Front Cover -- Social Work and Human Problems: Casework, Consultation and Other Topics -- Copyright Page -- Table of Contents -- Foreword -- Introduction -- Part I: Aspects of Casework -- Chapter 1. Renaissance in British Casework -- Chapter 2. The Function and Use of Relationship Between Client and Psychiatric Social Worker -- References -- Chapter 3. Transference and Reality in the Casework Relationship -- Relation Between Psycho-analytic Theory and Psycho-analytic Technique -- Transference and Reality in Relationships -- Role-playing in Casework
Access options:
The following links lead to the full text from the respective local libraries:
Oil is currently bought and sold in US dollars on the major oil markets. Recent rhetoric indicates some exporters are considering supporting a conversion to euro pricing of oil. Yet, the dollar has a firm grip. A switch is unlikely in the short- to medium-term as it would be exceedingly difficult given the structure and inertia inherent in oil markets along with the euro's second tier status to the dollar. The turbulent politics of many oil exporting countries-especially Islamic ones-could spur a spiteful movemnt to end dollar pricing but the significant obstacles producers must overcome may be too great for now. However, both economic and non-economic political concerns as a sources of change become more probable as the time horizon is extended, allowing time for the euro to mature and achieve a greater stake in international financial markets.
Computer and network security have become concerns for enterprises ranging from sole proprietorships run from home offices to global corporations and government agencies with hundred of thousands of employees. These concerns are reflected in the growing demand for computer security professionals to design, manage, and administer systems. Here a case is built for significant use of laboratory work to complement classroom and reading activities in computer security education. ; Approved for public release; distribution is unlimited.
We describe a high-assurance framework for networked clients and servers. Called Roundhouse consists of the following elements: (1) Pinkerton, a comprehensive model for the implementation of distributed protection domains that provide for robust protection in a networked environment; (2) Iron Horse: Functional and security design of a kernelized host providing essential ring-based protection, packet authentication, and cryptography services for higher layers. (3) DEPOT: Specification, design, and prototype implementation on a PC base of the framework and initial content of dynamically modifiable servers. The intent is that DEPOT clients and servers would take advantage of platform protected modes where available (e.g., Windows NT, Iron Horse) leading to client-server computing in a network of heterogeneously trusted hosts. As a general facility for installing and managing application "hooks" DEPOT incorporates the following key new ideas: (1) the division of sets of hooks by module, (2) the partial ordering of modules, (3) binding hooks to network names, and (4) provision of a run-time model of module behavior with a visible state machine model that abstracts and externalizes the dynamic behavior of that module. The architecture is unique as it composes strong and weak systems securely and permits the dynamic retooling of executing software. ; Approved for public release; distribution is unlimited.
(U) The Naval Postgraduate School Center for Information Systems Security (INFOSEC) Studies and Research (NPS CISR) is developing a comprehensive program in INFOSEC education and research that can become a resource for DoN/DoD and U.S Government in terms of educational materials and research. A security track within the Computer Science curriculum has been established. Its philosophical core is the abstract notion of conceptually complete security mechanism, the Reference Monitor Concept. Building upon a core curriculum of computer science and engineering, the security courses convey vital concepts and techniques associated with INFOSEC today.
For three days last January, an international group met to discuss some of the issues at the First ACM Workshop on Education in Computer Security, held in Monterey, California. Representatives from 20 universities and a sprinkling of information systems security employers from industry and government were invited to attend based on position papers they had written. The group�s task was to discuss ways to address the impending crisis in information security education. Among the questions addressed were articulating the diversity of information security education requirements for different careers and the need for training and retaining security experts in education. ; Approved for public release; distribution is unlimited.