Protecting the Self

Protecting the Self

Author: Phebe Cramer

Publisher: Guilford Press

Published: 2006-05-18

Total Pages: 400

ISBN-13: 1593852983

DOWNLOAD EBOOK

Integrating theory, research, and applications, this book examines the defense mechanisms and their role in both normal development and psychopathology. It describes how children and adults mobilize specific kinds of defenses to maintain their psychological equilibrium and preserve self-esteem, particularly in situations of trauma or stress.


Military Strategies for Sustainment of Nutrition and Immune Function in the Field

Military Strategies for Sustainment of Nutrition and Immune Function in the Field

Author: Institute of Medicine

Publisher: National Academies Press

Published: 1999-05-13

Total Pages: 722

ISBN-13: 0309173183

DOWNLOAD EBOOK

Every aspect of immune function and host defense is dependent upon a proper supply and balance of nutrients. Severe malnutrition can cause significant alteration in immune response, but even subclinical deficits may be associated with an impaired immune response, and an increased risk of infection. Infectious diseases have accounted for more off-duty days during major wars than combat wounds or nonbattle injuries. Combined stressors may reduce the normal ability of soldiers to resist pathogens, increase their susceptibility to biological warfare agents, and reduce the effectiveness of vaccines intended to protect them. There is also a concern with the inappropriate use of dietary supplements. This book, one of a series, examines the impact of various types of stressors and the role of specific dietary nutrients in maintaining immune function of military personnel in the field. It reviews the impact of compromised nutrition status on immune function; the interaction of health, exercise, and stress (both physical and psychological) in immune function; and the role of nutritional supplements and newer biotechnology methods reported to enhance immune function. The first part of the book contains the committee's workshop summary and evaluation of ongoing research by Army scientists on immune status in special forces troops, responses to the Army's questions, conclusions, and recommendations. The rest of the book contains papers contributed by workshop speakers, grouped under such broad topics as an introduction to what is known about immune function, the assessment of immune function, the effect of nutrition, and the relation between the many and varied stresses encountered by military personnel and their effect on health.


Security and Privacy in the Internet of Things

Security and Privacy in the Internet of Things

Author: Ali Ismail Awad

Publisher: John Wiley & Sons

Published: 2021-12-29

Total Pages: 340

ISBN-13: 1119607744

DOWNLOAD EBOOK

SECURITY AND PRIVACY IN THE INTERNET OF THINGS Provides the authoritative and up-to-date information required for securing IoT architecture and applications The vast amount of data generated by the Internet of Things (IoT) has made information and cyber security vital for not only personal privacy, but also for the sustainability of the IoT itself. Security and Privacy in the Internet of Things brings together high-quality research on IoT security models, architectures, techniques, and application domains. This concise yet comprehensive volume explores state-of-the-art mitigations in IoT security while addressing important security and privacy challenges across different IoT layers. The book provides timely coverage of IoT architecture, security technologies and mechanisms, and applications. The authors outline emerging trends in IoT security and privacy with a focus on areas such as smart environments and e-health. Topics include authentication and access control, attack detection and prevention, securing IoT through traffic modeling, human aspects in IoT security, and IoT hardware security. Presenting the current body of knowledge in a single volume, Security and Privacy in the Internet of Things: Discusses a broad range of IoT attacks and defense mechanisms Examines IoT security and privacy protocols and approaches Covers both the logical and physical security of IoT devices Addresses IoT security through network traffic modeling Describes privacy preserving techniques in smart cities Explores current threat and vulnerability analyses Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications is essential reading for researchers, industry practitioners, and students involved in IoT security development and IoT systems deployment.


Ego Mechanisms of Defense

Ego Mechanisms of Defense

Author: George E. Vaillant

Publisher: American Psychiatric Pub

Published: 1992

Total Pages: 332

ISBN-13: 9780880484046

DOWNLOAD EBOOK

Not since Anna Freud's 1937 book, The Ego and the Mechanisms of Defense, has any one volume explored this topic as fully as Ego Mechanisms of Defense by George E. Vaillant. By summarizing the latest empirical studies, proposing a universal language of defense mechanisms, and demonstrating how various assessment methods can be used in diagnosis, case formulation, and treatment, Dr. Vaillant and an interdisciplinary group of contributors provide the groundwork for clinical practice as well as future research in the field.


Computers at Risk

Computers at Risk

Author: National Research Council

Publisher: National Academies Press

Published: 1990-02-01

Total Pages: 320

ISBN-13: 0309043883

DOWNLOAD EBOOK

Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities. The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators. The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy.


Effective Model-Based Systems Engineering

Effective Model-Based Systems Engineering

Author: John M. Borky

Publisher: Springer

Published: 2018-09-08

Total Pages: 788

ISBN-13: 3319956698

DOWNLOAD EBOOK

This textbook presents a proven, mature Model-Based Systems Engineering (MBSE) methodology that has delivered success in a wide range of system and enterprise programs. The authors introduce MBSE as the state of the practice in the vital Systems Engineering discipline that manages complexity and integrates technologies and design approaches to achieve effective, affordable, and balanced system solutions to the needs of a customer organization and its personnel. The book begins with a summary of the background and nature of MBSE. It summarizes the theory behind Object-Oriented Design applied to complex system architectures. It then walks through the phases of the MBSE methodology, using system examples to illustrate key points. Subsequent chapters broaden the application of MBSE in Service-Oriented Architectures (SOA), real-time systems, cybersecurity, networked enterprises, system simulations, and prototyping. The vital subject of system and architecture governance completes the discussion. The book features exercises at the end of each chapter intended to help readers/students focus on key points, as well as extensive appendices that furnish additional detail in particular areas. The self-contained text is ideal for students in a range of courses in systems architecture and MBSE as well as for practitioners seeking a highly practical presentation of MBSE principles and techniques.


Defense Mechanisms

Defense Mechanisms

Author: Uwe Hentschel

Publisher: Elsevier

Published: 2004-06-12

Total Pages: 665

ISBN-13: 0080477070

DOWNLOAD EBOOK

The book is focused on defense mechanisms as theoretical constructs as well as the possibilities of their empirical registration by different methods, and the application of these constructs in different fields of psychology with special regard to concurrent and predictive validity. It is argued that defense mechanisms are in many ways to be seen as integrative constructs, not necessarily restricted to psychoanalytic theory and that the potential fields of their application have a wide ranging scope, comprising many fields of psychology. Consequently empirical studies are presented from the fields of clinical and personality psychology, psychotherapy research and psychosomatic phenomena and diseases. Methodological questions have a heavy weight in most of these studies. - Provides coverage of relevant literature - Covers different fields of application - Attempts an integration of the contstruct of defense mechanisms into mainstream psychology - Provides explanations of the theoretical basis of the construct of defense mechanisms


Cyber Defense Mechanisms

Cyber Defense Mechanisms

Author: Gautam Kumar

Publisher: CRC Press

Published: 2020-09-08

Total Pages: 231

ISBN-13: 1000171922

DOWNLOAD EBOOK

This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one single source. The book will take readers on a journey to understanding the security issues and possible solutions involving various threats, attacks, and defense mechanisms, which include IoT, cloud computing, Big Data, lightweight cryptography for blockchain, and data-intensive techniques, and how it can be applied to various applications for general and specific use. Graduate and postgraduate students, researchers, and those working in this industry will find this book easy to understand and use for security applications and privacy issues.