安娜的档案需要您的帮助! 许多人试图关停我们,但我们会奋起反击。
➡️ 如果您现在捐赠,您将获得 双倍 的快速下载次数。 有效期至本月底。 捐赠
✕

安娜的档案

📚 人类历史上最大的完全开放的图书馆。 📈 61,654,285 本图书、95,687,150 篇论文被永久保存。
AA 38TB
direct uploads
IA 304TB
scraped by AA
DuXiu 298TB
scraped by AA
Hathi 9TB
scraped by AA
Libgen.li 188TB
collab with AA
Z-Lib 77TB
collab with AA
Libgen.rs 82TB
mirrored by AA
Sci-Hub 90TB
mirrored by AA
⭐️ Our code and data are 100% open source. 了解更多……
✕ 近期下载:  
主页 主页 主页 主页
安娜的档案
主页
搜索
捐赠
🧬 SciDB
常问问题
账户
登录 / 注册
账户
公开资料
已下载文件
我的捐赠
Referrals
Explore
活动
代码浏览器
ISBN Visualization ↗
Community Projects ↗
Open data
数据集
种子
大语言模型数据
关注我们
联系邮箱
安娜的博客 ↗
Reddit ↗
Matrix ↗
Help out
改进元数据
志愿服务与悬赏
翻译 ↗
Development
安娜的软件 ↗
安全性
数字千年版权法(DCMA)/ 版权声明
镜像
annas-archive.li ↗
annas-archive.pm ↗
annas-archive.in ↗
SLUM [无关联] ↗
SLUM 2 [无关联] ↗
搜索搜索 捐赠 x2捐赠 x2
账户账户
搜索设置
排序
高级
增加特定搜索字段
内容
文件类型 open our viewer
更多……
访问方式
来源
语言
更多……
显示
Search settings
下载 期刊文章 数字借阅 元数据
结果集 1-25(总计 25)
lgli/Gaitsgory D., Lurie J. Weil's conjecture for function fields. Vol.1 (AMS199, PUP, 2019)(ISBN 9780691182131)(O)(320s)_MAtg_.pdf
Weil`s Conjecture for Function Fields – Volume I (AMS–199) (Annals of Mathematics Studies, 199) Dennis Gaitsgory, Jacob Lurie Princeton University Press, Princeton University Press, Princeton, 2019
A central concern of number theory is the study of local-to-global principles, which describe the behavior of a global field K in terms of the behavior of various completions of K. This book looks at a specific example of a local-to-global principle: Weil's conjecture on the Tamagawa number of a semisimple algebraic group G over K. In the case where K is the function field of an algebraic curve X, this conjecture counts the number of G-bundles on X (global information) in terms of the reduction of G at the points of X (local information). The goal of this book is to give a conceptual proof of Weil's conjecture, based on the geometry of the moduli stack of G-bundles. Inspired by ideas from algebraic topology, it introduces a theory of factorization homology in the setting l-adic sheaves. Using this theory, Dennis Gaitsgory and Jacob Lurie articulate a different local-to-global principle: a product formula that expresses the cohomology of the moduli stack of G-bundles (a global object) as a tensor product of local factors.Using a version of the Grothendieck-Lefschetz trace formula, Gaitsgory and Lurie show that this product formula implies Weil's conjecture. The proof of the product formula will appear in a sequel volume.
更多信息……
英语 [en] · PDF · 1.8MB · 2019 · 📘 非小说类图书 · 🚀/lgli/lgrs · Save
base score: 11065.0, final score: 17486.629
upload/degruyter/Degruyter Imprints v2 [09-06-23]/archt-b/10.1515_9783112517246.pdf
Archiv für Tierernährung : [Akad.-Verl., 1950-1985]. Band 11, Heft 4, 1. März 1962 W Harnisch; L Hoffmann; W Jentsch; M Kirchgessner; Ernst Mangold; K Nehring; W Oelschläger; J Rojahn; Martin Schieblich; R Schiemann; Inge Wetzel de Gruyter GmbH, Walter, Reprint 2021, 1963
德语 [de] · PDF · 25.9MB · 1963 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/upload/zlib · Save
base score: 11057.0, final score: 17481.686
upload/degruyter/DeGruyter Partners/Princeton University Press [RETAIL]/10.1515_9780691184432.pdf
Weil's Conjecture for Function Fields: Volume I (AMS-199) (Annals of Mathematics Studies Book 360) Gaitsgory, Dennis ;Lurie, Jacob Princeton University Press, Annals of Mathematics Studies; 199, 2019 dec 31
A central concern of number theory is the study of local-to-global principles, which describe the behavior of a global field __K__ in terms of the behavior of various completions of __K__. This book looks at a specific example of a local-to-global principle: Weil’s conjecture on the Tamagawa number of a semisimple algebraic group __G__ over __K__. In the case where __K__ is the function field of an algebraic curve __X__, this conjecture counts the number of __G__-bundles on __X__ (global information) in terms of the reduction of __G__ at the points of __X__ (local information). The goal of this book is to give a conceptual proof of Weil’s conjecture, based on the geometry of the moduli stack of __G__-bundles. Inspired by ideas from algebraic topology, it introduces a theory of factorization homology in the setting l-adic sheaves. Using this theory, Dennis Gaitsgory and Jacob Lurie articulate a different local-to-global principle: a product formula that expresses the cohomology of the moduli stack of __G__-bundles (a global object) as a tensor product of local factors. Using a version of the Grothendieck-Lefschetz trace formula, Gaitsgory and Lurie show that this product formula implies Weil’s conjecture. The proof of the product formula will appear in a sequel volume.
更多信息……
英语 [en] · PDF · 2.0MB · 2019 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/upload/zlib · Save
base score: 11065.0, final score: 17480.072
ia/shelter0000cobe_g4s5.pdf
Shelter : a Mickey Bolitar novel Coben, Harlan, 1962- Orion (an Imprint of The Orion Publishing Group Ltd ); Orion Publishing Group, Limited, A Mickey Bolitar novel, 1, Paperback edition, London, 2012
The First In An Exciting Series Of Ya Thrillers From The Master Of The Hook-and-twist. When Tragic Events Tear Him Away From His Parents, 15-year-old Mickey Bolitar Is Sent To Live With His Estranged Uncle, Myron. For A While, It Seems His Train Wreck Of A Life Is Finally Improving - Until His Girlfriend, Ashley, Goes Missing Without A Trace. Unwilling To Let Another Person He Cares About Walk Out Of His Life, Mickey Follows Ashley's Trail Into A Seedy Underworld, Revealing A Conspiracy So Shocking It Will Leave Him Questioning Everything About The Life He Thought He Knew.
更多信息……
英语 [en] · PDF · 11.3MB · 2012 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17479.018
lgli/F:\Library.nu\4e0f3138f85c110a07ebfa0d06e1de22~184996274X,9781849962742.pdf
802.11 Wireless Networks: Security and Analysis (Computer Communications and Networks) Alan Holt, Chi-Yu Huang (auth.) Springer-Verlag London, Computer Communications and Networks, Computer Communications and Networks, 1, 2010
Wireless communication has the advantage of mobility and obviates the need for cabling, but is inherently less secure and is subject to the heavy regulation of the radio frequency spectrum. Nevertheless, the allocation of unlicensed parts of the spectrum has facilitated the growth in wireless local area networks (WLANs). WLAN technology is progressing at a rapid pace, but the most widely accepted WLAN standard is the IEEE 802.11. This unique and highly practical text introduces the principles of WLANs based upon the IEEE 802.11 standards, demonstrating how to configure equipment in order to implement various network solutions. Readers will gain understanding of the security implications of wireless networks and learn how vulnerabilities can be mitigated. Additionally, the book examines the underlying 802.11 protocols and explains how to build mathematical models in order to analyse performance in a WLAN environment. **Topics and Features:** * Presents a practical approach supported by the extensive use of examples and detailed instructions * Discusses various wireless network solutions across a number of different vendor platforms, including Cisco Aironet, Alactel-Lucent Omniaccess and Meru Networks * Provides numerous mathematical models for analyzing the performance of IEEE 802.11 standards, and shows how to build these models using Maple * Examines issues of wireless security and describes how to implement a wireless network with enterprise security * Investigates the medium access control sub-layer, and models for performance analysis of the MAC layer * Reviews the physical sub-layers of 802.11, describing modulation techniques and examining how devices adapt to changes in the RF environment. A highly useful text/reference for industry professionals, undergraduate and graduate-level students will also find this book an ideal companion to a university course on wireless networking. **Dr. Alan Holt** is Chief Technical Officer at the network consultancy company IP Performance Ltd., based in Bristol, UK. He is author of the popular Springer text __Network Performance Analysis: Using the J Programming Language__. **Dr. Chi-Yu Huang** works for Tata Technologies Ltd., and is currently a software consultant on the Airbus project in Bristol. She was formerly Operations Manager for DL Consulting, New Zealand.
更多信息……
英语 [en] · PDF · 5.8MB · 2010 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/scihub/zlib · Save
base score: 11065.0, final score: 17477.77
lgli/R:\062020\springer2\10.1007%2F978-1-84996-275-9.pdf
802.11 Wireless Networks: Security and Analysis (Computer Communications and Networks) Alan Holt, Chi-Yu Huang (auth.) Springer-Verlag London, Computer Communications and Networks, Computer Communications and Networks, 1, 2010
Wireless communication has the advantage of mobility and obviates the need for cabling, but is inherently less secure and is subject to the heavy regulation of the radio frequency spectrum. Nevertheless, the allocation of unlicensed parts of the spectrum has facilitated the growth in wireless local area networks (WLANs). WLAN technology is progressing at a rapid pace, but the most widely accepted WLAN standard is the IEEE 802.11. This unique and highly practical text introduces the principles of WLANs based upon the IEEE 802.11 standards, demonstrating how to configure equipment in order to implement various network solutions. Readers will gain understanding of the security implications of wireless networks and learn how vulnerabilities can be mitigated. Additionally, the book examines the underlying 802.11 protocols and explains how to build mathematical models in order to analyse performance in a WLAN environment. **Topics and Features:** * Presents a practical approach supported by the extensive use of examples and detailed instructions * Discusses various wireless network solutions across a number of different vendor platforms, including Cisco Aironet, Alactel-Lucent Omniaccess and Meru Networks * Provides numerous mathematical models for analyzing the performance of IEEE 802.11 standards, and shows how to build these models using Maple * Examines issues of wireless security and describes how to implement a wireless network with enterprise security * Investigates the medium access control sub-layer, and models for performance analysis of the MAC layer * Reviews the physical sub-layers of 802.11, describing modulation techniques and examining how devices adapt to changes in the RF environment. A highly useful text/reference for industry professionals, undergraduate and graduate-level students will also find this book an ideal companion to a university course on wireless networking. **Dr. Alan Holt** is Chief Technical Officer at the network consultancy company IP Performance Ltd., based in Bristol, UK. He is author of the popular Springer text __Network Performance Analysis: Using the J Programming Language__. **Dr. Chi-Yu Huang** works for Tata Technologies Ltd., and is currently a software consultant on the Airbus project in Bristol. She was formerly Operations Manager for DL Consulting, New Zealand.
更多信息……
英语 [en] · PDF · 4.9MB · 2010 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/scihub/zlib · Save
base score: 11065.0, final score: 17477.77
ia/christianityontr0000chap_n9q4.pdf
Christianity on Trial: Bks.1-3 in 1v Chapman, Colin, 1938- Lion International, New ed, 1988, c1981
334 pages
更多信息……
英语 [en] · PDF · 18.7MB · 1981 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17474.645
ia/creatingprodigal0000luca.pdf
Creating a Prodigal-Friendly Church Jeff Lucas, Author of Will Your Prodigal Come Home? Grand Rapids, Mich.: Zondervan, HarperCollins Christian Publishing, Grand Rapids, Mich, 2008
Most of us have prodigals in our lives, whether a child, brother, sister, husband, wife, or friend. The ache for these dear ones is like no other. They may hurt us and disappoint us, but somehow we cannot stop loving them. And yet we cannot live their lives for them. <p>The Prodigal-Friendly Church looks at why people leave the church, how we can retain them, how we can reach those who have already gone, and how we can help those who return feel like they belong. Jeff Lucas offers no easy recipes for success, but plenty of truthtelling, hope, and encouragement.</p> <p>This book discusses the principles of:<br> * Reach: How do we reach those who've already left the church?<br> * Return: How do we help people return to the church?<br> * Retain: How do we retain the people we've worked so hard to reach? Ultimately we are called to bring our prodigals to the cross of Christ, for there we find the mingling of our own utter helplessness and God's total power to intervene and save. When the Father's house is filled with the Father's love, there is hope that the prodigals will come home.</p>
更多信息……
英语 [en] · PDF · 7.9MB · 2008 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17474.643
zlib/Mathematics/Mathematical Theory/Dennis Gaitsgory, Jacob Lurie/Weil's Conjecture for Function Fields (1) (Annals of Mathematics Studies, 199)_30094199.pdf
Weil's Conjecture for Function Fields: Volume I (AMS-199) (Annals of Mathematics Studies, 199) Dennis Gaitsgory, Jacob Lurie Annals of Mathematics Studies, Princeton University Press, Princeton, 2019
A central concern of number theory is the study of local-to-global principles, which describe the behavior of a global field K in terms of the behavior of various completions of K. This book looks at a specific example of a local-to-global principle: Weil's conjecture on the Tamagawa number of a semisimple algebraic group G over K. In the case where K is the function field of an algebraic curve X, this conjecture counts the number of G-bundles on X (global information) in terms of the reduction of G at the points of X (local information). The goal of this book is to give a conceptual proof of Weil's conjecture, based on the geometry of the moduli stack of G-bundles. Inspired by ideas from algebraic topology, it introduces a theory of factorization homology in the setting l-adic sheaves. Using this theory, Dennis Gaitsgory and Jacob Lurie articulate a different local-to-global principle: a product formula that expresses the cohomology of the moduli stack of G-bundles (a global object) as a tensor product of local factors. Using a version of the Grothendieck-Lefschetz trace formula, Gaitsgory and Lurie show that this product formula implies Weil's conjecture. The proof of the product formula will appear in a sequel volume.
更多信息……
英语 [en] · PDF · 2.4MB · 2019 · 📘 非小说类图书 · 🚀/zlib · Save
base score: 11068.0, final score: 17471.287
ia/substanceabuseco0000stev_y4j2.pdf
Substance Abuse Counseling: Theory and Practice (2nd Edition) Stevens, Patricia, 1947-; Smith, Robert L. (Robert Leonard), 1943- \Merrill/Prentice Hall, 2nd ed, Upper Saddle River, N.J, ©2000
This book provides information regarding the enormity of substance abuse problems in the population, how to assess the problems, and how to treat individuals and families who seek assistance. It educates beginning clinicians and counselors about substance abuse by guiding them through the process of working with substance-abuse clients. Written in an understandable, and easy-to-grasp manner, it covers the basics of substance use and abuse--Terminology, physiology, psychokinetics, and psychodynamics. Case histories are used in selected chapters to help readers integrate the various approaches by offering a sample of the types of issues presented when working with this population. An emphasis on special populations includes minority populations, women, elderly, special needs groups, and children/youth. For substance abuse counselors seeking information on the stages of counseling--from assessment and diagnosis through relapse prevention.
更多信息……
英语 [en] · PDF · 28.4MB · 2000 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17470.754
nexusstc/Creating a Prodigal-Friendly Church/c34f20c66cfc899a04af5b2659a50610.pdf
Creating a Prodigal-Friendly Church Jeff Lucas, Author of Will Your Prodigal Come Home? Zondervan Bibles, HarperCollins Christian Publishing, Grand Rapids, Mich, 2008
Most of us have prodigals in our lives, whether a child, brother, sister, husband, wife, or friend. The ache for these dear ones is like no other. They may hurt us and disappoint us, but somehow we cannot stop loving them. And yet we cannot live their lives for them. <p>The Prodigal-Friendly Church looks at why people leave the church, how we can retain them, how we can reach those who have already gone, and how we can help those who return feel like they belong. Jeff Lucas offers no easy recipes for success, but plenty of truthtelling, hope, and encouragement.</p> <p>This book discusses the principles of:<br> * Reach: How do we reach those who've already left the church?<br> * Return: How do we help people return to the church?<br> * Retain: How do we retain the people we've worked so hard to reach? Ultimately we are called to bring our prodigals to the cross of Christ, for there we find the mingling of our own utter helplessness and God's total power to intervene and save. When the Father's house is filled with the Father's love, there is hope that the prodigals will come home.</p>
更多信息……
英语 [en] · PDF · 2.7MB · 2008 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17470.348
scihub/10.1007/978-1-84996-275-9.pdf
[Computer Communications and Networks] 802.11 Wireless Networks || Alan Holt, Chi-Yu Huang (auth.) Springer London : Imprint: Springer, 10.1007/97, 2010
Wireless communication has the advantage of mobility and obviates the need for cabling, but is inherently less secure and is subject to the heavy regulation of the radio frequency spectrum. Nevertheless, the allocation of unlicensed parts of the spectrum has facilitated the growth in wireless local area networks (WLANs). WLAN technology is progressing at a rapid pace, but the most widely accepted WLAN standard is the IEEE 802.11. This unique and highly practical text introduces the principles of WLANs based upon the IEEE 802.11 standards, demonstrating how to configure equipment in order to implement various network solutions. Readers will gain understanding of the security implications of wireless networks and learn how vulnerabilities can be mitigated. Additionally, the book examines the underlying 802.11 protocols and explains how to build mathematical models in order to analyse performance in a WLAN environment. Topics and Features: Presents a practical approach supported by the extensive use of examples and detailed instructions Discusses various wireless network solutions across a number of different vendor platforms, including Cisco Aironet, Alactel-Lucent Omniaccess and Meru Networks Provides numerous mathematical models for analyzing the performance of IEEE 802.11 standards, and shows how to build these models using Maple Examines issues of wireless security and describes how to implement a wireless network with enterprise security Investigates the medium access control sub-layer, and models for performance analysis of the MAC layer Reviews the physical sub-layers of 802.11, describing modulation techniques and examining how devices adapt to changes in the RF environment. A highly useful text/reference for industry professionals, undergraduate and graduate-level students will also find this book an ideal companion to a university course on wireless networking. Dr. Alan Holt is Chief Technical Officer at the network consultancy company IP Performance Ltd., based in Bristol, UK. He is author of the popular Springer text Network Performance Analysis: Using the J Programming Language. Dr. Chi-Yu Huang works for Tata Technologies Ltd., and is currently a software consultant on the Airbus project in Bristol. She was formerly Operations Manager for DL Consulting, New Zealand.
更多信息……
英语 [en] · PDF · 5.4MB · 2010 · 📘 非小说类图书 · 🚀/lgli/scihub/zlib · Save
base score: 11065.0, final score: 17467.76
lgli/French Painting in the Time of Jean De Berry_ The Late XIV -- Millard Meiss -- 1967-01-01 -- Phaidon_ NY_ -- 9780714813103 -- af158061f31503eb6c2d0e1b00d72daa -- Anna’s Archive.pdf
French Painting in the Time of Jean De Berry: The Late XIV Century and the Patronage of The Duke (Plate Volume) Millard. Meiss Phaidon. NY., National Gallery of Art Kress Foundation studies in the history of European art, no. 2, London, 1967
英语 [en] · PDF · 61.0MB · 1967 · 📘 非小说类图书 · 🚀/ia/lgli/lgrs · Save
base score: 11065.0, final score: 17466.842
ia/frenchpaintingin0000meis_m0w3.pdf
French Painting in the Time of Jean De Berry: The Late Fourteenth Century and the Patronage of the Duke (2 Volumes - Text and Plate) Meiss, Millard Phaidon.Christie's Ltd, National Gallery of Art: Kress Foundation studies in the history of European art, no. 2, National Gallery of Art Kress Foundation studies in the history of European art ;, no. 2., London, England, 1967
V. [1] Text Volume.--v. [2] Plate Volume. U.s. Distributors: F. A. Praeger, New York. Bibliography: P. 408-434.
更多信息……
英语 [en] · PDF · 37.2MB · 1967 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17466.842
nexusstc/The Criminal Responsibility of Senior Political and Military Leaders as Principals to International Crimes/eea1c651f1f1c08e8f70dd8adb8fe3f0.pdf
The Criminal Responsibility of Senior Political and Military Leaders as Principals to International Crimes (Studies in International and Comparative Criminal Law) Héctor Olásolo; with a foreword by Adrian Fulford, an introduction by Ekaterina Trendafilova and an epilogue by Kai Ambos Hart Publishing; Bloomsbury, Bloomsbury UK, Oxford, 2009
As shown by the trials of Slobodan Milosevic, Charles Taylor and Saddam Hussein, the large-scale and systematic commission of international crimes is usually planned and set in motion by senior political and military leaders. Nevertheless, the application of traditional forms of criminal liability leads to the conclusion that they are mere accessories to such crimes. This does not reflect their central role and often results in a punishment which is inappropriately low in view of the impact of their actions and omissions. For these reasons, international criminal law has placed special emphasis on the development of concepts, such as control of the crime and joint criminal enterprise (also known as the common purpose doctrine), which aim at reflecting better the central role played by senior political and military leaders in campaigns of large scale and systematic commission of international crimes. The Rome Statute of the International Criminal Court and the case law of the ICTY and the ICTR have, in recent years, played a unique role in the achievement of this goal.
更多信息……
英语 [en] · PDF · 1.9MB · 2009 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17466.367
nexusstc/The Criminal Responsibility of Senior Political and Military Leaders as Principals to International Crimes (Studies in International and Comparative Criminal Law)/25e70520ccae5453648c4f2ab68d956d.pdf
The Criminal Responsibility of Senior Political and Military Leaders as Principals to International Crimes (Studies in International and Comparative Criminal Law) Héctor Olásolo; with a foreword by Adrian Fulford, an introduction by Ekaterina Trendafilova and an epilogue by Kai Ambos Hart Publishing; Bloomsbury, Studies in international and comparative criminal law -- v. 4, Oxford, Portland, Or, England, 2009
As shown by the recent trials of Slobodan Milosevic, Charles Taylor, and Saddam Hussein, the large-scale and systematic commission of international crimes is usually planned and set in motion by senior political and military leaders. Nevertheless, the application of traditional forms of criminal liability leads to the conclusion that they are mere accessories to such crimes. This does not reflect their central role and often results in a punishment which is inappropriately low in view of the impact of their actions and omissions. For these reasons, international criminal law has placed special emphasis on developing the concepts of joint criminal enterprise (also known as the common purpose doctrine) and the control of the crime, which aim at better reflecting the central role played by senior political and military leaders in campaigns of large scale and systematic commission of international crimes. The Rome Statute of the International Criminal Court, the case law of the International Criminal Tribunal of the former Yuglosavia, and the case law of the International Criminal Tribunal for Rwanda have, in recent years, played a unique role in the achievement of this goal. The book is a comprehensive study of the modes of responsibility and liability in international criminal law. It fills a gap in the literature, as few books detail the drafting of indictments. It covers both substantive and procedural law and will be useful for both academics and practitioners.
更多信息……
英语 [en] · PDF · 1.6MB · 2009 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17466.127
duxiu/initial_release/40689763.zip
The Criminal Responsibility of Senior Political and Military Leaders as Principals to International Crimes,Olasolo, Hector,Hart Publishing Limited;International Specialized Book Services [Distributor] Héctor Olásolo, Kai Ambos, Adrian Fulford, Ekaterina Trendafilova, Michael Bohlander, Héctor Olásolo, Olásolo, Héctor Bloomsbury Publishing Plc, 2010, 2010
1 (p1): 1 First Approach to the Criminal Liability of Political and Military Leaders for International Crimes13 (p2): 2 Perpetration of a Crime and Participation in a Crime Committed by a Third Person: Principal versus Accessorial Liability13 (p2-1): I Introduction14 (p2-2): II First Approach to the Problem: Principal versus Accessorial Liability in National Law20 (p2-3): III Principal versus Accessorial Liability in International Criminal Law27 (p2-4): IV Differences between the ICC and the Ad hoc Tribunals with regard to the Notion of Accessorial Liability30 (p2-5): V Different Approaches to the Distinction between Principal and Accessorial Liability33 (p2-6): VI First Approach to the Notion of Joint Criminal Enterprise as Elaborated by the Case Law of the Ad hoc Tribunals and to the Notion of Control of the Crime38 (p2-7): VII Are the Notions of Joint Criminal Enterprise and Control of the Crime Part of Customary International Law?69 (p3): 3 Direct Perpetration and Indirect Perpetration69 (p3-1): I Direct Perpetration82 (p3-2): II Principal Liability of Senior Political and Military Leaders for Commission by Omission109 (p3-3): III Indirect Perpetration153 (p4): 4 Co-perpetration Based on Joint Criminal Enterprise153 (p4-1): I Joint Criminal Enterprise and Joint Control as Two Competing Definitional Criteria of the Concept of Co-perpetration155 (p4-2): II Three Forms of Co-perpetration Based on Joint Criminal Enterprise157 (p4-3): III Elements of Co-perpetration Based on Joint Criminal Enterprise182 (p4-4): IV Traditional Notion of Joint Criminal Enterprise202 (p4-5): V The Notion of Joint Criminal Enterprise at the Leadership Level231 (p4-6): VI Pleading Co-perpetration Based on Joint Criminal Enterprise252 (p4-7): VII Distinguishing between the Notion of Co-perpetration Based on Joint Criminal Enterprise and Aiding and Abetting as a Form of Accessorial Liability261 (p4-8): VIII Final Remarks on the Relationship between the Notions of Co-Perpetration Based on...
更多信息……
英语 [en] · PDF · 15.5MB · 2010 · 📗 未知类型的图书 · 🚀/duxiu/zlibzh · Save
base score: 11068.0, final score: 17466.12
ia/shelter0000cobe.pdf
Shelter : a Mickey Bolitar novel Coben, Harlan, 1962- Orion (an Imprint of The Orion Publishing Group Ltd ); Orion Publishing Group, Limited, A Mickey Bolitar novel, 1, Paperback edition, London, 2012
The First In An Exciting Series Of Ya Thrillers From The Master Of The Hook-and-twist. When Tragic Events Tear Him Away From His Parents, 15-year-old Mickey Bolitar Is Sent To Live With His Estranged Uncle, Myron. For A While, It Seems His Train Wreck Of A Life Is Finally Improving - Until His Girlfriend, Ashley, Goes Missing Without A Trace. Unwilling To Let Another Person He Cares About Walk Out Of His Life, Mickey Follows Ashley's Trail Into A Seedy Underworld, Revealing A Conspiracy So Shocking It Will Leave Him Questioning Everything About The Life He Thought He Knew.
更多信息……
英语 [en] · PDF · 12.5MB · 2012 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17464.836
ia/shelter2011cobe.pdf
Shelter : a Mickey Bolitar novel Coben, Harlan, 1962- Orion (an Imprint of The Orion Publishing Group Ltd ); Orion Publishing Group, Limited, A Mickey Bolitar novel, 1, Paperback edition, London, 2012
The First In An Exciting Series Of Ya Thrillers From The Master Of The Hook-and-twist. When Tragic Events Tear Him Away From His Parents, 15-year-old Mickey Bolitar Is Sent To Live With His Estranged Uncle, Myron. For A While, It Seems His Train Wreck Of A Life Is Finally Improving - Until His Girlfriend, Ashley, Goes Missing Without A Trace. Unwilling To Let Another Person He Cares About Walk Out Of His Life, Mickey Follows Ashley's Trail Into A Seedy Underworld, Revealing A Conspiracy So Shocking It Will Leave Him Questioning Everything About The Life He Thought He Knew.
更多信息……
英语 [en] · PDF · 10.7MB · 2012 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17464.64
ia/shelter0000cobe_u2f3.pdf
Shelter : a Mickey Bolitar novel Coben, Harlan, 1962- Orion (an Imprint of The Orion Publishing Group Ltd ); Orion Publishing Group, Limited, A Mickey Bolitar novel, 1, Paperback edition, London, 2012
The First In An Exciting Series Of Ya Thrillers From The Master Of The Hook-and-twist. When Tragic Events Tear Him Away From His Parents, 15-year-old Mickey Bolitar Is Sent To Live With His Estranged Uncle, Myron. For A While, It Seems His Train Wreck Of A Life Is Finally Improving - Until His Girlfriend, Ashley, Goes Missing Without A Trace. Unwilling To Let Another Person He Cares About Walk Out Of His Life, Mickey Follows Ashley's Trail Into A Seedy Underworld, Revealing A Conspiracy So Shocking It Will Leave Him Questioning Everything About The Life He Thought He Knew.
更多信息……
英语 [en] · PDF · 11.1MB · 2012 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17464.408
ia/shelter0000cobe_b9p9.pdf
Shelter : a Mickey Bolitar novel Coben, Harlan, 1962- Orion (an Imprint of The Orion Publishing Group Ltd ); Orion Publishing Group, Limited, A Mickey Bolitar novel, 1, Paperback edition, London, 2012
The First In An Exciting Series Of Ya Thrillers From The Master Of The Hook-and-twist. When Tragic Events Tear Him Away From His Parents, 15-year-old Mickey Bolitar Is Sent To Live With His Estranged Uncle, Myron. For A While, It Seems His Train Wreck Of A Life Is Finally Improving - Until His Girlfriend, Ashley, Goes Missing Without A Trace. Unwilling To Let Another Person He Cares About Walk Out Of His Life, Mickey Follows Ashley's Trail Into A Seedy Underworld, Revealing A Conspiracy So Shocking It Will Leave Him Questioning Everything About The Life He Thought He Knew.
更多信息……
英语 [en] · PDF · 12.0MB · 2012 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17464.2
ia/80211wirelessnet0000holt.pdf
802.11 Wireless Networks: Security and Analysis (Computer Communications and Networks) Alan Holt, Alan Holt, Chi-Yu Huang Springer London : Imprint: Springer, Springer Nature, London, 2010
Wireless communication has the advantage of mobility and obviates the need for cabling, but is inherently less secure and is subject to the heavy regulation of the radio frequency spectrum. Nevertheless, the allocation of unlicensed parts of the spectrum has facilitated the growth in wireless local area networks (WLANs). WLAN technology is progressing at a rapid pace, but the most widely accepted WLAN standard is the IEEE 802.11. This unique and highly practical text introduces the principles of WLANs based upon the IEEE 802.11 standards, demonstrating how to configure equipment in order to implement various network solutions. Readers will gain understanding of the security implications of wireless networks and learn how vulnerabilities can be mitigated. Additionally, the book examines the underlying 802.11 protocols and explains how to build mathematical models in order to analyse performance in a WLAN environment. Topics and Features: Presents a practical approach supported by the extensive use of examples and detailed instructions Discusses various wireless network solutions across a number of different vendor platforms, including Cisco Aironet, Alactel-Lucent Omniaccess and Meru Networks Provides numerous mathematical models for analyzing the performance of IEEE 802.11 standards, and shows how to build these models using Maple Examines issues of wireless security and describes how to implement a wireless network with enterprise security Investigates the medium access control sub-layer, and models for performance analysis of the MAC layer Reviews the physical sub-layers of 802.11, describing modulation techniques and examining how devices adapt to changes in the RF environment. A highly useful text/reference for industry professionals, undergraduate and graduate-level students will also find this book an ideal companion to a university course on wireless networking. Dr. Alan Holt is Chief Technical Officer at the network consultancy company IP Performance Ltd., based in Bristol, UK. He is author of the popular Springer text Network Performance Analysis: Using the J Programming Language. Dr. Chi-Yu Huang works for Tata Technologies Ltd., and is currently a software consultant on the Airbus project in Bristol. She was formerly Operations Manager for DL Consulting, New Zealand.
更多信息……
英语 [en] · PDF · 10.8MB · 2010 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17463.955
upload/newsarch_ebooks_2025_10/2018/10/21/184996274X.pdf
802.11 Wireless Networks: Security and Analysis (Computer Communications and Networks) Alan Holt, Chi-Yu Huang (auth.) Springer-Verlag London, Computer Communications and Networks, Computer Communications and Networks, 1, 2010
Wireless communication has the advantage of mobility and obviates the need for cabling, but is inherently less secure and is subject to the heavy regulation of the radio frequency spectrum. Nevertheless, the allocation of unlicensed parts of the spectrum has facilitated the growth in wireless local area networks (WLANs). WLAN technology is progressing at a rapid pace, but the most widely accepted WLAN standard is the IEEE 802.11. This unique and highly practical text introduces the principles of WLANs based upon the IEEE 802.11 standards, demonstrating how to configure equipment in order to implement various network solutions. Readers will gain understanding of the security implications of wireless networks and learn how vulnerabilities can be mitigated. Additionally, the book examines the underlying 802.11 protocols and explains how to build mathematical models in order to analyse performance in a WLAN environment. **Topics and Features:** * Presents a practical approach supported by the extensive use of examples and detailed instructions * Discusses various wireless network solutions across a number of different vendor platforms, including Cisco Aironet, Alactel-Lucent Omniaccess and Meru Networks * Provides numerous mathematical models for analyzing the performance of IEEE 802.11 standards, and shows how to build these models using Maple * Examines issues of wireless security and describes how to implement a wireless network with enterprise security * Investigates the medium access control sub-layer, and models for performance analysis of the MAC layer * Reviews the physical sub-layers of 802.11, describing modulation techniques and examining how devices adapt to changes in the RF environment. A highly useful text/reference for industry professionals, undergraduate and graduate-level students will also find this book an ideal companion to a university course on wireless networking. **Dr. Alan Holt** is Chief Technical Officer at the network consultancy company IP Performance Ltd., based in Bristol, UK. He is author of the popular Springer text __Network Performance Analysis: Using the J Programming Language__. **Dr. Chi-Yu Huang** works for Tata Technologies Ltd., and is currently a software consultant on the Airbus project in Bristol. She was formerly Operations Manager for DL Consulting, New Zealand.
更多信息……
英语 [en] · PDF · 5.6MB · 2010 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/scihub/upload/zlib · Save
base score: 11065.0, final score: 17462.664
ia/slavesinfamily00ball_1.pdf
Slaves in the Family (G K Hall Large Print Book Series) Edward Ball; Edward G. Ballard G K Hall & Co, G.K. Hall large print core series, Thorndike, Me, 1999
Awesome. Excellent read. Could not put it down.
更多信息……
英语 [en] · PDF · 144.8MB · 1999 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17460.994
upload/newsarch_ebooks_2025_10/2019/09/04/Tall With Room.epub
Tall With Room Haunted by You A.J. Llewellyn [Llewellyn, A.J.] Total-E-Bound Publishing, Independent Publishers Group, [N.p.], 2012
©Copyright A.J. Llewellyn 2012 Cover Art by Posh Gosh ©Copyright 2012 Total-E-Bound Publishing All rights reserved ISBN# 978-1-78184-102-0
更多信息……
英语 [en] · EPUB · 0.2MB · 2012 · 📕 小说类图书 · 🚀/lgli/lgrs/upload/zlib · Save
base score: 10055.0, final score: 16777.81
上一页 1 下一页
上一页 1 下一页
安娜的档案
主页
搜索
捐赠
🧬 SciDB
常问问题
账户
登录 / 注册
账户
公开资料
已下载文件
我的捐赠
Referrals
Explore
活动
代码浏览器
ISBN Visualization ↗
Community Projects ↗
Open data
数据集
种子
大语言模型数据
关注我们
联系邮箱
安娜的博客 ↗
Reddit ↗
Matrix ↗
Help out
改进元数据
志愿服务与悬赏
翻译 ↗
Development
安娜的软件 ↗
安全性
数字千年版权法(DCMA)/ 版权声明
镜像
annas-archive.li ↗
annas-archive.pm ↗
annas-archive.in ↗
SLUM [无关联] ↗
SLUM 2 [无关联] ↗