01081nam0-22003251i-450 99000526206040332120220304101230.090-6255-208-0000526206FED01000526206(Aleph)000526206FED0100052620619990604d1978----km-y0itay50------bagery-------001yyStudien zur allgemeinen Rechtslehre des GaiusIus gentium und ius naturale in ihrem verhältnis zum ius civileHerbert WagnerZutphenTerra Publ.Co1978XXIV, 290 p.28 cmStudia amstelodamensia ad epigraphicam, ius antiquum et papyrologicam pertinentia15340.5422itaWagner,Herbert205254ITUNINARICAUNIMARCBK990005262060403321340.54 WAG 1ANT. G.R. 3184FLFBCDDR-VIII C Gaius 007605 ddrDDR21-3370FLFBCDDRStudien zur allgemeinen Rechtslehre des Gaius539725UNINA02891oam 2200625 450 991015311630332120210429120615.01-292-03791-1(CKB)2550000001126564(SSID)ssj0001257034(PQKBManifestationID)12453007(PQKBTitleCode)TC0001257034(PQKBWorkID)11274991(PQKB)10298137(MiAaPQ)EBC5174566(MiAaPQ)EBC5176391(MiAaPQ)EBC5833562(MiAaPQ)EBC5137883(MiAaPQ)EBC6399579(Au-PeEL)EBL5137883(CaONFJC)MIL527227(OCoLC)1015874961(PPN)179039377(EXLCZ)99255000000112656420210429d2014 uy 0engurcnu||||||||txtccrIntroduction to computer security /Michael T. Goodrich, Roberto TamassiaFirst edition.Harlow, England :Pearson Education Limited,[2014]©20141 online resource (514 pages) illustrationsAlways learningIncludes index.1-292-02540-9 1-299-95976-8 Includes bibliographical references and index.Cover -- Table of Contents -- 1. Introduction -- 2. Physical Security -- 3. Operating Systems Security -- 4. Malware -- 5. Network Security I -- 6. Network Security II -- 7. Web Security -- 8. Cryptography -- 9. Distributed-Applications Security -- 10. Bibliography -- Index.For computer-security courses that are taught at the undergraduate level and that have as their sole prerequisites an introductory computer science sequence (e.g., CS 1/CS 2). A new Computer Security textbook for a new generation of IT professionals. Unlike most other computer security textbooks available today, Introduction to Computer Security, 1e does NOT focus on the mathematical and computational foundations of security, and it does not assume an extensive background in computer science. Instead it looks at the systems, technology, management, and policy side of security, and offers students fundamental security concepts and a working knowledge of threats and countermeasures with "just-enough" background in computer science. The result is a presentation of the material that is accessible to students of all levels.Always learning.Computer securityComputer security.005.8Goodrich Michael T.305484Tamassia Roberto1960-MiAaPQMiAaPQUtOrBLWBOOK9910153116303321Introduction to computer security2862264UNINA02661oas 2201021 a 450 991014168300332120251106213014.01539-0705(DE-599)ZDB2070862-2(DE-599)2070862-2(OCoLC)49243401(CONSER) 2002212646(CKB)110975942239480(EXLCZ)9911097594223948020020305a19999999 sy aengurcnu||||||||txtrdacontentcrdamediacrrdacarrierJournal of hospice and palliative nursing JHPNPhiladelphia, PA Nursecom, Inc.©1999-Philadelphia, PA Lippincott Wiiliams & WilkinsRefereed/Peer-reviewed1522-2179 JHPNJournal of hospice & palliative nursingJ. hosp. palliat. nurs.Hospice carePeriodicalsPalliative treatmentPeriodicalsNursingPeriodicalsHospice CarePalliative CareSoins en phase terminalePériodiquesSoins palliatifsPériodiquesHospice carefast(OCoLC)fst00960872Nursingfast(OCoLC)fst01041731Palliative treatmentfast(OCoLC)fst01051719Nurses InstructionPeriodicalPeriodicals.fastPeriodicals.lcgftHospice carePalliative treatmentNursingHospice CarePalliative CareSoins en phase terminaleSoins palliatifsHospice care.Nursing.Palliative treatment.610Hospice and Palliative Nurses Association.NSDNSDOCLCQDLCLGGOCLCQMYGBUFOCLCSTXUVAMFFQCSUIL4I4UKWOHUKMGBOCLCQOCLCOOCLCQOCLCOOCLCFOCLCOOCLCQOCLCOQGKOCLCQUABOCLCLLVTOCLCQJOURNAL9910141683003321Journal of hospice and palliative nursing2565763UNINA