.4.2.1.2. Public supervision via the Internet; 1.4.2.1.3. CCDI website for public supervision; 1.4.2.1.4. Protecting citizens' online privacy; 1.4.2.1.5. Guaranteeing online safety for minors; 1.4.2.2. Protecting Internet Security |
1.5. Cyber security and diplomacy: an international perspective 1.5.1. Cyber policy dialogue and consultation; 1.5.2. Regional cyber cooperation; 1.5.3. Track II cyber diplomacy; 1.5.4. Legal cooperation in combating cyber crimes; 1.5.5. Technical cooperation; 1.5.5.1. CNCERT; 1.5.5.2. CNNIC; 1.5.5.3. ISC; 1.5.6. Office for Cyber Affairs of the MFA; 1.6. A cyber security strategy in the making?; 1.6.1. Significance of the Internet for China; 1.6.2. Goals and objectives; 1.6.3. Cyber threat landscape; 1.6.4. Means for strategic goals; 1.7. Conclusion |
Chapter 2: PLA Views on Informationized Warfare, Information Warfare and Information Operations 2.1. The evolution of Chinese military thinking; 2.2. The growing importance of information; 2.3. Information operations; 2.3.1. Command and control missions; 2.3.2. Offensive information missions; 2.3.2.1. Information coercion/information deterrence; 2.3.2.2. Information blockade; 2.3.2.3. Information misdirection; 2.3.2.4. Information contamination; 2.3.2.5. Information paralysis; 2.3.3. Defensive information missions; 2.3.4. Information support and safeguarding missions |
2.4. Key types of information operations |
|
|
|
|
|
|
Sommario/riassunto |
|
Cyber defense has become, over the past five years, a major issue on the international scene. China, by the place it occupies, is the subject of attention: it is observed, criticized, and designated by many states as a major player in the global cyber-insecurity. The United States is building their cyber defense strategy against what they call the ""Chinese threat."" It is therefore important to better understand today''s challenges related to cyber dimension in regard of the rise of China.Contributions from international researchers provide cross perspectives on China, its strategies and policy |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910974322803321 |
|
|
Autore |
Howes Andy |
|
|
Titolo |
Improving the context for inclusion : personalising teacher development through collaborative action research / / Andy Howes, Sam Fox and Sue Davies |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
New York, : Routledge, 2009 |
|
|
|
|
|
|
|
ISBN |
|
1-134-02755-9 |
1-282-32481-0 |
9786612324819 |
0-203-87513-3 |
|
|
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (209 p.) |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Inclusive education - Great Britain |
School improvement programs - Great Britain |
Action research in education - Great Britain |
Teachers - In-service training - Great Britain |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Book Cover; Title; Copyright; Contents; Series editor's preface; Acknowledgements; Part I What are the issues?; Chapter 1 Inclusion is a challenge; Part II What does the research tell us?; Chapter 2 Teachers are the solution; Chapter 3 Action research for inclusion; Chapter 4 What helped teachers; Chapter 5 The impact for young people; Chapter 6 What makes effective facilitation?; Part III What are the implications?; Chapter 7 Improving the context for inclusion; Appendix: How was the research carried out?; References; Index |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This timely book addresses the need for increasing multi-agency capacity in schools, as the success of initiatives such as 'Every Child Matters' or 'personalised learning' depends on teachers understanding the challenges faced by young people in learning effectively and happily in their school. The authors of this thought-provoking book present and analyse case studies of collaborative action research, illustrating what is needed in practice for teachers to engage with |
|
|
|
|
|
|
|
|
|
|
inclusion for the benefit of their pupils and themselves. The essential elements of success with inclusion are revea |
|
|
|
|
|
| |