LEADER 00956nam0-22003371i-450- 001 990000903100403321 005 20091202115605.0 010 $a0-471-37221-8 035 $a000090310 035 $aFED01000090310 035 $a(Aleph)000090310FED01 035 $a000090310 100 $a20021213d2000----km-y0itay50------ba 101 0 $aeng 102 $aUS 105 $aa---a---001yy 200 1 $aHomogeneous Catalysis$emechanisms and industrial applications$fSumit Bhaduri, Doble Mukesh 210 $aNew York$cWiley-Interscience$d2000 215 $axiv, 239 p.$cill.$d24 cm 676 $a660.299 5$v21 700 1$aBhaduri,$bSumit$043939 701 1$aMukesh,$bDoble$0345459 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990000903100403321 952 $a04 129-156$bDIC 3630$fDINCH 952 $a660.299-BHA-1$b3027$fSC1 959 $aDINCH 959 $aSC1 996 $aHomogeneous Catalysis$9357608 997 $aUNINA LEADER 01036nam a22002411i 4500 001 991002459119707536 005 20040319153306.0 008 040407s1942 sp a||||||||||||||||spa 035 $ab12926000-39ule_inst 035 $aARCHE-090561$9ExL 040 $aDip.to Scienze Storiche$bita$cA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l. 082 04$a946.89 100 1 $aBaeza Mancebo, Antonio$0486646 245 13$aLa hora de Gibraltar :$bgeografia, historia, antecedentes, ocupacion, odio ingles y farsa, intransigencia britanica, Golgota español, facilidad de combatir al peñon /$cCapitan Baeza Mancebo 260 $a[Madrid] :$bEdiciones Toledo,$c1942 300 $a258 p. :$bill. ;$c21 cm 651 4$aGibilterra$xStoria 907 $a.b12926000$b02-04-14$c16-04-04 912 $a991002459119707536 945 $aLE009 GEOG.14.5-226$g1$i2009000160088$lle009$o-$pE0.00$q-$rn$so $t0$u1$v0$w1$x0$y.i13499178$z16-04-04 996 $aHora de Gibraltar$9304426 997 $aUNISALENTO 998 $ale009$b16-04-04$cm$da $e-$fspa$gsp $h3$i1 LEADER 03491nam 22008055 450 001 9910337850903321 005 20251113194150.0 010 $a3-030-20951-2 024 7 $a10.1007/978-3-030-20951-3 035 $a(CKB)4100000008424386 035 $a(DE-He213)978-3-030-20951-3 035 $a(MiAaPQ)EBC5918980 035 $a(PPN)254416527 035 $a(EXLCZ)994100000008424386 100 $a20190518d2019 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyber Security Cryptography and Machine Learning $eThird International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27?28, 2019, Proceedings /$fedited by Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (XIII, 330 p. 141 illus., 76 illus. in color.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v11527 311 08$a3-030-20950-4 320 $aIncludes bibliographical references and index. 330 $aThis book constitutes the refereed proceedings of the Third International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2019, held in Beer-Sheva, Israel, in June 2019. The 18 full and 10 short papers presented in this volume were carefully reviewed and selected from 36 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v11527 606 $aData protection 606 $aComputer networks 606 $aComputer networks$xSecurity measures 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputers$xLaw and legislation 606 $aInformation technology$xLaw and legislation 606 $aComputers and civilization 606 $aData and Information Security 606 $aComputer Communication Networks 606 $aMobile and Network Security 606 $aCryptology 606 $aLegal Aspects of Computing 606 $aComputers and Society 615 0$aData protection. 615 0$aComputer networks. 615 0$aComputer networks$xSecurity measures. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputers$xLaw and legislation. 615 0$aInformation technology$xLaw and legislation. 615 0$aComputers and civilization. 615 14$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$aMobile and Network Security. 615 24$aCryptology. 615 24$aLegal Aspects of Computing. 615 24$aComputers and Society. 676 $a005.8 676 $a005.8 702 $aDolev$b Shlomi$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHendler$b Danny$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLodha$b Sachin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYung$b Moti$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910337850903321 996 $aCyber Security Cryptography and Machine Learning$92200042 997 $aUNINA