LEADER 01768nam 2200361 n 450 001 996389682503316 005 20200824121553.0 035 $a(CKB)1000000000645964 035 $a(EEBO)2240895635 035 $a(UnM)99830632e 035 $a(UnM)99830632 035 $a(EXLCZ)991000000000645964 100 $a19950823d1693 uy | 101 0 $aeng 135 $aurbn||||a|bb| 200 14$aThe art of painting according to the theory and practise of the best Italian, French, and Germane masters$b[electronic resource] $eTreating of the antiquity of painting. The reputation it always had. The characters of several masters. Proportion. Action and passion. The effects of light. Perspective. Draught. Colouring. Ordonnance. Far more compleat and compendious then hath yet been publisht by any, antient or modern. The second edition. By M.S. gent 210 $aLondon $cprinted by M.B. for the author, and are to be sold by R. Bently, in Russel-street, Covent-Garden, and J. Hancock, in Castle Ally by the Royal-Exchange. Price 2s. 6d.$d1693 215 $a[10], 89, [1] p. 300 $aM.S. = Marshall Smtih. 300 $aThe words "the antiquity .. passion." and "The effects .. Ordonnance." are joined with brackets in title. 300 $aReproduction of the original in the British Library. 330 $aeebo-0018 606 $aPainting$xTechnique$vEarly works to 1800 615 0$aPainting$xTechnique 700 $a[Smith$b Marshall$ffl. 1693].$01012367 801 0$bCu-RivES 801 1$bCu-RivES 801 2$bCStRLIN 801 2$bWaOLN 906 $aBOOK 912 $a996389682503316 996 $aThe art of painting according to the theory and practise of the best Italian, French, and Germane masters$92350243 997 $aUNISA LEADER 00838cam0 22002533 450 001 SOB000000962 005 20220708081424.0 010 $a8814048150 100 $a20010127d1994 |||||ita|0103 ba 101 $aita 102 $aIT 200 1 $a<>bilancio consolidato di gruppo$eprofili economici e giuridici$fMatteo Caratozzolo 210 $aMilano$cGiuffré$d1994 215 $aXII, 442 p.$d24 cm. 700 1$aCaratozzolo$b, Matteo$3AF00008829$4070$0113627 801 0$aIT$bUNISOB$c20220708$gRICA 850 $aUNISOB 852 $aUNISOB$j340$m94690 912 $aSOB000000962 940 $aM 102 Monografia moderna SBN 941 $aM 957 $a340$b001624$gSI$d94690$rACQUISTO$p52.000$1rovito$2UNISOB$3UNISOB$420220708081411.0$520220708081424.0$6rovito 996 $aBilancio consolidato di gruppo$9144917 997 $aUNISOB LEADER 05095nam 2200577Ia 450 001 9910483357103321 005 20200520144314.0 010 $a3-642-04444-1 024 7 $a10.1007/978-3-642-04444-1 035 $a(CKB)1000000000784709 035 $a(SSID)ssj0000316905 035 $a(PQKBManifestationID)11238019 035 $a(PQKBTitleCode)TC0000316905 035 $a(PQKBWorkID)10287819 035 $a(PQKB)10240090 035 $a(DE-He213)978-3-642-04444-1 035 $a(MiAaPQ)EBC3064579 035 $a(PPN)139955720 035 $a(EXLCZ)991000000000784709 100 $a20090922d2009 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 00$aComputer security - ESORICS 2009 $e14th European symposium on research in computer security, Saint-Malo, France, September 21-23, 2009 : proceedings /$fMichael Backes, Peng Ning (eds.) 205 $a1st ed. 2009. 210 $aBerlin ;$ahHeidelberg $cSpringer-Verlag$d2009 215 $a1 online resource (XVI, 706 p.) 225 1 $aLecture notes in computer science ;$v5789 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-04443-3 320 $aIncludes bibliographical references and index. 327 $aNetwork Security I -- Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones -- User-Centric Handling of Identity Agent Compromise -- The Coremelt Attack -- Type-Based Analysis of PIN Processing APIs -- Declassification with Explicit Reference Points -- Tracking Information Flow in Dynamic Tree Structures -- Network Security II -- Lightweight Opportunistic Tunneling (LOT) -- Hide and Seek in Time ? Robust Covert Timing Channels -- Authentic Time-Stamps for Archival Storage -- Towards a Theory of Accountability and Audit -- Reliable Evidence: Auditability by Typing -- PCAL: Language Support for Proof-Carrying Authorization Systems -- Network Security III -- ReFormat: Automatic Reverse Engineering of Encrypted Messages -- Protocol Normalization Using Attribute Grammars -- Automatically Generating Models for Botnet Detection -- Dynamic Enforcement of Abstract Separation of Duty Constraints -- Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging -- Requirements and Protocols for Inference-Proof Interactions in Information Systems -- A Privacy Preservation Model for Facebook-Style Social Network Systems -- New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing -- Secure Pseudonymous Channels -- Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing -- Content Delivery Networks: Protection or Threat? -- Model-Checking DoS Amplification for VoIP Session Initiation -- The Wisdom of Crowds: Attacks and Optimal Constructions -- Secure Evaluation of Private Linear Branching Programs with Medical Applications -- Keep a Few: Outsourcing Data While Maintaining Confidentiality -- Data Structures with Unpredictable Timing -- WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance -- Corruption-Localizing Hashing -- Isolating JavaScript with Filters, Rewriting, and Wrappers -- An Effective Method for Combating Malicious Scripts Clickbots -- Client-Side Detection of XSS Worms by Monitoring Payload Propagation -- Formal Indistinguishability Extended to the Random Oracle Model -- Computationally Sound Analysis of a Probabilistic Contract Signing Protocol -- Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption -- A Generic Security API for Symmetric Key Management on Cryptographic Devices -- ID-Based Secure Distance Bounding and Localization -- Secure Ownership and Ownership Transfer in RFID Systems -- Cumulative Attestation Kernels for Embedded Systems -- Super-Efficient Aggregating History-Independent Persistent Authenticated Dictionaries -- Set Covering Problems in Role-Based Access Control. 330 $aThis book constitutes the proceedings of the 14th European Symposium on Research in Computer Security, ESORICS 2009, held in Saint-Malo, France, in September 2009. The 42 papers included in the book were carefully reviewed and selected from 220 papers. The topics covered are network security, information flow, language based security, access control, privacy, distributed systems security, security primitives, web security, cryptography, protocols, and systems security and forensics. 410 0$aLecture notes in computer science ;$v5789. 606 $aComputer security$vCongresses 606 $aComputers$xAccess control$vCongresses 615 0$aComputer security 615 0$aComputers$xAccess control 676 $a005.822gerDNB 701 $aBackes$b Michael$01757187 701 $aNing$b Peng$0925149 712 12$aEuropean Symposium on Research in Computer Security 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483357103321 996 $aComputer security - ESORICS 2009$94194958 997 $aUNINA LEADER 03300nam 22006734a 450 001 9910970470603321 005 20240812221409.0 010 $a1-107-08454-7 010 $a1-107-11226-5 010 $a0-511-32813-3 010 $a0-511-15389-9 010 $a0-511-79052-X 010 $a0-511-17421-7 010 $a0-521-45351-8 010 $a9786610416769 010 $a1-280-41676-9 010 $a0-511-05285-5 035 $a(CKB)111056485624622 035 $a(EBL)202388 035 $a(OCoLC)437063529 035 $a(SSID)ssj0000262132 035 $a(PQKBManifestationID)11203457 035 $a(PQKBTitleCode)TC0000262132 035 $a(PQKBWorkID)10269559 035 $a(PQKB)10620521 035 $a(UkCbUP)CR9780511790522 035 $a(MiAaPQ)EBC202388 035 $a(Au-PeEL)EBL202388 035 $a(CaPaEBR)ebr10001848 035 $a(CaONFJC)MIL41676 035 $a(PPN)261338560 035 $a(EXLCZ)99111056485624622 100 $a19990414d2000 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aTrees $etheir natural history /$fPeter Thomas 205 $a1st ed. 210 $aCambridge, U.K. ;$aNew York $cCambridge University Press$d2000 215 $a1 online resource (ix, 289 pages) $cdigital, PDF file(s) 300 $aTitle from publisher's bibliographic system (viewed on 05 Oct 2015). 311 08$a0-521-45963-X 311 08$a0-511-01789-8 320 $aIncludes bibliographical references (p. 269-270). 327 $aCover; Half-title; Title; Copyright; Contents; Preface; Chapter 1: An overview; Chapter 2: Leaves: the food producers; Chapter 3: Trunk and branches: more than a connecting drainpipe; Chapter 4: Roots: the hidden tree; Chapter 5: Towards the next generation: flowers, fruits and seeds; Chapter 6: The growing tree; Chapter 7: The shape of trees; Chapter 8: The next generation: new trees from old; Chapter 9: Health, damage and death: living in a hostile world; Further reading; Index 330 $aTrees are familiar components of many landscapes, vital to the healthy functioning of the global ecosystem and unparalled in the range of materials which they provide for human use. Yet how much do we really understand about how they work? This 2000 book provides a comprehensive introduction to the natural history of trees, presenting information on all aspects of tree biology and ecology in an easy to read and concise text. Fascinating insights into the workings of these everyday plants are uncovered throughout the book, with questions such as how are trees designed, how do they grow and reproduce, and why do they eventually die tackled in an illuminating way. Written for a non-technical audience, the book is nonetheless rigorous in its treatment and will therefore provide a valuable source of reference for beginning students as well as those with a less formal interest in this fascinating group of plants. 606 $aTrees 615 0$aTrees. 676 $a582.16 700 $aThomas$b Peter A.$f1957-$01820245 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910970470603321 996 $aTrees$94382101 997 $aUNINA LEADER 05278nam 2200913 a 450 001 9910954828503321 005 20251001182326.0 010 $a0-309-21575-7 010 $a1-283-37632-6 010 $a9786613376329 010 $a0-309-21573-0 035 $a(CKB)2550000000075340 035 $a(EBL)3378904 035 $a(SSID)ssj0000595469 035 $a(PQKBManifestationID)11334434 035 $a(PQKBTitleCode)TC0000595469 035 $a(PQKBWorkID)10556160 035 $a(PQKB)10549390 035 $a(MiAaPQ)EBC3378904 035 $a(Au-PeEL)EBL3378904 035 $a(CaPaEBR)ebr10520713 035 $a(CaONFJC)MIL337632 035 $a(OCoLC)923284731 035 $a(EXLCZ)992550000000075340 100 $a20120114d2011 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 10$aImproving health literacy within a state $eworkshop summary /$fMaria Hewitt, rapporteur ; Institute of Medicine of the National Academies 205 $a1st ed. 210 $aWashington, D.C. $cNational Academies Press$d2011 215 $a1 online resource (114 pages) 300 $a"Roundtable on Health Literacy, Board on Population Health and Public Health Practice." 311 08$a0-309-21572-2 311 08$aPrint version: Hewitt, Maria. Improving Health Literacy Within a State : Workshop Summary. Washington : National Academies Press, ©1900 9780309215725 320 $aIncludes bibliographical references. 327 $a""Front Matter""; ""Reviewers""; ""Acknowledgments""; ""Contents""; ""Tables, Figures, and Boxes""; ""1 Introduction""; ""2 Keynote Address""; ""3 State-Based Models to Improve Health Literacy""; ""4 The Role of the University in Improving States Health Literacy""; ""5 Improving Health Literacy at the Community Level""; ""6 Closing Remarks""; ""References""; ""Appendix A: Acronyms""; ""Appendix B: Workshop Agenda""; ""Appendix C: Workshop Speaker Biosketches"" 330 $a"Health literacy is the degree to which individuals can obtain, process, and understand the basic health information and services they need to make appropriate health decisions. According to Health Literacy: A Prescription to End Confusion (IOM, 2004), nearly half of all American adults--90 million people--have inadequate health literacy to navigate the healthcare system. To address issues raised in that report, the Institute of Medicine convened the Roundtable on Health Literacy, which brings together leaders from the federal government, foundations, health plans, associations, and private companies to discuss challenges facing health literacy practice and research and to identify approaches to promote health literacy in both the public and private sectors. On November 30, 2010, the roundtable cosponsored a workshop with the University of California, Los Angeles (UCLA), Anderson School of Management in Los Angeles. Improving Health Literacy Within a State serves as a summary of what occurred at the workshop. The workshop focused on understanding what works to improve health literacy across a state, including how various stakeholders have a role in improving health literacy. The focus of the workshop was on presentations and discussions that address (1) the clinical impacts of health literacy improvement approaches; (2) economic outcomes of health literacy implementation; and (3) how various stakeholders can affect health literacy"--Publisher's description. 606 $aHealth education$zUnited States$vCongresses 606 $aPatient education$zUnited States$vCongresses 606 $aCommunication in medicine$zUnited States 606 $aTelecommunication in medicine$zUnited States 606 $aTelecommunication in medicine 606 $aConsumer Health Information$3(DNLM)D054626 606 $aCommunication Barriers$3(DNLM)D003144 606 $aEducational Status$3(DNLM)D004522 606 $aHealth Education$xmethods$3(DNLM)D006266Q000379 606 $aHealth Education$xstandards$3(DNLM)D006266Q000592 606 $aTelemedicine$3(DNLM)D017216 606 $aRemote Consultation$3(DNLM)D019144 607 $aUnited States 608 $aCongress 615 0$aHealth education 615 0$aPatient education 615 0$aCommunication in medicine 615 0$aTelecommunication in medicine 615 0$aTelecommunication in medicine. 615 12$aConsumer Health Information 615 22$aCommunication Barriers 615 22$aEducational Status 615 22$aHealth Education$xmethods 615 22$aHealth Education$xstandards 615 22$aTelemedicine 615 2$aRemote Consultation 676 $a613.0712 701 $aHewitt$b Maria$01472895 712 02$aInstitute of Medicine (U.S.) 712 02$aInstitute of Medicine (U.S.).$bRoundtable on Health Literacy. 712 02$aInstitute of Medicine (U.S.).$bBoard on Population Health and Public Health Practice. 712 12$aUnderstanding what works in health literacy across a State: A Workshop$f(2010 :$eLos Angeles, CA). 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910954828503321 996 $aImproving health literacy within a state$94435659 997 $aUNINA LEADER 00900nam 2200277 450 001 996672181503316 005 20250831201927.0 100 $a20250826d1987----km y0itay5003 ba 101 0 $aita 102 $aIT 105 $ay 00 y 200 1 $a<> vittima e il popolo di Dio$ela spiritualità teocentrica del Servo di Dio Francesco Saverio Petagna e l'incontro con Melania, Pastorella di La Salette$fPaolo Pisacane 210 $aSalerno$c[s.n.]$d1987 215 $a220 p.$cill.$d21 cm 225 2 $aStudi e ricerche$v4 410 0$12001$aStudi e ricerche$v4 600 0 $aPetagna,$bFrancesco Saverio$xSpiritualità$2BNCF 676 $a282.092 700 1$aPISACANE,$bPaolo$0620376 801 0$aIT$bcba$gREICAT 912 $a996672181503316 951 $aXVI.7.E. 587$bFBUO$cXVI.7.E. 959 $aBK 969 $aFBUO 996 $aVittima e il popolo di Dio$94423305 997 $aUNISA