LEADER 00898nam0-22003251i-450- 001 990003114320403321 010 $a0-19-877205-X 035 $a000311432 035 $aFED01000311432 035 $a(Aleph)000311432FED01 035 $a000311432 100 $a20000920d1985----km-y0itay50------ba 101 0 $aeng 102 $aIT 200 1 $aLabour Absorption in Agriculture$eTheoretical Analysis and Empirical Investigations$fAnne Booth$gR.M. Sundrum. 210 $aOxford$cOxford University Press$d1985. 215 $aXII, 327 p.$d22 cm 676 $aF/1.3 676 $aF/3.2 676 $aH/1.10 702 1$aBooth,$bAnne 702 1$aSundrum,$bR. M. 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990003114320403321 952 $aH/110 BOO$b4939$fSES 959 $aSES 996 $aLabour Absorption in Agriculture$9461128 997 $aUNINA DB $aING01 LEADER 02771nam 2200601Ia 450 001 9910453883503321 005 20200520144314.0 010 $a1-281-81132-7 010 $a9786611811327 010 $a0-8261-2264-7 035 $a(CKB)1000000000705024 035 $a(EBL)423573 035 $a(OCoLC)476263624 035 $a(SSID)ssj0000123760 035 $a(PQKBManifestationID)11135440 035 $a(PQKBTitleCode)TC0000123760 035 $a(PQKBWorkID)10010438 035 $a(PQKB)10268074 035 $a(MiAaPQ)EBC423573 035 $a(PPN)179997602 035 $a(Au-PeEL)EBL423573 035 $a(CaPaEBR)ebr10265255 035 $a(CaONFJC)MIL181132 035 $a(EXLCZ)991000000000705024 100 $a20001129d2001 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 12$aA clinician's guide to psychodrama$b[electronic resource] /$fEva Leveton 205 $a3rd ed. 210 $aNew York $cSpringer$dc2001 215 $a1 online resource (222 p.) 300 $aDescription based upon print version of record. 311 $a0-8261-2263-9 320 $aIncludes bibliographical references (p. 197-200) and index. 327 $aContents; Prologue; 1 Who's in Charge?; 2 Seating Arrangements; 3 The Warm-Up; 4 The Double; 5 Role Reversal; 6 The Sociogram; 7 The Empty Chair; 8 Six Characters in Search of a Personality; 9 The Given Scene; 10 Magic Shop; 11 Masks; 12 Permission for Spontaneity; 13 Resistances and Some Ways of Dealing with Them; 14 Trance and Psychodrama; 15 Psychodrama or Drama Therapy?; 16 Closure; 17 Psychodramatic Techniques in Use: Three Examples; Epilogue; Glossary; Bibliography; Index 330 $aIn this update of a popular text, Leveton draws from the works of Moreno, Erickson, Satir, and Perls. She fashions a psychodramatic approach that will help therapists practice more effective group work. New to this edition is material on drama therapy and supervision in institutional settings. ""...a delightful and informative journey into a world of psychodrama for both the experienced and newly-trained timid clinician. Ms. Leveton has clearly vitalized the use of psychodrama."". -- (about the second edition). ""...relevant, alive and exceedingly helpful."". -- Virginia Satir , From the Forew 606 $aDrama$xTherapeutic use 606 $aPsychotherapy 608 $aElectronic books. 615 0$aDrama$xTherapeutic use. 615 0$aPsychotherapy. 676 $a616.89/1523 700 $aLeveton$b Eva$0154116 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910453883503321 996 $aA clinician's guide to psychodrama$92447584 997 $aUNINA LEADER 03472nam 2200493 450 001 9910816960703321 005 20191111064343.0 010 $a1-119-61822-3 010 $a1-119-61823-1 010 $a1-119-61821-5 035 $a(CKB)4100000009590183 035 $a(MiAaPQ)EBC5946044 035 $a(PPN)272710679 035 $a(CaSebORM)9781119618195 035 $a(OCoLC)1124762814 035 $a(EXLCZ)994100000009590183 100 $a20191111d2020 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCryptography apocalypse $epreparing for the day when quantum computing breaks today's crypto /$fRoger A Grimes 205 $a1st edition 210 1$aHoboken, New Jersey :$cWiley,$d[2020] 210 4$dİ2020 215 $a1 online resource (275 pages) 311 $a1-119-61819-3 330 $aWill your organization be protected the day a quantum computer breaks encryption on the internet? Computer encryption is vital for protecting users, data, and infrastructure in the digital age. Using traditional computing, even common desktop encryption could take decades for specialized ?crackers? to break and government and infrastructure-grade encryption would take billions of times longer. In light of these facts, it may seem that today?s computer cryptography is a rock-solid way to safeguard everything from online passwords to the backbone of the entire internet. Unfortunately, many current cryptographic methods will soon be obsolete. In 2016, the National Institute of Standards and Technology (NIST) predicted that quantum computers will soon be able to break the most popular forms of public key cryptography. The encryption technologies we rely on every day?HTTPS, TLS, WiFi protection, VPNs, cryptocurrencies, PKI, digital certificates, smartcards, and most two-factor authentication?will be virtually useless. . . unless you prepare. Cryptography Apocalypse is a crucial resource for every IT and InfoSec professional for preparing for the coming quantum-computing revolution. Post-quantum crypto algorithms are already a reality, but implementation will take significant time and computing power. This practical guide helps IT leaders and implementers make the appropriate decisions today to meet the challenges of tomorrow. This important book: Gives a simple quantum mechanics primer Explains how quantum computing will break current cryptography Offers practical advice for preparing for a post-quantum world Presents the latest information on new cryptographic methods Describes the appropriate steps leaders must take to implement existing solutions to guard against quantum-computer security threats Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto is a must-have guide for anyone in the InfoSec world who needs to know if their security is ready for the day crypto break and how to fix it. 606 $aData encryption (Computer science) 606 $aCryptography 606 $aQuantum computing 615 0$aData encryption (Computer science) 615 0$aCryptography. 615 0$aQuantum computing. 676 $a005.82 700 $aGrimes$b Roger A.$01042670 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910816960703321 996 $aCryptography apocalypse$93937276 997 $aUNINA