01151cam0 2200301 450 E60020002625520070420095417.020070330d1975 |||||ita|0103 baitaIT<<I >>limiti della potenza americanaGli Stati Uniti nel mondo dal 1945 al 1954Joyce Kolko e Gabriel KolkoTorinoEinaudi1975XVI, 904 p.22 cmBiblioteca di cultura storica128(mr)altro esemplare in 900 Kol.Coll. 3/54b001LAEC000152022001 *Biblioteca di cultura storica128Kolko, JoyceA600200041376070157817Kolko, GabrielA600200041377070ITUNISOB20070420RICAUNISOBUNISOB900|Kol|Coll17273;47648E600200026255M 102 Monografia moderna SBNM3/54Si17273;47648acquistopregresso1UNISOBUNISOB20070330141932.020070330142040.0pregresso1900|Kol|Collaltro esemplare in 900 Kol.Coll. 3/54bLimiti della potenza americana1686483UNISOB06825nam 22008535 450 99646636560331620200704015644.03-642-10433-910.1007/978-3-642-10433-6(CKB)1000000000804421(SSID)ssj0000355476(PQKBManifestationID)11261332(PQKBTitleCode)TC0000355476(PQKBWorkID)10340745(PQKB)11504500(DE-He213)978-3-642-10433-6(MiAaPQ)EBC3064855(PPN)13996276X(EXLCZ)99100000000080442120100301d2009 u| 0engurnn|008mamaatxtccrCryptology and Network Security[electronic resource] 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009, Proceedings /edited by Juan A. Garay, Akira Otsuka1st ed. 2009.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2009.1 online resource (XIV, 538 p.) Security and Cryptology ;5888Bibliographic Level Mode of Issuance: Monograph3-642-10432-0 Cryptographic Protocol and Schemes I -- Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima -- Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security -- On Cryptographic Schemes Based on Discrete Logarithms and Factoring -- Invited Talk 1 -- Asymptotically Optimal and Private Statistical Estimation -- Cryptanalysis I -- Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT -- Saturation Attack on the Block Cipher HIGHT -- Extensions of the Cube Attack Based on Low Degree Annihilators -- An Analysis of the Compact XSL Attack on BES and Embedded SMS4 -- Wireless and Sensor Network Security I -- RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks -- Anonymizer-Enabled Security and Privacy for RFID -- Blink ’Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes -- Network Security -- DepenDNS: Dependable Mechanism against DNS Cache Poisoning -- Privacy and Anonymity -- Privacy-Preserving Relationship Path Discovery in Social Networks -- Verifying Anonymous Credential Systems in Applied Pi Calculus -- Transferable Constant-Size Fair E-Cash -- Functional and Searchable Encryption -- A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle -- Private-Key Hidden Vector Encryption with Key Confidentiality -- Invited Talk 2 -- Building Secure Networked Systems with Code Attestation -- Authentication -- HPAKE : Password Authentication Secure against Cross-Site User Impersonation -- An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart Cards -- Ensuring Authentication of Digital Information Using Cryptographic Accumulators -- Block Cipher Design -- MIBS: A New Lightweight Block Cipher -- Cryptanalysis II -- Distinguishing and Second-Preimage Attacks on CBC-Like MACs -- Improving the Rainbow Attack by Reusing Colours -- Side Channel Cube Attack on PRESENT -- Algebraic Attack on the MQQ Public Key Cryptosystem -- Algebraic and Number-Theoretic Schemes -- Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity -- Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves -- On the Complexity of Computing Discrete Logarithms over Algebraic Tori -- Wireless and Sensor Network Security II -- On the Usability of Secure Association of Wireless Devices Based on Distance Bounding -- Short Hash-Based Signatures for Wireless Sensor Networks -- Invited Talk 3 -- Computing on Encrypted Data -- Cryptographic Protocol and Schemes II -- Fully Robust Tree-Diffie-Hellman Group Key Exchange -- Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model -- Relinkable Ring Signature.This book constitutes the refereed proceedings of the 8th International Conference on Cryptology and Network Security, CANS 2009, held in Kanazawa, Japan, in December 2009. The 32 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 109 submissions. The papers are organized in topical sections on cryptographic protocols and schemes; cryptanalysis; wireless and sensor security; network security; privacy and anonymity; functional and searchable encryption; authentication; block cipher design; and algebraic and number-theoretic schemes.Security and Cryptology ;5888Data encryption (Computer science)Computer communication systemsNumber theoryCoding theoryInformation theoryMathematical logicComputer science—MathematicsCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Number Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/M25001Coding and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15041Mathematical Logic and Formal Languageshttps://scigraph.springernature.com/ontologies/product-market-codes/I16048Mathematics of Computinghttps://scigraph.springernature.com/ontologies/product-market-codes/I17001Kanazawa (2009)swdKongress.swdData encryption (Computer science).Computer communication systems.Number theory.Coding theory.Information theory.Mathematical logic.Computer science—Mathematics.Cryptology.Computer Communication Networks.Number Theory.Coding and Information Theory.Mathematical Logic and Formal Languages.Mathematics of Computing.004n/aDAT 461fstubDAT 465fstubSS 4800rvkGaray Juan Aedthttp://id.loc.gov/vocabulary/relators/edtOtsuka Akiraedthttp://id.loc.gov/vocabulary/relators/edtInternational Conference on Cryptology and Network SecurityBOOK996466365603316Cryptology and Network Security772198UNISA02126oam 2200565 450 991071203810332120190408092920.0(CKB)5470000002489722(OCoLC)954174515(OCoLC)959497418(EXLCZ)99547000000248972220160728d1905 ua 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierReport of progress of stream measurements for the calendar year 1904Part IIHudson, Passaic, Raritan, and Delaware River drainages /prepared under the direction F.H. Newell by R.E. Horton, N.C. Grover, and John C. Hoyt[Washington, D.C.] :Department of the Interior, United States Geological Survey,1905.Washington, D.C. :Government Printing Office.1 online resource (114 pages, 2 pages of plates) illustrations, mapsSeries P, Hydrographic progress reports ;30Water-supply and irrigation paper ;no. 125Title from title screen (viewed September 23, 2014).Includes bibliographical references and index.Hudson, Passaic, Raritan, and Delaware River drainages,RiversNew JerseyStream measurementsNew JerseyRiversfastStream measurementsfastNew JerseyfastRiversStream measurementsRivers.Stream measurements.Horton Robert E(Robert Elmer),1875-1945,1394098Grover Nathan Clifford1868-1956,Hoyt John Clayton1874-1946,Newell Frederick Haynes1862-1932,Geological Survey (U.S.),COPCOPOCLCOOCLCFAERDCOCLCAGPOBOOK9910712038103321Report of progress of stream measurements for the calendar year 19043450947UNINA04185nam 2200613 450 991027090970332120231115053757.01-119-27635-71-119-27631-41-119-38074-X(CKB)4100000000981173(OCoLC)1031279395(Safari)9781119270232(MiAaPQ)EBC5183773(CaSebORM)9781119270232(EXLCZ)99410000000098117320180109h20182018 uy 0engurunu||||||||txtrdacontentcrdamediacrrdacarrierThe CEO of technology lead, reimagine, and reinvent to drive growth and create value in unprecedented times /Hunter Muller1st editionHoboken, New Jersey :Wiley,2018.©20181 online resource (1 volume)Wiley CIO SeriesTHEi Wiley ebooks1-119-27023-5 Includes bibliographical references and index.Qualities of courageous leadership -- What keeps the CEO up at night -- Driving innovation across the enterprise -- Leaders of transformational change -- Elevation and career ascent -- The "eyes and ears" of the enterprise -- Building a robust network of partners -- Key takeaways.The CIO playbook, with lessons from the world's best leaders The CEO of Technology shows today's CIOs how to become exceptional leaders and bring value to their organization. By taking lessons from some of the world's best CEOs, you'll develop the traits and characteristics that drive legendary leadership. Interviews with top executives at leading global technology companies including Apple, Boeing, Direct TV, Facebook, Texas Instruments, and more provide deep and valuable insight into what it means to lead in a hyper-driven tech environment. These stories provide valuable lessons that don't come from a classroom, but only from the in-the-trenches experience of the world's best leaders—coupled with a groundbreaking leadership approach designed for the demands of today's markets, to give you the ultimate CIO handbook. You'll learn how to maximize the value of your greatest asset—your team—and how to drive performance to unprecedented levels. You'll discover how great leaders communicate business strategy across the modern enterprise, and become a driving force behind your organization's success. The IT industry is experiencing a seismic shift that is revolutionizing the way companies do business. The stakes are high, everything is in flux, and there are no guaranteed paths to success. Whether this revolution means crisis or opportunity is up to you; this book gives you a game-changing approach to IT leadership in the 21st century enterprise. Improve the quality of your leadership and strengthen the C-suite bond Attract top talent, build great teams, and align IT with overall strategic vision Become the indispensable leader who consistently drives achievement Integrate technology and business strategy to become a high-value CIO Modern CIOs face a radically new array of leadership challenges in today's ultra-competitive, highly volatile markets; are you capable of leading the charge to the top? The CEO of Technology offers a visionary approach and the wisdom of experience to help you join the ranks of great leaders.Wiley CIO series.THEi Wiley ebooks.Information technologyManagementTechnological innovationsManagementChief information officersChief executive officersLeadershipInformation technologyManagement.Technological innovationsManagement.Chief information officers.Chief executive officers.Leadership.658.4/2Muller Hunter1960-890070MiAaPQMiAaPQMiAaPQBOOK9910270909703321The CEO of technology2800736UNINA