| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA990003593220203316 |
|
|
Autore |
DAVOLI, Zeno |
|
|
Titolo |
Terre di Langobardia : carte a stampa nazionali e locali nella raccolta sanfelici 1544-1996 / Zeno Davoli, Roberto Sanfelici |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Biblioteca Panizzi - Raccolta Sanfelici - Carte geografiche - Cataloghi |
|
|
|
|
|
|
Collocazione |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910330710403321 |
|
|
Autore |
Beaufils Cécile |
|
|
Titolo |
Frontières de la non-fiction : Littérature, cinéma, arts / / Alison James, Christophe Reig |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Rennes, : Presses universitaires de Rennes, 2018 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (226-[12] p.) |
|
|
|
|
|
|
Altri autori (Persone) |
|
BoucharencMyriam |
ChristoffelDavid |
FartasNadia |
JamesAlison |
LarroqueTiphaine |
Métais-ChastanierBarbara |
Pierron-MoinelMarie-Josèphe |
PluvinetCharline |
ReigChristophe |
TriantafyllouAngelos |
VérayLaurent |
ZéauCaroline |
ZenettiMarie-Jeanne |
|
|
|
|
|
|
|
|
Soggetti |
|
Literary Theory & Criticism |
non-fiction |
roman |
documentaire |
cinéma |
théâtre contemporain |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Sommario/riassunto |
|
Non-fiction, documentaire : l'apparent parallélisme des deux termes recèle néanmoins des différences importantes. Le présent ouvrage explore la frontière entre les genres documentaires et une « esthétique |
|
|
|
|
|
|
|
|
|
|
|
|
|
du document » qui traverse depuis plus d'un siècle les genres et les formes artistiques. En considérant moins le document en soi que les différents modes documentaires (l'adjectif impliquant le montage et l'agencement d'un matériau indiciel) et plus précisément en s'attachant à la notion quelque peu paradoxale d'« esthétique documentaire », on peut voir s'affronter deux voies de légitimation que peuvent emprunter l'art et la littérature. D'une part, « l'accroche » au réel et au vécu ; d'autre part, la référence à l'autonomie de l'activité artistique – principe qui semble pourtant de plus en plus fragilisé aujourd'hui. À la croisée de diverses formes de « non-fiction », les articles et entretiens réunis ici proposent une réflexion sur les rapports entre texte et image, ainsi que sur les pratiques et les discours du cinéma, du théâtre, de l'art vidéo, et du drame radiophonique au xxe siècle et à l'époque contemporaine. Sans perdre de vue pour autant la spécificité des modes de représentation ou de « saisie » du réel propre à chaque domaine artistique, nous interrogeons également l'émergence et la prolifération de formes hybrides qui allient de manière ambigüe la force des faits et la fascination de la fiction. |
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910485030203321 |
|
|
Titolo |
Transactions on computational science IV : special issue on security in computing / / Marina L. Gavrilova, C.J. Kenneth Tan, Edward David Moreno (eds.) |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, : Springer-Verlag, c2009 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2009.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XVIII, 263 p.) |
|
|
|
|
|
|
Collana |
|
Lecture notes in computer science ; ; 5430 |
|
|
|
|
|
|
Altri autori (Persone) |
|
GavrilovaMarina L |
MorenoEdward David |
TanC. J. Kenneth (Chih Jeng Kenneth) |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer security |
Data protection |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
|
|
|
|
|
Nota di contenuto |
|
Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines -- Behavioural Characterization for Network Anomaly Detection -- The Power of Anonymous Veto in Public Discussion -- Collusion-Resistant Message Authentication in Overlay Multicast Communication -- A Model for Authentication Credentials Translation in Service Oriented Architecture -- Secure and Efficient Group Key Agreements for Cluster Based Networks -- An Integrated ECC-MAC Based on RS Code -- Optimizing Pseudonym Updation in Vehicular Ad-Hoc Networks -- Security Analysis of Role Based Access Control Models Using Colored Petri Nets and CPNtools -- Role Based Access Control with Spatiotemporal Context for Mobile Applications -- A Method for Estimation of the Success Probability of an Intrusion Process by Considering the Temporal Aspects of the Attacker Behavior -- A Hardware Architecture for Integrated-Security Services -- Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology -- Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science, but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the facilitating theoretical foundations and the applications of large-scale computations and massive data processing. It addresses researchers and practitioners in areas ranging from aerospace to biochemistry, from electronics to geosciences, from mathematics to software architecture, presenting verifiable computational methods, findings and solutions and enabling industrial users to apply techniques of leading-edge, large-scale, high performance computational methods. This issue focuses on the theme of security in computing, a topic of vital importance in the increasingly connected world of today. The 14 extensive papers selected for inclusion in this volume give an in-depth coverage of a number of hot topics in the field, presenting new architectures, novel hardware implementations, cryptographic algorithms and security protocols, and new tools and applications. |
|
|
|
|
|
|
|
| |