top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Artificial Intelligence and Security [[electronic resource] ] : 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part I / / edited by Xingming Sun, Zhaoqing Pan, Elisa Bertino
Artificial Intelligence and Security [[electronic resource] ] : 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part I / / edited by Xingming Sun, Zhaoqing Pan, Elisa Bertino
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XVII, 655 p. 342 illus., 214 illus. in color.)
Disciplina 006.3
Collana Security and Cryptology
Soggetto topico Computer security
Artificial intelligence
Computers
Computer communication systems
Optical data processing
Law and legislation
Systems and Data Security
Artificial Intelligence
Information Systems and Communication Service
Computer Communication Networks
Image Processing and Computer Vision
Legal Aspects of Computing
ISBN 3-030-24274-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cloud Computing -- Fuzzy Clustering: A New Clustering Method in Heterogeneous Medical Records Searching -- NOAA-LSTM: A New Method of Dialect Identification -- Evaluation Method of Teachers' Teaching Ability Based on BP Neural Network -- Research on the Promotion of Tibetan New Words and Platform Design -- A Classification Model for Drug Addicts Based on Improved Random Forests Algorithm -- Studying L-Diversity and K-Anonymity over Datasets with Sensitive Fields -- Power System Transient Stability Prediction Algorithm Based on ReliefF and LSTM -- A No-pairing Proxy Re-Encryption Scheme for Data Sharing in Untrusted Cloud -- E-sports Ban/Pick Prediction Based On Bi-LSTM Meta Learning Network -- Bottlenecks and Feasible Solutions of Data Field Clustering in Impact Factor, Time Resolution, Selecting Core Objects and Merging Process -- Detection of Microblog Overlapping Community Based on Multidimensional Information and Edge Distance Matrix -- Research on Settlement Deformation of Asphalt Pavement Structure in Soft Soil Zone Based on Pavement Settlement Theory -- Legal Case Inspection: An Analogy-based Approach to Judgment Evaluation -- A Novel Noise Filter Based on Multiple Voting -- Fuzzy Control Method for Path Tracking System of Combine Harvester -- Research on Opinion Spam Detection by Time Series Anomaly Detection -- Application of Machine Learning Methods for Material Classification with Multi-energy X-ray Transmission Images -- Intra-class Classification of Architectural Styles Using Visualization of CNN -- MSE-Net: Pedestrian Attribute Recognition using MLSC and SE-Blocks -- CBAM-GAN: Generative Adversarial Networks Based on Convolutional Block Attention Module -- A Novel Distributed Knowledge Reasoning Model -- Research on Detection Method Of Abnormal Traffic In SDN -- Research on Constructing Technology of Implicit Hierarchical Topic Network Based on FP-growth -- PPD-DL: Privacy-Preserving Decentralized Deep Learning -- Towards Edge Computing based Distributed Data Analytics Framework in Smart Grids -- Android Malware Identification Based on Traffic Analysis -- Unsupervised Traditional Chinese Medicine Text Segmentation Combined with Domain Dictionary -- Research on the Efficiency and Application of Ship- helicopter Cooperative Search -- Cellular Neural Network Based Contour Detection for Seismic Image -- Discovering New Sensitive Words Based on Sensitive Information Categorization -- A Dynamic Event Region Tracking Approach Based on Node Calibration -- A Graph Updating Method of Data Theft Detection Based on Rough Set -- A Tutorial of Graph Representation -- Ground-based Cloud Images Recognition Based on GAN and PCANet -- Sparse Representation-Based Radiomics in the Diagnosis of Thyroid Nodules -- Local Smoothing Constraint in Convolutional Neural Network for Image Denoising -- Perceptual Loss based Super-Resolution Reconstruction from Single Magnetic Resonance Imaging -- DWI Fiber Tracking with Functional MRI of White Matter -- Multi-objective Investment Decision Making Based on An Improved SPEA2 Algorithm -- Power Load Forecasting Based on Adaptive Deep Long Short-Term Memory Network -- Optimized White Matter Fiber Reconstruction Using Combination of Diffusion and Functional MRI -- Convolutional Neural Networks for Scene Image Recognition -- A Classification Model of Power Equipment Defect Texts Based on Convolutional Neural Network.-Research on Artificial Intelligence Technology in Computer Network Technology -- Research on Detection Method of Unhealthy Message in Social Network -- Image Authentication by Single Target Region Detection -- Security Approaches and Crypto Algorithms in Mobile Cloud Storage Environment to Ensure Data Security -- Probe-Polling: A polling based MAC protocol for Energy Harvesting Wireless Sensor Networks -- An Dynamic Protocol for the Quantum Secure Multi-party Summation based on Commutative Encryption -- Optimal Resource Allocation for Energy Harvesting Cognitive Radio Network with Q Learning -- Facial Expression Recognition Based on Complete Local Binary Pattern and Convolutional Neural Network -- A Novel Malware Detection and Classification Method Based on Capsule Network -- Application of Gradient Boosting Decision Tree in Wind Turbine Drivetrain Recognition -- Implementation of MD5 Collision Attack in Program -- Automatic Discovery Mechanism of Blockchain Nodes Based on the Kademlia Algorithm -- Monochromatic Mutual Nearest Neighbor Queries over Uncertain Data -- Network-Embedding Based Storage Location Assignment in Mobile Rack Warehouse -- Efficient PatchMatch-based Image Registration and Retargeting for Cartoon Animation.
Record Nr. UNISA-996466212703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Artificial Intelligence, Computational Modelling and Criminal Proceedings [[electronic resource] ] : A Framework for A European Legal Discussion / / by Serena Quattrocolo
Artificial Intelligence, Computational Modelling and Criminal Proceedings [[electronic resource] ] : A Framework for A European Legal Discussion / / by Serena Quattrocolo
Autore Quattrocolo Serena
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (242 pages) : illustrations
Disciplina 345.4
Collana Legal Studies in International, European and Comparative Criminal Law
Soggetto topico Criminal law - European Union countries
Private international law
Conflict of laws
Mass media
Law
Computers
Law and legislation
European Criminal Law
Private International Law, International & Foreign Law, Comparative Law
IT Law, Media Law, Intellectual Property
Legal Aspects of Computing
Intel·ligència artificial
Investigació criminal
Soggetto genere / forma Llibres electrònics
ISBN 3-030-52470-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part I: Introducing the Problem -- 1. Approaching the Unknown: Some Preliminary Words -- 2. A Theoretical Framework for the Discussion on AI and Criminal Law -- Part II Direct and Indirect Impact of Widespread Computational Modelling on Evidence Gathering -- 3. Hacking by Law-Enforcement: Investigating with the Help of Computational Models and AI Methods -- 4. Equality of Arms and Automatedly Generated Evidence -- Part III: Challenges of Computational Methods to the Judicial Decision-Making Process: Deciding v. Predicting -- 5. Predictability and Criminal Justice -- 6. Predictability of Violent Behaviour and Recidivism -- 7. Predictability and the Criminal Justice Decision-Making Process -- 8. The Gist of the Inquiry.
Record Nr. UNINA-9910416140803321
Quattrocolo Serena  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Attribution of Advanced Persistent Threats [[electronic resource] ] : How to Identify the Actors Behind Cyber-Espionage / / by Timo Steffens
Attribution of Advanced Persistent Threats [[electronic resource] ] : How to Identify the Actors Behind Cyber-Espionage / / by Timo Steffens
Autore Steffens Timo
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer Vieweg, , 2020
Descrizione fisica 1 online resource (XIV, 205 p. 49 illus.)
Disciplina 005.8
Soggetto topico Computer security
Computers
Law and legislation
Computer communication systems
Application software
Systems and Data Security
Legal Aspects of Computing
Privacy
Computer Communication Networks
Information Systems Applications (incl. Internet)
ISBN 3-662-61313-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Advanced Persistent Threats -- The attribution process.-Analysis of malware -- Attack infrastructure -- Analysis of control servers -- Geopolitical analysis -- Telemetry - data from security products -- Methods of intelligence agencies -- Doxing -- False flags -- Group set-ups -- Communication -- Ethics of attribution.
Record Nr. UNINA-9910413440203321
Steffens Timo  
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer Vieweg, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Attribution of Advanced Persistent Threats [[electronic resource] ] : How to Identify the Actors Behind Cyber-Espionage / / by Timo Steffens
Attribution of Advanced Persistent Threats [[electronic resource] ] : How to Identify the Actors Behind Cyber-Espionage / / by Timo Steffens
Autore Steffens Timo
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer Vieweg, , 2020
Descrizione fisica 1 online resource (XIV, 205 p. 49 illus.)
Disciplina 005.8
Soggetto topico Computer security
Computers
Law and legislation
Computer communication systems
Application software
Systems and Data Security
Legal Aspects of Computing
Privacy
Computer Communication Networks
Information Systems Applications (incl. Internet)
ISBN 3-662-61313-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Advanced Persistent Threats -- The attribution process.-Analysis of malware -- Attack infrastructure -- Analysis of control servers -- Geopolitical analysis -- Telemetry - data from security products -- Methods of intelligence agencies -- Doxing -- False flags -- Group set-ups -- Communication -- Ethics of attribution.
Record Nr. UNISA-996465367703316
Steffens Timo  
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer Vieweg, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Beyond Data Protection [[electronic resource] ] : Strategic Case Studies and Practical Guidance / / edited by Noriswadi Ismail, Edwin Lee Yong Cieh
Beyond Data Protection [[electronic resource] ] : Strategic Case Studies and Practical Guidance / / edited by Noriswadi Ismail, Edwin Lee Yong Cieh
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (276 p.)
Disciplina 342.0858
Soggetto topico Private international law
Conflict of laws
Mass media
Law
Computers
Law and legislation
Private International Law, International & Foreign Law, Comparative Law
IT Law, Media Law, Intellectual Property
Legal Aspects of Computing
Soggetto genere / forma Cross-cultural studies.
ISBN 1-299-33554-3
3-642-33081-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Noriswadi Ismail, Introduction --  Edwin Lee Yong Cieh, Personal Data Protection and Privacy law in Malaysia -- Edwin Lee Yong Cieh, Personal Data Protection Act 2010 : An Overview Analysis -- Edwin Lee Yong Cieh, Limitations Of The Personal Data Protection Act 2010 and Personal Data Protection in Selected Sectors -- Noriswadi Ismail, Technology and ‘Actors’ In Data Protection -- Noriswadi Ismail, Selected Technologies’ Appraisal from The PDPA 2010’s Lens -- Noriswadi Ismail, Acclaiming Accountability. Preaching Best Practices -- Eduardo Ustaran, The Scope of Application of EU Data Protection Law And its Extraterritorial Reach -- Eva Rose Rahim, Information Security In The Internet Age -- Indirani Viknaraja, Data Protection and Local Authorities in the United Kingdom -- Dan Manolescu, Data Protection Enforcement: The European Experience – Case Law -- Philipp E. Fischer, Data Protection Audit – The German Experience -- Noriswadi Ismail/Edwin Lee Yong Cieh, Concluding Remarks.
Record Nr. UNINA-9910438231003321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Big Data in Context : Legal, Social and Technological Insights / / edited by Thomas Hoeren, Barbara Kolany-Raiser
Big Data in Context : Legal, Social and Technological Insights / / edited by Thomas Hoeren, Barbara Kolany-Raiser
Autore Hoeren Thomas
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XII, 120 p.)
Disciplina 343.099
Collana SpringerBriefs in Law
Soggetto topico Information technology - Law and legislation
Mass media - Law and legislation
Quantitative research
Data mining
Law - Europe
Computers - Law and legislation
IT Law, Media Law, Intellectual Property
Data Analysis and Big Data
Data Mining and Knowledge Discovery
European Law
Legal Aspects of Computing
ISBN 3-319-62461-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Thomas Hoeren, Big Data and Data Quality -- Christian Döpke, The Importance of Big Data for Jurisprudence and Legal Practice -- Nicolai Culik and Christian Döpke, About Forgetting and Being Forgotten -- Nicolai Culik, Brussels Calling: Big Data and Privacy -- Andreas Börding, Safe Harbor: The Decision of the European Court of Justice -- Tim Jülicher, Education 2.0: Learning Analytics, Educational Data Mining and Co. -- Max v. Schönfeld, Big Data and Automotive – A Legal Approach -- Stefanie Eschholz and Jonathan Djabbarpour, Big Data and Scoring in the Financial Sector -- Charlotte Röttgen, Like or Dislike – Web Tracking -- Tim Jülicher and Marc Delisle, Step into “The Circle” – A Close Look at Wearables and Quantified Self -- Max v. Schönfeld and Nils Wehkamp, Big Data and Smart Grid -- Max v. Schönfeld, Reinhard Heil and Laura Bittner, Big Data on a Farm – Smart Farming.
Record Nr. UNINA-9910231244803321
Hoeren Thomas  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Big Digital Forensic Data [[electronic resource] ] : Volume 1: Data Reduction Framework and Selective Imaging / / by Darren Quick, Kim-Kwang Raymond Choo
Big Digital Forensic Data [[electronic resource] ] : Volume 1: Data Reduction Framework and Selective Imaging / / by Darren Quick, Kim-Kwang Raymond Choo
Autore Quick Darren
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (109 pages)
Disciplina 363.25968
Collana SpringerBriefs on Cyber Security Systems and Networks
Soggetto topico Computer security
Application software
Forensic science
Computers
Law and legislation
Systems and Data Security
Information Systems Applications (incl. Internet)
Forensic Science
Legal Aspects of Computing
Computer Appl. in Social and Behavioral Sciences
ISBN 981-10-7763-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1 Introduction -- Chapter 2 Background and Literature Review -- Chapter 3 Data Reduction and Data Mining Framework -- Chapter 4 Digital Forensic Data Reduction by Selective Imaging -- Chapter 5 Summary of the Framework and DRbSI.
Record Nr. UNINA-9910299287503321
Quick Darren  
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Big Digital Forensic Data [[electronic resource] ] : Volume 2: Quick Analysis for Evidence and Intelligence / / by Darren Quick, Kim-Kwang Raymond Choo
Big Digital Forensic Data [[electronic resource] ] : Volume 2: Quick Analysis for Evidence and Intelligence / / by Darren Quick, Kim-Kwang Raymond Choo
Autore Quick Darren
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (97 pages)
Disciplina 005
Collana SpringerBriefs on Cyber Security Systems and Networks
Soggetto topico Computer security
Application software
Forensic science
Computers
Law and legislation
Systems and Data Security
Information Systems Applications (incl. Internet)
Forensic Science
Legal Aspects of Computing
Computer Appl. in Social and Behavioral Sciences
ISBN 981-13-0263-4
9789811302633
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1 Introduction -- Chapter 2 Quick Analysis of Digital Forensic Data -- Chapter 3 Digital Forensic Data and Intelligence -- Chapter 4 Data Reduction of Mobile Device Extracts -- Chapter 5 Digital Forensic Data and Open Source Intelligence (DFINT+OSINT) -- Chapter 6 Summary.
Record Nr. UNINA-9910349478203321
Quick Darren  
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Blockchain and Distributed Ledger Technology Use Cases [[electronic resource] ] : Applications and Lessons Learned / / edited by Horst Treiblmaier, Trevor Clohessy
Blockchain and Distributed Ledger Technology Use Cases [[electronic resource] ] : Applications and Lessons Learned / / edited by Horst Treiblmaier, Trevor Clohessy
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (xiii, 329 pages) : illustrations
Disciplina 005.74
Collana Progress in IS
Soggetto topico Management information systems
Computers
Data structures (Computer science)
Law and legislation
Business Information Systems
Information Systems and Communication Service
Data Structures and Information Theory
Legal Aspects of Computing
ISBN 3-030-44337-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Toward More Rigorous Blockchain Research: Recommendations for Writing Blockchain Case Studies -- From a Use Case Categorization Scheme Towards A Maturity Model for Engineering Distributed Ledgers -- What’s In The Box? Combating Counterfeit Medications in Pharmaceutical Supply Chains With Blockchain Vigilant Information Systems -- A Use Case of Blockchain in Healthcare: Allergy Card -- International Exchange Of Financial Information on Distributed Ledgers: Outlook and Design Blueprint -- A Blockchain Supported Solution for Compliant Digital Security Offerings -- A Blockchain-Driven Approach to Fulfill the GDPR Recording Requirements -- Wibson: A Case Study of a Decentralized, Privacy-Preserving Data Marketplace -- : Business Process Transformation in Natural Resources Development Using Blockchain: Indigenous Entrepreneurship, Trustless Technology, and Rebuilding Trust -- Smart City Applications on the Blockchain: Development of a Multi-Layer Taxonomy -- A Case Study of Blockchain-Induced Digital Transformation in the Public Sector -- Analyzing the Potential of DLT-Based Applications in Smart Factories -- Disrupting Platform Organizations with Blockchain Technology and the Internet of Things? -- Using Blockchain for Online Multimedia Management: Characteristics of Existing Platforms -- Supply Chain Visibility Ledger. .
Record Nr. UNINA-9910407719503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Coherence: Insights from Philosophy, Jurisprudence and Artificial Intelligence [[electronic resource] /] / edited by Michał Araszkiewicz, Jaromír Šavelka
Coherence: Insights from Philosophy, Jurisprudence and Artificial Intelligence [[electronic resource] /] / edited by Michał Araszkiewicz, Jaromír Šavelka
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Dordrecht : , : Springer Netherlands : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (281 p.)
Disciplina 120
121
Collana Law and Philosophy Library
Soggetto topico Law—Philosophy
Law
Epistemology
Computers
Law and legislation
Theories of Law, Philosophy of Law, Legal History
Legal Aspects of Computing
ISBN 94-007-6110-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- About the Authors -- Table of Contents -- Three Kinds of Coherentism; Jaap Hage -- Coherence and Reliability in Judicial Reasoning; Stefan Schubert and Erik J. Olsson -- Coherence and Probability: A Probabilistic Account of Coherence; William Roche -- Coherence: An Outline in Six Metaphors and Four Rules; Juan Manuel Peréz Bermejo -- Legal Interpretation and Coherence; Bartosz Brożek -- Normative Inconsistency and Logical Theories. A First Critique of Defeasibilism; Giovanni Battista Ratti -- The Third Theory of Legal Objectivity; Aldo Schiavello -- Pattern Languages & Institutional Facts.Functions and Coherences in the Law; Kenneth Ehrenberg -- Consistency and Coherence in the “Hypertext” of Law. A Textological Approach; Wojciech Cyrul -- Case Classification, Similarities, Spaces of Reasons, and Coherences; Marcello Guarini -- Coherence as Constraint Satisfaction: Judicial Reasoning Support Mechanism; Jaromír Šavelka -- Limits of Constraint Satisfaction Theory of Coherence as a Theory of (Legal) Reasoning; Michał Araszkiewicz -- Ten Theses on Coherence in Law; Amalia Amaya.     Introduction -- About the Authors -- Table of Contents -- Three Kinds of Coherentism; Jaap Hage -- Coherence and Reliability in Judicial Reasoning; Stefan Schubert and Erik J. Olsson -- Coherence and Probability: A Probabilistic Account of Coherence; William Roche -- Coherence: An Outline in Six Metaphors and Four Rules; Juan Manuel Peréz Bermejo -- Legal Interpretation and Coherence; Bartosz Brożek -- Normative Inconsistency and Logical Theories. A First Critique of Defeasibilism; Giovanni Battista Ratti -- The Third Theory of Legal Objectivity; Aldo Schiavello -- Pattern Languages & Institutional Facts.Functions and Coherences in the Law; Kenneth Ehrenberg -- Consistency and Coherence in the “Hypertext” of Law. A Textological Approach; Wojciech Cyrul -- Case Classification, Similarities, Spaces of Reasons, and Coherences; Marcello Guarini -- Coherence as Constraint Satisfaction: Judicial Reasoning Support Mechanism; Jaromír Šavelka -- Limits of Constraint Satisfaction Theory of Coherence as a Theory of (Legal) Reasoning; Michał Araszkiewicz -- Ten Theses on Coherence in Law; Amalia Amaya.    .
Record Nr. UNINA-9910739474003321
Dordrecht : , : Springer Netherlands : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui