00800nam0 2200265 450 991026545090332120180427152127.0978885753842620180427d2017----km y0itay50 baitaIT 001yy<<La >>privacy vi salverà la vitainternet, social, chat e altre mortali amenitàAlessandro CurioniMilano ; UdineMimesis2017<<Il >>caffè dei filosofi91Diritto alla riservatezza323.44822itaCurioni,Alessandro749846ITUNINAREICATUNIMARCBK9910265450903321323.448 CUR 14307BFSBFSPrivacy vi salverà la vita1509231UNINA01686nam--2200445---450-99000108933020331620050516150318.03-201-00058-2000108933USA01000108933(ALEPH)000108933USA0100010893320020905d1975----km-y0itay0103----bagreengATy|||z|||001yy<<A>> concordance to the septuagint and the other greek version of the Old Testament (including the apocryphal booksby Edwin Hatch and Henry A.Redpath assisted by other scholarsGrazAkademische Druckcopyr.19752 v.29 cmRipr. facs. dell'ed. di Oxford del 19061.: A-I. - 696 p. - 2.:K-O. - P.698-1504, 1-272BibbiaVecchio TestamentoVersione dei SettantaConcordanze221.44HATCH,Edwin179448REDPATH,Henry A.212003ITsalbcISBD990001089330203316V 1 F 5/1(XIV 1447/1)163001 L.M.XIV00082591V 1 F 5/2-3(XIV 1447/2-3)163002 L.M.XIV00082592BKUMAPAOLA9020020905USA011323PAOLA9020020905USA011324PAOLA9020020905USA011327PAOLA9020020905USA011343PAOLA9020020905USA011347PATRY9020040406USA011715COPAT69020050516USA011503Concordance to the septuagint and the other greek version of the Old Testament (including the apocryphal books978486UNISA03079nam 2200613Ia 450 991045641770332120200520144314.01-282-93301-997866129330110-313-34531-7(CKB)2550000000019687(EBL)617118(OCoLC)699474608(SSID)ssj0000470168(PQKBManifestationID)11331928(PQKBTitleCode)TC0000470168(PQKBWorkID)10412202(PQKB)11724574(MiAaPQ)EBC617118(Au-PeEL)EBL617118(CaPaEBR)ebr10437127(CaONFJC)MIL293301(EXLCZ)99255000000001968720100223d2010 uy 0engur|n|---|||||txtccrIcons of mystery and crime detection[electronic resource] from sleuths to superheroesVolume 2 /Mitzi M. BrunsdaleSanta Barbara, Calif. Greenwoodc20101 online resource (410 p.)Greenwood iconsDescription based upon print version of record.0-313-34530-9 Includes bibliographical references and index.""Cover""; ""Contents""; ""Volume 2""; ""Tony Hillerman: Creator of Ethnic Detectives Joe Leaphorn and Jim Chee""; ""Alfred Hitchcock: Cinemaâ€?s Master of Suspense""; ""Sherlock Holmes: The Genius Detective""; ""Inspector Jules Maigret: The Gallic Gumshoe""; ""Philip Marlowe: The Detective as Knight Errant""; ""Perry Mason: The Legal Sleuth""; ""Edgar Allan Poe: The Father of Detective Fiction""; ""Dorothy L. Sayers: Creator of Lord Peter Wimsey, the Aristocratic Sleuth""; ""Sam Spade: The Hard-Boiled Private Eye""; ""Dick Tracy: The First Comic Strip Police Detective Hero""""Nero Wolfe: The Armchair Sleuth""""Zorro: The Masked Avenger""; ""Selected Bibliography""; ""Index""; ""A""; ""B""; ""C""; ""D""; ""E""; ""F""; ""G""; ""H""; ""I""; ""J""; ""K""; ""L""; ""M""; ""N""; ""O""; ""P""; ""Q""; ""R""; ""S""; ""T""; ""U""; ""V""; ""W""; ""X""; ""Y""; ""Z"" ""As one of the few titles available organized by character with in-depth character analysis and some literary criticism, this is a nice addition to any reference collection supporting serious mystery, suspense, and detective fans at the college and high school levels. Recommended."" - <STRONG> Library Journal </STRONG>Greenwood icons.Detective and mystery storiesAuthorshipDetective and mystery storiesHistory and criticismElectronic books.Detective and mystery storiesAuthorship.Detective and mystery storiesHistory and criticism.809.3/872Brunsdale Mitzi879629MiAaPQMiAaPQMiAaPQBOOK9910456417703321Icons of mystery and crime detection1964201UNINA02368nam 2200445 450 991049215130332120220330091253.03-030-74962-2(CKB)4100000011982480(MiAaPQ)EBC6678833(Au-PeEL)EBL6678833(EXLCZ)99410000001198248020220330d2021 uy 0engurcz#---auuuutxtrdacontentcrdamediacrrdacarrierProfit sharing and tax base erosion case studies of post-Communist countries /Danuše Nerudová, Jan Pavel, editorsCham, Switzerland :Springer,[2021]©20211 online resource (240 pages) illustrations (some color)Contributions to finance and accounting3-030-74961-4 Includes bibliographical references.Introduction -- Profit shifting and tax base erosion in 21th century -- Methodological approaches of the measurement of profit shifting and tax base erosion -- Economic analysis from the macro perspective -- Economic analysis from the micro perspective -- Economic policy in relation with fair corporate taxation -- Conclusion -- BMThis book provides a comprehensive analysis of current techniques for profit shifting and tax base erosion in the area of corporate taxation and measurement. Firstly, it explains the relevance of the issue at hand--profit shifting and base erosion in the context of the 21st century. In turn, the book provides a comprehensive analysis of available techniques for the identification and measurement of profit shifting and base erosion, which adopt both the macro and micro perspective. It also provides examples from selected post-communist countries now in the EU, including the Czech Republic, Poland and Hungary. Concrete recommendations for economic policy round out the coverageContributions to finance and accounting.TaxationEurope, EasternTaxation336.200947Nerudová DanušePavel Jan1978-MiAaPQMiAaPQMiAaPQBOOK9910492151303321Profit sharing and tax base erosion2571081UNINA01868nam a2200325 i 4500991002771889707536150529s2005 be a b 000 0 eng d250351846Xb1422995x-39ule_instDip. di Studi UmanisticiitageritaRamon Llull und Nikolaus von Kues :eine Begegnung im Zeichen der Toleranz : Akten des Internationalen Kongresses zu Ramon Llull und Nikolaus von Kues (Brixen und Bozen, 25.-27. November 2004) = Raimondo Lullo e Niccolo Cusano : un incontro nel segno della tolleranza : atti del Congresso Internazionale su Raimondo Lullo e Niccolo Cusano (Bressanone e Bolzano, 25-27 novembre 2004) /herausgegeben von Ermenegildo Bidese, Alexander Fidora, Paul RennerRaimondo Lullo e Niccolo Cusano :un incontro nel segno della tolleranza : atti del Congresso Internazionale su Raimondo Lullo e Niccolo Cusano (Bressanone e Bolzano, 25-27 novembre 2004)Turnhout :Brepols,2005X, 300 p. :ill. ;25 cmInstrumenta patristica et mediaevalia ;46Subsidia Lulliana ;2Contiene riferimenti bibliografici. IndiceContributi in tedesco e italianoLullo, RaimondoCongressiNiccolò :da CusaCongressiBidese, Ermenegildoauthorhttp://id.loc.gov/vocabulary/relators/aut732835Fidora, Alexanderauthorhttp://id.loc.gov/vocabulary/relators/aut732836Renner, Paul.b1422995x09-11-1529-05-15991002771889707536LE007 195 BID 01.0112007000264614le007pE95.51-l- 02320.i1570317409-11-15Ramon Llull und Nikolaus von Kues1443860UNISALENTOle00729-05-15ma -gerde 0001307nam0 22003373i 450 MIL051088120231121125549.0047157777420141021d1992 ||||0itac50 baengusz01i xxxe z01nDigital signal processing with C and the TMS320C25Rulph ChassaingNew York \etc.!Wileyc1992XV, 415 p.ill.24 cm1 dischetto per PC.Topics in digital signal processing001GEA00135832001 Topics in digital signal processingMicroprocessoriFIRRMLC015153IC++FIRRMLC376917IElaborazione del segnaleTecniche digitaliFIRRMLC400665I621.382220Chassaing, RulphPUVV085163070622408ITIT-0120141021IT-FR0099 Biblioteca Area IngegneristicaFR0099 MIL0510881Biblioteca Area Ingegneristica 54DAE 621.382 CHA 54VM 0000116135 VM barcode:ING221A. - Inventario:221a. - Fondo:CONVMA 2002030120121204 54Digital signal processing with C and the TMS320C251429082UNICAS02948nam 2200721 450 991082357260332120221215203513.01-282-96014-897866129601471-4081-3491-81-4081-2810-1(CKB)2670000000066285(EBL)573331(OCoLC)727647139(SSID)ssj0000468290(PQKBManifestationID)11287782(PQKBTitleCode)TC0000468290(PQKBWorkID)10498316(PQKB)10532138(MiAaPQ)EBC573331(MiAaPQ)EBC1986695(Au-PeEL)EBL1986695(CaONFJC)MIL296014(OCoLC)905985936(MiAaPQ)EBC6627488(Au-PeEL)EBL6627488(OCoLC)1252425551(NjHacI)992670000000066285(BIP)028200072(EXLCZ)99267000000006628520220123d2010 uy 0engur|n|---|||||txtccrDeal with difficult people how to cope with tricky situations in the workplaceRevised edition.London, England :A & C Black,[2010]©20101 online resource (95 p.)Steps to successIncludes index.1-4081-2809-8 Includes bibliographical references and index.Cover Page; Title Page; Copyright Page; Table of Contents; 1 Handling office politics; 2 Coping with a difficult boss; 3 Dealing with bullying or harassment; 4 Dealing with discrimination against you; 5 Preventing discrimination; 6 Managing addictive behaviour; 7 Managing poor performance; 8 Thinking around problems; Where to find more helpWhile we'd all like a quiet life, there are some situations that can't be ignored - a survey by Staffordshire University Business School estimated that 53% of us will be bullied at work at some point during our working life. In offices, workplace bullying is on the rise and discrimination is commonplace. Key customers are ever more demanding, won't take no for an answer and aren't afraid to tell you so. This fully revised and updated Steps to Success title offers solutions and step-by-step advice on a wide range of contemporary issues, from how to defuse tense situations, to where to turn if ySteps to success (London, England)Problem employeesInterpersonal ConflictConflict ManagementPsychology, IndustrialPsychologyProblem employees.658.3045A & C Black,MiAaPQMiAaPQMiAaPQBOOK9910823572603321Deal with difficult people4043858UNINA12852nam 22008655 450 991064426680332120251225173614.09783031230950303123095710.1007/978-3-031-23095-0(MiAaPQ)EBC7175605(Au-PeEL)EBL7175605(CKB)25994381500041(DE-He213)978-3-031-23095-0(PPN)267807880(EXLCZ)992599438150004120230110d2022 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierAdvancements in Smart Computing and Information Security First International Conference, ASCIS 2022, Rajkot, India, November 24–26, 2022, Revised Selected Papers, Part II /edited by Sridaran Rajagopal, Parvez Faruki, Kalpesh Popat1st ed. 2022.Cham :Springer Nature Switzerland :Imprint: Springer,2022.1 online resource (315 pages)Communications in Computer and Information Science,1865-0937 ;1760Print version: Rajagopal, Sridaran Advancements in Smart Computing and Information Security Cham : Springer,c2023 9783031230943 Includes bibliographical references and index.Intro -- Preface -- Organization -- Abstracts of Keynotes -- Post-pandemic Applications of AI and Machine Learning -- Smart and Soft Computing Methods for Prioritizing Software Requirements in Large-Scale Software Projects -- Your Readiness for Industry 4.0 -- Securing NexGen Automotives - Threats and Trends -- Cyber Attacks Classification and Attack Handling Methods Using Machine Learning Methods -- The Internet of Things (IoT) Ecosystem Revolution in the World of Global Sports -- Orchestration of Containers: Role of Artificial Intelligence -- Enterprise Cybersecurity Strategies in the Cloud -- Contents - Part II -- Contents - Part I -- Cyber Security -- A Comprehensive Study on Cyber Legislation in G20 Countries -- 1 Introduction -- 2 Literature Review -- 2.1 Argentina -- 2.2 Australia -- 2.3 Brazil -- 2.4 Canada -- 2.5 China -- 2.6 France -- 2.7 Germany -- 2.8 India -- 2.9 Indonesia -- 2.10 Italy -- 2.11 Japan -- 2.12 South Korea -- 2.13 Mexico -- 2.14 Russia -- 2.15 Saudi Arabia -- 2.16 South Africa -- 2.17 Turkey -- 2.18 United Kingdom -- 2.19 United State of America -- 2.20 European Union -- 3 Conclusions -- References -- Image Encryption Algorithm Based on Timeout, Pixel Transposition and Modified Fisher-Yates Shuffling -- 1 Introduction -- 2 Proposed Work -- 2.1 Key Generation -- 2.2 Encryption Process -- 2.3 Decryption Process -- 3 Library and Packages -- 4 Performance Analysis and Results -- 4.1 NPCR &amp -- UACI Test -- 4.2 Mean Square Error (MSE) -- 4.3 Root Mean Square Error (RMSE) -- 4.4 Peak Signal to Noise Ratio (PSNR) -- 4.5 Key Space Analysis -- 4.6 Key Sensitivity Test -- 4.7 Encryption Time -- 4.8 Correlation Analysis -- 4.9 Mono-bit Test -- 4.10 Entropy Analysis -- 4.11 Average Difference (AD) and Maximum Difference (MD) -- 4.12 Structural Content (SC) -- 5 Conclusion -- References.EXAM: Explainable Models for Analyzing Malicious Android Applications -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Data Set Preparation -- 3.2 Feature Extraction -- 3.3 Pre-processing the Feature Set and FVT Creation -- 3.4 Model Preparation and Classification -- 3.5 Obfuscation of Samples -- 3.6 Interpretation of Results Using SHAP -- 4 Experiments and Results -- 4.1 Evaluation Measures -- 4.2 Research Questions -- 4.3 Comparison with State-of-the-Art Approaches -- 5 Conclusion -- References -- Data Encryption Approach Using Hybrid Cryptography and Steganography with Combination of Block Ciphers -- 1 Introduction -- 1.1 Research Contribution -- 1.2 Paper Organisation -- 2 Related Work in the Domain -- 3 Proposed Methodology -- 4 Results and Discussions -- 5 Conclusion -- References -- Mitigation and Prevention Methods for Distributed Denial-of-Service Attacks on Network Servers -- 1 Introduction -- 2 Proposed Survey -- 2.1 Motivation for DDoS Attacks -- 2.2 Attack Strategies and Phases -- 2.3 Attack Methods -- 3 Prevention Methods -- 3.1 Prevention Using Filters -- 3.2 Secure Overlay -- 3.3 Honeypots -- 3.4 Load Balancing -- 3.5 Additional Security Patches -- 4 DDoS Mitigation Methods -- 4.1 Detection of DDoS Attacks -- 5 Conclusion -- References -- A Machine Learning Framework for Automatic Detection of Malware -- 1 Introduction -- 2 Literature Review -- 3 Proposed Framework -- 4 Experimental Results -- 5 Conclusion and Future Work -- References -- DNNdroid: Android Malware Detection Framework Based on Federated Learning and Edge Computing -- 1 Introduction -- 2 Related Work -- 3 Datasets -- 4 Machine Learning Technique -- 5 Proposed Framework Architecture -- 6 Evaluation of Proposed Framework -- 7 Comparison of Proposed Framework -- 7.1 Comparison on the Basis of Framework Available in the Literature.7.2 Comparison of the Proposed Framework with Different Anti-virus Scanners -- 8 Experimental Findings -- 9 Conclusion -- References -- An Improved Symmetric Key Encryption Method Using Randomized Matrix Generation -- 1 Introduction -- 2 Types of Encryption Technique -- 2.1 AES -- 2.2 DES -- 2.3 Blowfish -- 3 Proposed Technique -- 3.1 Random Key Generation Algorithm -- 3.2 Text Message Encryption Algorithm -- 3.3 Text Message Decryption Algorithm -- 4 Matrix Operations -- 4.1 Matrix Determinant -- 4.2 Matrix Multiplication -- 4.3 Matrix Transpose Operation -- 5 Performance Analysis -- 5.1 Implementation of System -- 5.2 Text Encryption Algorithms Performance Analysis -- 5.3 Analysis of Complexity for Random Key Generation -- 5.4 Analysis of Execution Time -- 5.5 Analysis of Throughput -- 6 Conclusion -- References -- Performance Analyses of Black Hole Attack in AODV Routing Protocol in Vanet Using NS3 -- 1 Introduction -- 1.1 AODV Routing Protocol -- 1.2 Black Hole Attack -- 1.3 Literature Survey -- 1.4 Simulation Set-Up -- 1.5 Result Analyses -- 1.6 Conclusion -- References -- Comparative Analysis of Several Approaches of Encoding Audio Files -- 1 Introduction -- 2 Overview of Cryptography -- 3 Aims of Cryptography -- 3.1 The Many Forms that Cryptography Can Take -- 4 Cryptographic Algorithms at a Glance -- 4.1 DES -- 4.2 3DES -- 4.3 AES -- 4.4 Blowfish -- 4.5 RC4 -- 4.6 Twofish -- 4.7 ThreeFish -- 5 Background and Related Works -- 5.1 Related Research and Development on Audio Encryption -- 6 Recent Works on Audio Encryption -- 7 Limitations -- 8 Conclusion -- References -- A Secure Mechanism for Safeguarding Cloud Infrastructure -- 1 Introduction -- 2 Literature Review -- 3 Types of Security in Cloud Computing -- 3.1 Information Security -- 3.2 Identity Security -- 3.3 Network Security -- 3.4 Software Security -- 3.5 Infrastructure Security.4 Security Concerns in Cloud -- 4.1 Virtualization -- 4.2 Public-Cloud Storage -- 4.3 Multitenancy -- 4.4 Identity and Access Management (IAM) -- 5 Security of Data in Cloud-Computing -- 6 Major Security Challenges -- 6.1 Internal Attacks -- 6.2 Partial/Incomplete Data Deletion -- 6.3 Interception of Data -- 6.4 Failure of Isolation -- 7 Using Encryption for Data Protection -- 7.1 Block-Cipher -- 7.2 Stream Ciphers -- 7.3 Hash Functions -- 8 Case Study on Cloud Based Cyber Security Model for Identification of Safe and Malicious Request -- 9 Conclusion -- References -- Phishing URLs Detection Using Machine Learning -- 1 Introduction -- 2 Related Work -- 2.1 Literature Review -- 2.2 URLs Descriptions -- 3 Research Methodology -- 4 Result and Analysis -- 4.1 Result -- 4.2 Analysis -- 5 Conclusion -- References -- Android Malware Detection with Classification Based on Hybrid Analysis and N-gram Feature Extraction -- 1 Introduction -- 1.1 Average Cost of a Data Breach -- 1.2 Growth Rate of Malware Infections -- 1.3 India and Asia Statistics on Malware Attacks -- 1.4 Trends in the Number of Attacks -- 1.5 Users Attacked by Malware -- 2 Research Objective/Problem Statement -- 3 Challenges in Malware Detection -- 4 Theoretical Framework -- 5 Hypothesis Declaration -- 6 Methodology -- 7 Approach -- 8 Outline of the Work Proposed -- 8.1 Process for the Proposed Scheme of Work -- 9 Conclusion -- 10 Further Research -- References -- Industry -- Image Processing and Deep Neural Networks for Face Mask Detection -- 1 Introduction -- 2 Literature Review -- 3 Proposed System -- 3.1 Machine Learning Approach -- 3.2 Supervised Learning -- 3.3 Unsupervised Learning -- 3.4 Viola Jones algorithm -- 4 Mathematical Formulation -- 5 Results and Discussion -- 6 Conclusion -- References -- An Analysis of Lightweight Cryptographic Algorithms for IoT-Applications.1 Introduction -- 2 Introduction of IoT -- 3 Software and Hardware Performance Metrics -- 4 Research Directions and Open Research Challenges -- 5 Conclusion -- Appendix 1 -- Hardware and Software Performances of LWC Algorithm -- References -- Permissioned Blockchain-Based Solution to Document Processing in the Real Estate Industry -- 1 Introduction -- 1.1 Blockchain Technology -- 1.2 Indian Real Estate Sector -- 1.3 Impact of Blockchain Technology on the Indian Real Estate Sector -- 2 Related Research Work and Limitations -- 2.1 Summarization of Recent Research Work -- 2.2 Research Gap -- 3 Proposed Research Work -- 3.1 Designed Framework and Components -- 3.2 Core Transaction Process Flow -- 3.3 Proposed Algorithms -- 3.4 Deployment -- 4 Conclusion and Future Scope -- References -- Automatic Evaluation of Free Text Answers: A Review -- 1 Introduction -- 2 Related Work -- 3 A Systematic Review -- 4 Discussion -- 5 Conclusions and Future Work -- References -- Blockchain Federated Learning Framework for Privacy-Preservation -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 4 Performance Evaluation -- 4.1 Datasets -- 4.2 Simulation Setup -- 4.3 Evaluation Metrics -- 4.4 Results and Discussion -- 5 Conclusion -- References -- Path Planning and Static Obstacle Avoidance for Unmanned Aerial Systems -- 1 Introduction -- 2 Methodology -- 2.1 A* Search -- 2.2 Rapidly-Exploring Random Tree -- 2.3 Ant Colony Optimization -- 2.4 Imitation Learning -- 3 Results and Discussion -- 4 Conclusion and Future Work -- References -- Comparative Study of Various Algorithms for Vehicle Detection and Counting in Traffic -- 1 Introduction -- 2 Literature Review -- 2.1 YOLO Real-Time Object Tracking -- 3 Methodology -- 3.1 YOLOv3 Architecture -- 3.2 YOLOv4 Architecture -- 3.3 YOLOv5 Architecture -- 3.4 YOLOv6 Architecture -- 3.5 YOLOv7 Architecture.4 Results and Discussion.This two-volume constitutes the refereed proceedings of the First International Conference on Advancements in Smart Computing and Information Security, ASCIS 2022, held in Rajkot, India, in November 2022. The 37 full papers and 19 short papers presented were thoroughly reviewed and selected from the 206 submissions. The papers are organized in topical sections on artificial intelligence; smart computing; cyber security; industry.Communications in Computer and Information Science,1865-0937 ;1760Artificial intelligenceComputer networksComputer systemsCoding theoryInformation theoryApplication softwareData protectionArtificial IntelligenceComputer Communication NetworksComputer System ImplementationCoding and Information TheoryComputer and Information Systems ApplicationsData and Information SecurityArtificial intelligence.Computer networks.Computer systems.Coding theory.Information theory.Application software.Data protection.Artificial Intelligence.Computer Communication Networks.Computer System Implementation.Coding and Information Theory.Computer and Information Systems Applications.Data and Information Security.330006.3Rajagopal SridaranFaruki ParvezPopat KalpeshMiAaPQMiAaPQMiAaPQBOOK9910644266803321Advancements in smart computing and information security3364147UNINA