1.

Record Nr.

UNISA990000391720203316

Autore

International conference on epitaxial crystal growth <1.; 1990; Budapest>

Titolo

Epitaxial cristal growth : proceedings of the 1st International conference on epitaxial crystal growth, Budapest, Hungary, April 1-7, 1990 / editor E. Lendvay

Pubbl/distr/stampa

Switzerland : Trans Tech Publications, copyr. 1991

ISBN

0-87849-616-5 vol.1

0-87849-616-5 vol.2

Descrizione fisica

2 v. : ill. ; 20 cm.

Disciplina

548

Collocazione

548 EPI (1)

548 EPI (2)

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

Vol. 1. - 232 p. Vol. 2. - 736 p.



2.

Record Nr.

UNISA990000862900203316

Autore

CEI, Vincenzo

Titolo

Panico e fobie : le risposte a tutti i dubbi / Vittorio Cei

Pubbl/distr/stampa

Milano : F. Angeli, copyr. 2002

ISBN

88-464-3088-3

Descrizione fisica

175 p. ; 23 cm

Collana

Self-help ; 31

Disciplina

616.85225

Soggetti

Fobie

Collocazione

II.3. 2484(VI PS B 1028)

Lingua di pubblicazione

Italiano

Formato

Materiale a stampa

Livello bibliografico

Monografia

3.

Record Nr.

UNISALENTO991001998699707536

Autore

Colombo, Ugo M.

Titolo

Gli anziani : rapporti sociali, lavoro, pensioni / Ugo M. Colombo

Pubbl/distr/stampa

Milano : Giuffrè, 1975

Descrizione fisica

XXIII, 747 p. ; 24 cm

Disciplina

301.435

Soggetti

Anziani

Lingua di pubblicazione

Italiano

Formato

Materiale a stampa

Livello bibliografico

Monografia



4.

Record Nr.

UNICASBVE0084348

Titolo

Banche e risanamento delle imprese in crisi / a cura di Giancarlo Forestieri ; Alberto Berlinghieri ... \et al.!

Pubbl/distr/stampa

Milano, : EGEA, \1995!

ISBN

8823803012

Descrizione fisica

IX, 368 p. ; 25 cm.

Collana

Management ; 10

Disciplina

658.4056

Soggetti

Imprese - Risanamento

Lingua di pubblicazione

Italiano

Formato

Materiale a stampa

Livello bibliografico

Monografia

5.

Record Nr.

UNINA9911019689703321

Autore

Jacquenet Christian

Titolo

Service automation and dynamic provisioning techniques in IP/MPLS environments / / Christian Jacquenet, Gilles Bourdon and Mohamed Boucadair

Pubbl/distr/stampa

Chichester, England ; ; Hoboken, NJ, : J. Wiley & Sons, c2008

ISBN

9786611318079

9781281318077

1281318078

9780470035146

0470035145

9780470035153

0470035153

Descrizione fisica

1 online resource (348 p.)

Collana

Wiley series in communications networking & distributed systems

Altri autori (Persone)

BourdonGilles

BoucadairMohamed

Disciplina

004.6/2

004.62

621.38

Soggetti

MPLS standard

TCP/IP (Computer network protocol)



Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

1 Introduction -- PART I - ARCHITECTURES AND PROTOCOLS FOR SERVICE AUTOMATION AND APPLICATION EXAMPLES OF SERVICE AUTOMATION AND DYNAMIC RESOURCE PROVISIONING TECHNIQUES -- 2 What is a policy? -- 3 The Radius Protocol and its Extensions -- 4 The Diameter Protocol -- 5 The Common Open Policy Service (COPS) Protocol -- 6 NETCONF -- 7 Control and Provisioning of Wireless Access Points (CAPWAP) -- PART II - DYNAMIC RESOURCE PROVISIONING TECHNIQUES -- 8 Dynamic Enforcement of QoS Policies -- 9 Dynamic Enforcement of IP Traffic Engineering Policies in IP/MPLS -- Infrastructures -- 10 Automated Production of BGP/MPLS-Based VPN Networks -- 11 Dynamic Enforcement of Security Policies in IP/MPLS Environments -- 12 Future Challenges -- Appendices -- A XML Schema for NETCONF RPCS and Operations -- B XML Schema for NETCONF Notifications -- C Example of an IP Traffic Engineering Policy Information Base (IP TE PIB) -- D Example of an IP TE Accounting PIB -- E Description of Classes of an IP VPN Information Model -- Index

Sommario/riassunto

Save time & resources with this comprehensive guide to automation configuration for the value-added IP services of the future. As the Internet becomes the medium of choice for value-added IP service offerings such as TV broadcasting, videoconferencing, and Voice over IP, the ability of automating configuration processes has become a key challenge for service providers. In fact, this feature has become crucial with the ever-growing level of expertise required to deploy such services and the scope of the techniques that need to be activated in order to provide such services with a guaranteed level of quality. Service Automation and Dynamic Provisioning Techniques in IP/MPLS Environments: *Discusses architectures and protocols for services information, covering the state-of-the-art in current implementations of Remote Authentication Dial-In User Service (RADIUS), Diameter, Common Open Policy Service (COPS), Simple Network Management Protocol (SNMP) and NETCONF *Explains various application examples, covering the dynamic enforcement of QoS, security, and IP Traffic Engineering policies. *Covers the automated production of MPLS-based VPNs. The authors offer an invaluable guide for IT facilitators, network managers, and researchers in industry and academia, as well as students studying advanced IP/MPLS networking communications courses. System designers and architects will also find this book helpful.



6.

Record Nr.

UNINA9910965389703321

Titolo

Information security management handbook / / edited by Harold F. Tipton, Micki Krause Nozaki

Pubbl/distr/stampa

Boca Raton : , : Auerbach Publications, , 2007-

ISBN

0-429-11284-X

1-283-59665-2

9786613909107

1-4398-9315-2

Edizione

[6th edition.]

Descrizione fisica

1 online resource (495 p.)

Collana

Information security management handbook ; ; v. 6

Disciplina

658

658/.0558

Soggetti

Computer security - Management

Data protection

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

"An Auerbach book."

Nota di bibliografia

Includes bibliographical references.

Nota di contenuto

Front Cover; Contents; Introduction; Editors; Contributors; Chapter 1: What Business Associates Need to Know about Protected Health Information under HIPAA and HITECH; Chapter 2: E-Mail Security; Chapter 3: Appreciating Organizational Behavior and Institutions to Solidify Your Information Security Program; Chapter 4: The Information Security Auditors Have Arrived, Now What?; Chapter 5: Continuous Monitoring: Extremely Valuable to Deploy within Reason; Chapter 6: Social Networking; Chapter 7: Insider Threat Defense; Chapter 8: Risk Management in Public Key Certificate Applications

Chapter 9: Server Virtualization: Information Security ConsiderationsChapter 10: Security Requirements Analysis; Chapter 11: CERT Resilience Management Model: An Overview; Chapter 12: Managing Bluetooth Security; Chapter 13: Slash and Burn: In Times of Recession, Do Not Let Emotions Drive Business Decisions; Chapter 15: Application Whitelisting; Chapter 16: Design of Information Security for Large System Development Projects; Chapter 17: Building Application Security Testing into the Software Development Life Cycle; Chapter 19: Format Preserving Encryption



Chapter 20: Elliptic Curve CryptosystemsChapter 21: Pirating the Ultimate Killer App: Hacking Military Unmanned Aerial Vehicles; Chapter 22: Service-Oriented Architecture; Chapter 23: Cloud Security; Chapter 24: Enterprise Zones of Trust; Chapter 25: Complex Event Processing for Automated Security Event Analysis; Chapter 26: Records Management; Chapter 27: Data Backup Strategies: Traditional versus Cloud; Chapter 28: Managing Advanced Persistent Threats; Chapter 29: Virtualization Forensics; Information Security Management Handbook: Comprehensive Table of Contents; Back Cover

Sommario/riassunto

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations. Reporting on the latest developments in information security and recent changes to the (ISC)2® CISSP Common Body of Knowledge (CBK®</SU