LEADER 01119nam0-2200289---450- 001 990009101040403321 005 20091009100552.0 035 $a000910104 035 $aFED01000910104 035 $a(Aleph)000910104FED01 035 $a000910104 100 $a20091009d1928----km-y0itay50------ba 101 0 $aita 102 $aIT 105 $ay-------001yy 200 1 $a<>giurisdizione competente per le controversie contro Pubbliche Amministrazioni, aventi per oggetto diritti patrimoniali derivanti dal rapporto di impiego$fOreste Ranelletti 210 $aCittą di Castello$cTipografia dell'Unione Arti Grafiche$d1928 215 $a28 p.$d24 cm 300 $aEstratto da "Il Foro Italiano", vol. LIII, fascicolo 2 700 1$aRanelletti,$bOreste$f<1868-1956>$06302 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990009101040403321 952 $aBusta 12 (14) 23$b32729$fFGBC 959 $aFGBC 996 $aGiurisdizione competente per le controversie contro Pubbliche Amministrazioni, aventi per oggetto diritti patrimoniali derivanti dal rapporto di impiego$9781896 997 $aUNINA LEADER 01651nlm0 22004571i 450 001 990009248500403321 010 $a9783540350958 035 $a000924850 035 $aFED01000924850 035 $a(Aleph)000924850FED01 035 $a000924850 100 $a20100926d2006----km-y0itay50------ba 101 0 $aeng 102 $aDE 135 $adrnn-008mamaa 200 1 $aExtreme Programming and Agile Processes in Software Engineering$bRisorsa elettronica$e7th International Conference, XP 2006, Oulu, Finland, June 17-22, 2006. Proceedings$fedited by Pekka Abrahamsson, Michele Marchesi, Giancarlo Succi 210 $aBerlin ; Heidelberg$cSpringer$d2006 225 1 $aLecture Notes in Computer Science$x0302-9743$v4044 230 $aDocumento elettronico 336 $aTesto 337 $aFormato html, pdf 702 1$aAbrahamsson,$bPekka 702 1$aMarchesi,$bMichele 702 1$aSucci,$bGiancarlo 801 0$aIT$bUNINA$gREICAT$2UNIMARC 856 4 $zFull text per gli utenti Federico II$uhttp://dx.doi.org/10.1007/11774129 901 $aEB 912 $a990009248500403321 961 $aComputer science 961 $aComputer Science 961 $aComputers and Society 961 $aInformation Systems 961 $aLogic design 961 $aLogics and Meanings of Programs 961 $aManagement of Computing and Information Systems 961 $aProgramming Languages, Compilers, Interpreters 961 $aProgramming Techniques 961 $aSoftware engineering 961 $aSoftware Engineering 996 $aExtreme Programming and Agile Processes in Software Engineering$9771914 997 $aUNINA LEADER 01470nam 2200361 n 450 001 996392113803316 005 20200824121346.0 035 $a(CKB)4940000000104020 035 $a(EEBO)2240878209 035 $a(UnM)99849323e 035 $a(UnM)99849323 035 $a(EXLCZ)994940000000104020 100 $a19920130d1579 uy | 101 0 $aeng 135 $aurbn||||a|bb| 200 03$aAn inuective against vices, taken for vertue. Gathered out of the Scriptures, by the vnprofitable seruant of Iesus Christe, Richard Rice$b[electronic resource] $eAlso certaine necessary instructions, most to be taught the younger sort, before thei come to be partakers of the holy communion. Doen by D.W. Arch 210 $aImprinted at London $cBy Ihon Kyngston, for Henry Kirkham$d1579 215 $a[80] p 300 $aSignatures: A-E. 300 $aReproduction of the original in Cambridge University Library. 330 $aeebo-0021 606 $aAmusements$xReligious aspects$vEarly works to 1800 615 0$aAmusements$xReligious aspects 700 $aRice$b Richard$ffl. 1548-1579.$01004333 701 $aD. W$cArchdeacon.$01004334 801 0$bCu-RivES 801 1$bCu-RivES 801 2$bCStRLIN 801 2$bWaOLN 906 $aBOOK 912 $a996392113803316 996 $aAn inuective against vices, taken for vertue. Gathered out of the Scriptures, by the vnprofitable seruant of Iesus Christe, Richard Rice$92343952 997 $aUNISA LEADER 02895nam 22006735 450 001 9910337840303321 005 20251225195026.0 010 $a3-030-20074-4 024 7 $a10.1007/978-3-030-20074-9 035 $a(CKB)4100000008160639 035 $a(DE-He213)978-3-030-20074-9 035 $a(MiAaPQ)EBC5926000 035 $a(PPN)236522108 035 $a(EXLCZ)994100000008160639 100 $a20190511d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Security Theory and Practice $e12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10?11, 2018, Revised Selected Papers /$fedited by Olivier Blazy, Chan Yeob Yeun 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (XII, 223 p. 58 illus., 21 illus. in color.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v11469 300 $aIncludes Index. 311 08$a3-030-20073-6 327 $aReal world -- Cryptography -- Artificial learning -- Cybersecurity -- Internet of things. 330 $aThis volume constitutes the refereed proceedings of the 12th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2018, held in Brussels, Belgium, in December 2018. The 13 revised full papers and 2 short papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: real world; cryptography; artificial learning; cybersecurity; and Internet of things. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v11469 606 $aData protection 606 $aComputer networks$xSecurity measures 606 $aComputer networks 606 $aComputers and civilization 606 $aData and Information Security 606 $aMobile and Network Security 606 $aSecurity Services 606 $aComputer Communication Networks 606 $aComputers and Society 615 0$aData protection. 615 0$aComputer networks$xSecurity measures. 615 0$aComputer networks. 615 0$aComputers and civilization. 615 14$aData and Information Security. 615 24$aMobile and Network Security. 615 24$aSecurity Services. 615 24$aComputer Communication Networks. 615 24$aComputers and Society. 676 $a005.8 676 $a005.8 702 $aBlazy$b Olivier$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYeun$b Chan Yeob$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910337840303321 996 $aInformation Security Theory and Practice$92073240 997 $aUNINA