LEADER 00944cam0-22003491i-450- 001 990000629000403321 005 20060111162000.0 010 $a88-08-14672-3 035 $a000062900 035 $aFED01000062900 035 $a(Aleph)000062900FED01 035 $a000062900 100 $a20020821d1990----km-y0itay50------ba 101 0 $aita 102 $aIT 105 $aa---j---001yy 200 1 $aManuale del calcestruzzo armato$emateriali e teorie di dimensionamento$fEnzo Donaggio 210 $aBologna$cZanichelli$d1990 215 $a702 p.$cill.$d27 cm 610 0 $aTabelle 610 0 $aNorme 610 0 $aManuali 700 1$aDonaggio,$bEnzo$024315 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990000629000403321 952 $a07 O-97 CNR$b5038/23L$fDINSC 952 $a03 MN.0,74$fIINTC 959 $aDINSC 959 $aIINTC 996 $aManuale del calcestruzzo armato$9315669 997 $aUNINA LEADER 04124nam 22006015 450 001 9910299197503321 005 20251226195625.0 010 $a3-319-23802-7 024 7 $a10.1007/978-3-319-23802-9 035 $a(CKB)3710000000541767 035 $a(SSID)ssj0001597042 035 $a(PQKBManifestationID)16297495 035 $a(PQKBTitleCode)TC0001597042 035 $a(PQKBWorkID)14886099 035 $a(PQKB)10189413 035 $a(DE-He213)978-3-319-23802-9 035 $a(MiAaPQ)EBC6287628 035 $a(MiAaPQ)EBC5577740 035 $a(Au-PeEL)EBL5577740 035 $a(OCoLC)933784231 035 $a(PPN)190886528 035 $a(EXLCZ)993710000000541767 100 $a20151201d2015 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInternational Conference on Security and Privacy in Communication Networks $e10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II /$fedited by Jin Tian, Jiwu Jing, Mudhakar Srivatsa 205 $a1st ed. 2015. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2015. 215 $a1 online resource (XIX, 409 p. 126 illus.) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v153 300 $aIncludes index. 311 08$a3-319-23801-9 327 $aSecurity and privacy in wired, wireless, mobile, hybrid, sensor, ad hoc networks -- network intrusion detection and prevention, firewalls, packet filters -- malware, and distributed denial of service -- communication privacy and anonymity -- network and internet forensics techniques -- public key infrastructures, key management, credential management -- secure routing, naming/addressing, network management -- security and privacy in pervasive and ubiquitous computing -- security & privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems -- security & isolation in data center networks -- security & isolation in software defined networking. 330 $aThis 2-volume set constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014, held in Beijing, China, in September 2014. The 27 regular and 17 short papers presented were carefully reviewed. It also presents 22 papers accepted for four workshops (ATCS, SSS, SLSS, DAPRO) in conjunction with the conference, 6 doctoral symposium papers and 8 poster papers. The papers are grouped in the following topics: security and privacy in wired, wireless, mobile, hybrid, sensor, ad hoc networks; network intrusion detection and prevention, firewalls, packet filters; malware, and distributed denial of service; communication privacy and anonymity; network and internet forensics techniques; public key infrastructures, key management, credential management; secure routing, naming/addressing, network management; security and privacy in pervasive and ubiquitous computing; security & privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems; security & isolation in data center networks; security & isolation in software defined networking. 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v153 606 $aData protection 606 $aData and Information Security 615 0$aData protection. 615 14$aData and Information Security. 676 $a005.8 702 $aTian$b Jin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aJing$b Jiwu$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSrivatsa$b Mudhakar$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910299197503321 996 $aInternational Conference on Security and Privacy in Communication Networks$92535392 997 $aUNINA