LEADER 00982cam0-22003371i-450- 001 990006880930403321 005 20111121084938.0 010 $a88-7670-290-3 035 $a000688093 035 $aFED01000688093 035 $a(Aleph)000688093FED01 035 $a000688093 100 $a20010426d1997----km-y0itay50------ba 101 0 $aita 102 $aIT 105 $ay-------001yy 200 1 $aBalcani d'Africa$eBurundi, Rwanda, Zaire$eoltre la guerra etnica$fRoberto Cavalieri$gprefazione di Paolo Cereda 210 $aTorino$cEdizioni Gruppo Abele$d1997 215 $a128 p.$d21 cm 610 0 $aBurundi$a1993-1994 610 0 $aRuanda$a1994-1997 610 0 $aZaire$a1994-1997 676 $a967.57204$v19$zita 700 1$aCavalieri,$bRoberto$f<1965- >$0253894 801 0$aIT$bUNINA$gREICAT$2UNIMARC 901 $aBK 912 $a990006880930403321 952 $aXIV E 515$b32790$fFSPBC 959 $aFSPBC 996 $aBalcani d'Africa$9625580 997 $aUNINA LEADER 01303nam2-2200385---450- 001 990003106810203316 005 20080925145251.0 010 $a978-3-540-74809-0 035 $a000310681 035 $aUSA01000310681 035 $a(ALEPH)000310681USA01 035 $a000310681 100 $a20080514d2007----km-y0itay50------ba 101 $aeng 102 $aDE 105 $aa---||||001yy 200 1 $aFoundations of security analysis and design IV$eFOSAD 2006/2007 tutorial lectures$fAlessandro Aldini, Roberto Gorrieri (eds.) 210 $aBerlin [etc.]$cSpringer$dcopyr. 2007 215 $aVI, 323 p.$cill.$d24 cm 225 2 $aLecture notes in computer science$iTutorial$v4677 410 0$12001$aLecture notes in computer science$v4677 461 1$1001000314960$12001$aLecture notes in computer science 606 0 $aSicurezza del computer$xCongressi$z2006/2007 676 $a005.8 702 1$aALDINI,$bAlessandro 702 1$aGORRIERI,$bRoberto 801 0$aIT$bsalbc$gISBD 912 $a990003106810203316 951 $a001 LNCS 4677$b35356/CBS$c001$d00216612 959 $aBK 969 $aSCI 979 $aCBAS$b10$c20080514$lUSA01$h1218 979 $aANGELA$b90$c20080925$lUSA01$h1452 996 $aFoundations of Security Analysis and Design IV$9772080 997 $aUNISA