LEADER 01767nam a2200361 i 4500 001 991001114389707536 005 20020507183528.0 008 950912s1981 de ||| | eng 020 $a3540111557 035 $ab10802903-39ule_inst 035 $aLE01307248$9ExL 040 $aDip.to Matematica$beng 082 0 $a519.8 084 $aAMS 92-06 084 $aAMS 92-XX 084 $aAMS 92C99 100 1 $aHolmes, Mark H.$061979 245 10$aMathematical modeling of the hearing process :$bproceedings of the NSF-CBMS regional conference held in Troy, NY, July 21-25, 1980 /$cedited by Mark H. Holmes and Lester A. Rubenfeld 260 $aBerlin :$bSpringer-Verlag,$c1981 300 $a104 p. :$bill. ;$c25 cm 490 0 $aLecture notes in biomathematics,$x0341-633X ;$v43 500 $aContents: Cochlear modeling-1980 / by J.B. Allen - Studies in cochlear mechanics / by R.S. Chadwick - The Hydroelastic model of the cochlea / M.H. Holmes - Basilar membrane response measured in damaged cochleas of cats / by S.M. Khanna and D.G.B. Leonard - A mathematical model of the semicircular canals / by W.C. Van Buskirk - The acoustical inverse problem for the cochlea / by M.M. Sondhi. 500 $aIncludes bibliographies. 650 4$aBiology and behavioral sciences 650 4$aHearing-mathematical models 650 4$aPhysiological, cellular and medical topics 700 1 $aRubenfeld, Lester A. 907 $a.b10802903$b23-02-17$c28-06-02 912 $a991001114389707536 945 $aLE013 92-XX HOL11 (1981)$g1$i2013000035048$lle013$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i10907257$z28-06-02 996 $aMathematical modeling of the hearing process$9925314 997 $aUNISALENTO 998 $ale013$b01-01-95$cm$da $e-$feng$gde $h0$i1 LEADER 01120nam a2200265 i 4500 001 991000240409707536 008 040121s it 000 0 eng d 035 $ab12588854-39ule_inst 040 $aDip.to Fisica$beng 082 0 $a530 084 $a53(082.2) 111 2 $aInternational Physics Olympiad$n<30. ;$d<1999 ;$cPadova, Italy>$0481671 245 10$a30. International Physics Olympiad :$bPadova, Italy, official report /$cedited by Giuliana Cavaggioni 260 $aPadova :$bTipografia Miranese,$c2000 300 $a245 p. :$bill. ;$c24 cm 650 4$aPhysics$xCongresses 650 4$aPhysics$xStudy and teaching 700 1 $aCavaggioni, Giuliana 907 $a.b12588854$b21-09-06$c21-01-04 912 $a991000240409707536 945 $aLE006 53(042+082.2) CAV$g1$i2006000092166$lle006$o-$pE25.82$q-$rl$s- $t0$u0$v0$w0$x0$y.i1306163x$z21-01-04 945 $aLE006 53(042+082.2) CAV$g1$i2006000092173$lle006$o-$pE25.82$q-$rl$s- $t0$u0$v0$w0$x0$y.i13061641$z21-01-04 996 $a30. International Physics Olympiad$9253298 997 $aUNISALENTO 998 $ale006$b21-01-04$cm$da $e-$feng$git $h0$i1 LEADER 07117nam 2200601Ia 450 001 9910280812803321 005 20250628110053.0 010 $a9781484214565 010 $a1484214560 024 8 $a10.1007/978-1-4842-1455-8 035 $a(CKB)4340000000014851 035 $a(Safari)9781484214558 035 $a(OCoLC)958879520 035 $a(MiAaPQ)EBC5575803 035 $a(Au-PeEL)EBL5575803 035 $a(OCoLC)1066183556 035 $a(MiAaPQ)EBC6422848 035 $a(ScCtBLL)6e861a5a-b814-4131-8189-b8efe265acc7 035 $a(OCoLC)1250407624 035 $a(Perlego)2340136 035 $a(ODN)ODN0010071766 035 $a(EXLCZ)994340000000014851 100 $a20160921d2016 uy 0 101 0 $aeng 135 $aurunu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aManaging risk and information security $eprotect to enable /$fMalcolm W Harkins 205 $aSecond edition. 210 $d2016 210 1$a[Place of publication not identified] :$cApress Open,$d[2016] 210 2$aNew York, NY :$cDistributed to the book trade worldwide by Springer Science+Business Media New York 210 4$d©2016 215 $a1 online resource (1 volume) $cillustrations 320 $aIncludes bibliographical references and index. 327 $aIntro -- Contents at a Glance -- Contents -- Foreword -- Praise for the second edition of Managing Risk and Information Security -- About the Author -- Acknowledgments -- Preface -- Chapter 1: Introduction -- Protect to Enable® -- Building Trust -- Keeping the Company Legal: The Regulatory Flood -- Privacy: Protecting Personal Information -- Personalization vs. Privacy -- Financial Regulations -- E-Discovery -- Expanding Scope of Regulation -- The Rapid Proliferation of Information, Devices, and Things -- The Changing Threat Landscape -- Stealthy Malware -- Nine Irrefutable Laws of Information Risk -- A New Approach to Managing Risk -- Chapter 2: The Misperception of Risk -- The Subjectivity of Risk Perception -- How Employees Misperceive Risk -- The Lure of the Shiny Bauble -- How Security Professionals Misperceive Risk -- Security and Privacy -- How Decision Makers Misperceive Risk -- How to Mitigate the Misperception of Risk -- Uncovering New Perspectives During Risk Assessments -- Communication Is Essential -- Building Credibility -- Chapter 3: Governance and Internal Partnerships: How to Sense, Interpret, and Act on Risk -- Information Risk Governance -- Finding the Right Governance Structure -- Building Internal Partnerships -- Legal -- Privacy -- Litigation -- Intellectual Property -- Contracts -- Financial Compliance -- Legal Specialists Within Business Groups -- Human Resources -- Setting Employee Expectations in Security Policies -- Employee Communications -- Investigations -- Finance -- Sarbanes-Oxley Compliance -- Working with Business Groups -- Internal Audit -- Corporate Risk Management -- Privacy -- Corporate Security -- Business Group Managers -- Conclusion -- Chapter 4: External Partnerships: The Power of Sharing Information -- The Value of External Partnerships -- External Partnerships: Types and Tiers -- 1:1 Partnerships. 327 $aCommunities -- Community Characteristics -- Community Goals -- Sharing Information about Threats and Vulnerabilities -- Sharing Best Practices and Benchmarking -- Influencing Regulations and Standards -- Corporate Citizenship -- Conclusion -- Chapter 5: People Are the Perimeter -- The Shifting Perimeter -- Compliance or Commitment? -- Examining the Risks -- Adjusting Behavior -- A Model for Improving Security Awareness -- Broadening the Awareness Model -- The Security Benefits of Personal Use -- Roundabouts and Stop Signs -- The Technology Professional -- Insider Threats -- Deter -- Detect -- Discipline -- Finding the Balance -- Chapter 6: Emerging Threats and Vulnerabilities: Reality and Rhetoric -- Structured Methods for Identifying Threat Trends -- The Product Life Cycle Model -- Understanding Threat Agents -- Playing War Games -- Trends That Span the Threat Landscape -- Trust Is an Attack Surface -- Barriers to Entry Are Crumbling -- The Rise of Edge Case Insecurity -- The Enemy Knows the System -- Key Threat Activity Areas -- The Industry of Malware -- The Web Expands to the Internet of Things -- Smartphones -- Web Applications -- Conclusion -- Chapter 7: A New Security Architecture to Improve Business Agility -- The 9 Box of Controls, Business Trends, and Architecture Requirements -- 9 Box of Controls -- IT Consumerization -- New Business Needs -- Cloud Computing -- Changing Threat Landscape -- Privacy and Regulatory Requirements -- New Architecture -- Trust Calculation -- Source Score -- Destination Score -- Available Controls -- Calculating Trust -- Security Zones -- Untrusted Zones -- Selective Zones -- Trusted Zones -- Balanced Controls -- Users, Data, and the Internet of Things: The New Perimeters -- Data Perimeter -- User Perimeter -- Internet of Things -- Conclusion -- Chapter 8: Looking to the Future: Emerging Security Capabilities. 327 $aInternet of Things -- Consistent User Experience Across Devices -- Cloud Computing -- Big Data Analytics -- Artificial Intelligence -- Business Benefits and Risks -- New Security Capabilities -- Baseline Security -- Protected Environments -- Encryption -- Hardware Acceleration -- Enhanced Recovery -- AI-Based Security and Automation -- Context-Aware Security -- Cloud Security and Context Awareness -- Security Analytics and Data Protection -- Conclusion -- Chapter 9: Corporate Social Responsibility: The Ethics of Managing Information Risk -- The Expanding Scope of Corporate Social Responsibility -- The Evolution of Technology and Its Impact -- Maintaining Society's Trust -- The Ethics of Managing Information Risk -- Conclusion -- Chapter 10: The 21st Century CISO -- Chief Trust Officer -- The Z-Shaped Individual -- Foundational Skills -- Becoming a Storyteller -- Fear Is Junk Food -- Accentuating the Positive -- Demonstrating the Reality of Risk -- The CISO's Sixth Sense -- Taking Action at the Speed of Trust -- The CISO as a Leader -- Learning from Other Business Leaders -- Voicing Our Values -- Discussing Information Risk at Board Level -- Conclusion -- Chapter 11: Performance Coaching -- How to Use the Tables -- Independence and Initiative -- Efficiency and Effectiveness -- Commitment -- Professionalism -- Discipline -- Teamwork -- Problem-Solving -- Communication -- Listening -- Style -- Clarity -- Goal-Setting -- Conclusion -- Appendix A -- Index. 330 $aComputer science 606 $aComputer security 606 $aElectronic information resources$xAccess control 615 0$aComputer security. 615 0$aElectronic information resources$xAccess control. 676 $a005.8 686 $aCOM014000$aCOM053000$2bisacsh 700 $aHarkins$b Malcolm$0860577 801 0$bUMI 801 1$bUMI 906 $aBOOK 912 $a9910280812803321 996 $aManaging risk and information security$91920131 997 $aUNINA LEADER 05637oam 2200805I 450 001 9910973345103321 005 20251117110617.0 010 $a1-315-78605-2 010 $a1-317-71935-2 010 $a1-317-71936-0 024 7 $a10.4324/9781315786056 035 $a(CKB)2670000000529247 035 $a(EBL)1639350 035 $a(SSID)ssj0001130812 035 $a(PQKBManifestationID)12383542 035 $a(PQKBTitleCode)TC0001130812 035 $a(PQKBWorkID)11111960 035 $a(PQKB)11154717 035 $a(OCoLC)878138750 035 $a(MiAaPQ)EBC1639350 035 $a(Au-PeEL)EBL1639350 035 $a(CaPaEBR)ebr10843659 035 $a(CaONFJC)MIL578195 035 $a(OCoLC)871224655 035 $a(OCoLC)897457394 035 $a(FINmELB)ELB136784 035 $a(EXLCZ)992670000000529247 100 $a20180706e20132002 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aFamily empowerment intervention $ean innovative service for high-risk youths and their families /$fRichard Dembo, James Schmeidler 205 $a1st ed. 210 1$aLondon :$cRoutledge,$d2013. 215 $a1 online resource (211 p.) 225 1 $aHaworth Criminal Justice, Forensic Behavioral Sciences, & Offender Rehabilitation 300 $aFirst published in 2002 by The Haworth Press, Inc. 311 08$a0-7890-1573-0 311 08$a0-7890-1572-2 320 $aIncludes bibliographical references and index. 327 $aCover; Half Title; Title Page; Copyright Page; Table of Contents; Foreword; Acknowledgments; Chapter 1. The Need for Effective, Cost-Efficient Intervention Services for High-Risk Youths; Strengths and Limitations of Case Management and Referral Services; A Study of Preliminary Screening; The Importance of Family Interventions with an Ecological Focus; Criteria for Evaluating Intervention Programs; Organization of Report; Chapter 2. Overview of the Family Empowerment Intervention; Theoretical Foundations; Goals; Structural Intervention Strategies; Phases of the Intervention 327 $aCategories of Families Served by the FEIInvolving Families and Moving Them Through the FEI to Graduation; The Field Consultants; Roles and Responsibilities of Key Supervisory Personnel; Clinical Policies; Ensuring the Integrity of Intervention Services; Implementing the FEI; Chapter 3. Youths and Families Involved in the Youth Support Project; Setting for the YSP; Selecting Youths and Families for Enrollment in the YSP; Data-Collection Procedures; Characteristics of Youths at Baseline Interview; Summary; Chapter 4. Impact of the Family Empowerment Intervention on Crime; Case Type 327 $aOfficial Record OutcomesSelf-Reported Delinquency; Influence of Change in Project's Clinical Leadership on Outcomes; Chapter 5. Impact of the Family Empowerment Intervention on Alcohol and Other Drug Use; Short-Term Impact on Alcohol /Other Drug Use; Long-Term Impact on Alcohol /Other Drug Use; Influence of Change in Project's Clinical Leadership on Outcomes; Chapter 6. Impact of the Family Empowerment Intervention on Emotional/Psychological Functioning; Short-Term Impact on Emotional /Psychological Functioning; Long-Term Impact on Emotional/Psychological Functioning 327 $aInfluence of Change in Project's Clinical Leadership on OutcomesSummary of Findings; Chapter 7. Conclusions and Directions for the Future; Short-Term Impact of the FEI; Long-Term Impact of the FEI; Could Project Referrals to Services Account for Its Impact, Not the FEI?; Cost-Saving Benefits of the FEI; How Could the FEI Be Improved?; Next Steps; Appendix A. Time 1 Summary Measures for Six Sets of Major Variables; Appendix B. Parent-Adolescent Communication (Adolescent and Mother Form); Appendix C. Publications Resulting from the Youth Support Project and Family Empowerment Intervention 327 $aAppendix D. Percentage of ESI Youths, FEI Noncompleters, and FEI Completers Who Reported Receiving Various Services During the Second Follow-Up PeriodAppendix E. Percentage of ESI Youths, FEI Noncompleters, and FEI Completers Who Reported Receiving Various Services During the Third Follow-Up Period; References; Index 330 $aUse this important intervention to improve your practice with substance-using youths and their families!This vital book gives you a detailed review of a National Institute on Drug Abuse-funded, long-term clinical trial of the Family Empowerment Intervention (FEI). The subjects are youths who have been arrested and processed at the Hillsborough County Juvenile Assessment Center and their families. With information on the conceptual foundations and clinical practices of the intervention and an examination of its one-year and longer-term impact on these youths' recidivism and psychosoci 410 0$aHaworth criminal justice, forensic behavioral sciences & offender rehabilitation. 606 $aSocial work with youth 606 $aYouth$xFamily relationships 606 $aFamily social work 606 $aYouth$xServices for 606 $aFamilies 615 0$aSocial work with youth. 615 0$aYouth$xFamily relationships. 615 0$aFamily social work. 615 0$aYouth$xServices for. 615 0$aFamilies. 676 $a362.7/083 676 $a362.7083 700 $aDembo$b Richard.$01873974 701 $aSchmeidler$b James$01873975 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910973345103321 996 $aFamily empowerment intervention$94484291 997 $aUNINA