| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910210658703321 |
|
|
Titolo |
Il patrimonio industriale in Molise : itinerari di un censimento in corso a cura di Roberto Parisi, Ilaria Zilli ; presentazione di Renato Covino |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
XIX, 240 p., [68] c. di tav : ill. ; 24 cm |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Locazione |
|
|
|
|
|
|
Collocazione |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
2. |
Record Nr. |
UNINA9910451061503321 |
|
|
Autore |
St. Denis Tom |
|
|
Titolo |
Cryptography for developers [[electronic resource] /] / Tom St Denis, Simon Johnson |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Rockland, MA, : Syngress Publishing, Inc., c2007 |
|
|
|
|
|
|
|
ISBN |
|
1-281-07185-4 |
9786611071851 |
0-08-050345-4 |
|
|
|
|
|
|
|
|
Edizione |
[1st edition] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (449 p.) |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Computer software - Development |
Cryptography |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
|
|
|
|
|
Nota di contenuto |
|
Front Cover; Cryptography for Developers; Copyright Page; Contents; Preface; Chapter 1. Introduction; Introduction; Threat Models; What Is Cryptography?; Asset Management; Common Wisdom; Developer Tools; Summary; Organization; Frequently Asked Questions; Chapter 2. ASN.1 Encoding; Overview of ASN.1; ASN.1 Syntax; ASN.1 Data Types; ASN.1 Length Encodings; ASN. 1 Boolean Type; ASN.1 Integer Type; ASN.1 BIT STRING Type; ASN.1 OCTET STRING Type; ASN.1 NULL Type; ASN.1 OBJECT IDENTIFIER Type; ASN.1 SEQUENCE and SET Types; ASN.1 PrintableString and IA5STRING Types; ASN.1 UTCTIME Type |
IniplementationASN.1 Length Routines; ASN.1 Primitive Encoders; Putting It All Together; Frequently Asked Questions; Chapter 3. Random Number Generation; Introduction; Measuring Entropy; How Bad Can It Be?; RNG Design; PRNG Algorithms; Putting It All Together; Frequently Asked Questions; Chapter 4. Advanced Encryption Standard; Introduction; Implementation; Practical Attacks; Chaining Modes; Putting It All Together; Frequently Asked Questions; Chapter 5. Hash Functions; Introduction; Designs of SHS and Implementation; PKCS # 5 Key Derivation; Putting It All Together |
Frequently Asked QuestionsChapter 6. Message-Authentication Code Algorithms; Introduction; Security Guidelines; Standards; Cipher Message Authentication Code; Hash Message Authentication Code; Putting It All Together; Frequently Asked Questions; Chapter 7. Encrypt and Authenticate Modes; Introduction; Design and Implementation; Putting It All Together; Frequently Asked Questions; Chapter 8. Large Integer Arithmetic; Introduction; What Are BigNums?; The Algorithms; Putting It All Together; Frequently Asked Questions; Chapter 9. Public Key Algorithms; Introduction |
Goals of Public Key CryptographyRSA Public Key Cryptography; Elliptic Curve Cryptography; Putting It All Together; Frequently Asked Questions; Index |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
The only guide for software developers who must learn and implement cryptography safely and cost effectively.The book begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910450362803321 |
|
|
Autore |
Caldwell Phoebe |
|
|
Titolo |
Finding you, finding me [[electronic resource] ] : using intensive interaction to get in touch with people with severe learning disabilities combined with autistic spectrum disorder / / Phoebe Caldwell |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
London, : Jessica Kingsley, 2005 |
|
|
|
|
|
|
|
ISBN |
|
1-280-53817-1 |
9786610538171 |
1-84642-239-6 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (176 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Autism |
Body language |
Developmentally disabled - Means of communication |
Interpersonal communication |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di contenuto |
|
COVER; Finding You Finding Me:Using Intensive Interaction to get in touch with people whose severe learning disabilities are combined with autistic spectrum disorder; Contents; 1.Introduction; What is this book about?; Introducing Christopher, Pranve and Gabriel; Intensive Interaction; Digression into the world of 'feeling'; Whose reality?; ASD and learning disabilities?; Developing interaction; 2.What is Autism?; What does autism feel like?; Overload; Fragmentation; Coping strategies; Fight/flight response; Inducing stress; Descriptions of fragmentation; Looking for meaning; Fixations |
3.Causes of Stress Hypersensitivities; Vision; Sound; Balance; Touch; Smell and taste; Synaesthesia; Emotional overload; Not knowing what is happening; Speech, understanding and communication; Functional language and emotional access; Hollow words; Getting to know each other; Clarity, gesture, sign and speech; Restricted speech; Swearing - a passive acceptance approach; Delayed echolalia; Time; Choices and change; Hormones; 4. Behaviour - Challenging or Distressed?; Can we |
|
|
|
|
|
|
|
|
|
|
|
have a miracle please?; 'Trading on their autism'; Reducing the sensory overload; Looking for triggers; Aggression |
Self-harm Moving attention away from the inner turmoil; Diversion; Maintenance of successful strategies; Epilepsy; 5.Intensive Interaction; The dynamic of conversations; Seeing things differently; Significance; Imitation; Repetitive behaviour and the brain-body language; Where we are focused - feedback; Surprise; Observation and the individual repertoire; Neglecting the inner-world language; Christopher; Intensive Interaction and attention to the hypersensitivities; Video; Pranve; Gabriel; Working from the present; Using the personal code; Moving attention from 'self ' to 'other' |
The discontinuity in expectation 'Ringing a bell'; Intensive Interaction and stress reduction; Habituation; Long-term effectiveness of Intensive Interaction; 6.The Development of Self; What do we mean by 'self '?; The dual message; Failing to find a sense of self; Raising self-esteem; Significant responses; Gabriel and the dyad; The glass bubble; Separation; Coda; Appendix A:The Causes of ASD; Appendix B: The Way In - Using Intensive Interaction; References; Resources; Subject Index; Author Index |
|
|
|
|
|
|
Sommario/riassunto |
|
Caldwell introduces Intensive Interaction, which uses the body language of people whose learning disabilities are combined with autistic spectrum disorder - who have largely been regarded as unreachable - to get in touch with them, giving them a way of expressing themselves which shifts their attention from self-stimulation to shared activity. |
|
|
|
|
|
|
|
| |