LEADER 01774nam 2200493 450 001 9910816697703321 005 20230730081423.0 010 $a1-63853-072-6 010 $a1-62623-028-5 024 7 $a10.1055/b-005-143331 035 $a(CKB)3710000001184972 035 $a(Au-PeEL)EBL4845576 035 $a(CaPaEBR)ebr11377761 035 $a(OCoLC)962304411 035 $a10.1055-b-005-143331 035 $a(DE-2912)1496418198778 035 $a(MiAaPQ)EBC4845576 035 $a(EXLCZ)993710000001184972 100 $a20170515h20172017 uy 0 101 0 $aeng 135 $aurcn|---uuuuu 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aColor Atlas of Brainstem Surgery /$fby: Spetzler, Robert F., Kalani, M. Yashar S., Nakaji, Peter, Ya?murlu, Kaan 210 1$aNew York :$cThieme,$d2017. 210 4$dİ2017 215 $a1 online resource (564 pages) $cillustrations (chiefly color) 300 $a"With 1700 figures." 300 $aIncludes index. 311 $a1-62623-027-7 327 $aAnatomy -- Safe entry zones -- Tenets of brainstem surgery -- Approaches to thalamic, pineal, and brainstem lesions -- Case studies. 606 $aBrain stem$xSurgery 615 0$aBrain stem$xSurgery. 676 $a617.481 700 $aSpetzler$b Robert F$4edt$4http://id.loc.gov/vocabulary/relators/edt$0760247 702 $aKalani$b M. Yashar S$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aNakaji$b Peter$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYa?murlu$b Kaan$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bDE-2912 906 $aBOOK 912 $a9910816697703321 996 $aColor Atlas of Brainstem Surgery$93971502 997 $aUNINA LEADER 02939nam 22006255 450 001 9910437567603321 005 20251226195448.0 010 $a3-642-40597-5 024 7 $a10.1007/978-3-642-40597-6 035 $a(CKB)3710000000015937 035 $a(SSID)ssj0000986813 035 $a(PQKBManifestationID)11619762 035 $a(PQKBTitleCode)TC0000986813 035 $a(PQKBWorkID)10941688 035 $a(PQKB)11695964 035 $a(DE-He213)978-3-642-40597-6 035 $a(MiAaPQ)EBC3096887 035 $a(PPN)172429722 035 $a(EXLCZ)993710000000015937 100 $a20130814d2013 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aAdvances in Security of Information and Communication Networks $eFirst International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013. Proceedings /$fedited by Ali Ismail Awad, Aboul Ella Hassanien, Kensuke Baba 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (XII, 249 p. 104 illus.) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v381 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-40596-7 327 $aNetworking security -- Data and information security -- Authentication and privacy -- Security applications. 330 $aThis book constitutes the refereed proceedings of the International Conference on Advances in Security of Information and Communication Networks, Sec Net 2013, held in Cairo, Egypt, in September 2013. The 21 revised full papers presented were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on networking security; data and information security; authentication and privacy; security applications.                        . 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v381 606 $aData protection 606 $aComputer networks 606 $aData mining 606 $aData and Information Security 606 $aComputer Communication Networks 606 $aData Mining and Knowledge Discovery 615 0$aData protection. 615 0$aComputer networks. 615 0$aData mining. 615 14$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$aData Mining and Knowledge Discovery. 676 $a005.8 702 $aAwad$b Ali Ismail$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHassanien$b Aboul Ella$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBaba$b Kensuke$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910437567603321 996 $aAdvances in Security of Information and Communication Networks$92546628 997 $aUNINA