LEADER 00799cam0-22003011i-450- 001 990002957850403321 005 20120313104952.0 010 $a88-420-5740-1 035 $a000295785 035 $aFED01000295785 035 $a(Aleph)000295785FED01 035 $a000295785 100 $a20030910d2000----km-y0itay50------ba 101 0 $aita 102 $aIT 200 1 $aInternet 2000$emanuale per l'uso della rete$fMarco Calvo ... [et al.] 210 $aRoma$cLaterza$d2000 215 $a650 p.$d21 cm$ecd-rom 610 0 $aInternet 676 $a004.6$v20$zita 702 1$aCalvo,$bMarco$f<1967- > 801 0$aIT$bUNINA$gREICAT$2UNIMARC 901 $aBK 912 $a990002957850403321 952 $aVII-A-130$b7205$fMAS 959 $aMAS 996 $aInternet 2000$9466513 997 $aUNINA LEADER 00759nam0-22002651i-450- 001 990002530930403321 035 $a000253093 035 $aFED01000253093 035 $a(Aleph)000253093FED01 035 $a000253093 100 $a20000920d1968----km-y0itay50------ba 101 0 $aENG 200 1 $aConvergence of Probability Measures$fPatrick Billingsley. 210 $aNew York$cJohn Wiley$d1968. 215 $aXII, 253 p.$d23 cm 610 0 $aProbabilità, Calcolo delle probabilità 700 1$aBillingsley,$bPatrick$041724 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990002530930403321 952 $aVI-A-27$b4625$fMAS 959 $aMAS 996 $aConvergence of probability measures$979660 997 $aUNINA DB $aING01 LEADER 02463nlm0 22006731i 450 001 990009256820403321 010 $a9783540858867 035 $a000925682 035 $aFED01000925682 035 $a(Aleph)000925682FED01 035 $a000925682 100 $a20100926d2008----km-y0itay50------ba 101 0 $aeng 102 $aDE 135 $adrnn-008mamaa 200 1 $aInformation Security$bRisorsa elettronica$e11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings$fedited by David Hutchison, Takeo Kanade, Josef Kittler, Jon M. Kleinberg, Friedemann Mattern, John C. Mitchell, Moni Naor, Oscar Nierstrasz, C. Pandu Rangan, Bernhard Steffen, Madhu Sudan, Demetri Terzopoulos, Doug Tygar, Moshe Y. Vardi, Gerhard Weikum, Tzong-Chen Wu, Chin-Laung Lei, Vincent Rijmen, Der-Tsai Lee 210 $aBerlin ; Heidelberg$cSpringer$d2008 225 1 $aLecture Notes in Computer Science$x0302-9743$v5222 230 $aDocumento elettronico 336 $aTesto 337 $aFormato html, pdf 702 1$aHutchison,$bDavid 702 1$aKanade,$bTakeo 702 1$aKittler,$bJosef 702 1$aKleinberg,$bJon M. 702 1$aLee,$bDer-Tsai 702 1$aLei,$bChin-Laung 702 1$aMattern,$bFriedemann 702 1$aMitchell,$bJohn C. 702 1$aNaor,$bMoni 702 1$aNierstrasz,$bOscar 702 1$aPandu Rangan,$bC. 702 1$aRijmen,$bVincent 702 1$aSteffen,$bBernhard 702 1$aSudan,$bMadhu 702 1$aTerzopoulos,$bDemetri 702 1$aTygar,$bDoug 702 1$aVardi,$bMoshe Y. 702 1$aWeikum,$bGerhard 702 1$aWu,$bTzong-Chen 801 0$aIT$bUNINA$gREICAT$2UNIMARC 856 4 $zFull text per gli utenti Federico II$uhttp://dx.doi.org/10.1007/978-3-540-85886-7 901 $aEB 912 $a990009256820403321 961 $aAlgorithm Analysis and Problem Complexity 961 $aComputer Communication Networks 961 $aComputer Communication Networks 961 $aComputer science 961 $aComputer Science 961 $aComputer software 961 $aData Encryption 961 $aData encryption (Computer science) 961 $aData protection 961 $aMath Applications in Computer Science 961 $aSoftware engineering 961 $aSpecial Purpose and Application-Based Systems 961 $aSystems and Data Security 996 $aInformation Security$9771885 997 $aUNINA