LEADER 01458nam0-22003971i-450- 001 990000371680403321 005 20001010 035 $a000037168 035 $aFED01000037168 035 $a(Aleph)000037168FED01 035 $a000037168 100 $a20001010d--------km-y0itay50------ba 101 0 $aita 105 $ay-------001yy 200 1 $a<>OPTICAL characterization of high molecular mass carbonaceous structures produced in premixed laminar lames acrossthe soot threshold limit$f(by) C. Buchta, A. D'Alessio, a$eD'Anna, G. Gambi, P. Minutolo and S. Russo 210 $aOxford$cElsevier$d1995 215 $a1227-1232 pp. ill. 25 cm 300 $aestratto da: Planet.Space Sci. vol. 43, nr. 10/11, 1995 702 1$aBuchta,$bC. 702 1$aD'Alessio,$bAntonio 702 1$aD'Anna,$bAndrea 702 1$aGambi,$bGiovanna 702 1$aMinutolo,$bPatrizia 702 1$aRusso,$bS. 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990000371680403321 952 $a04 270-107$bDIC ingr. 2837$fDINCH 952 $a04 270-103$bDIC ingr. 2833$fDINCH 952 $a04 270-104$bDIC ingr. 2834$fDINCH 952 $a04 270-106$bDIC ingr. 2836$fDINCH 952 $a04 270-105$bDIC ingr. 2835$fDINCH 959 $aDINCH 996 $aOPTICAL characterization of high molecular mass carbonaceous structures produced in premixed laminar lames acrossthe soot threshold limit$9127257 997 $aUNINA DB $aING01 LEADER 04507nam 2200601 450 001 996466364203316 005 20220816210123.0 010 $a3-540-89862-X 024 7 $a10.1007/978-3-540-89862-7 035 $a(CKB)1000000000545829 035 $a(SSID)ssj0000318297 035 $a(PQKBManifestationID)11247225 035 $a(PQKBTitleCode)TC0000318297 035 $a(PQKBWorkID)10308180 035 $a(PQKB)11583253 035 $a(DE-He213)978-3-540-89862-7 035 $a(MiAaPQ)EBC3063764 035 $a(MiAaPQ)EBC6806082 035 $a(Au-PeEL)EBL6806082 035 $a(OCoLC)313374027 035 $a(PPN)132861666 035 $a(EXLCZ)991000000000545829 100 $a20220816d2008 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 00$aInformation systems security $e4th international conference, ICISS 2008, Hyderabad, India, December 16-20, 2008 : proceedings /$fedited by R. Sekar, Arun K. Pujari 205 $a1st ed. 2008. 210 1$aBerlin, Germany :$cSpringer,$d[2008] 210 4$dİ2008 215 $a1 online resource (XIII, 307 p.) 225 1 $aSecurity and Cryptology ;$v5352 300 $aInternational conference proceedings. 311 $a3-540-89861-1 320 $aIncludes bibliographical references and index. 327 $aKeynote Address -- BitBlaze: A New Approach to Computer Security via Binary Analysis -- Languages and Formal Methods -- On the Decidability of Model-Checking Information Flow Properties -- Synthesizing Enforcement Monitors wrt. the Safety-Progress Classification of Properties -- Implicit Flows: Can?t Live with ?Em, Can?t Live without ?Em -- Protocols -- A Robust Reputation Scheme for Decentralized Group Management Systems -- Complexity of Checking Freshness of Cryptographic Protocols -- Secure Internet Voting Based on Paper Ballots -- Short Papers -- A Secure Round-Based Timestamping Scheme with Absolute Timestamps (Short Paper) -- A Framework for Trustworthy Service-Oriented Computing (Short Paper) -- Revisiting Bluetooth Security (Short Paper) -- A Verification Framework for Temporal RBAC with Role Hierarchy (Short Paper) -- Keynote Address -- Computing on Encrypted Data -- Ongoing Research -- Identification of Cryptographically Strong and Weak Pseudorandom Bit Generators -- Proxy Re-signature Schemes -- Keynote Address -- Fast Signature Matching Using Extended Finite Automaton (XFA) -- Intrusion Detection -- Real-Time Alert Correlation with Type Graphs -- Incorporation of Application Layer Protocol Syntax into Anomaly Detection -- A Parallel Architecture for Stateful, High-Speed Intrusion Detection -- Biometrics, Forensics and Steganography -- Indexing Multimodal Biometric Databases Using Kd-Tree with Feature Level Fusion -- Audio Watermarking Based on Quantization in Wavelet Domain -- Overwriting Hard Drive Data: The Great Wiping Controversy -- Practical Applications -- Optimizing the Block Cipher and Modes of Operations Overhead at the Link Layer Security Framework in the Wireless Sensor Networks -- Privacy Management for Facebook -- HyDRo ? Hybrid Development of Roles -- Keynote Address -- The Enlightened Era of Enterprise Security (Invited Talk). 330 $aThis book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS 2008, held in Hyderabad, India, in December 2008. The 15 revised full papers, 4 short papers, and 2 research reports presented together with 4 keynote talks were carefully reviewed and selected from 81 submissions. The papers span a wide range of topics including access control, cryptography, forensics, formal methods and language-based security, intrusion detection, malware defense, network and Web security, operating system security, and privacy, and are organized in topical sections on languages and formal methods, protocols, ongoing research, intrusion detection, biometrics, forensics and steganography, and practical applications. 410 0$aSecurity and Cryptology ;$v5352 606 $aComputer security$vCongresses 615 0$aComputer security 676 $a005.8 702 $aSekar$b R. 702 $aPujari$b Arun K. 712 12$aInternational Conference on Information Systems Security 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466364203316 996 $aInformation Systems Security$9771916 997 $aUNISA LEADER 00907nam0-2200289 --450 001 9910325451603321 005 20241023104927.0 010 $a9782372760133 100 $a20190628d2016----kmuy0itay5050 ba 101 0 $aeng 102 $aFR 105 $aab 001yy 200 1 $aLanguage in space$ethe cartographic representation of dialects$fMonika Wegmann 210 $aStrasbourg$cEliPhi, Editions de linguistique et de philologie$d2016 215 $aXVI, 317 p.$cill.$d24 cm 225 1 $aTravaux de linguistique et de philologie 610 0 $aLingua inglese$aDialetti 676 $a427$v22$zita 700 1$aWegmann,$bMonika$0765169 801 0$aIT$bUNINA$gREICAT$2UNIMARC 901 $aBK 912 $a9910325451603321 952 $a417.2 WEGM 01$bbibl. 2019$fFLFBC 952 $a417.2 WEGM 01 BIS$b2021/4742$fFLFBC 959 $aFLFBC 996 $aLanguage in space$91554971 997 $aUNINA LEADER 01381nam 2200469z 450 001 9910149140303321 005 20251218161151.0 010 $a9784339124736 010 $a4339124737 010 $a9784339224733 010 $a4339224731 035 $a(CKB)3710000000471752 035 $a(JP-MeL)3000017731 035 $a(JP-MeKC)3000397272 035 $a(EXLCZ)993710000000471752 100 $a20211007d2013 ||| | 101 0 $ajpn 135 $aur|n||||un||| 181 $2ncrcontent 182 $2ncrmedia 183 $2ncrcarrier 200 10$a?????Java??????? 210 $a??$c????$d2013.9 210 1$a?? : $c????, $d2013 215 $a???????1? 311 08$a9784339024739 311 08$a4339024732 517 3 $aJava??????? : ????? 606 $6880-04/$1$a???????????$2jlabsh 606 $6880-05/$1$a???????(??????)$2ndlsh 615 7$a??????????? 615 7$a???????(??????) 686 $a547.48$2njb/09 686 $a547.4833$2njb/09 686 $a007.64$2njb/09 701 $a??$b ?? 701 $a??$b ?? 701 $a??$b ?? 801 1$bJP-MeL 906 $aBOOK 912 $a9910149140303321 997 $aUNINA