LEADER 01346nam2-2200409li-450 001 990000198510203316 005 20180312154812.0 010 $a0-19-505613-2 035 $a0019851 035 $aUSA010019851 035 $a(ALEPH)000019851USA01 035 $a0019851 100 $a20001109d1993----km-y0itay0103----ba 101 0 $aeng 102 $aUS 200 1 $aMechanisms of conventional and high Tc superconductivity$fVladimir Z. Kresin, Hans Morawitz,Stuart A. Wolf 210 $aOxford$cUniversity Press$d1993 215 $aXIV, 181 p.$cill.$d23 cm 225 2 $a<> international series of monographs on physics$v84 410 0$10010019847$12001$a<> international series of monographs on physics 610 1 $aalte temperature 610 1 $asuperconduttivita' 676 $a537623$9. 700 1$aKresin,$bVladimir Z.$08438 702 1$aMorawitz,$bHans 702 1$aWolf,$bStuart A. 801 $aSistema bibliotecario di Ateneo dell' Università di Salerno$gRICA 912 $a990000198510203316 951 $a537.623 KRE$b0020403 959 $aBK 969 $aSCI 979 $c19971018 979 $c20001110$lUSA01$h1713 979 $c20020403$lUSA01$h1627 979 $aPATRY$b90$c20040406$lUSA01$h1614 996 $aMechanisms of conventional and high Tc superconductivity$91501889 997 $aUNISA LEADER 03013nam 2200637 a 450 001 9910458413103321 005 20200520144314.0 010 $a1-282-68944-4 010 $a9786612689444 010 $a0-470-88704-4 010 $a0-470-91109-3 035 $a(CKB)2560000000011282 035 $a(EBL)537355 035 $a(OCoLC)638860411 035 $a(SSID)ssj0000441208 035 $a(PQKBManifestationID)12160848 035 $a(PQKBTitleCode)TC0000441208 035 $a(PQKBWorkID)10424836 035 $a(PQKB)11089029 035 $a(MiAaPQ)EBC537355 035 $a(CaSebORM)9780470525951 035 $a(Au-PeEL)EBL537355 035 $a(CaPaEBR)ebr10392927 035 $a(CaONFJC)MIL268944 035 $a(EXLCZ)992560000000011282 100 $a20100412d2010 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aProfessional Cocoa application security$b[electronic resource] /$fGraham J. Lee 205 $a1st edition 210 $aIndianapolis, Ind. $cWiley$d2010 215 $a1 online resource (339 p.) 225 0 $aWrox professional guides Professional Cocoa application security 300 $aIncludes index. 311 $a0-470-52595-9 320 $aIncludes bibliographical references and index. 327 $aProfessional Cocoa Application Security; About the Author; Contents; Introduction; Chapter 1: Secure by Design; Chapter 2: Managing Multiple Users; Chapter 3: Using the Filesystem Securely; Chapter 4: Handling Multiple Processes; Chapter 5: Storing Confidential Data in the Keychain; Chapter 6: Performing Privileged Tasks; Chapter 7: Auditing Important Operations; Chapter 8: Securing Network Connections; Chapter 9: Writing Secure Application Code; Chapter 10: Deploying Software Securely; Chapter 11: Kernel Extensions; Chapter 12: Conclusion and Further Reading; Index 330 $aThe first comprehensive security resource for Mac and iPhone developers The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide of 606 $aComputer security 606 $aCocoa (Application development environment) 608 $aElectronic books. 615 0$aComputer security. 615 0$aCocoa (Application development environment) 676 $a005.268 676 $a005.2768 700 $aLee$b Graham J$01030913 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910458413103321 996 $aProfessional Cocoa application security$92448061 997 $aUNINA