A Treatise on Dinitrogen Fixation / R. W. F. Hardy, Frank Bottomley, R. C. Burns |
Pubbl/distr/stampa | New York, : John Wiley & Sons, 1979 |
Descrizione fisica | xiv, 812 p. : ill. ; 25 cm |
Disciplina | 631.47 |
Soggetto non controllato | Azoto - In relazione alle piante |
ISBN | 0-471-35134-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-990001457440403321 |
New York, : John Wiley & Sons, 1979 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
A Treatise on Limnology / G. Evelyn Hutchinson |
Autore | Hutchinson, G. Evelin |
Pubbl/distr/stampa | New York : John Wiley & Sons, 1975 |
Descrizione fisica | 3 v. (xii, 1115 ; xi, 1115 ; x, 660) p. : ill. ; 25 cm |
Soggetto non controllato | Limnologia |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-990001458260403321 |
Hutchinson, G. Evelin | ||
New York : John Wiley & Sons, 1975 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
A user's guide to principal components / J. Edward Jackson |
Autore | JACKSON, J. Edward |
Pubbl/distr/stampa | Hoboken ( (NJ), : John Wiley & Sons, 2003 |
Descrizione fisica | XVII, 569 p. ; 23 cm. |
Soggetto topico | STATISTICA - Metodologia |
ISBN | 04-7147-134-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNIOR-UON00277857 |
JACKSON, J. Edward | ||
Hoboken ( (NJ), : John Wiley & Sons, 2003 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. L'Orientale | ||
|
A user's guide to principal components / J. Edward Jackson |
Autore | Jackson, J. Edward |
Pubbl/distr/stampa | New York : John Wiley & Sons, c. 1991 |
Descrizione fisica | XVIII,569 p. 23 |
Disciplina | 519.5 |
Collana | Wiley series in probability and mathematical statistics |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | ita |
Record Nr. | UNINA-990006684850403321 |
Jackson, J. Edward | ||
New York : John Wiley & Sons, c. 1991 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
A visual approach to park design / Albert J. Rutledge ; illustations by Donald J. Molnar |
Autore | Rutledge, Albert L. |
Pubbl/distr/stampa | New York : John Wiley & Sons, c1985 |
Descrizione fisica | VIII, 180 p. : ill. ; 26 cm |
Disciplina | 712'.2 |
Altri autori (Persone) | Molnar, Donald J. |
Soggetto non controllato | Parks |
ISBN | 0-471-82572-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-990008303280403321 |
Rutledge, Albert L. | ||
New York : John Wiley & Sons, c1985 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
A visual dictionary of architecture / Francis D. K. Ching |
Autore | Ching, Francis D. K. |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | Hoboken, : John Wiley & Sons, 2012 |
Descrizione fisica | VIII, 328 p. : ill. ; 31 cm |
Soggetto non controllato | Architettura - Dizionari |
ISBN | 9780470648858 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910495449703321 |
Ching, Francis D. K. | ||
Hoboken, : John Wiley & Sons, 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
AAA and network security for mobile access [[electronic resource] ] : radius, diameter, EAP, PKI and IP mobility / / Madjid Nakhjiri and Mahsa Nakhjiri |
Autore | Nakhjiri Madjid |
Edizione | [1st edition] |
Pubbl/distr/stampa | Chichester, England ; ; Hoboken, NJ, : John Wiley & Sons, c2005 |
Descrizione fisica | 1 online resource (319 p.) |
Disciplina |
004.62
005.8 |
Altri autori (Persone) | NakhjiriMahsa |
Soggetto topico |
Wireless Internet - Security measures
Mobile computing - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN |
1-280-24272-8
9786610242726 0-470-01746-5 0-470-01745-7 |
Classificazione |
54.32
53.72 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
AAA AND NETWORK SECURITY FOR MOBILE ACCESS; Contents; Foreword; Preface; About the Author; Chapter 1 The 3 "A"s: Authentication, Authorization, Accounting; 1.1 Authentication Concepts; 1.1.1 Client Authentication; 1.1.2 Message Authentication; 1.1.3 Mutual Authentication; 1.1.4 Models for Authentication Messaging; 1.1.4.1 Two-Party Authentication Model; 1.1.4.2 Three-Party Authentication Model; 1.1.5 AAA Protocols for Authentication Messaging; 1.1.5.1 User-AAA Server; 1.1.5.2 NAS-AAA Server Communications; 1.1.5.3 Supplicant (User)-NAS Communications; 1.2 Authorization
1.2.1 How is it Different from Authentication?1.2.2 Administration Domain and Relationships with the User; 1.2.3 Standardization of Authorization Procedures; 1.2.3.1 Authorization Messaging; 1.2.3.2 Policy Framework and Authorization; 1.3 Accounting; 1.3.1 Accounting Management Architecture; 1.3.1.1 Accounting Across Administrative Domains; 1.3.2 Models for Collection of Accounting Data; 1.3.2.1 Polling Models for Accounting; 1.3.2.2 Event-Driven Models for Accounting; 1.3.3 Accounting Security; 1.3.4 Accounting Reliability; 1.3.4.1 Interim Accounting; 1.3.4.2 Transport Protocols 1.3.4.3 Fail-Over Mechanisms1.3.5 Prepaid Service: Authorization and Accounting in Harmony; 1.4 Generic AAA Architecture; 1.4.1 Requirements on AAA Protocols Running on NAS; 1.5 Conclusions and Further Resources; 1.6 References; Chapter 2 Authentication; 2.1 Examples of Authentication Mechanisms; 2.1.1 User Authentication Mechanisms; 2.1.1.1 Basic PPP User Authentication Mechanisms; 2.1.1.2 Shortcoming of PPP Authentication Methods; 2.1.1.3 Extensible Authentication Protocol (EAP) as Extension to PPP; 2.1.1.4 SIM-Based Authentication; 2.1.2 Example of Device Authentication Mechanisms 2.1.2.1 Public Key Certificate-Based Authentication2.1.2.2 Basics of Certificate-Based Authentication; 2.1.3 Examples of Message Authentication Mechanisms; 2.1.3.1 HMAC-MD5; 2.2 Classes of Authentication Mechanisms; 2.2.1 Generic Authentication Mechanisms; 2.2.1.1 Extensible Authentication Protocol (EAP); 2.2.1.2 EAP Messaging; 2.3 Further Resources; 2.4 References; Chapter 3 Key Management Methods; 3.1 Key Management Taxonomy; 3.1.1 Key Management Terminology; 3.1.2 Types of Cryptographic Algorithms; 3.1.3 Key Management Functions; 3.1.4 Key Establishment Methods; 3.1.4.1 Key Transport 3.1.4.2 Key Agreement3.1.4.3 Manual Key Establishment; 3.2 Management of Symmetric Keys; 3.2.1 EAP Key Management Methods; 3.2.2 Diffie-Hellman Key Agreement for Symmetric Key Generation; 3.2.2.1 Problems with Diffie-Hellman; 3.2.3 Internet Key Exchange for Symmetric Key Agreement; 3.2.4 Kerberos and Single Sign On; 3.2.4.1 Kerberos Issues; 3.2.5 Kerberized Internet Negotiation of Keys (KINK); 3.3 Management of Public Keys and PKIs; 3.4 Further Resources; 3.5 References; Chapter 4 Internet Security and Key Exchange Basics; 4.1 Introduction: Issues with Link Layer-Only Security 4.2 Internet Protocol Security |
Record Nr. | UNINA-9910143692503321 |
Nakhjiri Madjid | ||
Chichester, England ; ; Hoboken, NJ, : John Wiley & Sons, c2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
AAA and network security for mobile access [[electronic resource] ] : radius, diameter, EAP, PKI and IP mobility / / Madjid Nakhjiri and Mahsa Nakhjiri |
Autore | Nakhjiri Madjid |
Edizione | [1st edition] |
Pubbl/distr/stampa | Chichester, England ; ; Hoboken, NJ, : John Wiley & Sons, c2005 |
Descrizione fisica | 1 online resource (319 p.) |
Disciplina |
004.62
005.8 |
Altri autori (Persone) | NakhjiriMahsa |
Soggetto topico |
Wireless Internet - Security measures
Mobile computing - Security measures |
ISBN |
1-280-24272-8
9786610242726 0-470-01746-5 0-470-01745-7 |
Classificazione |
54.32
53.72 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
AAA AND NETWORK SECURITY FOR MOBILE ACCESS; Contents; Foreword; Preface; About the Author; Chapter 1 The 3 "A"s: Authentication, Authorization, Accounting; 1.1 Authentication Concepts; 1.1.1 Client Authentication; 1.1.2 Message Authentication; 1.1.3 Mutual Authentication; 1.1.4 Models for Authentication Messaging; 1.1.4.1 Two-Party Authentication Model; 1.1.4.2 Three-Party Authentication Model; 1.1.5 AAA Protocols for Authentication Messaging; 1.1.5.1 User-AAA Server; 1.1.5.2 NAS-AAA Server Communications; 1.1.5.3 Supplicant (User)-NAS Communications; 1.2 Authorization
1.2.1 How is it Different from Authentication?1.2.2 Administration Domain and Relationships with the User; 1.2.3 Standardization of Authorization Procedures; 1.2.3.1 Authorization Messaging; 1.2.3.2 Policy Framework and Authorization; 1.3 Accounting; 1.3.1 Accounting Management Architecture; 1.3.1.1 Accounting Across Administrative Domains; 1.3.2 Models for Collection of Accounting Data; 1.3.2.1 Polling Models for Accounting; 1.3.2.2 Event-Driven Models for Accounting; 1.3.3 Accounting Security; 1.3.4 Accounting Reliability; 1.3.4.1 Interim Accounting; 1.3.4.2 Transport Protocols 1.3.4.3 Fail-Over Mechanisms1.3.5 Prepaid Service: Authorization and Accounting in Harmony; 1.4 Generic AAA Architecture; 1.4.1 Requirements on AAA Protocols Running on NAS; 1.5 Conclusions and Further Resources; 1.6 References; Chapter 2 Authentication; 2.1 Examples of Authentication Mechanisms; 2.1.1 User Authentication Mechanisms; 2.1.1.1 Basic PPP User Authentication Mechanisms; 2.1.1.2 Shortcoming of PPP Authentication Methods; 2.1.1.3 Extensible Authentication Protocol (EAP) as Extension to PPP; 2.1.1.4 SIM-Based Authentication; 2.1.2 Example of Device Authentication Mechanisms 2.1.2.1 Public Key Certificate-Based Authentication2.1.2.2 Basics of Certificate-Based Authentication; 2.1.3 Examples of Message Authentication Mechanisms; 2.1.3.1 HMAC-MD5; 2.2 Classes of Authentication Mechanisms; 2.2.1 Generic Authentication Mechanisms; 2.2.1.1 Extensible Authentication Protocol (EAP); 2.2.1.2 EAP Messaging; 2.3 Further Resources; 2.4 References; Chapter 3 Key Management Methods; 3.1 Key Management Taxonomy; 3.1.1 Key Management Terminology; 3.1.2 Types of Cryptographic Algorithms; 3.1.3 Key Management Functions; 3.1.4 Key Establishment Methods; 3.1.4.1 Key Transport 3.1.4.2 Key Agreement3.1.4.3 Manual Key Establishment; 3.2 Management of Symmetric Keys; 3.2.1 EAP Key Management Methods; 3.2.2 Diffie-Hellman Key Agreement for Symmetric Key Generation; 3.2.2.1 Problems with Diffie-Hellman; 3.2.3 Internet Key Exchange for Symmetric Key Agreement; 3.2.4 Kerberos and Single Sign On; 3.2.4.1 Kerberos Issues; 3.2.5 Kerberized Internet Negotiation of Keys (KINK); 3.3 Management of Public Keys and PKIs; 3.4 Further Resources; 3.5 References; Chapter 4 Internet Security and Key Exchange Basics; 4.1 Introduction: Issues with Link Layer-Only Security 4.2 Internet Protocol Security |
Record Nr. | UNINA-9910830716303321 |
Nakhjiri Madjid | ||
Chichester, England ; ; Hoboken, NJ, : John Wiley & Sons, c2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
AAA and network security for mobile access : radius, diameter, EAP, PKI and IP mobility / / Madjid Nakhjiri and Mahsa Nakhjiri |
Autore | Nakhjiri Madjid |
Edizione | [1st edition] |
Pubbl/distr/stampa | Chichester, England ; ; Hoboken, NJ, : John Wiley & Sons, c2005 |
Descrizione fisica | 1 online resource (319 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | NakhjiriMahsa |
Soggetto topico |
Wireless Internet - Security measures
Mobile computing - Security measures |
ISBN |
1-280-24272-8
9786610242726 0-470-01746-5 0-470-01745-7 |
Classificazione |
54.32
53.72 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
AAA AND NETWORK SECURITY FOR MOBILE ACCESS; Contents; Foreword; Preface; About the Author; Chapter 1 The 3 "A"s: Authentication, Authorization, Accounting; 1.1 Authentication Concepts; 1.1.1 Client Authentication; 1.1.2 Message Authentication; 1.1.3 Mutual Authentication; 1.1.4 Models for Authentication Messaging; 1.1.4.1 Two-Party Authentication Model; 1.1.4.2 Three-Party Authentication Model; 1.1.5 AAA Protocols for Authentication Messaging; 1.1.5.1 User-AAA Server; 1.1.5.2 NAS-AAA Server Communications; 1.1.5.3 Supplicant (User)-NAS Communications; 1.2 Authorization
1.2.1 How is it Different from Authentication?1.2.2 Administration Domain and Relationships with the User; 1.2.3 Standardization of Authorization Procedures; 1.2.3.1 Authorization Messaging; 1.2.3.2 Policy Framework and Authorization; 1.3 Accounting; 1.3.1 Accounting Management Architecture; 1.3.1.1 Accounting Across Administrative Domains; 1.3.2 Models for Collection of Accounting Data; 1.3.2.1 Polling Models for Accounting; 1.3.2.2 Event-Driven Models for Accounting; 1.3.3 Accounting Security; 1.3.4 Accounting Reliability; 1.3.4.1 Interim Accounting; 1.3.4.2 Transport Protocols 1.3.4.3 Fail-Over Mechanisms1.3.5 Prepaid Service: Authorization and Accounting in Harmony; 1.4 Generic AAA Architecture; 1.4.1 Requirements on AAA Protocols Running on NAS; 1.5 Conclusions and Further Resources; 1.6 References; Chapter 2 Authentication; 2.1 Examples of Authentication Mechanisms; 2.1.1 User Authentication Mechanisms; 2.1.1.1 Basic PPP User Authentication Mechanisms; 2.1.1.2 Shortcoming of PPP Authentication Methods; 2.1.1.3 Extensible Authentication Protocol (EAP) as Extension to PPP; 2.1.1.4 SIM-Based Authentication; 2.1.2 Example of Device Authentication Mechanisms 2.1.2.1 Public Key Certificate-Based Authentication2.1.2.2 Basics of Certificate-Based Authentication; 2.1.3 Examples of Message Authentication Mechanisms; 2.1.3.1 HMAC-MD5; 2.2 Classes of Authentication Mechanisms; 2.2.1 Generic Authentication Mechanisms; 2.2.1.1 Extensible Authentication Protocol (EAP); 2.2.1.2 EAP Messaging; 2.3 Further Resources; 2.4 References; Chapter 3 Key Management Methods; 3.1 Key Management Taxonomy; 3.1.1 Key Management Terminology; 3.1.2 Types of Cryptographic Algorithms; 3.1.3 Key Management Functions; 3.1.4 Key Establishment Methods; 3.1.4.1 Key Transport 3.1.4.2 Key Agreement3.1.4.3 Manual Key Establishment; 3.2 Management of Symmetric Keys; 3.2.1 EAP Key Management Methods; 3.2.2 Diffie-Hellman Key Agreement for Symmetric Key Generation; 3.2.2.1 Problems with Diffie-Hellman; 3.2.3 Internet Key Exchange for Symmetric Key Agreement; 3.2.4 Kerberos and Single Sign On; 3.2.4.1 Kerberos Issues; 3.2.5 Kerberized Internet Negotiation of Keys (KINK); 3.3 Management of Public Keys and PKIs; 3.4 Further Resources; 3.5 References; Chapter 4 Internet Security and Key Exchange Basics; 4.1 Introduction: Issues with Link Layer-Only Security 4.2 Internet Protocol Security |
Record Nr. | UNINA-9910877654503321 |
Nakhjiri Madjid | ||
Chichester, England ; ; Hoboken, NJ, : John Wiley & Sons, c2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
ABC of epilepsy [[electronic resource] /] / edited by W. Henry Smithson and Matthew Walker |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Chichester, West Sussex, U.K., : John Wiley & Sons, 2012 |
Descrizione fisica | 1 online resource (xi, 36 pages) : illustrations |
Disciplina | 616.85/3 |
Altri autori (Persone) |
SmithsonHenry
WalkerM. C (Matthew Charles) |
Collana | ABC series |
Soggetto topico |
Epilepsy
Epilepsy - Diagnosis Epilepsy - Treatment |
Soggetto genere / forma | Electronic books. |
ISBN | 1-4443-6121-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Machine generated contents note: What is epilepsy? Incidence, prevalence and aetiology / Henry Smithson & Matthew Walker -- Describing and classifying the condition / Colin Ferrie & Matthew Walker -- Making the diagnosis - taking a history, clinical examination, investigations / Jan Bagshaw, Colin Ferrie, Mike Kerr -- Managing the drug treatment of epilepsy / Colin Ferrie ... [et al.] -- Non-drug treatments including epilepsy surgery / Colin Ferrie, Henry Smithson & Matthew Walker -- Prolonged or repeated seizures / Matthew Walker -- Special groups: women, children, learning disability and the elderly / Jan Bagshaw, Colin Ferrie & Mike Kerr -- Monitoring and review: how to manage the condition long term / Colin Ferrie, Alice Hanscomb & Mike Kerr -- Living with epilepsy: information, support and self management / Alice Hanscomb, Henry Smithson. |
Record Nr. | UNINA-9910465732303321 |
Chichester, West Sussex, U.K., : John Wiley & Sons, 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|