| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISALENTO991002117929707536 |
|
|
Autore |
Torrent, Armando |
|
|
Titolo |
El negocio juridico en derecho romano / Armando Torrent |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
2. |
Record Nr. |
UNINA9910254838903321 |
|
|
Titolo |
Information Systems Security and Privacy : Second International Conference, ICISSP 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers / / edited by Olivier Camp, Steven Furnell, Paolo Mori |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2017.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XII, 215 p. 100 illus.) |
|
|
|
|
|
|
Collana |
|
Communications in Computer and Information Science, , 1865-0937 ; ; 691 |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data protection |
Cryptography |
Data encryption (Computer science) |
Application software |
Electronic data processing - Management |
Data and Information Security |
Cryptology |
Computer and Information Systems Applications |
IT Operations |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
Data and software security -- Privacy and confidentiality -- Mobile systems security -- Biometric authentication -- Privacy in social media. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the revised selected papers of the Second International Conference on Information Systems Security and Privacy, ICISSP 2016, held in Rome, Italy, in February 2016. The 9 full papers presented together with two invited papers were carefully reviewed and selected from a total of 91 submissions. They are dealing with topics such as data and software security; privacy and confidentiality; mobile systems security; biometric authentication; privacy in social media. |
|
|
|
|
|
|
|
| |