LEADER 01632nam 2200349Ia 450 001 996389616903316 005 20200824132453.0 035 $a(CKB)4940000000094020 035 $a(EEBO)2240858934 035 $a(OCoLC)ocm53981598e 035 $a(OCoLC)53981598 035 $a(EXLCZ)994940000000094020 100 $a20040106d1678 uy 0 101 0 $aeng 135 $aurbn||||a|bb| 200 12$aA new prognostication, for the year of our redemption, 1678, being the second after bissextile, or leap year$b[electronic resource] $eMost curiously and artificially calculated, for all north-Brittain, but more especially (and even according to every typographer's very bound duty) for the latitude and meridian of our most famous city of Bon-Accord. Which stands upon a pleasant lone, whose gallant dykes, are Dee and Done. /$fby A. R. A.M. an expert mathematician 210 $aPrinted in Aberdeen $cby John Forbes, printer to the town and colledges$d1678 215 $a[16] p. $cill 300 $aImperfect: tightly bound with some loss of text. 300 $aReproduction of the original in the National Library of Scotland. 330 $aeebo-0097 606 $aAlmanacs, English$zScotland$y17th century 606 $aFairs$zScotland$y17th century$vEarly works to 1800 615 0$aAlmanacs, English 615 0$aFairs 700 $aA. R$cmathematician,$ffl. 1678.$01017149 801 0$bEAE 801 1$bEAE 906 $aBOOK 912 $a996389616903316 996 $aA new prognostication, for the year of our redemption, 1678, being the second after bissextile, or leap year$92383910 997 $aUNISA LEADER 04371nam 22008175 450 001 9910483260503321 005 20251226200218.0 010 $a3-642-39345-4 024 7 $a10.1007/978-3-642-39345-7 035 $a(CKB)3710000000002626 035 $a(DE-He213)978-3-642-39345-7 035 $a(SSID)ssj0000962802 035 $a(PQKBManifestationID)11525896 035 $a(PQKBTitleCode)TC0000962802 035 $a(PQKBWorkID)10976129 035 $a(PQKB)10664295 035 $a(MiAaPQ)EBC3101166 035 $a(PPN)172428122 035 $a(EXLCZ)993710000000002626 100 $a20130703d2013 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aHuman Aspects of Information Security, Privacy and Trust $eFirst International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013. Proceedings /$fedited by Louis Marinos, Ioannis Askoxylakis 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (XX, 378 p. 102 illus.) 225 1 $aInformation Systems and Applications, incl. Internet/Web, and HCI,$x2946-1642 ;$v8030 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-39344-6 327 $aNovel authentication systems -- Human factors in security -- Security and privacy policies -- User centric security and privacy. 330 $aThis book constitutes the refereed proceedings of the First International Conference on Human Aspects of Information Security, Privacy and Trust, HAS 2013, held as part of the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, USA in July 2013, jointly with 12 other thematically similar conferences. The total of 1666 papers and 303 posters presented at the HCII 2013 conferences was carefully reviewed and selected from 5210 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers accepted for presentation thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The total of 39 contributions was carefully reviewed and selected for inclusion in the HAS proceedings. The papers are organized in the following topical sections: novel authentication systems; human factors in security; security and privacy policies; and user centric security and privacy. 410 0$aInformation Systems and Applications, incl. Internet/Web, and HCI,$x2946-1642 ;$v8030 606 $aUser interfaces (Computer systems) 606 $aHuman-computer interaction 606 $aData protection 606 $aElectronic commerce 606 $aComputers and civilization 606 $aApplication software 606 $aInformation storage and retrieval systems 606 $aUser Interfaces and Human Computer Interaction 606 $aData and Information Security 606 $ae-Commerce and e-Business 606 $aComputers and Society 606 $aComputer and Information Systems Applications 606 $aInformation Storage and Retrieval 615 0$aUser interfaces (Computer systems). 615 0$aHuman-computer interaction. 615 0$aData protection. 615 0$aElectronic commerce. 615 0$aComputers and civilization. 615 0$aApplication software. 615 0$aInformation storage and retrieval systems. 615 14$aUser Interfaces and Human Computer Interaction. 615 24$aData and Information Security. 615 24$ae-Commerce and e-Business. 615 24$aComputers and Society. 615 24$aComputer and Information Systems Applications. 615 24$aInformation Storage and Retrieval. 676 $a029.7 702 $aMarinos$b Louis$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAskoxylakis$b Ioannis$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483260503321 996 $aHuman Aspects of Information Security, Privacy and Trust$92589705 997 $aUNINA