LEADER 01227nam0 22002891i 450 001 SUN0019874 005 20151016104301.219 100 $a20040714d1993 |0engc50 ba 101 $aeng 102 $aUS 105 $a|||| ||||| 200 1 $aSampling and analysis of airborne pollutants$fedited by Eric D. Winegar, Lawrence H. Keith 210 $aBoca Raton$cLewis$d1993 215 $aXIX, 364 p.$cill.$d24 cm. 620 $aUS$dBoca Raton$3SUNL000070 676 $a628.5$cTecnologia del controllo dell'inquinamento e ingegneria sanitaria industriale$v22 676 $a577.14$cChimica ambientale$v22 702 1$aKeith$b, Lawrence H.$3SUNV012312 702 1$aWinegar$b, Eric D.$3SUNV016071 712 $aLewis$3SUNV000215$4650 790 1$aKeith, L. H.$zKeith, Lawrence H.$3SUNV101791 790 1$aWinegar, E. D.$zWinegar, Eric D.$3SUNV101793 801 $aIT$bSOL$c20200615$gRICA 912 $aSUN0019874 950 $aUFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI SCIENZE E TECNOLOGIE AMBIENTALI BIOLOGICHE E FARMACEUTICHE$d17CONS Cf2 $e17FSA511 20040714 $sBuono 996 $aSampling and analysis of airborne pollutants$91427836 997 $aUNICAMPANIA LEADER 03480nam 22005535 450 001 9910299283003321 005 20251107152706.0 010 $a3-319-93354-X 024 7 $a10.1007/978-3-319-93354-2 035 $a(CKB)3810000000358770 035 $a(DE-He213)978-3-319-93354-2 035 $a(MiAaPQ)EBC6285570 035 $a(PPN)229495346 035 $a(EXLCZ)993810000000358770 100 $a20180608d2018 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Systems Security and Privacy $eThird International Conference, ICISSP 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers /$fedited by Paolo Mori, Steven Furnell, Olivier Camp 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XII, 295 p. 78 illus.) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v867 300 $aIncludes index. 311 08$a3-319-93353-1 327 $aApplication Marketplace Malware Detection by User Feedback Analysis -- A System for Detecting Targeted Cyber-attacks Using Attack Patterns -- A Better Understanding of Machine Learning Malware Misclassification -- Situation-aware Access Control for Industrie 4.0 -- How to Quantify Graph De-anonymization Risks -- A Security Pattern Classification Based on Data Integration -- Forensic Analysis of Android Runtime (ART) Application Heap Objects in Emulated and Real Devices -- Effcient Detection of Conicts in Data Sharing Agreements -- On Using Obligations for Usage Control in Joining of Datasets -- Directional Distance-Bounding Identification -- An Information Security Management for Socio-Technical Analysis of System Security -- An Exploration of Some Security Issues Within the BACnet Protocol -- Not So Greedy: Enhanced Subset Exploration for Nonrandomness Detectors. . 330 $aThis book constitutes the revised selected papers of the Third International Conference on Information Systems Security and Privacy, ICISSP 2017, held in Porto, Portugal, in February 2017. The 13 full papers presented were carefully reviewed and selected from a total of 100 submissions. They are dealing with topics such as vulnerability analysis and countermeasures, attack patterns discovery and intrusion detection, malware classification and detection, cryptography applications, data privacy and anonymization, security policy analysis, enhanced access control, and socio-technical aspects of security. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v867 606 $aData protection 606 $aComputer networks 606 $aData and Information Security 606 $aComputer Communication Networks 615 0$aData protection. 615 0$aComputer networks. 615 14$aData and Information Security. 615 24$aComputer Communication Networks. 676 $a005.8 702 $aMori$b Paolo$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aFurnell$b Steven$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCamp$b Olivier$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910299283003321 996 $aInformation Systems Security and Privacy$92162731 997 $aUNINA