LEADER 01028cam0-2200313---450- 001 990004331470403321 005 20100928112033.0 035 $a000433147 035 $aFED01000433147 035 $a(Aleph)000433147FED01 035 $a000433147 100 $a19990604d1985----km-y0itay50------ba 101 0 $aita 102 $aIT 105 $aa-------101zy 200 1 $aContributi alla ceramica etrusca tardo-classica$eatti del seminario, 11 maggio 1984 210 $aRoma$cConsiglio Nazionale delle Ricerche$d1985 215 $a83 p.$cill.$d26 cm 225 1 $aQuaderni del Centro di studio per l'archeologia etrusco-italica$v10 610 0 $aCeramiche etrusche a figure rosse$aSec. 4.-3. a. C. 610 0 $aCeramiche etrusche$aCongressi$a1984 676 $a738.309375 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990004331470403321 952 $a738.309 CONV ROMA 1984$bBibl.s.i.$fFLFBC 959 $aFLFBC 996 $aContributi alla ceramica etrusca tardo - classica$9162090 997 $aUNINA LEADER 02949nam 2200601Ia 450 001 9910451215703321 005 20200520144314.0 010 $a1-281-14365-0 010 $a9786611143657 010 $a1-84663-697-3 035 $a(CKB)1000000000405450 035 $a(EBL)328737 035 $a(OCoLC)437197058 035 $a(SSID)ssj0000830289 035 $a(PQKBManifestationID)11463767 035 $a(PQKBTitleCode)TC0000830289 035 $a(PQKBWorkID)10799238 035 $a(PQKB)11213238 035 $a(MiAaPQ)EBC328737 035 $a(Au-PeEL)EBL328737 035 $a(CaPaEBR)ebr10211641 035 $a(EXLCZ)991000000000405450 100 $a19930922d2007 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aInformation management & computer security$hVolume 15, Number 5$iPapers from the HAISA 2007 Symposium$b[electronic resource] 210 $a[Bradford, England] $cEmerald$d2007 215 $a1 online resource (100 p.) 225 1 $aInformation Management and Computer Security - Volume 15, Issue 5 300 $aDescription based upon print version of record. 311 $a1-84663-696-5 320 $aIncludes bibliographical references. 327 $aCover; CONTENTS; EDITORIAL ADVISORY BOARD; Guest editorial; Comply! Resistance is futile; Vendor availability: a key factor for outsourcing in Chilean ICT sector; How well are information risks being communicated to your computer end-users?; User-centred security applied to the development of a management information system; Improving protection mechanisms by understanding online risk; Usable set-up of runtime security policies; Toward viable information security reporting systems; On the imbalance of the security problem space and its expected consequences 330 $aThe first two papers in this e-book give a global perspective on Information Management issues. The remaining papers are security-focused, and have been selected for inclusion from the International Symposium on Human Aspects of Information Security & Assurance (HAISA 2007), which took place in Plymouth, UK, on 10 July 2007. The theme of the event reflected that a significant aspect of protection comes down to the attitudes, awareness, behaviour and capabilities of the people involved. 410 0$aInformation Management and Computer Security - Volume 15, Issue 5 606 $aComputer security 606 $aInformation technology$xManagement 606 $aManagement information systems 608 $aElectronic books. 615 0$aComputer security. 615 0$aInformation technology$xManagement. 615 0$aManagement information systems. 676 $a658.4/038 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910451215703321 996 $aInformation management & computer security$91759866 997 $aUNINA