LEADER 00904cam0-2200313---450- 001 990004200400403321 005 20101025150700.0 035 $a000420040 035 $aFED01000420040 035 $a(Aleph)000420040FED01 035 $a000420040 100 $a19990604d1960----km-y0itay50------ba 101 0 $aita 102 $aIT 105 $a--------001ea 200 1 $aLettere$eil primo e il secondo libro$fa cura di Francesco Flora$gcon note storiche di Alessandro Del Vita 210 $aMilano$cMondadori$d1960 215 $a1246 p.$d18 cm 676 $a856.3 700 1$aAretino,$bPietro$f<1492-1556>$014003 702 1$aDel Vita,$bAlessandro 702 1$aFlora,$bFrancesco$f<1891-1962> 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990004200400403321 952 $a853.3 ARET 21(2)$bBibl.37309$fFLFBC 959 $aFLFBC 996 $aLettere$998270 997 $aUNINA LEADER 01841nlm0 22005171i 450 001 990009246780403321 010 $a9783540383437 035 $a000924678 035 $aFED01000924678 035 $a(Aleph)000924678FED01 035 $a000924678 100 $a20100926d2006----km-y0itay50------ba 101 0 $aeng 102 $aDE 135 $adrnn-008mamaa 200 1 $aInformation Security$bRisorsa elettronica$e9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006. Proceedings$fedited by Sokratis K. Katsikas, Javier López, Michael Backes, Stefanos Gritzalis, Bart Pre 210 $aBerlin ; Heidelberg$cSpringer$d2006 225 1 $aLecture Notes in Computer Science$x0302-9743$v4176 230 $aDocumento elettronico 336 $aTesto 337 $aFormato html, pdf 702 1$aBackes,$bMichael 702 1$aGritzalis,$bStefanos 702 1$aKatsikas,$bSokratis K. 702 1$aLópez,$bJavier 702 1$aPreneel,$bBart 801 0$aIT$bUNINA$gREICAT$2UNIMARC 856 4 $zFull text per gli utenti Federico II$uhttp://dx.doi.org/10.1007/11836810 901 $aEB 912 $a990009246780403321 961 $aAlgorithm Analysis and Problem Complexity 961 $aComputer Communication Networks 961 $aComputer Communication Networks 961 $aComputer science 961 $aComputer Science 961 $aComputer software 961 $aData Encryption 961 $aData encryption (Computer science) 961 $aInformation Systems 961 $aManagement of Computing and Information Systems 961 $aOperating Systems 961 $aOperating systems (Computers) 961 $aSoftware engineering 961 $aSpecial Purpose and Application-Based Systems 996 $aInformation Security$9771885 997 $aUNINA