Constitutional and political theory :, Bockenforde, Ernst-Wolfgang
Автор: Walsh Carl E. Название: Monetary Theory and Policy, Third Edition ISBN: 0262013770 ISBN-13(EAN): 9780262013772 Издательство: MIT Press Рейтинг: Цена: 8287.00 р. Наличие на складе: Нет в наличии.
Описание: A new edition of the leading text in monetary economics, a comprehensive treatment revised and enhanced with new material reflecting recent advances in the field.
Автор: Mas-Colell, Andreu Название: Microeconomic theory ISBN: 0195102681 ISBN-13(EAN): 9780195102680 Издательство: Oxford Academ Рейтинг: Цена: 19931.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This is a comprehensive textbook covering all of the topics taught in the graduate-level, two-semester course in microeconomic theory required of all graduate students in economics. It combines the results of the authors` experience of teaching microeconomics at Harvard and has been fully classroom tested.
Автор: Ginsburg Название: Comparative Constitutional Design ISBN: 1107020565 ISBN-13(EAN): 9781107020566 Издательство: Cambridge Academ Рейтинг: Цена: 17424.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This volume brings together essays by leading scholars of comparative constitutional design from myriad disciplinary perspectives. The authors collectively assess what we know - and do not know - about the design process as well as particular institutional choices concerning executive power, constitutional amendment processes and many other issues.
Автор: E.L.K.E Название: Laser Machining: Theory and Practice ISBN: 1475740867 ISBN-13(EAN): 9781475740868 Издательство: Springer Рейтинг: Цена: 9141.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Laser Machining: Theory and Practice addresses state-of-the-art laser machining in a way useful for research- ers, academicians and practitioners, particularly manufacturing engineers, who are considering lasers as a solution to the machining requirements of their factories and plants.
Who makes constitutional law? Is constitutional doctrine the monopoly of the courts? In accessible and persuasive prose Louis Fisher explains that constitutional law is not solely or even primarily the Supreme Court's "final word" but rather a richly political convergence of separate interpretations. With a broad range of examples, he argues that constitutional principles emerge from a dialogue among all three branches of government--executive, legislative, and judicial. Important contributions also come from the states and the general public. Fisher identifies executive and legislative initiatives in many areas of constitutional significance. Where there is litigation, the Court generally upholds these initiatives or may avoid making a constitutional decision by using "threshold devices." On those rare occasions when the Supreme Court exercises judicial review and strikes down a presidential or congressional action, it is usually only a matter of time before the proposal is revived and the dialogue begins again.
Originally published in 1988.
The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These paperback editions preserve the original texts of these important books while presenting them in durable paperback editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.
Описание: English translation of materials from a workshop on Confucian constitutionalism in May 2010 at the City University of Hong Kong.
Автор: Stinson, Douglas R. Название: Cryptography: Theory and Practice, Third Edition ISBN: 1584885084 ISBN-13(EAN): 9781584885085 Издательство: Taylor&Francis Рейтинг: Цена: 7501.00 р. Наличие на складе: Нет в наличии.
Описание: This third edition of a standard text provides complete coverage of the use of cryptographic protocols which establish a series of steps that must be taken before any type of secret transmission can be completed. The book shows the reader how the various parties to the transaction establish their cryptographic identities or keys. It covers many of the cryptographic tools used in network security along with topic such as copyright protection techniques and public key infrastructure. The book is a text for senior graduate courses introducing cryptography and is also a useful reference for professionals interested in network security and cryptographic protocols.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru