02979nam 2200625 a 450 991079137530332120200520144314.01-282-68944-497866126894440-470-88704-40-470-91109-3(CKB)2560000000011282(EBL)537355(OCoLC)638860411(SSID)ssj0000441208(PQKBManifestationID)12160848(PQKBTitleCode)TC0000441208(PQKBWorkID)10424836(PQKB)11089029(Au-PeEL)EBL537355(CaPaEBR)ebr10392927(CaONFJC)MIL268944(CaSebORM)9780470525951(MiAaPQ)EBC537355(EXLCZ)99256000000001128220100412d2010 uy 0engur|n|---|||||txtccrProfessional Cocoa application security[electronic resource] /Graham J. Lee1st editionIndianapolis, Ind. Wiley20101 online resource (339 p.)Wrox professional guides Professional Cocoa application securityIncludes index.0-470-52595-9 Includes bibliographical references and index.Professional Cocoa Application Security; About the Author; Contents; Introduction; Chapter 1: Secure by Design; Chapter 2: Managing Multiple Users; Chapter 3: Using the Filesystem Securely; Chapter 4: Handling Multiple Processes; Chapter 5: Storing Confidential Data in the Keychain; Chapter 6: Performing Privileged Tasks; Chapter 7: Auditing Important Operations; Chapter 8: Securing Network Connections; Chapter 9: Writing Secure Application Code; Chapter 10: Deploying Software Securely; Chapter 11: Kernel Extensions; Chapter 12: Conclusion and Further Reading; IndexThe first comprehensive security resource for Mac and iPhone developers The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide ofComputer securityCocoa (Application development environment)Computer security.Cocoa (Application development environment)005.268005.2768Lee Graham J1546528MiAaPQMiAaPQMiAaPQBOOK9910791375303321Professional Cocoa application security3802190UNINA01470nam0 22003133i 450 RMG011530320251003044338.0883483492520031210d2003 ||||0itac50 baitaitz01i xxxe z01nAmministrazione, controllo e bilancio nella riforma delle S.p.a.artt. 2380-2435 bis Cod. civ.a cura di Michele Sandulli e Vittorio SantoroTorinoG. Giappichelli[2003]P. XXV, 389-86624 cmEstr. da: La riforma delle società : Società per azioni.Societa per azioniItaliaLegislazioneFIRUFIC110135I346DIRITTO PRIVATO14Santoro, Vittorio <1950- >CFIV016138Sandulli, MicheleMILV088383ITIT-00000020031210IT-BN0095 NAP 01POZZO LIB.Vi sono collocati fondi di economia, periodici di ingegneria e scienze, periodici di economia e statistica e altri fondi comprendenti documenti di economia pervenuti in dono. RMG0115303Biblioteca Centralizzata di Ateneo1 v.1 v. 01POZZO LIB.ECON MON 871 0101 0000193355E VMA 1 v. (Precedente collocazione: DASES B 1365)B 2009091820090918 01Amministrazione, controllo e bilancio nella riforma delle S.p.a1065601UNISANNIO05483nam 2200601 a 450 991030554580332120200520144314.01-134-62961-31-134-62962-10-203-18980-91-280-32838-X0-203-13451-610.4324/9780203134511 (CKB)1000000000008061(SSID)ssj0000387532(PQKBManifestationID)12150889(PQKBTitleCode)TC0000387532(PQKBWorkID)10401873(PQKB)10901516(MiAaPQ)EBC166089(OCoLC)49569871(BIP)63759133(BIP)6749595(EXLCZ)99100000000000806120010312d2000 uy 0engurcnu||||||||txtccrTransfer of learning in professional and vocational education /edited by Viviene E. Cree and Cathlin MacaulayLondon Routledge20001 online resource (xvi, 207 pages)Bibliographic Level Mode of Issuance: Monograph0-415-20418-6 0-415-20419-4 Includes bibliographical references and index.chapter 1 Transfer of learning /CATHLIN MACAULAY -- chapter Schema theory and information processing -- chapter Implications for teaching and learning -- chapter 2 The challenge of assessment /VIVIENE E. CREE -- chapter The critical professional -- chapter Issues in assessment -- chapter The process of assessing transfer of learning: what to assess? -- chapter 3 Competence, risk assessment and transfer of learning /HAZEL KEMSHALL -- chapter 4 Personal construct theory and the transfer of learning: the history of a moment -- NICK GOULD /The history of a moment Nick Gould -- chapter Intensity -- chapter Cognitive integration -- chapter Repertory grids as a reflexive technique -- chapter 5 Enquiry and action learning: a model for transferring learning -- VIVIENE E. CREE AND RALPH DAVIDSON /A model for transferring learning Viviene E. Cree and Ralph Davidson -- chapter Process of EAL study units -- chapter The use of consultants -- chapter 6 Intentional observation: exploring transfer in action -- KAREN TANNER AND PAT LE RICHE /Exploring transfer in action Karen Tanner and Pat Le Riche -- chapter 7 Using a reflective diary in student supervision /MIKE TAIT -- chapter What is a reflective diary? -- chapter As a tool for developing reflective practice -- chapter As a tool for assessment -- chapter 8 Critical incident analysis: facilitating reflection and transfer of learning -- HILARY DAVIES AND HELEN KINLOCH /Facilitating reflection and transfer of learning Hilary Davies and Helen Kinloch -- chapter 9 In praise of the process recording /GARY CLAPTON -- chapter 1 0 Mature students and transfer of learning /PAM GREEN LISTER -- chapter 1 1 Understanding and managing conflict in the learning process: Christians coming out -- YVONNE CHANNER /Christians coming out Yvonne Channer -- chapter 1 2 From the blackboard to the web /LIZ TIMMS -- chapter Figure 12.1 Community Portraits homepage. For Community Portraits, the walled and windowed space of conventional teaching, with its tables and chairs, black/white-board, overhead projector and ancillary equipment, is replaced by a structured learning environment (TELSIpro) that is mapped out on the participants computer screens. Once logged on to Community Portraits, participants see four buttons across the top of the screen allowing them to choose one of three activities (Document preparation, Sending mail or Chat) or to seek help. The selection of a button will lead to a list of options in the vertical column on the left of the screen. The main work area occupies the rest of the screen (Figure 12.1). Participants decide and allocate permissions for reading and revising any document -- chapter Community Portraits and the transfer of learning.Combining an accessible presentation of the underlying theory of transfer of learning which explains how to put theory into practice, this is a text which is relevant to 'teaching for transfer' in any professional or vocational context. The first part of the book looks at:* what transfer of learning means* how it operates* the implications for teaching* issues such as assessment, competence, outcomes.In the second part contributors present case studies from social work which show how specific teaching methods can be successfully used to make the maximum use of the student's previous experience. These include:* personal construct psychology* enquiry and action learning* intentional observation* critical incident analysis* reflective diaries* process recording* information technology.Information on each teaching method is presented in enough detail to allow the educator to go away and use it.Transfer of trainingSocial work educationTransfer of training.Social work education.361.30715Cree Viviene E.1954-855521Macaulay Cathlin855522MiAaPQMiAaPQMiAaPQBOOK9910305545803321Transfer of learning in professional and vocational education1909898UNINA