LEADER 00780nam0-22002891i-450- 001 990007499670403321 005 20051019131326.0 035 $a000749967 035 $aFED01000749967 035 $a(Aleph)000749967FED01 035 $a000749967 100 $a20030814d1948----km-y0itay50------ba 101 0 $afre 102 $aFR 200 1 $a<>villes$eaperçu de géographie humeine$fpar Georges Chabot 210 $aParis$cColin$d1948 215 $a224 p.$d21 cm 225 1 $aCollection Armand Colin$v250 610 0 $aCittà 700 1$aChabot,$bGeorges$f<1890-1975>$035073 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990007499670403321 952 $aC-03-102$bIst.4162$fILFGE 959 $aILFGE 996 $aVilles$9298290 997 $aUNINA LEADER 01633nlm0 22004691i 450 001 990009262250403321 010 $a9783642042195 035 $a000926225 035 $aFED01000926225 035 $a(Aleph)000926225FED01 035 $a000926225 100 $a20100926d2009----km-y0itay50------ba 101 0 $aeng 102 $aDE 135 $adrnn-008mamaa 200 1 $aSecure Data Management$bRisorsa elettronica$e6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009. Proceedings$fedited by Willem Jonker, Milan Petkovic 210 $aBerlin ; Heidelberg$cSpringer$d2009 225 1 $aLecture Notes in Computer Science$x0302-9743$v5776 230 $aDocumento elettronico 336 $aTesto 337 $aFormato html, pdf 702 1$aJonker,$bWillem 702 1$aPetkovic,$bMilan 801 0$aIT$bUNINA$gREICAT$2UNIMARC 856 4 $zFull text per gli utenti Federico II$uhttp://dx.doi.org/10.1007/978-3-642-04219-5 901 $aEB 912 $a990009262250403321 961 $aComputer network architectures 961 $aComputer science 961 $aComputer Science 961 $aComputer Systems Organization and Communication Networks 961 $aComputers and Society 961 $aData Encryption 961 $aData encryption (Computer science) 961 $aDatabase management 961 $aDatabase Management 961 $aInformation Storage and Retrieval 961 $aInformation storage and retrieval systems 961 $aInformation Systems 961 $aManagement of Computing and Information Systems 996 $aSecure Data Management$9772044 997 $aUNINA