LEADER 00783nam0-22002771i-450- 001 990005878360403321 005 20131210104919.0 035 $a000587836 035 $aFED01000587836 035 $a(Aleph)000587836FED01 035 $a000587836 100 $a20000421d1999----km-y0itay50------ba 101 0 $aita 105 $af-------001yy 200 1 $aCenobi italo-greci e paesi del basso Cilento$fPaolo Abbate 210 $d1999$cPalladio$aSalerno 215 $a121 p.$etav.$d22 cm 676 $a271$v21$zita 700 1$aAbbate,$bPaolo$0223750 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990005878360403321 952 $a271 ABB 1$bBibl. 30504$fFLFBC 959 $aFLFBC 996 $aCenobi italo-greci e paesi del basso Cilento$9563789 997 $aUNINA LEADER 01354nam0 2200325 i 450 001 VAN0108692 005 20230320114129.72 010 $a978-33-19-18301-5 017 70$2N$a978-3-319-18302-2 100 $a20170404d2015 |0itac50 ba 101 $aeng 102 $aCH 105 $a|||| ||||| 200 1 $aCyber Security: Analytics, Technology and Automation$fMartti Lehto, Pekka Neittaanmäki Editors 205 $aCham : Springer, 2015 210 $aX$d269 p.$cill. ; 24 cm 215 410 1$1001VAN0108694$12001 $aIntelligent Systems, Control and Automation: Science and Engineering$1210 $aCham$cSpringer.$v78 620 $aCH$dCham$3VANL001889 702 1$aLehto$bMartti$3VANV083970 702 1$aNeittaanmäki$bPekka$3VANV083859 712 $aSpringer $3VANV108073$4650 801 $aIT$bSOL$c20240614$gRICA 856 4 $uhttps://link.springer.com/book/10.1007%2F978-3-319-18302-2$zE-book ? Accesso al full-text attraverso riconoscimento IP di Ateneo, proxy e/o Shibboleth 899 $aBIBLIOTECA CENTRO DI SERVIZIO SBA$2VAN15 912 $fN 912 $aVAN0108692 950 $aBIBLIOTECA CENTRO DI SERVIZIO SBA$d15CONS SBA EBOOK 872 $e15EB 872 20170404 996 $aCyber Security: Analytics, Technology and Automation$91412297 997 $aUNICAMPANIA