LEADER 00888nam0-2200241 --450 001 9910229659403321 005 20171204113642.0 100 $a20171204d1931----km y0itay50 ba 101 0 $aita 102 $aIT 105 $ay 001yy 200 1 $aIacopo Sannazaro nel 4. centenario della sua morte$e(1530-1930)$eConferenza detta nella Sala De Sanctis della R. Università di Napoli ad iniziativa dell'Associazione per la tutela dei monumenti e del paesaggio di Napoli$fRaimondo Annecchino 210 $aNapoli$cTipografia Unione$d1931 215 $a29 p.$d25 cm 610 0 $aSannazaro, Jacopo$aCelebrazioni 700 1$aAnnecchino,$bRaimondo$0438386 801 0$aIT$bUNINA$gREICAT$2UNIMARC 901 $aBK 912 $a9910229659403321 952 $aII 89$b0927/38$fDINED 959 $aDINED 996 $aIacopo Sannazaro nel 4. centenario della sua morte$91533870 997 $aUNINA LEADER 01059nam a22002773i 4500 001 991003216889707536 005 20040128085801.0 008 040802s1987 it a||||||||||||||||ita 020 $a8844410737 035 $ab13042014-39ule_inst 035 $aARCHE-099462$9ExL 040 $aBiblioteca Interfacoltà$bita$cA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l. 082 04$a299.92 100 1 $aGrossi, Paolo$0145058 245 10$aAsmat uccidere per essere :$bmiti e riti dei cacciatori di teste della Nuova Guinea /$cPaolo Grossi 260 $aMilano :$bAll'insegna del pesce d'oro,$c1987 300 $a197 p. :$bill. ;$c22 cm 440 0$aBiblioteca orientale 650 4$aMiti$zNuova Guinea 650 4$aRiti$zNuova Guinea 907 $a.b13042014$b02-04-14$c05-08-04 912 $a991003216889707536 945 $aLE002 Lett. III F 12$g1$i2002000264824$lle002$nC. 1$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i13665649$z05-08-04 996 $aAsmat uccidere per essere$9286901 997 $aUNISALENTO 998 $ale002$b05-08-04$cm$da $e-$fita$git $h0$i1 LEADER 04560nam 22008055 450 001 9910299252203321 005 20251107173428.0 010 $a3-319-14039-6 024 7 $a10.1007/978-3-319-14039-1 035 $a(CKB)3710000000394705 035 $a(EBL)2096909 035 $a(SSID)ssj0001500982 035 $a(PQKBManifestationID)11852696 035 $a(PQKBTitleCode)TC0001500982 035 $a(PQKBWorkID)11523030 035 $a(PQKB)11288936 035 $a(DE-He213)978-3-319-14039-1 035 $a(MiAaPQ)EBC2096909 035 $a(PPN)185490158 035 $a(MiAaPQ)EBC3109340 035 $a(EXLCZ)993710000000394705 100 $a20150409d2015 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCyber Warfare $eBuilding the Scientific Foundation /$fedited by Sushil Jajodia, Paulo Shakarian, V.S. Subrahmanian, Vipin Swarup, Cliff Wang 205 $a1st ed. 2015. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2015. 215 $a1 online resource (326 p.) 225 1 $aAdvances in Information Security,$x2512-2193 ;$v56 300 $aDescription based upon print version of record. 311 08$a3-319-14038-8 320 $aIncludes bibliographical references. 327 $aCyber War Games -- Alternatives to Cyber Warfare: Deterrence and Assurance -- Identifying and Exploiting the Cyber High Ground with Botnets -- Attribution, Temptation, and Expectation: A Formal Framework for Defense-by-Deception in Cyberfare -- Game-theoretic Foundations for the Strategic Use of Honeypots in Network Security -- Cyber Counterdeception: How to Detect Denial & Deception -- Automated Adversary Profiling -- Cyber Attribution: An Argumentation-Based Approach -- The Human Factor in Cybersecurity: Robust & Intelligent Defense -- CyberWar Game: A Paradigm for Understanding New Challenges of Cyber War -- Active Discovery of Hidden Profiles in Social Networks using Malware -- A Survery of Community Detection Algorithms Based on Analysis-Intent -- Understanding the Vulnerability Lifecycle for Risk Assessment and Defense Against Sophisticated Cyber Attacks -- Graph Mining for Cyber Security -- Programming language theoretic security in the real world: a mirage or the future?. 330 $aThis book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially government employees or contractors. Advanced-level students in computer science and electrical engineering with an interest in security will also find this content valuable as a secondary textbook or reference. 410 0$aAdvances in Information Security,$x2512-2193 ;$v56 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aApplication software 606 $aData and Information Security 606 $aCryptology 606 $aComputer Communication Networks 606 $aComputer and Information Systems Applications 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer networks. 615 0$aApplication software. 615 14$aData and Information Security. 615 24$aCryptology. 615 24$aComputer Communication Networks. 615 24$aComputer and Information Systems Applications. 676 $a004 676 $a004.6 676 $a005.7 676 $a005.8 676 $a005.82 702 $aJajodia$b Sushil$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aShakarian$b Paulo$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSubrahmanian$b V.S$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSwarup$b Vipin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWang$b Cliff$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910299252203321 996 $aCyber Warfare$92519887 997 $aUNINA