04155nam 22006374a 450 991078441080332120230617003023.01-280-25239-197866102523980-471-69443-6(CKB)1000000000355368(EBL)225836(OCoLC)57756591(SSID)ssj0000141281(PQKBManifestationID)11157766(PQKBTitleCode)TC0000141281(PQKBWorkID)10057280(PQKB)11349639(OCoLC)ocm55149438(MiAaPQ)EBC225836(Au-PeEL)EBL225836(CaPaEBR)ebr10114094(CaONFJC)MIL25239(EXLCZ)99100000000035536820040512d2005 uy 0engur|n|---|||||txtccrDrawing the line[electronic resource] art therapy with the difficult client /Lisa B. MoschiniHoboken, N.J. J. Wileyc20051 online resource (370 p.)Description based upon print version of record.0-471-68773-1 Includes bibliographical references (p. 327-333) and index.Drawing the Line: Art Therapy with the Difficult Client; Contents; Tables; Illustrations; Preface; Acknowledgments; Introduction: A Difficult Client Defined; In the Beginning; Interaction Is the Key; Developing the Language of Metaphor; Things to Come; Part I: DEFENSE MECHANISMS AND THE NORMS OF BEHAVIOR; Chapter 1: In My Defense; Intellectualization; Conversion; Condensation; Regression; Summary; Chapter 2: Adaptation and Integration; Jean Piaget; Freud; Erikson; There Was, There Was, and Yet There Was Not; Collecting; Summary; Part II: READING BETWEEN THE LINESChapter 3: Interpreting the ArtA Picture Is Worth a Thousand Words; Draw-a-Person (DAP) Examples; Draw-a-Person (DAP) Art Assessments; Case Illustrations; House-Tree-Person (HTP); House-Tree-Person (HTP) Examples; House-Tree-Person (HTP) Art Assessments; Case Illustrations; Eight-Card Redrawing Test (8CRT); Eight-Card Redrawing Test (8CRT) Art Assessments; Case Illustrations; Summary; Chapter 4: Directives; Directives as Interventions; Summary; Part III: THE PRACTICE OF ART THERAPY; Chapter 5: Individual Therapy; Case Study 5.1; Case Study 5.2; Case Study 5.3Chapter 6: Group Therapy IllustratedThe Here-and-Now Interaction; Empathy; Self-Disclosure; Chapter 7: Two's Company, Three's a Crowd?; Paired Communication Drawing; Family Mural Drawing; Case Study 7.1; Case Study 7.2; Appendix A: Structural Aspects Quantitative Analysis; Appendix B: Formal Aspects Qualitative Analysis of the Person; Appendix C: Formal Aspects Qualitative Analysis of the House; Appendix D: Formal Aspects Qualitative Analysis of the Tree; Appendix E: Eight-Card Redrawing Test Adapted Scoring Sheet; Appendix F: Sample Directives; Appendix G: Sample Group Processing DirectivesReferencesIndex; About the CD-ROMThis resourceful guide presents art therapy techniques for difficult clients where the typical therapist-client interaction can often be distant, demanding, and frustrating. Offering practical and theoretical information from a wide variety of treatment populations and diagnostic categories; and incorporating individual, group, and family therapy case studies, the text is filled with examples and over 150 illustrations taken from the author's sixteen years of experience working with hundreds of clients. The author is a licensed Marriage and Family Therapist with a Master's degree in Clinical AArt therapyDrawingTherapeutic usePsychotherapist and patientArt therapy.DrawingTherapeutic use.Psychotherapist and patient.615.9/5156Moschini Lisa B777628MiAaPQMiAaPQMiAaPQBOOK9910784410803321Drawing the line3762066UNINA02967nam 22006855 450 991048456370332120251226200544.03-319-08344-910.1007/978-3-319-08344-5(CKB)3710000000219379(SSID)ssj0001297118(PQKBManifestationID)11858100(PQKBTitleCode)TC0001297118(PQKBWorkID)11354703(PQKB)10648394(DE-He213)978-3-319-08344-5(MiAaPQ)EBC5579065(PPN)179925482(EXLCZ)99371000000021937920140704d2014 u| 0engurnn|008mamaatxtccrInformation Security and Privacy 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings /edited by Willy Susilo, Yi Mu1st ed. 2014.Cham :Springer International Publishing :Imprint: Springer,2014.1 online resource (XIV, 464 p. 61 illus.) Security and Cryptology,2946-1863 ;8544Bibliographic Level Mode of Issuance: Monograph3-319-08343-0 Includes bibliographic references and index.Cryptanalysis -- Cryptographic protocols -- Fine-grain cryptographic protocols -- Key exchange -- Fundamentals -- Lattices -- Homomorphic encryption -- Applications.This book constitutes the refereed conference proceedings of the 19th Australasian Conference on Information Security and Privacy, ACISP 2014, held in Wollongong, NSW, Australia, in July 2014. The 26 revised full papers and 6 short papers presented in this volume were carefully selected from 91 submissions. The papers are organized in topical sections on cryptanalysis; cryptographic protocols; fine-grain cryptographic protocols; key exchange, fundamentals, lattices and homomorphic encryption, and applications.Security and Cryptology,2946-1863 ;8544Data protectionCryptographyData encryption (Computer science)Electronic data processingManagementData and Information SecurityCryptologyIT OperationsData protection.Cryptography.Data encryption (Computer science).Electronic data processingManagement.Data and Information Security.Cryptology.IT Operations.005.82Susilo Willyedthttp://id.loc.gov/vocabulary/relators/edtMu Yiedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910484563703321Information Security and Privacy3395200UNINA