01044nam a2200289 i 4500991000509929707536040305r19691949nyu b 001 0 eng d0828402213b12627616-39ule_instDip.to Matematicaeng517.38AMS 34-XXLC QA381.S38Schouten, Jan Arnoldus22783Pfaff's problem and its generalizations,by J. A. Schouten and W. v. d. KulkNew York :Chelsea Pub. Co.1969xvi, 542 p. ;22 cmReprint of the 1949 ed.Bibliography: p. [534]-536Pfaffian problemKulk, Wouter van der,joint author.b1262761621-09-0605-03-04991000509929707536LE013 34-XX SCH11 (1969)12013000145242le013pE44.70-l- 00000.i1324815701-04-04Pfaff's problem and its generalizations277439UNISALENTOle01305-03-04ma -engnyu0103650nam a2200409Ii 4500991003255239707536m d cr cn|||||||||070806s2004 maua s 001 0 eng d97819318361111931836116b13656235-39ule_inst106156:106187Elsevier Science & Technologyhttp://www.sciencedirect.comOPELSOPELSTEFA005.822Cyber adversary characterization[electronic resource] :auditing the hacker mind /Tom Parker ... [et al. ; foreword by Jeff Moss].Rockland, MA :Syngress,c2004.xxxi, 324 p. :ill. ;24 cm."Your window into the cyber enemy's mind"--Cover.Includes index.The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer systems. Some of these vulnerabilities are waiting to be exploited, while numerous others already have. Everyday that a vulnerability or threat goes unchecked greatly increases an attack and the damage it can cause. Who knows what the prospects for a cascade of failures across US infrastructures could lead to. What type of group or individual would exploit this vulnerability, and why would they do it? "Inside the Mind of a Criminal Hacker" sets the stage and cast of characters for examples and scenarios such as this, providing the security specialist a window into the enemys mind - necessary in order to develop a well configured defense. Written by leading security and counter-terrorism experts, whose experience include first-hand exposure in working with government branches & agencies (such as the FBI, US Army, Department of Homeland Security), this book sets a standard for the fight against the cyber-terrorist. Proving, that at the heart of the very best defense is knowing and understanding your enemy. * This book will demonstrate the motives and motivations of criminal hackers through profiling attackers at post attack and forensic levels. * This book is essential to those who need to truly "know thy enemy" in order to prepare the best defense. * . The breadth of material in "Inside the Criminal Mind" will surprise every security specialist and cyber-terrorist buff of how much they do and (more importantly) don't know about the types of adversaries they stand to face.Electronic reproduction.Amsterdam :Elsevier Science & Technology,2007.Mode of access: World Wide Web.System requirements: Web browser.Title from title screen (viewed on Aug. 2, 2007).Access may be restricted to users at subscribing institutions.Computer security.Computer networksSecurity measures.Computerbeveiliging.gttComputercriminaliteit.gttElectronic books.localParker, Tom,1982-authorhttp://id.loc.gov/vocabulary/relators/aut739075Original19318361169781931836111(OCoLC)56064605Referexhttp://www.sciencedirect.com/science/book/9781931836111An electronic book accessible through the World Wide Web; click for information.b1365623524-02-2224-01-08991003255239707536C0TEFCyber adversary characterization1464025UNISALENTOle02924-01-08mm -engmau0001052nam a2200277 i 450099100074622970753620020503201136.0940527s1979 us eng 047199670Xb10123088-39ule_instLE02521498ExLFac. Economiaita331.1Bartholomew, David460890Statistical techniques for manpower planning /David Bartholomew and Andrew F. ForbesChichester [etc.] :Wiley,c1979xiii, 288 p. ;21 cmWiley series in probability and mathematical statisticsOrganizzazione del lavoroMetodi statisticiForbes, Andrew F.b1012308803-04-2027-06-02991000746229707536LE025 ECO 331 BAR02.0112025000008717le025-E0.00-l- 00000.i1014436527-06-02Statistical techniques for manpower planning198794UNISALENTOle02501-01-94ma -engus 01