01430nam0 22003251i 450 SUN000686720110208100355.88488-13-20904-5IT98 1285020020822d1998 |0itac50 baitaIT|||| |||||Trasformazione, fusione, scissione di societàGiorgia ManziniPadovaCedam1998XIV, 758 p.24 cm.001SUN00070002001 ˆI ‰grandi orientamenti della giurisprudenza civile e commerciale39210 PadovaCEDAM1987-.Società <diritto e economia>TrasformazioneGiurisprudenzaFISUNC004119Società <diritto e economia>FusioneGiurisprudenzaFISUNC004120Società <diritto e economia>ScissioneGiurisprudenzaFISUNC004121PadovaSUNL000007346.45066260264821Manzini, GiorgiaSUNV005789240732CEDAMSUNV005537650ITSOL20181109RICASUN0006867UFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI GIURISPRUDENZA00 CONS XV.Eh.227 39 00 14100 UFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI GIURISPRUDENZA14100CONS XV.Eh.227 39paTrasformazione, fusione, scissione di società661371UNICAMPANIA03852nam 22007815 450 99646550450331620221017174247.03-642-22424-510.1007/978-3-642-22424-9(CKB)2670000000095966(SSID)ssj0000530759(PQKBManifestationID)11320818(PQKBTitleCode)TC0000530759(PQKBWorkID)10569183(PQKB)10625345(DE-He213)978-3-642-22424-9(MiAaPQ)EBC3066859(PPN)153869712(EXLCZ)99267000000009596620110620d2011 u| 0engurnn#008mamaatxtccrDetection of Intrusions and Malware, and Vulnerability Assessment[electronic resource] 8th International Conference, DIMVA 2011, Amsterdam, The Netherlands, July 7-8, 2011, Proceedings /edited by Thorsten Holz, Herbert Bos1st ed. 2011.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2011.1 online resource (X, 235 p. 86 illus., 44 illus. in color.)Security and Cryptology ;6739Bibliographic Level Mode of Issuance: Monograph3-642-22423-7 Includes bibliographical references and index.This book constitutes the refereed proceedings of the 8th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2011, held in Amsterdam, the Netherlands, in July 2011. The 11 full papers presented together with two short papers were carefully reviewed and selected from 41 initial  submissions. The papers are organized in topical sections on network security, attacks, Web security, and host security.Security and Cryptology ;6739Computer communication systemsManagement information systemsComputer scienceData encryption (Computer science)Computers and civilizationApplication softwareAlgorithmsComputer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Information Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Computer communication systems.Management information systems.Computer science.Data encryption (Computer science).Computers and civilization.Application software.Algorithms.Computer Communication Networks.Management of Computing and Information Systems.Cryptology.Computers and Society.Information Systems Applications (incl. Internet).Algorithm Analysis and Problem Complexity.004.6Holz Thorstenedthttp://id.loc.gov/vocabulary/relators/edtBos Herbertedthttp://id.loc.gov/vocabulary/relators/edtBOOK996465504503316Detection of Intrusions and Malware, and Vulnerability Assessment2071230UNISA