LEADER 01232nam a2200289 i 4500 001 991001011389707536 008 050510s2004 njua b 001 0 eng d 020 $a0131911562 035 $ab13306674-39ule_inst 040 $aDip.to Ingegneria dell'Innovazione$beng 082 0 $a004.22 100 1 $aHeuring, Vincent P.$062602 245 10$aComputer systems design and architecture /$cVincent P. Heuring, Harry F. Jordan ; with a contribution by Miles Murdocca 250 $a2nd ed. 260 $aUpper Saddle River, N.J. :$bPearson/Prentice Hall,$cc2004 300 $axvi, 592 p. :$bill. ;$c25 cm. 504 $aIncludes bibliographical references and index 650 4$aSystem design. 650 4$aComputer architecture. 700 1 $aJordan, Harry Frederick$eauthor$4http://id.loc.gov/vocabulary/relators/aut$0622260 700 1 $aMurdocca, Miles 907 $a.b13306674$b21-09-06$c10-05-05 912 $a991001011389707536 945 $aLE026 004.22 HEU 01.01 2004$g1$i2026000021195$lle026$nProf. De Paolis / Biblioteca$op$pE75.03$q-$rl$s- $t4$u4$v0$w4$x0$y.i14064212$z10-05-05 996 $aComputer systems design and architecture$91461303 997 $aUNISALENTO 998 $ale026$b10-05-05$cm$da $e-$feng$gnju$h0$i0 LEADER 01203nam a2200265 i 4500 001 991003184619707536 008 040723s2003 it b 001 0 ita d 020 $a8814104751 035 $ab13036798-39ule_inst 040 $aDip.to Studi Giuridici$bita 082 14$a346.402 100 1 $aAmato, Cristina$0151406 245 10$aPer un diritto europeo dei contratti con i consumatori :$bproblemi e tecniche di attuazione della legislazione comunitaria nell'ordinamento italiano e nel Regno Unito /$cCristina Amato 260 $aMilano :$bGiuffrè,$cc2003 300 $axi, 522 p. ;$c24 cm 440 0$aCollana del Dipartimento di scienze giuridiche dell'Università degli studi di Brescia 504 $aInclude riferimenti bibliografici (p. [483]-522) 650 4$aConsumatori$xTutela$xDiritto comunitario 650 4$aContratti$xDiritto comunitario 907 $a.b13036798$b02-04-14$c23-07-04 912 $a991003184619707536 945 $aLE027 346.40 AMA01.01$g1$i2027000062638$lle027$o-$pE40.00$q-$rl$s- $t0$u2$v2$w2$x0$y.i13656144$z23-07-04 996 $aPer un diritto europeo dei contratti con i consumatori$9287381 997 $aUNISALENTO 998 $ale027$b23-07-04$cm$da $e-$fita$git $h0$i0 LEADER 02861nam 2200613 450 001 9910132493903321 005 20230803201535.0 010 $a1-118-90663-2 010 $a1-118-90664-0 010 $a1-118-90665-9 035 $a(CKB)3580000000001284 035 $a(EBL)1791342 035 $a(SSID)ssj0001378278 035 $a(PQKBManifestationID)11844071 035 $a(PQKBTitleCode)TC0001378278 035 $a(PQKBWorkID)11329230 035 $a(PQKB)10975963 035 $a(MiAaPQ)EBC1791342 035 $a(Au-PeEL)EBL1791342 035 $a(CaPaEBR)ebr10943472 035 $a(CaONFJC)MIL879719 035 $a(OCoLC)892799992 035 $a(EXLCZ)993580000000001284 100 $a20141008h20142014 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 12$aA new Silurian (Llandovery, Telychian) sponge assemblage from Gotland, Sweden /$fFreek Rhebergen and Joseph P. Botting 210 1$a[Place of publication not identified] :$cWiley Blackwell,$d2014. 210 4$d©2014 215 $a1 online resource (273 p.) 225 1 $aFossils and Strata ;$vNumber 60 300 $aDescription based upon print version of record. 311 $a1-118-90662-4 320 $aIncludes bibliographical references. 327 $aCover; Title page; A new Silurian (Llandovery, Telychian) sponge assemblage from Gotland, Sweden; Introduction; Institutional abbreviations; Geological setting; Material, repository, methods and terminology; Systematic palaeontology; Palaeobiogeography and community evolution; Taphonomy; Palaeoecology and palaeoenvironmental interpretation; Conclusions; References; End User License Agreement 330 $aA newly discovered, diverse sponge fauna of early Silurian age, is described from Gotland, Sweden. This is the first Silurian sponge assemblage known from Baltica, and the only diverse Llandoverian assemblage known worldwide. The fauna includes 20 genera and 29 species, of which three genera and six species are new. Eighteen species are new to Baltica. The fauna shows strong similarities to later Silurian assemblages in Arctic Canada, but one endemic species comprises ca. 50% of the fauna. The fauna shows that lithistid sponges recovered well from the late Ordovician extinction in some areas, 410 0$aFossils and strata ;$vNumber 60. 606 $aSponges, Fossil 606 $aPaleontology$ySilurian 615 0$aSponges, Fossil. 615 0$aPaleontology 676 $a563.4094869 700 $aFreek Rhebergen$0988069 702 $aBotting$b J. P$g(Joseph P.), 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910132493903321 996 $aA new Silurian (Llandovery, Telychian) sponge assemblage from Gotland, Sweden$92259378 997 $aUNINA LEADER 06068nam 22008535 450 001 9910143619703321 005 20200701062150.0 010 $a3-540-39945-3 024 7 $a10.1007/3-540-39945-3 035 $a(CKB)1000000000211310 035 $a(SSID)ssj0000326130 035 $a(PQKBManifestationID)11264632 035 $a(PQKBTitleCode)TC0000326130 035 $a(PQKBWorkID)10265159 035 $a(PQKB)11257056 035 $a(DE-He213)978-3-540-39945-2 035 $a(MiAaPQ)EBC3072717 035 $a(PPN)155210785 035 $a(EXLCZ)991000000000211310 100 $a20121227d2000 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aRecent Advances in Intrusion Detection $eThird International Workshop, RAID 2000 Toulouse, France, October 2-4, 2000 Proceedings /$fedited by Herve Debar, Ludovic Me, S. Felix Wu 205 $a1st ed. 2000. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2000. 215 $a1 online resource (X, 230 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v1907 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-41085-6 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aLogging -- Better Logging through Formality -- A Pattern Matching Based Filter for Audit Reduction and Fast Detection of Potential Intrusions -- Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection -- Data Mining -- A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions -- Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report -- Modeling Process Behavior -- Adaptive, Model-Based Monitoring for Cyber Attack Detection -- A Real-Time Intrusion Detection System Based on Learning Program Behavior -- Intrusion Detection Using Variable-Length Audit Trail Patterns -- Flexible Intrusion Detection Using Variable-Length Behavior Modeling in Distributed Environment: Application to CORBA Objects -- IDS Evaluation -- The 1998 Lincoln Laboratory IDS Evaluation -- Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation -- Using Rule-Based Activity Descriptions to Evaluate Intrusion-Detection Systems -- Modeling -- LAMBDA: A Language to Model a Database for Detection of Attacks -- Target Naming and Service Apoptosis. 330 $aSince 1998, RAID has established its reputation as the main event in research on intrusion detection, both in Europe and the United States. Every year, RAID gathers researchers, security vendors and security practitioners to listen to the most recent research results in the area as well as experiments and deployment issues. This year, RAID has grown one step further to establish itself as a well-known event in the security community, with the publication of hardcopy proceedings. RAID 2000 received 26 paper submissions from 10 countries and 3 continents. The program committee selected 14 papers for publication and examined 6 of them for presentation. In addition RAID 2000 received 30 extended abstracts proposals; 15 of these extended abstracts were accepted for presentation. - tended abstracts are available on the website of the RAID symposium series, http://www.raid-symposium.org/. We would like to thank the technical p- gram committee for the help we received in reviewing the papers, as well as all the authors for their participation and submissions, even for those rejected. As in previous RAID symposiums, the program alternates between fun- mental research issues, such as newtechnologies for intrusion detection, and more practical issues linked to the deployment and operation of intrusion det- tion systems in a real environment. Five sessions have been devoted to intrusion detection technology, including modeling, data mining and advanced techniques. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v1907 606 $aComputer networks 606 $aComputer security 606 $aData encryption (Computer science) 606 $aManagement information systems 606 $aComputer science 606 $aComputers and civilization 606 $aOperating systems (Computers) 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 615 0$aComputer networks. 615 0$aComputer security. 615 0$aData encryption (Computer science) 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputers and civilization. 615 0$aOperating systems (Computers) 615 14$aComputer Communication Networks. 615 24$aSystems and Data Security. 615 24$aCryptology. 615 24$aManagement of Computing and Information Systems. 615 24$aComputers and Society. 615 24$aOperating Systems. 676 $a005.8 702 $aDebar$b Herve$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMe$b Ludovic$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWu$b S. Felix$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aRAID 2000 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910143619703321 996 $aRecent Advances in Intrusion Detection$9772673 997 $aUNINA