LEADER 01159nam0 2200277 i 450 001 SUN0008355 005 20070920120000.0 010 $a88-14-08817-9 100 $a20020903d2001 |0itac50 ba 101 $aita 102 $aIT 105 $a|||| ||||| 200 1 $aˆIl ‰tribunale di sorveglianza$emanuale pratico aggiornato con il nuovo regolamento penitenziario (D.P.R. 230/00) e con le leggi n. 4/01, n. 40/01, n. 134/01$fGraziano Prelati 210 $aMilano$cGiuffrè$d[2001] 215 $aXX, 287 p.$d24 cm$e1 CD-ROM. 410 1$1001SUN0008356$12001 $aCosa & Come. Diritto e pratica professionale$1210 $aMilano$cGiuffrè. 606 $aGiudice di sorveglianza$xItalia$2FI$3SUNC004923 620 $dMilano$3SUNL000284 676 $a345.45077$v21 700 1$aPrelati$b, Graziano$3SUNV006741$0283100 712 $aGiuffrè$3SUNV001757$4650 801 $aIT$bSOL$c20181231$gRICA 912 $aSUN0008355 950 $aUFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI GIURISPRUDENZA$d00CONS XVII.Eb.37 $e00 19838 20020903 996 $aTribunale di sorveglianza$9668825 997 $aUNICAMPANIA LEADER 01722oam 2200493M 450 001 9910716410003321 005 20200213070601.9 035 $a(CKB)5470000002522050 035 $a(OCoLC)1065923021 035 $a(OCoLC)995470000002522050 035 $a(EXLCZ)995470000002522050 100 $a20071213d1927 ua 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aFrank H. Wilson. February 2, 1927. -- Committed to the Committee of the Whole House and ordered to be printed 210 1$a[Washington, D.C.] :$c[U.S. Government Printing Office],$d1927. 215 $a1 online resource (2 pages) 225 1 $aHouse report / 69th Congress, 2nd session. House ;$vno. 1940 225 1 $a[United States congressional serial set] ;$v[serial no. 8690] 300 $aBatch processed record: Metadata reviewed, not verified. Some fields updated by batch processes. 300 $aFDLP item number not assigned. 606 $aClaims 606 $aDesertion, Military 606 $aDesertion, Naval 606 $aMilitary discharge 606 $aSailors 608 $aLegislative materials.$2lcgft 615 0$aClaims. 615 0$aDesertion, Military. 615 0$aDesertion, Naval. 615 0$aMilitary discharge. 615 0$aSailors. 701 $aMiller$b John Franklin$f1862-1936$pRepublican (WA)$01388529 801 0$bWYU 801 1$bWYU 801 2$bOCLCO 801 2$bOCLCQ 906 $aBOOK 912 $a9910716410003321 996 $aFrank H. Wilson. February 2, 1927. -- Committed to the Committee of the Whole House and ordered to be printed$93439229 997 $aUNINA LEADER 04629nam 22007095 450 001 9910337571903321 005 20251225190604.0 010 $a3-030-12143-7 024 7 $a10.1007/978-3-030-12143-3 035 $a(CKB)4100000007598511 035 $a(DE-He213)978-3-030-12143-3 035 $a(MiAaPQ)EBC5920952 035 $a(PPN)233799710 035 $a(EXLCZ)994100000007598511 100 $a20190124d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aRisks and Security of Internet and Systems $e13th International Conference, CRiSIS 2018, Arcachon, France, October 16?18, 2018, Revised Selected Papers /$fedited by Akka Zemmari, Mohamed Mosbah, Nora Cuppens-Boulahia, Frédéric Cuppens 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (X, 237 p. 112 illus., 35 illus. in color.) 225 1 $aInformation Systems and Applications, incl. Internet/Web, and HCI,$x2946-1642 ;$v11391 311 08$a3-030-12142-9 327 $aAn Empirical Study on the Comprehensibility of Graphical Security Risk Models Based on Sequence Diagrams -- Are Third-Party Libraries Secure? A Software Library Checker for Java -- A prediction-based method for False Data Injection Attacks Detection in Industrial Control Systems -- Outsourcing Signatures of Confidential Documents -- Trust evaluation model for attack detection in Social Internet of Things -- A certificate-less key exchange protocol for IoT -- Personalized, Browser-based Visual Phishing Detection Based on Deep Learning -- Privacy Preserving Data Offloading based on Transformation -- DSTC: DNS-based Strict TLS Configurations -- Authenticated Quality of Service Aware Routing in Software Defined Networks -- On Consent in Online Social Networks: Privacy Impacts and Research Directions (Short Paper) -- Enhancing Collaboration between Security Analysts in Security Operations Centers -- RIICS: Risk based IICS segmentation Method -- Effectiveness and Impact measurements of a diversification based Moving Target Defense -- Practical security exploits of the FlexRay in-vehicle communication Protocol -- Connection Dumping Vulnerability Affecting Bluetooth Availability -- A Systematic Method to Describe and Identify Security Threats Based on Functional Requirements -- Optimal Distribution of Privacy Budget in Differential Privacy. 330 $aThis book constitutes the revised selected papers from the 13th International Conference on Risks and Security of Internet and Systems, CRiSIS 2018, held in Arcachon, France, in October 2018. The 12 full papers and 6 short papers presented in this volume were carefully reviewed and selected from 34 submissions. They cover diverse research themes that range from classic topics, such as vulnerability analysis and classification; apps security; access control and filtering; cloud security; cyber-insurance and cyber threat intelligence; human-centric security and trust; and risk analysis. 410 0$aInformation Systems and Applications, incl. Internet/Web, and HCI,$x2946-1642 ;$v11391 606 $aSoftware engineering 606 $aData protection 606 $aApplication software 606 $aComputer networks 606 $aArtificial intelligence 606 $aSoftware Engineering 606 $aData and Information Security 606 $aComputer and Information Systems Applications 606 $aComputer Communication Networks 606 $aArtificial Intelligence 615 0$aSoftware engineering. 615 0$aData protection. 615 0$aApplication software. 615 0$aComputer networks. 615 0$aArtificial intelligence. 615 14$aSoftware Engineering. 615 24$aData and Information Security. 615 24$aComputer and Information Systems Applications. 615 24$aComputer Communication Networks. 615 24$aArtificial Intelligence. 676 $a004.67 676 $a005.8 702 $aZemmari$b Akka$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMosbah$b Mohamed$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCuppens-Boulahia$b Nora$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCuppens$b Frédéric$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910337571903321 996 $aRisks and Security of Internet and Systems$92102247 997 $aUNINA