| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910454483703321 |
|
|
Autore |
Bernstein Richard B. <1956-> |
|
|
Titolo |
The Founding Fathers reconsidered [[electronic resource] /] / R.B. Bernstein |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Oxford ; ; New York, : Oxford University Press, 2009 |
|
|
|
|
|
|
|
ISBN |
|
1-282-05376-0 |
9786612053764 |
0-19-971362-6 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (265 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Founding Fathers of the United States |
Founding Fathers of the United States - Historiography |
Electronic books. |
United States Politics and government 1775-1783 |
United States Politics and government 1783-1809 |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references (p. [187]-227) and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Contents; Preface; Chronology; CHAPTER 1: Words, Images, Meanings; CHAPTER 2: Contexts: The History That Made the Founding Fathers; CHAPTER 3: Achievements and Challenges: The History the Founding Fathers Made; CHAPTER 4: Legacies: What History Has Made of the Founding Fathers; EPILOGUE: The Founding Fathers, History, and Us; Appendix: The Founding Fathers: A Partial List; Acknowledgments; Notes; Further Reading; Index |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Here is a concise, scholarly, yet accessible overview of the brilliant, flawed, and quarrelsome group of lawyers, politicians, merchants, military men, and clergy known as ""the Founding Fathers""--who got as close to the ideal of the Platonic ""philosopher-kings"" as American or world history has ever seen. In The Founding Fathers Reconsidered, R. B. Bernstein reveals Washington, Franklin, Jefferson, Adams, Hamilton, and the other founders not as shining demigods but as imperfect human beings--people much like us--who nevertheless achieved political greatness. They emerge here as men who soug |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNISA996465753003316 |
|
|
Titolo |
Financial Cryptography and Data Security [[electronic resource] ] : 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers / / edited by Aggelos Kiayias |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2017.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XIV, 650 p. 132 illus.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology ; ; 10322 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data encryption (Computer science) |
Computers |
Law and legislation |
Computers and civilization |
Software engineering |
Cryptology |
Legal Aspects of Computing |
Computers and Society |
Software Engineering/Programming and Operating Systems |
Information Systems and Communication Service |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
Privacy and Identity Management -- Privacy and Data Processing -- Cryptographic Primitives and API's.-Vulnerabilities and Exploits -- Blockchain Technology -- Security of Internet Protocols -- Blind signatures.-Searching and Processing Private Data -- Secure Channel Protocols -- Privacy in Data Storage and Retrieval. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Conference on Financial Cryptography and Data Security, FC 2017, held in Sliema, Malta, in April 2017. The 30 revised full papers and 5 short papers were carefully selected and reviewed from 132 submissions. The papers are grouped in the following topical sections: Privacy and Identity Management; Privacy and Data Processing; Cryptographic Primitives and API's; |
|
|
|
|
|
|
|
|
|
|
Vulnerabilities and Exploits; Blockchain Technology; Security of Internet Protocols; Blind signatures; Searching and Processing Private Data; Secure Channel Protocols; and Privacy in Data Storage and Retrieval. |
|
|
|
|
|
| |