LEADER 02750nam 2200685Ia 450 001 9911008968803321 005 20241226111304.0 010 $a9781506320069 010 $a1506320066 010 $a9781322422664 010 $a1322422664 010 $a9780803944008 010 $a0803944004 010 $a9781452265094 010 $a1452265097 035 $a(CKB)2550000000111955 035 $a(EBL)997052 035 $a(OCoLC)809773868 035 $a(SSID)ssj0000697303 035 $a(PQKBManifestationID)12332864 035 $a(PQKBTitleCode)TC0000697303 035 $a(PQKBWorkID)10691880 035 $a(PQKB)10167582 035 $a(OCoLC)809969521 035 $a(StDuBDS)EDZ0000085578 035 $a(MiAaPQ)EBC997052 035 $a4322 035 $a(EXLCZ)992550000000111955 100 $a20120823d1994 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt 182 $cc 183 $acr 200 10$aAdult personality development$b[electronic resource] $etheories and concepts$hVolume 2$iApplications /$fLawrence S. Wrightsman 210 $aThousand Oaks, Calif. $cSage Publications$dc1994 215 $a1 online resource (227 p.) 300 $aDescription based upon print version of record. 311 08$a9781452233796 311 08$a1452233799 311 08$a9780803943995 311 08$a0803943997 320 $aIncludes bibliographical references and indexes. 327 $aCover; Contents; Preface; Acknowledgments; Chapter 1 - Recurring Issues in the Development of Personality in Adulthood; Chapter 2 - Occupational Changes in Adulthood; Chapter 3 - Cognitive Abilities During Adulthood; Chapter 4 - Sex Roles; Chapter 5 - Sexual Relationships and Marriage; Chapter 6 - Changes in Values and Attitudes; Chapter 7 - Reactions to Death and Dying; Chapter 8 - The Use of Personal Documents in Understanding Adult Personality Development; Chapter 9 - The Idiographic Approach to Personality Development; References; Author Index; Subject Index; About the Author 330 8 $aWrightsman encourages readers to look at the evolving nature of their own lives, and includes case studies throughout to illustrate concepts in a thought-provoking, non-technical manner. 606 $aPersonality 606 $aAdulthood$xPsychological aspects 606 $aAging$xPsychological aspects 615 0$aPersonality. 615 0$aAdulthood$xPsychological aspects. 615 0$aAging$xPsychological aspects. 676 $a155.6 700 $aWrightsman$b Lawrence S$0148894 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911008968803321 996 $aAdult personality development$94393569 997 $aUNINA LEADER 04547nam 22007215 450 001 9911046534703321 005 20250721130835.0 010 $a3-031-89518-5 024 7 $a10.1007/978-3-031-89518-0 035 $a(CKB)39698744400041 035 $a(MiAaPQ)EBC32227353 035 $a(Au-PeEL)EBL32227353 035 $a(DE-He213)978-3-031-89518-0 035 $a(OCoLC)1528959154 035 $a(EXLCZ)9939698744400041 100 $a20250721d2026 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Systems Security and Privacy $e9th International Conference, ICISSP 2023, Lisbon, Portugal, 22?24 February, 2023, and 10th International Conference, ICISSP 2024, Rome, Italy, February 26?28, 2024, Revised Selected Papers /$fedited by Gabriele Lenzini, Paolo Mori, Steven Furnell 205 $a1st ed. 2026. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2026. 215 $a1 online resource (500 pages) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v2459 311 08$a3-031-89517-7 327 $aManagement and Operations -- On the Centrality of Web Trackers: Assessing Its Potential for Automated Detection -- Secure Multi-Party Querying Federated Graph Databases -- Employing Board Cyber-Risk Management Collaborative Game Under Condition of Uncertainty -- Applications and Services -- Safeguarding Data from Deprecated System Software: A Resilient Boot Architecture for Edge Devices Leveraging TEEs -- Evaluating Input Transformation Ensembles Against Adversarial Attacks -- An Improved Attention-Enhanced LSTM Model for Early Detection of Distributed Denial of Service Attacks -- Seeing is Believing: Assessing and Enhancing Android Privacy Indicators through Eye-Tracking Analysis.-Technologies and Foundations -- Data Exfiltration from Network-Isolated Virtual Computing Systems with Infrastructure Mediated Power Analysis -- Chosen Text Attacks Against an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map -- Efficient Management Models for SGX Enclaves -- Forgery Resistance of Behavioral Authentication Through Score Fusion Methods -- mKEM-DEM Based Anonymous Certificateless Hybrid Signcryption for Broadcast VANET Communication -- Assessing the Efficiency of Polynomial Commitment Schemes in Erasure Code-Based Data Distribution -- Feasibility Study on EM-FI Effectiveness Using Physical Layer Abstraction -- A Peek into the Ecosystem of TPM v2. 330 $aThis book constitutes the refereed post-proceedings of the 9th and 10th International Conference on Information Systems Security and Privacy, ICISSP 2023 and 2024, held in Lisbon, Portugal, and in Rome, Italy during February 22-24, 2023 and February 26-28, 2024, respectively. The 15 full papers included in this book were carefully reviewed and selected from 285 submissions. These papers have been organized under the following topical sections: Management and operations; Applications and services; and Technologies and foundations. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v2459 606 $aData protection 606 $aComputer networks 606 $aComputer systems 606 $aImage processing$xDigital techniques 606 $aComputer vision 606 $aArtificial intelligence 606 $aData and Information Security 606 $aComputer Communication Networks 606 $aComputer System Implementation 606 $aComputer Imaging, Vision, Pattern Recognition and Graphics 606 $aArtificial Intelligence 615 0$aData protection. 615 0$aComputer networks. 615 0$aComputer systems. 615 0$aImage processing$xDigital techniques. 615 0$aComputer vision. 615 0$aArtificial intelligence. 615 14$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$aComputer System Implementation. 615 24$aComputer Imaging, Vision, Pattern Recognition and Graphics. 615 24$aArtificial Intelligence. 676 $a005.8 700 $aLenzini$b Gabriele$01349777 701 $aMori$b Paolo$070988 701 $aFurnell$b Steven$0846860 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911046534703321 996 $aInformation Systems Security and Privacy$93404724 997 $aUNINA LEADER 01140nam 2200373 450 001 996667772503316 005 20250807122409.0 010 $a978-88-3623-036-5 100 $a20250717d2021----km y0itay5003 ba 101 0 $aita 102 $aIT 105 $aaaa 001yy 200 1 $aElementi di Fisica$emeccanica e termodinamica$fP. Mazzoldi, M. Nigro, C. Voci$gedizione a cura di E. Milani... [et al.] 205 $a3. ed. 210 $aNapoli$cEdiSES$d2021 215 $aIX, 438 p.$cill.$d29 cm 300 $aIn copertina: Comprende versione ebook e software di simulazione 517 1 $aMeccanica e termodinamica 606 0 $aFisica$2BNCF 606 0 $aMeccanica$2BNCF 606 0 $aTermodinamica$2BNCF 676 $a530 700 1$aMAZZOLDI,$bPaolo$054736 701 1$aNIGRO,$bMassimo$0332076 701 1$aVOCI,$bCesare$0440219 702 1$aMILANI,$bEnrico 801 0$aIT$bcba$gREICAT 912 $a996667772503316 951 $a530 MAZ 5$b24749 Ing.$c530$d00338115 951 $a530 MAZ 5 a$b24750 Ing.$c530$d00338116 959 $aBK 969 $aTEC 996 $aElementi di fisica$947461 997 $aUNISA