LEADER 01684nam0 2200361 450 001 000036930 005 20141024120501.0 100 $a20140623d1991----km-y0itaa50------ba 101 0 $aita 102 $aIT 200 1 $a<> studi sui repertori degli strumenti musicali folklorici italiani$eestratto da Cataloghi dei musei e gallerie d'Italia, Museo nazionale delle arti e tradizioni popolari$fSandro Biagiola 210 $aRoma$cIstituto poligrafico e Zecca dello Stato$d1991 215 $a1 partitura (P. 381-433)$d26 cm 300 $aInformazioni tratte dalla copertina 300 $aEstratto da: Cataloghi dei musei e gallerie d'Italia, La collezione degli strumenti musicali, Museo nazionale delle arti e tradizioni popolari 316 $aIn testa alla pag. 381 dedica autografa dell'autore a Giancarlo Rostirolla 606 1 $aMusica popolare italiana 606 2 $aStrumenti musicali popolari$yItalia$xRepertori$xStudi 676 $a781.6200945$v(22. ed.)$9Musica popolare. Italia 700 1$aBiagiola,$bSandro$0446886 801 0$aIT$bUniversità della Basilicata - B.I.A.$gREICAT$2unimarc 912 $a000036930 996 $aStudi sui repertori degli strumenti musicali folklorici italiani$9103005 997 $aUNIBAS BAS $aLETTERE CAT $aSTD097$b01$c20140623$lBAS01$h1031 CAT $aSTD097$b01$c20140623$lBAS01$h1031 CAT $aTTM$b30$c20140916$lBAS01$h1029 CAT $aTTM$b30$c20141024$lBAS01$h1205 CAT $aBATCH$b00$c20180801$lBAS01$h1239 FMT Z30 -1$lBAS01$LBAS01$mBOOK$1BASA1$APolo Storico-Umanistico$2FROS$BFondo Rostirolla$3FRost/2621$62621$5D2621$820140623$f98$FConsultazione all $aall $n0009164 LEADER 02175nam a2200589 i 4500 001 991000837879707536 005 20020507174250.0 008 940722s1994 de b 001 0 eng d 020 $a3540181768 020 $a0387181768 035 $ab10764288-39ule_inst 035 $aLE01303091$9ExL 040 $aDip.to Matematica$beng 041 1 $aeng$hrus 082 0 $a516.362 084 $aAMS 00A20 084 $aAMS 58F05 084 $aAMS 58F06 084 $aAMS 58F07 084 $aAMS 70E 084 $aAMS 70F 084 $aAMS 70H 084 $a53.1.3 084 $a53.1.68 084 $a510.34 084 $a510.46 084 $a510.57 084 $aLC QA805D5613 240 10$aDinamicheskie sistemy 7.$lEnglish$91455527 245 10$aDynamical systems VII :$bintegrable systems nonholonomic dynamical systems /$cV. I. Arnold, S. P. Novikov, eds. ; translated from the Russian by A. G. Reyman, M. A. Semenov-Tian-Shansky 246 30$aIntegrable systems nonholonomic dynamical systems 250 $a[Engl. ed.] 260 $aBerlin :$bSpringer-Verlag,$cc1994 300 $avii, 341 p. :$bill. ;$c24 cm 490 0 $aEncyclopaedia of mathematical sciences,$x0938-0396 ;$v16 500 $aIncludes bibliographical references (p. 328-333) and index 500 $aTranslated from the Russian 650 0$aDifferentiable dynamical systems 650 0$aNonholonomic dynamical systems 650 0$aCelestial mechanics 650 0$aMechanics, analytic 700 1 $aArnold, Vladimir Igorevic 700 1 $aNovikov, Sergei Petrovich$eauthor$4http://id.loc.gov/vocabulary/relators/aut$0464308 700 1 $aReyman, A. G. 700 1 $aSemonov-Tian-Shansky, M. A. 907 $a.b10764288$b23-02-17$c28-06-02 912 $a991000837879707536 945 $aLE006 53.1.3 EMS$g1$i2006000040679$lle006$o-$pE0.00$q-$rl$s- $t0$u1$v0$w1$x0$y.i10173171$z27-06-02 945 $aLE013 00A20 EMS11 V.16 (1994)$cV. 16$g1$i2013000005072$lle013$o-$pE0.00$q-$rl$s- $t0$u1$v1$w1$x0$y.i10859810$z28-06-02 996 $aDinamicheskie sistemy 7$91455527 997 $aUNISALENTO 998 $ale006$ale013$b01-01-94$cm$da $e-$feng$gde $h0$i2 LEADER 04671nam 22005895 450 001 996546841303316 005 20230711162349.0 010 $a3-031-34006-X 024 7 $a10.1007/978-3-031-34006-2 035 $a(CKB)27559408700041 035 $a(MiAaPQ)EBC30627421 035 $a(Au-PeEL)EBL30627421 035 $a(DE-He213)978-3-031-34006-2 035 $a(PPN)272257184 035 $a(EXLCZ)9927559408700041 100 $a20230711d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aData Protection in a Post-Pandemic Society$b[electronic resource] $eLaws, Regulations, Best Practices and Recent Solutions /$fedited by Chaminda Hewage, Yogachandran Rahulamathavan, Deepthi Ratnayake 205 $a1st ed. 2023. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2023. 215 $a1 online resource (246 pages) 311 $a9783031340055 327 $aChapter. 1. Post-Covid-19 Metaverse Cybersecurity and Data Privacy-Present and Future Challenges -- Chapter. 2. Keeping it Low-Key: Modern-day approaches to Privacy-Preserving Machine Learning -- Chapter. 3. Security Analysis of Android Hot Cryptocurrency Wallet Applications -- Chapter. 4. Exploring the Opportunities of Applying Digital Twins for Intrusion Detection in Industrial Control Systems of Production and Manufacturing ? A Systematic Review -- Chapter. 5. Securing Privacy During a World Health Emergency: Exploring How to Create a Balance Between the Need to Save the World and People?s Right to Privacy -- Chapter. 6. Federated Learning: Data privacy and cyber security in edge-based machine learning Mobile Malware Detection Using Consortium -- Chapter. 7. Emerging Computer Security Laws and Regulations across the Globe: A Comparison between Sri Lankan and Contemporary International Computer Acts -- Chapter. 8. Legal Considerations and Ethical Challenges of Artificial Intelligence on Internet of Things and Smart Cities. 330 $aThis book offers the latest research results and predictions in data protection with a special focus on post-pandemic society. This book also includes various case studies and applications on data protection. It includes the Internet of Things (IoT), smart cities, federated learning, Metaverse, cryptography and cybersecurity. Data protection has burst onto the computer security scene due to the increased interest in securing personal data. Data protection is a key aspect of information security where personal and business data need to be protected from unauthorized access and modification. The stolen personal information has been used for many purposes such as ransom, bullying and identity theft. Due to the wider usage of the Internet and social media applications, people make themselves vulnerable by sharing personal data. This book discusses the challenges associated with personal data protection prior, during and post COVID-19 pandemic. Some of these challenges are caused by the technological advancements (e.g., Artificial Intelligence (AI)/Machine Learning (ML) and ChatGPT). In order to preserve the privacy of the data involved, there are novel techniques such as zero knowledge proof, fully homomorphic encryption, multi-party computations are being deployed. The tension between data privacy and data utility drive innovation in this area where numerous start-ups around the world have started receiving funding from government agencies and venture capitalists. This fuels the adoption of privacy-preserving data computation techniques in real application and the field is rapidly evolving. Researchers and students studying/working in data protection and related security fields will find this book useful as a reference. . 606 $aData protection?Law and legislation 606 $aData protection 606 $aFinancial risk management 606 $aPrivacy 606 $aData and Information Security 606 $aRisk Management 615 0$aData protection?Law and legislation. 615 0$aData protection. 615 0$aFinancial risk management. 615 14$aPrivacy. 615 24$aData and Information Security. 615 24$aRisk Management. 676 $a005.8 676 $a323.448 700 $aHewage$b Chaminda$01373670 701 $aRahulamathavan$b Yogachandran$01373671 701 $aRatnayake$b Deepthi$01373672 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996546841303316 996 $aData Protection in a Post-Pandemic Society$93404750 997 $aUNISA