Listing 1 - 10 of 33 | << page >> |
Sort by
|
Choose an application
Whether due to anxiety or the comfort of routine, people with Asperger's Syndrome often find that they go through life on autopilot. This book provides advice and step-by-step exercises for adopting a mindful way of living to overcome difficulties and become more present in the moment. Exercises include breathing, yoga stretches and meditations.
Asperger's syndrome --- Meditation --- Therapeutic use --- Meditation - Therapeutic use --- Asperger's syndrome. --- AS (Psychiatry) --- Asperger syndrome --- Asperger's disorder --- Autistic psychopathy --- High-functioning autism --- Psychopathy, Autistic --- Autism spectrum disorders --- Syndromes --- Therapeutic use.
Choose an application
Choose an application
Coding theory --- Cryptography --- Congresses --- Congresses
Choose an application
This story will be inspirational to all adults either facing Asperger's syndrome personally or interacting with someone who has been diagnosed. Chris Mitchell describes his life before and after diagnosis with Asperger's syndrome.
Choose an application
This book constitutes the proceedings of the 13th International Workshop on Security and Trust Management, STM 2017, held in Oslo, Norway, in September 2017, in conjunction with the 22nd European Symposium Research in Computer Security, ESORICS 2017. The 10 full papers and 6 short papers were carefully reviewed and selected from 33 submissions. The focus of the workshop was on the following topics: cryptosystems and applied cryptography; software security and risk management; authorization; security vulnerabilities and protocols; and secure systems.
Computer science. --- Computer communication systems. --- Software engineering. --- Computer security. --- Computers. --- Computer Science. --- Systems and Data Security. --- Information Systems Applications (incl. Internet). --- Software Engineering. --- Computer Communication Networks. --- Computing Milieux. --- Informatics --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer software engineering --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Protection --- Security measures --- Science --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Data protection --- Security systems --- Hacking --- Engineering --- Distributed processing --- Computer security --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
This book constitutes the proceedings of the First International Conference on Security Standardisation Research, SSR 2014, which was held in London, UK, in December 2014. The 14 full papers presented in this volume were carefully reviewed and selected from 22 submissions. The papers cover a range of topics in the field of security standardisation research, including cryptographic evaluation, standards development, analysis with formal methods, potential future areas of standardisation, and improving existing standards.
Computer science. --- Computer communication systems. --- Computer security. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer science --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Computer Communication Networks. --- Data Structures. --- Math Applications in Computer Science. --- Mathematics. --- Data structures (Computer scienc. --- Cryptology. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Protection --- Security measures --- Data structures (Computer science) --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Computer science—Mathematics. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Distributed processing
Choose an application
This book constitutes the proceedings of the First International Conference on Security Standardisation Research, SSR 2014, which was held in London, UK, in December 2014. The 14 full papers presented in this volume were carefully reviewed and selected from 22 submissions. The papers cover a range of topics in the field of security standardisation research, including cryptographic evaluation, standards development, analysis with formal methods, potential future areas of standardisation, and improving existing standards.
Mathematics --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- computers --- informatica --- database management --- wiskunde --- programmatielogica --- computerbeveiliging --- computernetwerken --- computerkunde
Choose an application
Based on author Chris Parry-Mitchell's successful work across a range of schools, this book consists of 10 sessions that make up a program to help students who are at risk of exclusion. The young people learn how to think, communicate, behave and relate to each other and other people in more useful ways. Everything in this book has been tried and tested with young people who are at risk within their school settings, and for most of them it has been a turning point in their lives.
Teacher participation in educational counseling. --- Students --- Social isolation --- Behavior modification. --- Psychology. --- Prevention. --- Behavioral assessment.
Choose an application
This book constitutes the refereed proceedings of the 18th International Conference on Information Security, ISC 2015, held in Trondheim, Norway, in September 2015. The 30 revised full papers presented were carefully reviewed and selected from 103 submissions. The papers cover a wide range of topics in the area of cryptography and cryptanalysis and are organized in the following topical sections: signatures; system and software security; block ciphers; protocols; network and cloud security; encryption and fundamentals; PUFs and implementation security; and key generation, biometrics and image security. .
Computer Science. --- Systems and Data Security. --- Computer science. --- Data protection. --- Informatique --- Protection de l'information (Informatique) --- Computer Science --- Engineering & Applied Sciences --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Protection --- Security measures --- Data encryption (Computer science). --- Computer software. --- Software engineering. --- Cryptology. --- Algorithm Analysis and Problem Complexity. --- Math Applications in Computer Science. --- Special Purpose and Application-Based Systems. --- Computers and Society. --- Computer software engineering --- Engineering --- Software, Computer --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Data encryption (Computer science) --- Algorithms. --- Computer science—Mathematics. --- Special purpose computers. --- Computers and civilization. --- Civilization and computers --- Civilization --- Special purpose computers --- Algorism --- Algebra --- Arithmetic --- Foundations
Choose an application
This book constitutes the refereed proceedings of the 18th International Conference on Information Security, ISC 2015, held in Trondheim, Norway, in September 2015. The 30 revised full papers presented were carefully reviewed and selected from 103 submissions. The papers cover a wide range of topics in the area of cryptography and cryptanalysis and are organized in the following topical sections: signatures; system and software security; block ciphers; protocols; network and cloud security; encryption and fundamentals; PUFs and implementation security; and key generation, biometrics and image security. .
Complex analysis --- Mathematics --- Computer science --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- cryptografie --- complexe analyse (wiskunde) --- computers --- informatica --- maatschappij --- externe fixatie (geneeskunde --- hardware --- wiskunde --- algoritmen --- computerbeveiliging
Listing 1 - 10 of 33 | << page >> |
Sort by
|