01108nam--2200349---450-99000331925020331620090925095411.0000331925USA01000331925(ALEPH)000331925USA0100033192520090925d1984----km-y0itay50------baitaITa---||||001yyCinquant'anni di fisica delle interazioni debolia cura di A, Bertin, R. A. Ricci, A. VitaleBolognaSocietà italiana di fisica1984XL, 797 p.ill.24 cmAltro front. in inglese: in testa al front. saocietà italiana di fisica, Bologna, 26 aprile 1984InterazioniFisica539.754BERTIN,A.RICCI,R. A.VITALE,A.ITsalbcISBD990003319250203316539.754 CIN23859/CBS539.75400328316BKSCIRSIAV79020090925USA010954Cinquant'anni di fisica delle interazioni deboli1121050UNISA03169oam 2200637I 450 991079238190332120230721015725.01-135-45004-81-135-45005-61-282-59538-597866125953870-203-87578-810.4324/9780203875780 (CKB)2670000000008848(EBL)446886(OCoLC)609634857(SSID)ssj0000362852(PQKBManifestationID)11925512(PQKBTitleCode)TC0000362852(PQKBWorkID)10381229(PQKB)11235376(MiAaPQ)EBC446886(Au-PeEL)EBL446886(CaPaEBR)ebr10371567(CaONFJC)MIL259538(EXLCZ)99267000000000884820180706d2009 uy 0engur|n|---|||||txtccrManaging self harm psychological perspectives /edited by Anna MotzLondon ;New York :Routledge,2009.1 online resource (247 p.)Includes index.1-58391-705-5 1-58391-704-7 Includes bibliographical references (pages [219]-220) and index.Book Cover; Title; Copyright; Contents; Contributors; Acknowledgements; Introduction; Part 1 Understanding self-harm; Chapter 1 Self-harm as a sign of hope; Chapter 2 The paradox of self-harm; Part 2 The wider context: Systemic issues and self-harm; Chapter 3 `Why do you treat me this way?': Reciprocal violence and the mythology of `deliberate self-harm'; Chapter 4 The trap: Self-harm and young people in foster care and residential settings; Chapter 5 Self-harm and attachment; Part 3 Women and self-harm; Chapter 6 Speaking with the bodyChapter 7 Absences, transitions and endings: Threats to successful treatmentChapter 8 Self-harm in women's secure services: Reflections and strategies for treatment design; Chapter 9 Self-harm cessation in secure settings; Conclusion: `If you prick us do we not bleed?'; Further reading; IndexSelf-harm often arises at moments of despair or emotional intensity, and its reasons are not necessarily available to the conscious mind. Managing Self-Harm explores the meaning and impact of self-harm, and the sense in which it is a language of the body. It is designed to help clinicians, people who self-harm and their families and carers to understand its causes, meaning and treatment.Each chapter integrates theory with clinical illustration, enabling the direct experiences of those who self-harm to be heard and reflecting the populations that are most likely to self-harSelf-mutilationSelf-destructive behaviorSelf-mutilation.Self-destructive behavior.616.85/82616.8582Motz Anna1964-1547634MiAaPQMiAaPQMiAaPQBOOK9910792381903321Managing self harm3804109UNINA03484nam 22006255 450 991025484760332120251107172351.0981-10-6430-X10.1007/978-981-10-6430-2(CKB)4100000000882180(DE-He213)978-981-10-6430-2(MiAaPQ)EBC5576492(PPN)220125716(EXLCZ)99410000000088218020171002d2017 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierComputational Intelligence, Communications, and Business Analytics First International Conference, CICBA 2017, Kolkata, India, March 24 – 25, 2017, Revised Selected Papers, Part II /edited by J. K. Mandal, Paramartha Dutta, Somnath Mukhopadhyay1st ed. 2017.Singapore :Springer Nature Singapore :Imprint: Springer,2017.1 online resource (XXXI, 631 p. 307 illus.) Communications in Computer and Information Science,1865-0937 ;776Includes index.981-10-6429-6 Data science and advanced data analytics -- Signal processing and communications -- Microelectronics, sensors, intelligent networks -- Computational forensics (privacy and security) -- Computational intelligence in bio-computing -- Computational intelligence in mobile and quantum computing -- Intelligent data mining and data warehousing -- Computational intelligence.The two volume set CCIS 775 and 776 constitutes the refereed proceedings of the First International Conference on Computational Intelligence, Communications, and Business Analytics, CICBA 2017, held in Kolkata, India, in March 2017. The 90 revised full papers presented in the two volumes were carefully reviewed and selected from 276 submissions. The papers are organized in topical sections on data science and advanced data analytics; signal processing and communications; microelectronics, sensors, intelligent networks; computational forensics (privacy and security); computational intelligence in bio-computing; computational intelligence in mobile and quantum computing; intelligent data mining and data warehousing; computational intelligence. .Communications in Computer and Information Science,1865-0937 ;776Data structures (Computer science)Information theoryData protectionComputer networksData Structures and Information TheoryData and Information SecurityComputer Communication NetworksData structures (Computer science).Information theory.Data protection.Computer networks.Data Structures and Information Theory.Data and Information Security.Computer Communication Networks.004Mandal J. Kedthttp://id.loc.gov/vocabulary/relators/edtDutta Paramarthaedthttp://id.loc.gov/vocabulary/relators/edtMukhopadhyay Somnathedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910254847603321Computational Intelligence, Communications, and Business Analytics2495437UNINA