LEADER 01469nam--2200433---450- 001 990002203710203316 005 20100322164955.0 010 $a978-88-04-58602-9 035 $a000220371 035 $aUSA01000220371 035 $a(ALEPH)000220371USA01 035 $a000220371 100 $a20041123d2009----km-y0itay50------ba 101 1 $aita$cfre 102 $aIT 105 $aaf||||||001yy 200 1 $aVolevamo uccidere Hitler$el'ultimo testimone dell'operazione Valchiria racconta il complotto del 20 luglio 1944$fPhilipp von Boeselager$gcon Florence e Jérôme Fehrenbach 210 $aMilano$cMondadori$d2009 215 $aVIII, 138 p., [4] carte di tav.$cill.$d23 cm 225 2 $a<> scie 300 $aTraduzione di Alessandra Benabbi 410 0$12001$a<> scie 454 0$12001$aNous voulions tuer Hitler$933339 600 1$aHitler,$bAdolf$xAttentati$z1944$xMemorie$2BNCF 676 $a943.0864092 700 1$aBOESELAGER,$bPhilipp : von$0569139 702 1$aFEHRENBACH,$bFlorence 702 1$aFEHRENBACH,$bJérôme 702 1$aBENABBI,$bAlessandra 801 0$aIT$bsalbc$gISBD 912 $a990002203710203316 951 $aX.3.A. 1683$b215506 L.M.$cX.3.A.$d00256898 959 $aBK 969 $aUMA 979 $aMARIA$b10$c20041123$lUSA01$h1324 979 $aANNAMARIA$b90$c20100322$lUSA01$h1649 979 $aANNAMARIA$b90$c20100322$lUSA01$h1649 996 $aNous voulions tuer Hitler$933339 997 $aUNISA LEADER 03573nam 2200589 450 001 9910480466103321 005 20180613001252.0 010 $a1-4704-0688-8 035 $a(CKB)3360000000464462 035 $a(EBL)3113720 035 $a(SSID)ssj0000889038 035 $a(PQKBManifestationID)11488377 035 $a(PQKBTitleCode)TC0000889038 035 $a(PQKBWorkID)10875981 035 $a(PQKB)10601717 035 $a(MiAaPQ)EBC3113720 035 $a(PPN)195411609 035 $a(EXLCZ)993360000000464462 100 $a19830225h19831983 uy| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aLimiting equations for problems involving long range memory /$fM. Marcus and Victor Mizel 210 1$aProvidence, R.I., USA :$cAmerican Mathematical Socieity,$d[1983] 210 4$d©1983 215 $a1 online resource (68 p.) 225 1 $aMemoirs of the American Mathematical Society,$x0065-9266 ;$vvolume 43, number 278 (May 1983) 300 $aDescription based upon print version of record. 311 $a0-8218-2278-0 320 $aIncludes bibliographical references. 327 $a""IV. Condition for Precompactness in H of Positive Translates of an H-operator""""V. Limiting Equations""; ""5.1 I?©-limiting set of a solution""; ""5.2a???5.3 Existence for limiting equations defined on the entire line""; ""5.4a???5.5 Limiting set and limiting equation for a family of solutions""; ""VI. Generalization to Non-BV Outputs""; ""6.1a???6.2 Weakly H-operators""; ""VII. Applications to Hammerstein Hereditary Operators I""; ""7.1a???7.4 Hammerstein hereditary operators""; ""7.5a???7.6 Proof that Hammerstein hereditary operators belong to H"" 327 $a""7.7a???7.11 Verification that 'regular' Hammerstein hereditary operators are uniform H-operators and their positive translates are precompact in H""""7.12a???7.14 Representation theorem for limiting equations of a regular Hammerstein hereditary equation""; ""VIII. Applications to Functional Differential Equations""; ""8.1 Associating an H-operator to an FDE""; ""8.2a???8.3 Quasi-uniform H-operators, the class H[sub(a)]""; ""8.4a???8.7 Normalized translates, modified limiting sets of solutions""; ""8.8a???8.10 Existence of a limiting equation"" 327 $a""8.11a???8.12 A condition ensuring that limiting equations are also FDE's""""IX. Applications to Hammerstein Hereditary Operators II""; ""9.1a???9.2 Hammerstein hereditary operators with nonautonomous kernel""; ""9.3a???9.4 Proof that such operators belong to H""; ""9.5a???9.6 Conditions for regularity""; ""9.7a???9.9 Verification that 'regular' Hammerstein hereditary operators are uniform H-operators and their positive translates are precompact in H""; ""9.10 Representation theorem for limiting equations of a regular Hammerstein hereditary equation""; ""Acknowledgment""; ""Bibliography"" 410 0$aMemoirs of the American Mathematical Society ;$vnumber 278. 606 $aTopological dynamics 606 $aVolterra equations 608 $aElectronic books. 615 0$aTopological dynamics. 615 0$aVolterra equations. 676 $a510 s 676 $a514/.322 700 $aMarcus$b M$g(Moshe),$f1937-$0997676 702 $aMizel$b Victor J. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910480466103321 996 $aLimiting equations for problems involving long range memory$92288031 997 $aUNINA LEADER 01593nam 2200421 a 450 001 9910692682003321 005 20040811112532.0 035 $a(CKB)5470000002354642 035 $a(OCoLC)56130688 035 9 $aocm56130688 035 $a(OCoLC)995470000002354642 035 $a(EXLCZ)995470000002354642 100 $a20040811d2004 ua 0 101 0 $aeng 135 $aurmn|||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation security$b[electronic resource] $eagencies need to implement consistent processes in authorizing systems for operations : report to congressional requesters 210 1$a[Washington, D.C.] :$cU.S. General Accounting Office,$d[2004] 300 $aTitle from title screen (viewed on Aug. 6, 2004). 300 $a"June 2004." 300 $aPaper version available from: U.S. General Accounting Office, 441 G St., NW, Rm. LM, Washington, D.C. 20548. 300 $a"GAO-04-376." 320 $aIncludes bibliographical references. 517 $aInformation security 606 $aAdministrative agencies$zUnited States$xRules and practice$xEvaluation 606 $aData protection$zUnited States$xEvaluation 606 $aComputer security$zUnited States$xEvaluation 615 0$aAdministrative agencies$xRules and practice$xEvaluation. 615 0$aData protection$xEvaluation. 615 0$aComputer security$xEvaluation. 801 0$bGPO 801 1$bGPO 906 $aBOOK 912 $a9910692682003321 996 $aInformation Security$9771885 997 $aUNINA