LEADER 00726nam0-22002531i-450- 001 990007268360403321 005 20090227114215.0 035 $a000726836 035 $aFED01000726836 035 $a(Aleph)000726836FED01 035 $a000726836 100 $a20021021d1980----km-y0itay50------ba 101 0 $aeng 200 1 $a<>methodological appraisal of Marxian economics$fMark Blaug 210 $aAmsterdam$cNorth-Holland$d1980 215 $a82 p.$d19 cm 700 1$aBlaug,$bMark$f<1927- >$0107072 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990007268360403321 952 $aXV E2 15$b2363$fDTE 959 $aDTE 996 $aMethodological appraisal of Marxian economics$9686596 997 $aUNINA LEADER 03287nam 22007455 450 001 9910350235003321 005 20251113193556.0 010 $a981-13-5826-5 024 7 $a10.1007/978-981-13-5826-5 035 $a(CKB)4100000007522585 035 $a(DE-He213)978-981-13-5826-5 035 $a(MiAaPQ)EBC5924530 035 $a(PPN)23380014X 035 $a(EXLCZ)994100000007522585 100 $a20190123d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity in Computing and Communications $e6th International Symposium, SSCC 2018, Bangalore, India, September 19?22, 2018, Revised Selected Papers /$fedited by Sabu M. Thampi, Sanjay Madria, Guojun Wang, Danda B. Rawat, Jose M. Alcaraz Calero 205 $a1st ed. 2019. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2019. 215 $a1 online resource (XXV, 708 p. 282 illus.) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v969 311 08$a981-13-5825-7 330 $aThis book constitutes the refereed proceedings of the 6th International Symposium on Security in Computing and Communications, SSCC 2018, held in Bangalore, India, in September 2018. The 34 revised full papers and 12 revised short papers presented were carefully reviewed and selected from 94 submissions. The papers cover wide research fields including cryptography, database and storage security, human and societal aspects of security and privacy. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v969 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aComputer networks 606 $aComputer networks$xSecurity measures 606 $aApplication software 606 $aCryptology 606 $aData and Information Security 606 $aComputer Communication Networks 606 $aMobile and Network Security 606 $aComputer and Information Systems Applications 606 $aSecurity Services 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection. 615 0$aComputer networks. 615 0$aComputer networks$xSecurity measures. 615 0$aApplication software. 615 14$aCryptology. 615 24$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$aMobile and Network Security. 615 24$aComputer and Information Systems Applications. 615 24$aSecurity Services. 676 $a327.73 702 $aThampi$b Sabu M$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMadria$b Sanjay$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWang$b Guojun$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aRawat$b Danda B$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAlcaraz Calero$b Jose M$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910350235003321 996 $aSecurity in Computing and Communications$92256445 997 $aUNINA