LEADER 01218nam 2200433 450 001 9910467898003321 005 20200520144314.0 010 $a1-5040-4733-8 035 $a(CKB)4340000000196067 035 $a(MiAaPQ)EBC5013736 035 $a(Au-PeEL)EBL5013736 035 $a(CaPaEBR)ebr11430939 035 $a(OCoLC)995357894 035 $a(EXLCZ)994340000000196067 100 $a20190123d2017 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aFairy and folk tales of the Irish peasantry /$fW. B. Yeats 210 1$aNew York, New York :$cOpen Road Integrated Media Inc.,$d2017. 215 $a1 online resource (249 pages) 606 $aFairy tales$zIreland 606 $aTales$zIreland 606 $aFolklore$zIreland 608 $aElectronic books. 615 0$aFairy tales 615 0$aTales 615 0$aFolklore 676 $a398.2109415 700 $aYeats$b W. B.$0480140 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910467898003321 996 $aFairy and folk tales of the Irish peasantry$92014977 997 $aUNINA LEADER 02811nam 22006254a 450 001 9910784270103321 005 20230721025516.0 010 $a1-281-12356-0 010 $a9786611123567 010 $a1-59385-618-0 035 $a(CKB)1000000000339680 035 $a(EBL)306728 035 $a(OCoLC)214282953 035 $a(SSID)ssj0000096303 035 $a(PQKBManifestationID)11120139 035 $a(PQKBTitleCode)TC0000096303 035 $a(PQKBWorkID)10082529 035 $a(PQKB)10982882 035 $a(MiAaPQ)EBC306728 035 $a(Au-PeEL)EBL306728 035 $a(CaPaEBR)ebr10176566 035 $a(CaONFJC)MIL112356 035 $a(EXLCZ)991000000000339680 100 $a20060523d2007 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 14$aThe abusive personality$b[electronic resource] $eviolence and control in intimate relationships /$fDonald G. Dutton 205 $a2nd ed. 210 $aNew York $cGuilford Press$dc2007 215 $a1 online resource (272 p.) 300 $aDescription based upon print version of record. 311 $a1-59385-371-8 320 $aIncludes bibliographical references and index. 327 $aEarly explanations -- Learning of abusiveness -- The psychology of the cycle of violence -- The structure of the abusive personality: the data -- The primitive origins of rage -- An anger born of fear: attachment rage -- The sociopsychoneurobiology of attachment -- The early antecedents studies -- Longitudinal development and female abusive personalities -- The treatment of assaultiveness. 330 $aThis influential book provides an innovative framework for understanding and treating intimate partner violence. Integrating a variety of theoretical and empirical perspectives, Donald G. Dutton demonstrates that male abusiveness is more than just a learned pattern of behavior--it is the outgrowth of a particular personality configuration. He illuminates the development of the abusive personality from early childhood to adulthood and presents an evidence-based treatment approach designed to meet this population's unique needs. The second edition features two new c 606 $aAbusive men$xPsychology 606 $aObject relations (Psychoanalysis) 606 $aAttachment behavior 606 $aIntimacy (Psychology) 615 0$aAbusive men$xPsychology. 615 0$aObject relations (Psychoanalysis) 615 0$aAttachment behavior. 615 0$aIntimacy (Psychology) 676 $a616.85/82 700 $aDutton$b Donald G.$f1943-$0859983 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910784270103321 996 $aThe abusive personality$93801423 997 $aUNINA LEADER 03622nam 22007455 450 001 9910357850203321 005 20251225200636.0 010 $a981-15-0871-2 024 7 $a10.1007/978-981-15-0871-4 035 $a(CKB)4100000009844698 035 $a(DE-He213)978-981-15-0871-4 035 $a(MiAaPQ)EBC5978843 035 $a(PPN)260301647 035 $a(EXLCZ)994100000009844698 100 $a20191014d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aApplications and Techniques in Information Security $e10th International Conference, ATIS 2019, Thanjavur, India, November 22?24, 2019, Proceedings /$fedited by V. S. Shankar Sriram, V. Subramaniyaswamy, N. Sasikaladevi, Leo Zhang, Lynn Batten, Gang Li 205 $a1st ed. 2019. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2019. 215 $a1 online resource (XI, 313 p. 157 illus., 101 illus. in color.) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v1116 311 08$a981-15-0870-4 327 $aInformation Security -- Network Security -- Intrusion Detection System -- Authentication and Key Management System -- Security Centric Applications. . 330 $aThis book constitutes the refereed proceedings of the 10th International Conference on Applications and Techniques in Information Security, ATIS 2019, held in Tamil Nadul, India, in November 2019. The 22 full papers and 2 short papers presented in the volume were carefully reviewed and selected from 50 submissions. The papers are organized in the following topical sections: information security; network security; intrusion detection system; authentication and key management system; security centric applications. . 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v1116 606 $aData protection 606 $aComputers$xLaw and legislation 606 $aInformation technology$xLaw and legislation 606 $aArtificial intelligence 606 $aApplication software 606 $aComputer networks 606 $aData and Information Security 606 $aLegal Aspects of Computing 606 $aArtificial Intelligence 606 $aComputer and Information Systems Applications 606 $aComputer Communication Networks 615 0$aData protection. 615 0$aComputers$xLaw and legislation. 615 0$aInformation technology$xLaw and legislation. 615 0$aArtificial intelligence. 615 0$aApplication software. 615 0$aComputer networks. 615 14$aData and Information Security. 615 24$aLegal Aspects of Computing. 615 24$aArtificial Intelligence. 615 24$aComputer and Information Systems Applications. 615 24$aComputer Communication Networks. 676 $a005.8 702 $aShankar Sriram$b V. S$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSubramaniyaswamy$b V$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSasikaladevi$b N$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZhang$b Leo$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBatten$b Lynn$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLi$b Gang$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910357850203321 996 $aApplications and Techniques in Information Security$92028776 997 $aUNINA