LEADER 02140nam1-22003611i-450- 001 990000127030403321 035 $a000012703 035 $aFED01000012703 035 $a(Aleph)000012703FED01 035 $a000012703 100 $a20011111d--------km-y0itay50------ba 101 0 $aita 105 $ay-------001yy 200 1 $aTravaux et matériel de chemins de fer$fexécutes en majeure partie sous la direction de Bazaine. 210 $as.l.$cs.e.$d1868- 215 $av.$d48 cm 463 \1$1001990000167130403321$12001 $a1. : partie 1. : Travaux d'art. Cartesplans et profils, traces, terrassements,souterrains et viaducs en ma\022Fnnerie :atlas. 109 tav. : ill. 463 \1$1001990000167140503321$12001 $a1. : partie 2. : Travaux d'art. Viaducsmétalliques, ponts, ponceaux et aqueducs,passages a niveau : atlas. 110-198 tav. :ill. 463 \1$1001990000167150403321$12001 $a2. : Matériel fixes : voies, plaquestournantes, charists, arrt\030As, outillage,vignaux, prises d'eau, appareils dechargement et de etc. : atlas. 142 tav. 463 \1$1001990000167160503321$12001 $a3. : Bt\0301iments et constructions diverses :batiments des voyageurs et dependances,halles à marchandises, remises àlocomotives, remises a voitures, etc. :premiers types : atlas. 77 tav. : ill. 463 \1$1001990000167170403321$12001 $a4. : Bt\0301iments et constructions diverses :gares et stations batiments des voyageurset dependances, quais, halles amarchandises, remises a locomotives [...] :derniers types : atlas. 118 tav. : ill. 463 \1$1001990000167180503321$12001 $a5. : Materiel roulant : locomotivestenders, voitures, wagons, etc. :ensembles : atlas. 43 tav. : ill. 463 \1$1001990000167190503321$12001 $a6. : Matériel roulant : locomotives,tenders, voitures, wagons, etc. : détails :atlas. 65 tav. : ill. 610 0 $aCostruzioni ferroviarie 676 $a625.1 700 1$aBazaine,$bPierre Dominique$08535 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990000127030403321 959 $aFINBC 996 $aTravaux et matériel de chemins de fer$9114490 997 $aUNINA DB $aING01 LEADER 00943nam0-22003371i-450 001 990001466420403321 005 20240221121155.0 010 $a0-12-277250-4 035 $a000146642 035 $aFED01000146642 035 $a(Aleph)000146642FED01 100 $a20010214d1971----km-y0itay50------ba 101 0 $aeng 102 $aGB 105 $aa---a---001yy 200 1 $aAtlas of Energy Budgets of Plant Leaves$fDavid M.Gates and LaVerne E. Papian 210 $aLondon$cAcademic Press$d1971 215 $av, 277 p.$d25 cm 610 0 $aEcologia 676 $a581$v22 $z ita 700 1$aGates,$bDavid M.$064918 702 1$aPapian,$bLaverne E. 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990001466420403321 952 $aBSF-581-GAT-1$b84$fSC1 952 $aA PAT 1945$b2811/2024$fFAGBC 959 $aSC1 959 $aFAGBC 996 $aAtlas of Energy Budgets of Plant Leaves$9379065 997 $aUNINA LEADER 04705nam 22006255 450 001 9910337835503321 005 20251113175642.0 010 $a3-030-16837-9 024 7 $a10.1007/978-3-030-16837-7 035 $a(CKB)4100000008493347 035 $a(DE-He213)978-3-030-16837-7 035 $a(MiAaPQ)EBC5795872 035 $a(PPN)248602322 035 $a(EXLCZ)994100000008493347 100 $a20190619d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCybersecurity and Secure Information Systems $eChallenges and Solutions in Smart Environments /$fedited by Aboul Ella Hassanien, Mohamed Elhoseny 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (X, 314 p. 128 illus., 95 illus. in color.) 225 1 $aAdvanced Sciences and Technologies for Security Applications,$x2363-9466 311 08$a3-030-16836-0 327 $aSecurity and Privacy in Smart City Applications and Services: Opportunities and Challenges -- A Lightweight Multi-Level Encryption Model for IoT Applications -- An Efficient Image Encryption Scheme based on Signcryption Technique with Adaptive Elephant Herding Optimization -- Time Split based Pre-processing with a Data-driven Approach for Malicious URL Detection; Optimal Wavelet Coefficients Based Steganography for Image Security with Secret Sharing Cryptography Model -- Deep learning Framework for Cyber Threat Situational Awareness based on Email and URL Data Analysis -- Application of Deep Learning Architectures for Cyber security.-Improved DGA Domain Names Detection and Categorization using Deep learning Architectures with Classical Machine learning Algorithms -- Secure Data Transmission through Reliable Vehicles in VANET using Optimal Lightweight Cryptography -- Some specific examples of attacks on information systems and smart cities applications -- Clustering Based Cybersecurity Model for Cloud Data -- A Detailed Investigation and Analysis of Deep Learning Architectures and Visualization Techniques for Malware Family Identification -- Design and Implementation of a Research and Education Cybersecurity Operations Center. 330 $aThis book provides a concise overview of the current state of the art in cybersecurity and shares novel and exciting ideas and techniques, along with specific cases demonstrating their practical application. It gathers contributions by both academic and industrial researchers, covering all aspects of cybersecurity and addressing issues in secure information systems as well as other emerging areas. The content comprises high-quality research articles and reviews that promote a multidisciplinary approach and reflect the latest advances, challenges, requirements and methodologies. Thus, the book investigates e.g. security vulnerabilities, cybercrime, and privacy issues related to big data analysis, as well as advances in digital forensics, secure smart city services, and risk mitigation strategies for devices employing cyber-physical systems. Given its scope, the book offers a valuable resource for students, researchers, IT professionals and providers, citizens, consumers and policymakers involved or interested in the modern security procedures needed to protect our information and communication resources. Its goal is to foster a community committed to further research and education, and one that can also translate its findings into concrete practices. 410 0$aAdvanced Sciences and Technologies for Security Applications,$x2363-9466 606 $aData protection 606 $aData protection$xLaw and legislation 606 $aSecurity systems 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData and Information Security 606 $aPrivacy 606 $aSecurity Science and Technology 606 $aCryptology 615 0$aData protection. 615 0$aData protection$xLaw and legislation. 615 0$aSecurity systems. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 14$aData and Information Security. 615 24$aPrivacy. 615 24$aSecurity Science and Technology. 615 24$aCryptology. 676 $a005.8 676 $a005.8 702 $aHassanien$b Aboul Ella$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aElhoseny$b Mohamed$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910337835503321 996 $aCybersecurity and Secure Information Systems$92533672 997 $aUNINA