LEADER 01037nam0 2200289 450 001 000038236 005 20140903141447.0 010 $a0-19-281686-1 100 $a20140903d1985----km-y0itaa50------ba 101 0 $aeng 102 $aGB 200 1 $a<> Shadow-Line$ea Confession$fJoseph Conrad$gedited with an Introduction by Jeremy Hawthorne 210 $aOxford ; New York$cOxford University Press$d1985 215 $aXL, 142 p.$d19 cm 225 2 $a<> World's classics 410 0$12001$a<> World's classics 676 $a823.91$v(22. ed.)$9Narrativa inglese. 1900-1999 700 1$aConrad,$bJoseph$0153570 702 1$aHawthorne,$bJeremy 801 0$aIT$bUniversità della Basilicata - B.I.A.$gREICAT$2unimarc 912 $a000038236 996 $aShadow-line$946001 997 $aUNIBAS BAS $aLETTERE CAT $aEXT016$b01$c20140903$lBAS01$h1414 FMT Z30 -1$lBAS01$LBAS01$mBOOK$1BASA1$APolo Storico-Umanistico$2DSLF$BCollezione DiSLF$3DF/E1332$63146$5F3146$820140903$f04$FPrestabile Didattica LEADER 02066nam 2200409 450 001 9910830776903321 005 20231006123634.0 010 $a1-118-82065-7 035 $a(CKB)3710000000492866 035 $a(NjHacI)993710000000492866 035 $a(EXLCZ)993710000000492866 100 $a20231006d2014 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aComputer security handbook$hVolume 2 /$fedited by Seymour Bosworth, Michel E. Kabay, Eric Whyne 205 $aSixth edition. 210 1$aHoboken :$cJohn Wiley & Sons, Inc.,$d2014. 215 $a1 online resource $cillustrations 311 $a1-118-13411-7 320 $aIncludes bibliographical references and index. 327 $aVol. 1. [1140p.] -- vol. 2. [1200p.]. 330 $aComputer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer security breaches in your systems. Written for professionals and college students, it provides comprehensive best guidance about how to minimize hacking, fraud, human error, the effects of natural disasters, and more. This essential and highly-regarded reference maintains timeless lessons and is fully revised and updated with current information on security issues for social networks, cloud computing, virtualization, and more. 606 $aElectronic data processing departments$xSecurity measures 615 0$aElectronic data processing departments$xSecurity measures. 676 $a658.4/78 702 $aBosworth$b Seymour 702 $aKabay$b Michel E. 702 $aWhyne$b Eric 801 0$bNjHacI 801 1$bNjHacl 906 $aBOOK 912 $a9910830776903321 996 $aComputer security handbook$92066238 997 $aUNINA