LEADER 00986nam0-22003251i-450- 001 990003042060403321 005 20100513103719.0 010 $a0-415-14057-9 035 $a000304206 035 $aFED01000304206 035 $a(Aleph)000304206FED01 035 $a000304206 100 $a20030910d1996----km-y0itay50------ba 101 0 $aeng 102 $aIT 200 1 $aCurrency convertibility$ethe gold standard and beyond$fedited by Jorge Braga de Macedo, Barry Eichengreen and Jaime Reis 210 $aLondon$aNew York$cRoutledge$d1996 215 $aXIV, 273 p.$d23 cm 225 1 $aRoutledge explorations in economic history$v3 610 0 $aGold standard 702 1$aEichengreen,$bBarry J.$f<1952- > 702 1$aMacedo,$bJorge Braga de 702 1$aReis,$bJaime 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990003042060403321 952 $aO/2.112 MAC$b17883$fSES 959 $aSES 996 $aCurrency convertibility$9463193 997 $aUNINA LEADER 00851nam0-22003011i-450- 001 990000267470403321 005 20001010 035 $a000026747 035 $aFED01000026747 035 $a(Aleph)000026747FED01 035 $a000026747 100 $a20001010d--------km-y0itay50------ba 101 0 $aita 105 $ay-------001yy 200 1 $aCours de calcul operationnel applique`$fMaurice Denis-Papin, A. Kaufmann. 210 $aParis$cEditions Albin Michel$d1963 215 $a273 p., 23 cm 676 $a510 700 1$aDenis-Papin,$bMaurice$f<1900- >$0625 702 1$aKaufmann,$bArnold$f<1911- > 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990000267470403321 952 $a04 010-55$bPIC$fDINCH 959 $aDINCH 996 $aCours de calcul operationnel applique$9118633 997 $aUNINA DB $aING01 LEADER 01287nam0-2200409---450 001 990005652710203316 005 20210825125038.0 035 $a000565271 035 $aUSA01000565271 035 $a(ALEPH)000565271USA01 035 $a000565271 100 $a20040805d1970----|||y0itaa50------ba 101 $aita 102 $ait 105 $a0 00||| 200 1 $aStoria della rivoluzione russa$fLev Trotsky$gtraduzione e introduzione di Livio Maitan 205 $a3. ed 210 $aMilano$cA. Mondadori$d1970 215 $a2 v. (XLV, 1273 p. compless.)$cill.$d19 cm 225 2 $a<> Oscar$ei libri settimanali Mondadori 410 0$12001$a<> Oscar 606 $aRivoluzione russa$2F 620 $dMILANO 676 $a947 700 1$aTROCKIJ,$bLev Davydovic$0242587 702 1$aMAITAN,$bLivio 801 0$aIT$bSA$c20111219 912 $a990005652710203316 950 0$aDipar.to di Filosofia - Salerno$dDFFDC TRO 1$e6103 FIL 951 $aXV.18.A. 1250 1 (FDC TRO 1)$b6104 FIL$cXV.18.A$d481661 951 $aXV.18.A. 1250 2 (FDC TRO 2)$b6103 FIL$cXV.18.A$d481643 959 $aBK 969 $aFDECI 979 $c20121027$lUSA01$h1525 979 $c20121027$lUSA01$h1615 996 $aHistory of the Russian revolution$91536147 997 $aUNISA LEADER 04928nam 2200445 450 001 9910412317203321 005 20230825164245.0 035 $a(CKB)5280000000243803 035 $a(NjHacI)995280000000243803 035 $a(EXLCZ)995280000000243803 100 $a20230825d2020 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aCODASPY'20 $eproceedings of the Tenth ACM Conference on Data and Application Security and Privacy : March 16-18, 2020, New Orleans, LA, USA /$fgeneral chairs, Vassil Rouseev, Bhavani Thuraisingham 210 1$aNew York :$cAssociation for Computing Machinery,$d2020. 215 $a1 online resource (392 pages) $cillustrations 225 0 $aACM conferences 300 $aIncludes index. 311 $a1-4503-7107-8 330 $aIt is our great pleasure to welcome you to the tenth edition of the ACM Conference on Data and Application Security and Privacy (CODASPY 2020), which follows the successful ninth editions held in February/March 2011-2019. This conference series has been founded to foster novel and exciting research in this arena and to help generate new directions for further research and development. The initial concept was established by the two co-founders, Elisa Bertino and Ravi Sandhu, and sharpened by subsequent discussions with a number of fellow data security and privacy researchers. Their enthusiastic encouragement persuaded the co-founders to move ahead with the always daunting task of creating a high-quality conference.Data and applications that manipulate data are crucial assets in today's information age. With the increasing drive towards availability of data and services anytime and anywhere, security and privacy risks have increased. Vast amounts of privacy-sensitive data are being collected today by organizations for a variety of reasons. Unauthorized disclosure, modification, usage or denial of access to these data and corresponding services may result in high human and financial costs. Important applications such as homeland security, social networking and social computing provide value by aggregating input from numerous individual users, and the mobile devices they carry. The emerging area of Internet of Things also poses serious privacy and security challenges. To achieve efficiency and effectiveness in traditional domains such as healthcare, there is a drive to make these records electronic and highly available. The need for organizations to share information effectively is underscored by rapid innovations in the business world that require close collaboration across traditional boundaries. Security and privacy in these and other arenas can be meaningfully achieved only in context of the application domain. Data and applications security and privacy has rapidly expanded as a research field with many important challenges to be addressed.In response to the call for papers of CODASPY 2020, 154 papers were submitted from Africa, Asia, Europe, South America and North America. The program committee selected 28 full-length research papers and 2 dataset papers (19.4% acceptance rate). These papers cover a variety of topics, including security issues in web, cloud, IoT, and mobile devices, privacy, access control, authentication, malware and system security. The program includes a poster paper session presenting exciting work in progress. The program is complemented by two keynote speeches by James Joshi and Somesh Jha and a panel on challenges on winning the cybersecurity arms race. This year's edition also features three workshops: ACM Workshop for Women in Cybersecurity Research, ACM International Workshop on Security and Privacy Analytics and the 2nd ACM Workshop on Automotive Cybersecurity.The organization of a conference like CODASPY requires the collaboration of many individuals. First of all, we would like to thank the authors for submitting to the conference and the keynote speakers for graciously accepting our invitation. We express our gratitude to the program committee members and external reviewers for their efforts in reviewing the papers, engaging in active online discussion during the selection process and providing valuable feedback to authors. 606 $aApplication software$xSecurity measures 606 $aComputer security$vCongresses 606 $aData protection$vCongresses 606 $aOnline social networks$xSecurity measures$vCongresses 615 0$aApplication software$xSecurity measures. 615 0$aComputer security 615 0$aData protection 615 0$aOnline social networks$xSecurity measures 676 $a004.16 702 $aRouseev$b Vassil 702 $aThuraisingham$b Bhavani 801 0$bNjHacI 801 1$bNjHacl 906 $aBOOK 912 $a9910412317203321 996 $aCODASPY'20$93470039 997 $aUNINA