LEADER 01049nam2 2200349 450 001 990005970610203316 005 20141016133204.0 035 $a000597061 035 $aUSA01000597061 035 $a(ALEPH)000597061USA01 035 $a000597061 100 $a20110311d2014----km-y0itay50------ba 101 $aita 102 $aIT 105 $a||||||||001yy 200 1 $aDelle societą. Dell'azienda. Della concorrenza$fa cura di Daniele U. Santosuosso 210 $aSan Mauro Torinese$cUTETgiuridica$d2014- 215 $a5 volumi$d24 cm 410 0$12001 454 1$12001 461 1$1001000337939$12001$aCommentario del codice civile 676 $a346.45002632 702 1$aSANTOSUOSSO,$bDaniele U. 801 0$aIT$bsalbc$gISBD 912 $a990005970610203316 951 $aXXV.1.B. 649/12$bG.$cXXV.1.B. 649 959 $aBK 969 $aGIU 979 $aFIORELLA$b90$c20141016$lUSA01$h1329 979 $aFIORELLA$b90$c20141016$lUSA01$h1332 996 $aDelle societą. Dell'azienda. Della concorrenza$91079438 997 $aUNISA LEADER 01369nam 2200385 450 001 9910283658803321 005 20230814224121.0 010 $a1-5386-4593-9 035 $a(CKB)4100000005963626 035 $a(WaSeSS)IndRDA00121268 035 $a(EXLCZ)994100000005963626 100 $a20200326d2018 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$a2018 12th International Conference on Electromagnetic Wave Interaction with Water and Moist Substances $e4-7 June 2018, Lublin, Poland /$fIEEE Computer Society 210 1$aPiscataway, New Jersey :$cInstitute of Electrical and Electronics Engineers,$d2018. 215 $a1 online resource (46 pages) 311 $a1-5386-4594-7 606 $aElectromagnetic waves$vCongresses 606 $aWater$xElectric properties$vCongresses 606 $aMoisture$xMeasurement$vCongresses 615 0$aElectromagnetic waves 615 0$aWater$xElectric properties 615 0$aMoisture$xMeasurement 676 $a539.2 712 02$aIEEE Computer Society, 801 0$bWaSeSS 801 1$bWaSeSS 906 $aPROCEEDING 912 $a9910283658803321 996 $a2018 12th International Conference on Electromagnetic Wave Interaction with Water and Moist Substances$92524075 997 $aUNINA LEADER 02634nam 2200613 450 001 9910783282303321 005 20230126210806.0 010 $a1-58053-885-1 035 $a(CKB)1000000000023478 035 $a(EBL)227650 035 $a(OCoLC)304072275 035 $a(SSID)ssj0000113418 035 $a(PQKBManifestationID)11125005 035 $a(PQKBTitleCode)TC0000113418 035 $a(PQKBWorkID)10100155 035 $a(PQKB)10984636 035 $a(Au-PeEL)EBL227650 035 $a(CaPaEBR)ebr10082041 035 $a(CaBNVSL)mat09107197 035 $a(IEEE)9107197 035 $a(MiAaPQ)EBC227650 035 $a(EXLCZ)991000000000023478 100 $a20200729d2004 uy 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aBluetooth security /$fChristian Gehrmann, Joakim Persson, Ben Smeets 210 1$aBoston :$cArtech House,$d©2004. 210 2$a[Piscataqay, New Jersey] :$cIEEE Xplore,$d[2004] 215 $a1 online resource (221 p.) 225 1 $aArtech House computer security series 300 $aDescription based upon print version of record. 311 $a1-58053-504-6 320 $aIncludes bibliographical references and index. 327 $aMachine generated contents note: 1. Introduction -- 2. Overview of the Bluetooth security architecture -- 3. Bluetooth pairing and key management -- 4. Algorithms -- 5. 330 $a"This resource examine the most significant attacks on Bluetooth security mechanisms and their implementations, demonstrating how some of these known weaknesses can be avoided with appropriate defensive measures. The book presents concrete examples of how to design security solutions for some Bluetooth applications and products built on these applications. Professionals find real-world case studies including technical algorithms, mechanisms and protocols, and security architecture. These architectures offer valuable guidelines for use in building Bluetooth and non-Bluetooth-specific security mechanisms."--Jacket. 410 0$aArtech House computer security series. 606 $aBluetooth technology$xSecurity measures 606 $aComputer security 615 0$aBluetooth technology$xSecurity measures. 615 0$aComputer security. 676 $a005.8 700 $aGehrmann$b Christian$01507632 701 $aPersson$b Joakim$01507633 701 $aSmeets$b Ben$01507634 801 0$bCaBNVSL 801 1$bCaBNVSL 801 2$bCaBNVSL 906 $aBOOK 912 $a9910783282303321 996 $aBluetooth security$93738531 997 $aUNINA