Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Pain: Psychological Perspectives

Buy
This volume offers a state-of-the-art, comprehensive account of the psychology
of pain that encompasses clinical perspectives but also basic social and
behavioral science as well as biopsychological contributions to the field.
The relatively recent focus on pain as a subjective experience has led to
dramatic improvements in our understanding of the complex psychological
processes that represent and control pain. There has also been an enhanced
understanding of the ontogenetic, socialization, and contextual determinants
of pain. Mechanisms responsible for the complex synthesis of
sensations, feelings, and thoughts underlying pain behavior have been the
target of concerted research and clinical investigation. This volume explicates
our current understanding of the current theory, research, and practice
on these complex psychological processes. We are proud of our list of
contributors that includes some of the most influential and productive pain
researchers in the world.

Although the book is primarily intended for psychologists (practitioners,
researchers, and students) managing, investigating, and studying pain, it
would also be of interest to a variety of other professionals working in this
area (e.g., physicians, nurses, physiotherapists). The book is also suitable
as a textbook for graduate and advanced undergraduate courses on the
psychology of pain.
(HTML tags aren't allowed.)

Information, Interaction, and Agency
Information, Interaction, and Agency
Contemporary epistemological and cognitive studies, as well as recent trends in computer science and game theory have revealed an increasingly important and intimate relationship between Information, Interaction, and Agency. Agents perform actions based on the available information and in the presence of other interacting agents. From this...
Tribal Politics in the Borderland of Egypt and Libya (Palgrave Series in African Borderlands Studies)
Tribal Politics in the Borderland of Egypt and Libya (Palgrave Series in African Borderlands Studies)
This book explores the tribal politics of the Awlad ‘Ali Bedouin in the borderland of Egypt and Libya. These tribal politics are part of heterarchy in which sovereignty is shared between tribes, states and other groups and, within this dynamic setting, the local politicians of the Awlad ‘Ali are essential producers of order beyond...
Windows Vista Secrets
Windows Vista Secrets
"If one book can help you master Vista, this is it." --Fred Langa, former editor-in-chief of Byte Magazine

"These two know more about Windows than Microsoft does." --Chris Pirillo, editor of Lockergnome.com

Go beyond Microsoft's Help guide and discover the true secrets of Windows Vista that are essential...


MATLAB Programming with Applications for Engineers
MATLAB Programming with Applications for Engineers

MATLAB PROGRAMMING WITH APPLICATIONS FOR ENGINEERS seeks to simultaneously teach MATLAB as a technical programming language while introducing the student to many of the practical functions that make solving problems in MATLAB so much easier than in other languages. The book provides a complete introduction to the fundamentals of good...

Realtime Data Mining: Self-Learning Techniques for Recommendation Engines (Applied and Numerical Harmonic Analysis)
Realtime Data Mining: Self-Learning Techniques for Recommendation Engines (Applied and Numerical Harmonic Analysis)

​​​​Describing novel mathematical concepts for recommendation engines, Realtime Data Mining: Self-Learning Techniques for Recommendation Engines features a sound mathematical framework unifying approaches based on control and learning theories, tensor factorization, and hierarchical methods. Furthermore, it...

E-Mail Security: A Pocket Guide
E-Mail Security: A Pocket Guide

E-mail is now an established and increasingly essential channel of business and personal communication. As such, safeguarding its operation and integrity is an issue of widespread significance. At the same time, e-mail has proven itself to represent a considerable threat vector, providing a route for a variety of attacks including malware,...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy