LEADER 00968nam 2200253la 450 001 9910481175503321 005 20210618143002.0 035 $a(UK-CbPIL)2090353948 035 $a(CKB)5500000000084589 035 $a(EXLCZ)995500000000084589 100 $a20210618d1683 uy | 101 0 $alat 135 $aurcn||||a|bb| 200 10$aMedicinam practicam non satis æstimari. Oratio habita in archi-lycæo Patauino, die 16. Nouembris, 1683. A Carolo Patino, .$b[electronic resource] 210 $aVenice $c[s.n.]$d1683 215 $aOnline resource (P. 184-190, 4°.) 300 $aReproduction of original in Biblioteca Nazionale Centrale di Firenze. 700 $aPatin$b Charles$f1633-1693.$0483346 801 0$bUk-CbPIL 801 1$bUk-CbPIL 906 $aBOOK 912 $a9910481175503321 996 $aMedicinam practicam non satis æstimari. Oratio habita in archi-lycæo Patauino, die 16. Nouembris, 1683. A Carolo Patino,$92264309 997 $aUNINA LEADER 01658nam 2200433 n 450 001 996384734403316 005 20221108024543.0 035 $a(CKB)4940000000067673 035 $a(EEBO)2240863162 035 $a(UnM)99845568 035 $a(EXLCZ)994940000000067673 100 $a19911001d1640 uy | 101 0 $aeng 135 $aurbn||||a|bb| 200 04$aThe school of patience$b[electronic resource] $ein three books by H. Drexelius 210 $aCambridge $cPrinted by Roger Daniel printer to the University, 1640. And are sold [by N. Alsop] at the Angell in Popes head alley[, London$d1640] 215 $a[10], 197, [1], 169, [1], 163, [1] p., [3] plates 300 $aTranslator's dedication signed: D.L. 300 $aA translation of: Gymnasium patientiae. 300 $aBookseller's name from STC. 300 $aIn three parts, each with separate pagination; register is continuous. 300 $aThe title page is engraved and signed "W. Marshall scul:". The other plates are also by him. 300 $aIdentified as STC 7239a on UMI microfilm. 300 $aReproduction of the original in Cambridge University Library. 330 $aeebo-0021 606 $aPatience$xReligious aspects$vEarly works to 1800 615 0$aPatience$xReligious aspects 700 $aDrexel$b Jeremias$f1581-1638.$0718089 701 $aD. L$ffl. 1640.$01014456 702 $aMarshall$b William$ffl. 1617-1650, 801 0$bCu-RivES 801 1$bCu-RivES 801 2$bUk-ES 801 2$bCStRLIN 801 2$bWaOLN 906 $aBOOK 912 $a996384734403316 996 $aThe school of patience$92394973 997 $aUNISA LEADER 05138nam 22008175 450 001 9910144145503321 005 20200701065247.0 010 $a3-540-45299-0 024 7 $a10.1007/10722599 035 $a(CKB)1000000000548806 035 $a(SSID)ssj0000322134 035 $a(PQKBManifestationID)11247760 035 $a(PQKBTitleCode)TC0000322134 035 $a(PQKBWorkID)10283248 035 $a(PQKB)10828657 035 $a(DE-He213)978-3-540-45299-7 035 $a(MiAaPQ)EBC3088743 035 $a(PPN)155236601 035 $a(EXLCZ)991000000000548806 100 $a20121227d2000 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aComputer Security - ESORICS 2000 $e6th European Symposium on Research in Computer Security Toulouse, France, October 4-6, 2000 Proceedings /$fedited by Frederic Cuppens, Yves Deswarte, Dieter Gollmann, Michael Waidner 205 $a1st ed. 2000. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2000. 215 $a1 online resource (X, 330 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v1895 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-41031-7 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aPersonal Devices and Smart Cards -- Checking Secure Interactions of Smart Card Applets -- Verification of a Formal Security Model for Multiapplicative Smart Cards -- How Much Negotiation and Detail Can Users Handle? Experiences with Security Negotiation and the Granularity of Access Control in Communications -- Electronic Commerce Protocols -- Secure Anonymous Signature-Based Transactions -- Metering Schemes for General Access Structures -- Access Control -- A Typed Access Control Model for CORBA -- Safety Analysis of the Dynamic-Typed Access Matrix Model -- A Formal Model for Role-Based Access Control Using Graph Transformation -- Protocol Verification -- A Formal Semantics for SPKI -- Formal Verification of Cardholder Registration in SET -- Automating Data Independence -- Internet Security -- Finding a Connection Chain for Tracing Intruders -- A Full Bandwidth ATM Firewall -- Security Property Analysis -- Analysing Time Dependent Security Properties in CSP Using PVS -- Unwinding Possibilistic Security Properties -- Authentication and Confidentiality via IPsec -- Mobile Agents -- A Security Framework for a Mobile Agent System -- A Distributed Access Control Model for Java -- Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code. 330 $ahis book presents the refereed proceedings of the 6th European Symposium on Research in Computer Security, ESORICS 2000, held in Toulouse, France in October 2000. The 19 revised full papers presented were carefully reviewed and selected from a total of 75 submissions. The papers are organized in sections on personal devices and smart cards, electronic commerce protocols, access control, protocol verification, Internet security, security property analysis, and mobile agents. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v1895 606 $aComputer networks 606 $aOperating systems (Computers) 606 $aData encryption (Computer science) 606 $aComputer logic 606 $aManagement information systems 606 $aComputer science 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aLogics and Meanings of Programs$3https://scigraph.springernature.com/ontologies/product-market-codes/I1603X 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aComputer networks. 615 0$aOperating systems (Computers) 615 0$aData encryption (Computer science) 615 0$aComputer logic. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aComputer Communication Networks. 615 24$aOperating Systems. 615 24$aCryptology. 615 24$aLogics and Meanings of Programs. 615 24$aManagement of Computing and Information Systems. 676 $a005.8 702 $aCuppens$b Frederic$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDeswarte$b Yves$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGollmann$b Dieter$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWaidner$b Michael$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aEuropean Symposium on Research in Computer Security 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910144145503321 996 $aComputer Security - ESORICS 2000$92158504 997 $aUNINA