Kirjojen hintavertailu. Mukana 12 360 076 kirjaa ja 12 kauppaa.

Kirjahaku

Etsi kirjoja tekijän nimen, kirjan nimen tai ISBN:n perusteella.

153 tulosta hakusanalla Vyanst

The Stature of Waiting

The Stature of Waiting

W. H. Vanstone

Darton,Longman Todd Ltd
2004
pokkari
Experiences of dependence and of waiting are becoming increasingly frequent and widespread in contemporary life and yet we evade, repudiate or resent them. Vanstone's book, a modern classic of the Anglican spiritual tradition, looks at our attitudes to illness, to being out of work, to not 'doing' anything. He draws on the story of the passion in John's Gospel to transform our understanding of these experiences, by presenting Jesus as a figure who, in his waiting, discloses the deepest dimension of the glory of God.
Effective Probation Practice

Effective Probation Practice

Peter Raynor; David Smith; Maurice Vanstone

Red Globe Press
1994
nidottu
Drawing on the authors' experience of research and practice in probation, the book provides a positive and realistic view of the contribution the probation service can make to the criminal justice system. It covers court work, face-to-face work with offenders, wider work in the community, and probation organisation and management. It is informed both by research on 'what works' and by a commitment to anti-discriminatory practice.
Guide to Elliptic Curve Cryptography

Guide to Elliptic Curve Cryptography

Darrel Hankerson; Alfred J. Menezes; Scott Vanstone

Springer-Verlag New York Inc.
2004
sidottu
After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism. Anchored by a comprehensive treatment of the practical aspects of elliptic curve cryptography (ECC), this guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment. In addition, the book addresses some issues that arise in software and hardware implementation, as well as side-channel attacks and countermeasures. Readers receive the theoretical fundamentals as an underpinning for a wealth of practical and accessible knowledge about efficient application. Features & Benefits: * Breadth of coverage and unified, integrated approach to elliptic curve cryptosystems * Describes important industry and government protocols, such as the FIPS 186-2 standard from the U.S. National Institute for Standards and Technology * Provides full exposition on techniques for efficiently implementing finite-field and elliptic curve arithmetic* Distills complex mathematics and algorithms for easy understanding* Includes useful literature references, a list of algorithms, and appendices on sample parameters, ECC standards, and software toolsThis comprehensive, highly focused reference is a useful and indispensable resource for practitioners, professionals, or researchers in computer science, computer engineering, network design, and network data security.
Applications of Finite Fields

Applications of Finite Fields

Alfred J. Menezes; Ian F. Blake; Ronald C. Mullin; Scott A. Vanstone; Tomik Yaghoobian

Springer
1992
sidottu
The theory of finite fields, whose origins can be traced back to the works of Gauss and Galois, has played a part in various branches in mathematics. Inrecent years we have witnessed a resurgence of interest in finite fields, and this is partly due to important applications in coding theory and cryptography. The purpose of this book is to introduce the reader to some of these recent developments. It should be of interest to a wide range of students, researchers and practitioners in the disciplines of computer science, engineering and mathematics. We shall focus our attention on some specific recent developments in the theory and applications of finite fields. While the topics selected are treated in some depth, we have not attempted to be encyclopedic. Among the topics studied are different methods of representing the elements of a finite field (including normal bases and optimal normal bases), algorithms for factoring polynomials over finite fields, methods for constructing irreducible polynomials, the discrete logarithm problem and its implications to cryptography, the use of elliptic curves in constructing public key cryptosystems, and the uses of algebraic geometry in constructing good error-correcting codes. To limit the size of the volume we have been forced to omit some important applications of finite fields. Some of these missing applications are briefly mentioned in the Appendix along with some key references.
Handbook of Applied Cryptography

Handbook of Applied Cryptography

Alfred J. Menezes; Paul C. van Oorschot; Scott A. Vanstone

CRC Press Inc
1996
sidottu
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography. The Handbook of Applied Cryptography provides a treatment that is multifunctional:It serves as an introduction to the more practical aspects of both conventional and public-key cryptography It is a valuable source of the latest techniques and algorithms for the serious practitioner It provides an integrated treatment of the field, while still presenting each major topic as a self-contained unit It provides a mathematical treatment to accompany practical discussions It contains enough abstraction to be a valuable reference for theoreticians while containing enough detail to actually allow implementation of the algorithms discussedNow in its third printing, this is the definitive cryptography reference that the novice as well as experienced developers, designers, researchers, engineers, computer scientists, and mathematicians alike will use.
Guide to Elliptic Curve Cryptography

Guide to Elliptic Curve Cryptography

Darrel Hankerson; Alfred J. Menezes; Scott Vanstone

Springer-Verlag New York Inc.
2010
nidottu
After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism. Anchored by a comprehensive treatment of the practical aspects of elliptic curve cryptography (ECC), this guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment. In addition, the book addresses some issues that arise in software and hardware implementation, as well as side-channel attacks and countermeasures. Readers receive the theoretical fundamentals as an underpinning for a wealth of practical and accessible knowledge about efficient application. Features & Benefits: * Breadth of coverage and unified, integrated approach to elliptic curve cryptosystems * Describes important industry and government protocols, such as the FIPS 186-2 standard from the U.S. National Institute for Standards and Technology * Provides full exposition on techniques for efficiently implementing finite-field and elliptic curve arithmetic* Distills complex mathematics and algorithms for easy understanding* Includes useful literature references, a list of algorithms, and appendices on sample parameters, ECC standards, and software toolsThis comprehensive, highly focused reference is a useful and indispensable resource for practitioners, professionals, or researchers in computer science, computer engineering, network design, and network data security.
Applications of Finite Fields

Applications of Finite Fields

Alfred J. Menezes; Ian F. Blake; Ronald C. Mullin; Scott A. Vanstone; Tomik Yaghoobian

Springer-Verlag New York Inc.
2010
nidottu
The theory of finite fields, whose origins can be traced back to the works of Gauss and Galois, has played a part in various branches in mathematics. Inrecent years we have witnessed a resurgence of interest in finite fields, and this is partly due to important applications in coding theory and cryptography. The purpose of this book is to introduce the reader to some of these recent developments. It should be of interest to a wide range of students, researchers and practitioners in the disciplines of computer science, engineering and mathematics. We shall focus our attention on some specific recent developments in the theory and applications of finite fields. While the topics selected are treated in some depth, we have not attempted to be encyclopedic. Among the topics studied are different methods of representing the elements of a finite field (including normal bases and optimal normal bases), algorithms for factoring polynomials over finite fields, methods for constructing irreducible polynomials, the discrete logarithm problem and its implications to cryptography, the use of elliptic curves in constructing public key cryptosystems, and the uses of algebraic geometry in constructing good error-correcting codes. To limit the size of the volume we have been forced to omit some important applications of finite fields. Some of these missing applications are briefly mentioned in the Appendix along with some key references.
Darkness Yielding

Darkness Yielding

Jim Cotter; Martyn Percy; Sylvia Sands; W. H. Vanstone; Rowan Williams

Canterbury Press Norwich
2009
nidottu
Darkness Yielding is an imaginative and engaging collection of ready-to-use liturgies, prayers and reflections for the richest seasons of the Christian year - Advent and Christmas, Holy Week and Easter. For all who may be looking for fresh and striking ways of expressing what the birth, death and resurrection of Jesus mean for human life, Darkness Yielding offers: Probing reflections by Rowan Williams and Martyn PercyComplete liturgies by Jim Cotter for a Christmas Eve vigil, a Maundy Thursday footwashing and Last Supper, a Good Friday devotional service, an Easter Eve vigil, and a dawn celebration of the ResurrectionA contemporary set of meditations on the Stations of the Cross and the Seven Words from the Cross from Sylvia SandsA series of seven Good Friday addresses by W H Vanstone
Getting out and staying out

Getting out and staying out

Anna Clancy; Kirsty Hudson; Mike Maguire; Richard Peake; Peter Raynor; Maurice Vanstone; Jocelyn Kynch

Policy Press
2006
nidottu
Short-term prisoners have exceptionally high reconviction rates, fuelled by major social problems. Growing recognition of this, and of deficiencies in prison-probation coordination, has accelerated 'resettlement' of ex-prisoners up the penal agenda. The 'Resettlement Pathfinders' tested several new partnership-based approaches. This report evaluates three probation-led projects which combined practical assistance with interventions to improve motivation and capacity to change. Their key feature was the delivery of a cognitive-motivational programme ('FOR - A Change') specially designed for short-termers. The study found this produced significant changes in attitude, as well as greater 'continuity' (voluntary post-release contact between offenders and project staff) than previous approaches. It also found evidence of association between continuity and reduced reconviction. Overall, the findings support resettlement strategies based on fostering and nurturing offenders' motivation to change, facilitating access to services, and 'through the gate' contact with staff or volunteers with whom a relationship has already been built. The research offers findings and insights of practical value to probation and prison officers, as well as staff of other agencies that work with prisoners and ex-prisoners. The report should also be read by penal policy-makers, criminology/criminal justice academics and students, and those engaged in staff training.
Dictionnaire de Logopedie. Les Troubles Logopediques de La Sphere O.R.L.

Dictionnaire de Logopedie. Les Troubles Logopediques de La Sphere O.R.L.

C. Campolini; V. Van Hovell; A. Vansteelandt

Peeters
1998
nidottu
L'approche des troubles logopediques de la sphere O.R.L. est une suite logique d'un premier ouvrage dans lequel les auteurs avaient tente de circonscrire les notions et de definir les termes utilises par les logopedes-orthophonistes dans le contexte du developpement normal du langage et de sa pathologie. La recherche s'est poursuivie dans des domaines tres pointus de l'action diagnostique et therapeutique du logopede. Le lecteur pourra decouvrir, au fil des pages, un enchainement de termes qui permettent de circonscrire le travail logopedique dans les secteurs de dysfonctionnement tubaire, de l'orthopedie dento-faciale, de la dysphagie et des dysphonies. La coherence de ce travail tient au fait que toutes ces pathologies touchent au fondement organique du langage et permettent au logopede d'affirmer sa specificite paramedicale. Son action ne pourra etre couronnee de succes que s'il partage, avec d'autres specialistes, son terrain d'intervention. C'est dans le contexte d'un travail d'equipe, reunissant le medecin oto-rhino-laryngologiste, le phoniatre, l'orthodontiste et le logopede que ces perturbations de la sphere O.R.L. trouvent un eclairage pluridisciplinaire qui permet la convergence des diverses interventions, souvent indispensables dans le cadre de ces pathologies. Nous esperons que ce travail soit une amorce de dialogue entre les intervenants specialises, les patients qui souffrent de ces atteintes et leur entourage, souvent sollicite comme acteur dans le processus therapeutique.
Dictionnaire de logopédie. La construction du nombre

Dictionnaire de logopédie. La construction du nombre

C. Campolini; A. Timmermans; A. Vansteelandt

PEETERS PUBLISHERS
2002
nidottu
Dans ce quatrième ouvrage, qui vient s'ajouter aux trois premiers tomes du «Dictionnaire de Logopédie», les auteurs se sont penchés sur un concept dont l'acquisition va sans doute conduire l'enfant à s'élever de plus en plus dans l'abstraction et le raisonnement logique. Le parcours terminologique, qui est le nôtre, met ici en lumière un lexique qui n'est peut-être pas d'emblée attribué aux logopèdes-orthophonistes, même si ceux-ci ont été sollicités très tôt pour venir en aide aux enfants en difficulté d'apprentissage dans le domaine des mathématiques. La recherche en cette matière nous a permis de découvrir un monde où la linguistique côtoie le cognitif et l'épouse, donnant ainsi naissance à un langage du raisonnement dont il faut comprendre les tenants et les aboutissants, si l'on veut espérer pouvoir aider l'enfant dans sa découverte des mathématiques. Notre réflexion suit un parcours génétique du raisonnement logico-mathématique et tente de montrer combien l'acquisition du nombre est, en effet, une lente et longue construction dont les fondations s'appuient sur les premières expériences sensori-motrices du nourrisson. La cheville ouvrière de cette construction, sans doute infinie, est ce que Jean Piaget appelle, tout au long de son oeuvre, la «fonction symbolique». Source vive de la représentation et de l'abstraction, elle alimente l'ensemble des capacités cognitives, contribuant ainsi à l'essor des mots et des nombres.