| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNIORUON00518602 |
|
|
Autore |
WALSER, Martin |
|
|
Titolo |
Halbzeit : Roman / Martin Walser |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Frankfurt am Main, : Suhrkamp, ©1960 |
|
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
2. |
Record Nr. |
UNINA9910978381703321 |
|
|
Autore |
Stalnaker-Shofner Devona M |
|
|
Titolo |
A Comprehensive Guide for Counselor Education : Training Doctoral Learners and New Educators for Counselor Education and Supervision / / edited by Devona M. Stalnaker-Shofner, Tanisha N. Sapp |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
|
|
Edizione |
[1st ed. 2024.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (582 pages) |
|
|
|
|
|
|
Collana |
|
Springer Texts in Education, , 2366-7680 |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Professional education |
Vocational education |
Counseling |
Education, Higher |
Teachers - Training of |
Professional and Vocational Education |
Higher Education |
Teaching and Teacher Education |
Formació professional |
Educació superior |
Formació del professorat |
Llibres electrònics |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
PartI: Teaching, Supervision, and Counseling Curriculum -- Diversity, Equity, Inclusion, Belonging, Accessibility, and Social Justice in Counselor Education -- Common Teaching Strategies -- Best Practices for Online Education -- Clinical Supervision within the Degree Program -- Course Development -- PartII: Working with Counselors in Training -- Strategies for Recruitment, Admission, and Retention -- Faculty Advisement -- Remediation and Gatekeeping -- PartIII: Navigating Higher Education -- Common Pitfalls for New Counselor Educators and How to Prevent Them -- Finding and Landing the Job -- The First Year -- The International Learner and Counselor Educator -- Counselors-in-Training and Counselor Educators with Disabilities -- The Promotion and Tenure Process -- PartIV: Counseling Specializations -- Understanding the CACREP Standards and Self-Study Process -- Addiction Counseling -- Career Counseling -- Clinical Mental Health Counseling -- Clinical Rehabilitation and Rehabilitation Counseling -- College Counseling and Student Affairs -- Marriage, Couple, and Family Counseling -- School Counseling -- PartV: Personal and Professional Development -- Leadership and Administrative Roles in Counselor Education -- Maintaining and Promoting Wellness for Faculty and Counselors-in-Training -- Imposter Phenomenon – Recognizing, Managing, and Preventing. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book prepares doctoral learners and new counselor educators to enter into the profession of counselor education and supervision. The work outlines the total experience of teaching in counselor education by providing a practical guide for navigating higher education using best practices grounded in research and based on the lived experiences of seasoned counselor educator contributors. Using case scenarios, points of reflection, as well as the professional and personal accounts of current educators, this book serves as a soup-to-nuts guide outlining current best practices in counselor education. Written from a social justice perspective with efforts to emphasize diversity, equity, inclusion, accessibility, and belonging, more than 70% of the textbook contributors identify as Black, Indigenous, or People of Color (BIPOC). Additionally, all contributors identify as female with varying sexual identities, physical body sizes, and abilities, thus disrupting the dominant narrative. The chapters range in scope and cover topics such as best practices and strategies for teaching praxis, curriculum development, and strategies to develop CACREP specialization programs based on the 2024 CACREP standards and extant research. The book also provides chapters addressing recommendations for navigating higher education such as finding and landing the job, the first year as a counselor educator, the promotion and tenure process, and concludes with a section on personal and professional development for new and experienced counselor educators. A bonus feature of this book is the inclusion of a technological component offering a companion website with a repository of activities, exercises, and resources. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNISA996668471303316 |
|
|
Autore |
Susilo Willy |
|
|
Titolo |
Information Security and Privacy : 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14–16, 2025, Proceedings, Part III / / edited by Willy Susilo, Josef Pieprzyk |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2025.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (764 pages) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Computer Science, , 1611-3349 ; ; 15660 |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data protection |
Computer security |
Cryptography |
Data encryption (Computer science) |
Data protection - Law and legislation |
Computer networks - Security measures |
Blockchains (Databases) |
Data and Information Security |
Principles and Models of Security |
Cryptology |
Privacy |
Mobile and Network Security |
Blockchain |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
-- Privacy Enhancing Technologies. -- Comparing and Improving Frequency Estimation Perturbation Mechanisms under Local Differential Privacy. -- Strong Federated Authentication With Password-based Credential Against Identity Server Corruption. -- Anonymous Credentials with Credential Redaction and Its Application to SSI-based Plug Charge for Shared Vehicles. -- Direction-Oriented Smooth Sensitivity and Its Application to Genomic Statistical Analysis. -- Sentence Embedding Generation Method for Differential Privacy Protection. .-KD-IBMRKE-PPFL: A Privacy-Preserving Federated Learning |
|
|
|
|
|
|
|
|
|
|
|
Framework Integrating Knowledge Distillation and Identity-Based Multi-Receiver Key Encapsulation. -- AI Security and Privacy. -- Identifying the Truth of Global Model: A Generic Solution to Defend Against Byzantine and Backdoor Attacks in Federated Learning. .-RAGLeak: Membership Inference Attacks on RAG-Based Large Language Models. -- DeGain: Detecting GAN-based Data Inversion in Collaborative Deep Learning. -- FRFL: Fair and Robust Federated Learning Incentive Model Based on Game Theory. -- DPFedSub: A Differentially Private Federated Learning with Randomized Subspace Descend. -- MG-Det: Deepfake Detection with Multi-Granularity. -- LPIA: Label Preference Inference Attack against Federated Graph Learning. -- DARA: Enhancing Vulnerability Alignment via Adaptive Reconstruction and Dual-Level Attention. -- Zeroth-Order Federated Private Tuning for Pretrained Large Language Models. -- Understanding the Robustness of Machine-Unlearning Models. -- System Security. -- Mitigating the Unprivileged User Namespaces based Privilege Escalation Attacks with Linux Capabilities. -- SoK: From Systematization to Best Practices in Fuzz Driver Generation. -- Facial Authentication Security Evaluation against Deepfake Attacks in Mobile Apps. -- Short Papers. -- EAPIR: Efficient and Authenticated Private Information Retrieval with Fast Server Processing. -- Ransomware Encryption Detection: Adaptive File System Analysis Against Evasive Encryption Tactics. -- Receiver-initiated Updatable Public Key Encryption: Construction, Security and Application. -- Robust and Privacy-Preserving Dynamic Average Consensus with Individual Weight. -- Improving RSA Cryptanalysis: Combining Continued Fractions and Coppersmith’s Techniques. -- Shortest Printable Shellcode Encoding Algorithm Based on Dynamic Bitwidth Selection. -- Position Paper. -- Bridging Clone Detection and Industrial Compliance: A Practical Pipeline for Enterprise Codebases. |
|
|
|
|
|
|
Sommario/riassunto |
|
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025. The 54 full papers, 6 short papers and 1 invited paper included in this book were carefully reviewed and selected from 181 submissions. They were organized in topical sections as follows: symmetric-key cryptography and cryptanalysis; public-key encryption; digital signatures and zero knowledge; cryptographic protocols and blockchain; post-quantum cryptography; homomorphic encryption and applications; cryptographic foundations and number theory; privacy enhancing technologies; AI security and privacy; system security. |
|
|
|
|
|
|
|
| |