| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA990009437460403321 |
|
|
Autore |
Catalano, Giuseppe <1888-1981> |
|
|
Titolo |
Tre anni di attività (1949, 1950, 1951) / [Giuseppe Catalano] |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
|
|
|
|
Descrizione fisica |
|
16 p., 7 c. di tav. : ill. ; 25 cm |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Locazione |
|
|
|
|
|
|
Collocazione |
|
60 DONO CATALANO 112/8 |
60 DONO CATALANO 113/7 |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Estr. da: Delpinoa. n.s. Bullettino dell'Istituto ed Orto botanico dell'Università di Napoli, vol. 4 tomo 31 |
In testa al front.: Stazione sperimentale per le piante officinali |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910795853003321 |
|
|
Autore |
Slobogin Christopher <1951-> |
|
|
Titolo |
Proving the unprovable [[electronic resource] ] : the role of law, science, and speculation in adjudicating culpability and dangerousness / / Christopher Slobogin |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
New York, : Oxford University Press, 2007 |
|
|
|
|
|
|
|
ISBN |
|
0198040962 |
9780198040965 |
0-19-989398-5 |
0-19-804096-2 |
1-280-84603-8 |
1-4294-0297-0 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Collana |
|
American Psychology-Law Society series |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Evidence, Expert - United States |
Criminal liability - United States - Psychological aspects |
Criminal liability - Social aspects - United States |
Violent offenders - United States |
Criminal psychology - United States |
Forensic psychology - United States |
Forensic sociology - United States |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
The need for nuance -- Diagnoses, syndromes, and criminal responsibility -- The case for informed speculation -- Redefining probative value -- Beyond relevance -- The current state of the science and the law -- Are there "experts" on dangerousness? -- The structure of expertise in criminal cases. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910299768303321 |
|
|
Autore |
Slinko A. M (Arkadii M.) |
|
|
Titolo |
Algebra for Applications : Cryptography, Secret Sharing, Error-Correcting, Fingerprinting, Compression / / by Arkadii Slinko |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2015.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XIV, 328 p. 5 illus., 1 illus. in color.) |
|
|
|
|
|
|
Collana |
|
Springer Undergraduate Mathematics Series, , 2197-4144 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Algebra |
Computer science - Mathematics |
Discrete mathematics |
Mathematical Applications in Computer Science |
Discrete Mathematics |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di contenuto |
|
Integers -- Cryptology -- Groups -- Fields -- Polynomials -- Secret Sharing -- Error-Correcting Codes -- Compression -- Appendix A: GAP -- Appendix B: Miscellanies -- Solutions to Exercises. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book examines the relationship between mathematics and data in the modern world. Indeed, modern societies are awash with data which must be manipulated in many different ways: encrypted, compressed, shared between users in a prescribed manner, protected from an unauthorised access and transmitted over unreliable channels. All of these operations can be understood only by a person with knowledge of basics in algebra and number theory. This book provides the necessary background in arithmetic, polynomials, groups, fields and elliptic curves that is sufficient to understand such real-life applications as cryptography, secret sharing, error-correcting, fingerprinting and compression of information. It is the first to cover many recent developments in these topics. Based on a lecture course given to third-year undergraduates, it is self-contained with numerous worked examples and exercises provided to test understanding. It can additionally be used for self-study. |
|
|
|
|
|
|
|
| |