LEADER 01055cam0-22003251i-450- 001 990006354490403321 005 19980601 010 $a2-275-00663-X 035 $a000635449 035 $aFED01000635449 035 $a(Aleph)000635449FED01 035 $a000635449 100 $a19980601d1991----km-y0itay50------ba 101 0 $afre 102 $aFR 105 $ay-------001yy 200 1 $a<>évolution du contrôle juridictionnel des motifs de l'acte administratif$fStavroula Ktistaki$gpréface de Gérard Timsit 210 $aParis$cLibr. générale de droit et de jurisprudence$d1991 215 $aXXVIII, 472 p.$d24 cm 225 1 $aBibliothèque de droit public$v162 676 $a342.06$v20$zita 700 1$aKtistaki,$bStavroula$0238950 702 1$aTimsit,$bGérard 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990006354490403321 952 $aCOLLEZIONE 77 (162)$b33668*$fFGBC 959 $aFGBC 996 $aÉvolution du contrôle juridictionnel des motifs de l'acte administratif$9658261 997 $aUNINA LEADER 00919nam0-22003131i-450- 001 990003100070403321 035 $a000310007 035 $aFED01000310007 035 $a(Aleph)000310007FED01 035 $a000310007 100 $a20000920d1964----km-y0itay50------ba 101 0 $aENG 102 $aIT 200 1 $aIndustrial Society$ethe Emergence of the Human Problems of Automation$fGeorges Friedmann$gEdited and with an introduction by Harold L. Sheppard. 210 $aGlencoe$dIll.$cFree Press of Glencoe$d1964. 215 $a436 p.$d21 cm 610 0 $aSociologia industriale 676 $a18100 676 $a18310 676 $a18320 702 1$aFriedmann,$bGeorges$f<1902-1977> 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990003100070403321 952 $a18100 FRI/64$b033926$fSES 959 $aSES 996 $aIndustrial Society$9459572 997 $aUNINA DB $aING01 LEADER 01526nam 2200397Ka 450 001 9910695294103321 005 20060726144555.0 035 $a(CKB)5470000002367795 035 $a(OCoLC)70700217 035 $a(EXLCZ)995470000002367795 100 $a20060726d2005 ua 0 101 0 $aeng 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aRecommendation for block cipher modes of operation$b[electronic resource] $ethe CMAC mode for authentication /$fMorris Dworkin 210 1$aGaithersburg, MD :$cU.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology,$d[2005] 215 $aiv, 19 pages $cdigital, PDF file 225 1 $aNIST special publication ;$v800-38 B.$aComputer security 300 $aTitle from title screen (viewed on July 19, 2006). 300 $a"May 2005." 517 $aRecommendation for block cipher modes of operation 606 $aComputer security$xStandards$zUnited States 606 $aAuthentication$xStandards 606 $aData encryption (Computer science) 615 0$aComputer security$xStandards 615 0$aAuthentication$xStandards. 615 0$aData encryption (Computer science) 700 $aDworkin$b Morris$01383622 712 02$aNational Institute of Standards and Technology (U.S.) 801 0$bGPO 801 1$bGPO 906 $aBOOK 912 $a9910695294103321 996 $aRecommendation for block cipher modes of operation$93428675 997 $aUNINA