01022nam0-2200337---450-99000961214040332120120910134729.0978-88-548-2336-5000961214FED01000961214(Aleph)000961214FED0100096121420120730d2009----km-y0itay50------baitaIT--------001yyTempi e spazi della rivoltaepistemologia critica delle soggettività (migranti) e dell'antagonismo ai tempi della governance e della finanziarizzazioneCarmelo BuscemaRomaAracne2009268 p.20 cmA13324Contiene bibl. (pp. 257-268)Conflitto sociale303.6422itaBuscema,Carmelo517376ITUNINARICAUNIMARCBK990009612140403321303.64 BUS 15553BFSBFSTempi e spazi della rivolta849364UNINA02987nam 22006615 450 991025482010332120251225212329.0981-10-5421-510.1007/978-981-10-5421-1(CKB)4340000000062282(DE-He213)978-981-10-5421-1(MiAaPQ)EBC6299038(MiAaPQ)EBC5592505(Au-PeEL)EBL5592505(OCoLC)992118745(PPN)20299175X(EXLCZ)99434000000006228220170622d2017 u| 0engurnn#008mamaatxtrdacontentcrdamediacrrdacarrierApplications and Techniques in Information Security 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedings /edited by Lynn Batten, Dong Seong Kim, Xuyun Zhang, Gang Li1st ed. 2017.Singapore :Springer Nature Singapore :Imprint: Springer,2017.1 online resource (XIV, 223 p. 68 illus.)Communications in Computer and Information Science,1865-0937 ;719981-10-5420-7 Keynote Speeches -- Crypto Algorithms and Applications -- Attacks -- Malware and Malicious Events Detection -- System and Network Security.This book constitutes the refereed proceedings of the 8th International Conference on Applications and Techniques in Information Security, ATIS 2017, held in Auckland, New Zealand, in July 2017. The 14 revised full papers and 4 short papers presented together with two abstracts of invited talks were carefully reviewed and selected from 29 submissions. The papers are organized in topical sections on Keynote Speeches; Crypto Algorithms and Applications; Attacks; Malware and Malicious Events Detection; System and Network Security.Communications in Computer and Information Science,1865-0937 ;719Data protectionCryptographyData encryption (Computer science)AlgorithmsData and Information SecurityCryptologyAlgorithmsData protection.Cryptography.Data encryption (Computer science).Algorithms.Data and Information Security.Cryptology.Algorithms.005.8Batten Lynnedthttp://id.loc.gov/vocabulary/relators/edtKim Dong Seongedthttp://id.loc.gov/vocabulary/relators/edtZhang Xuyunedthttp://id.loc.gov/vocabulary/relators/edtLi Gangedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910254820103321Applications and Techniques in Information Security2028776UNINA