Make your own eBooks

Use our Remix App to mix & match content. In minutes make your own course packs, training bundles, custom travel guides, you name it. Even add your own title & cover.


Slices & Articles Get by the slice or add to your own ebook

Medium 9781855758896

CHAPTER ELEVEN. Psychoanalysis and the child

Slice ePub May 23, 2014

Tine Norregaard Arroyo and Michael Plastow

The psychoanalysis of children was, from the outset, a domain of female analysts, being designated as such by Freud himself. Such women, moreover, were generally non-medical analysts, for no less a reason than by virtue of the fact that women were barred from studying medicine at the time. These women also took up the place of educators of children, both in the sense of raising children, but also literally as teachers. Such was the case of the woman whom we can situate as the first psychoanalyst of children, Hermine Hug-Hellmuth. These beginnings open up a question regarding the place of the analyst in regard to a child, the maternal relationship tending to be conflated, in the first instance, with the transference.

In addition, as is well known, many of the early analysts analysed their own children. Most prominent amongst this trend was Anna Freud’s analysis by her father Sigmund Freud. Melanie Klein also situated herself as analyst of her own children. The analysis of little Hans by his father, who was a member of Freud’s circle, is also a case in point. Freud explicitly articulates this position in relation to the case of little Hans, but puts it forwards as necessary:

See more
Medium 9780596006846

Command Reference

Slice PDF May 27, 2014

• Cross-references and footnotes (Table 25)

• Office Assistant keys (Table 26)

• Task Pane keys (Table 27)

To assign your own keyboard shortcuts for many of these and other Word operations, select Tools ➝ Customize and click the Keyboard button.

Command Reference

There are over 1,000 commands available in Word 2003 and only some of them make their way onto Word’s menus and toolbars or were given keyboard shortcuts. Table 2 lists some useful commands and suggestions on where you might add them. To see all the commands built into Word, select

Tools ➝ Customize, click the Commands tab, and select All

Commands from the Categories list. Check out the section on customizing Word in Part 2 for details on adding these commands to the interface.

Table 2. Useful Word commands



Suggested uses


Removes all character formatting, reverting text to the default paragraph formatting. Same as pressing Ctrl-Space or choosing Clear Formatting from Style drop-down menu.

Add button to Formatting toolbar, Text shortcut menu, or create as macro.

See more
Medium 9781601323286

Development of a Mathematical Model for Designing Reliable Information Systems and its Properties

Slice PDF December 15, 2014


Int'l Conf. Software Eng. Research and Practice | SERP'14 |





The 2014 International Conference on Software Engineering Research and Practice (SERP'14),

Las Vegas, USA, July 21-24, 2014

Seilkhan Boranbayev

L.N. Gumilyov Eurasian National University

5 Munaitpasov Street

Astana, 010008, Kazakhstan

Askar Boranbayev

Nazarbayev University

Astana, Kazakhstan

Sanzhar Altayev

L.N. Gumilyov Eurasian National University

5 Munaitpasov Street

Astana, 010008, Kazakhstan

Abstract—It is necessary to reduce dependence of results quality from development of information systems on such subjective factors as qualification and experience of performers, to lower risk of unsuccessful completion of the project. There is an urgent need today for science-based technological methods of information systems to plan the parameters of a software project, to guarantee the required quality of results. Thus, the creation of scientific methods and technologies for the information systems design is an important scientific and technical problem. This article is devoted to development of methods of design and distribution of resources for development of information systems.

See more
Medium 9781783102235

Richmond Barthé (1901-1989)

Source: Escultura
Slice ePub June 08, 2014

Medium 9780596528003

Networking with TCP/IP

Slice PDF May 28, 2014

Networking with TCP/IP

While Windows Vista has the capability of using several networking protocols, the primary protocols used are TCP and IP. Windows Vista uses the TCP/IP protocol for networking among peer-to-peer networks, domain-controlled networks, and the

Internet. TCP/IP is a vital protocol set for using your operating system fully.

Windows Vista contains a new TCP/IP stack, referred to as a dual stack, that works with IP Version 4 (IPv4) and IP Version 6 (IPv6). IPv4 uses a limited 32-bit address space, defined by four octets and a subnet mask composed of four octets. IPv6 uses a

128-bit addressing scheme, allowing for the needed IP growth of the Internet.

Understanding IPv4

IP addresses used with IPv4 can be divided into two parts: the network ID and the host ID. The network ID identifies the network on which a computer or device is located and the host ID identifies the computer or device.

An example of an IPv4 address is, which shows the four distinct sets of numbers divided by a period, or dot. Each section separated by a dot is referred to as an octet, which correlates to an eight-bit number in binary form.

See more

See All Slices

0 Items 0.0 Mb
Sub-total $0.00
Title & Cover
Make ebook
or drag to add content