LEADER 00915nam0 22002411i 450 001 UON00178915 005 20250528084701.628 100 $a20030730d1982 |0itac50 ba 101 $aita 102 $aIT 105 $a|||| 1|||| 200 1 $aDizionario di economia politica$eVol 3: Investimento, di Anna Carabelli - Occupazione, di Vittorio Valli 210 $aTorino$cBoringhieri$d1982 215 $a183 p.$d22 cm 606 $aEconomia politica$xDizionari$3UONC035356$2FI 702 1$aCarabelli$bAnna$3UONV100856 702 1$aValli$bVittorio$3UONV100128 801 $aIT$bSOL$c20250704$gRICA 899 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$2UONSI 912 $aUON00178915 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$dSI A 0006/III $eSI SC 13389 7 0006/III 996 $aDizionario di economia politica$9370156 997 $aUNIOR LEADER 03472nam 22008175 450 001 9910483525403321 005 20251226204216.0 010 $a3-319-12601-6 024 7 $a10.1007/978-3-319-12601-2 035 $a(CKB)3710000000269708 035 $a(SSID)ssj0001372585 035 $a(PQKBManifestationID)11881975 035 $a(PQKBTitleCode)TC0001372585 035 $a(PQKBWorkID)11304521 035 $a(PQKB)10371987 035 $a(DE-He213)978-3-319-12601-2 035 $a(MiAaPQ)EBC6301695 035 $a(MiAaPQ)EBC5586335 035 $a(Au-PeEL)EBL5586335 035 $a(OCoLC)893106157 035 $a(PPN)182097951 035 $a(EXLCZ)993710000000269708 100 $a20141003d2014 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aDecision and Game Theory for Security $e5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014, Proceedings /$fedited by Radha Poovendran, Walid Saad 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (XII, 381 p. 83 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v8840 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-319-12600-8 330 $aThis book constitutes the refereed proceedings of the 5th International Conference on Decision and Game Theory for Security, GameSec 2014, held in Los Angeles, CA, USA, in November 2014. The 16 revised full papers presented together with 7 short papers were carefully reviewed and selected from numerous submissions. The covered topics cover multiple facets of cyber security that include: rationality of adversary, game-theoretic cryptographic techniques, vulnerability discovery and assessment, multi-goal security analysis, secure computation, economic-oriented security, and surveillance for security. Those aspects are covered in a multitude of domains that include networked systems, wireless communications, border patrol security, and control systems. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v8840 606 $aApplication software 606 $aComputer networks 606 $aData protection 606 $aAlgorithms 606 $aElectronic data processing$xManagement 606 $aGame theory 606 $aComputer and Information Systems Applications 606 $aComputer Communication Networks 606 $aData and Information Security 606 $aAlgorithms 606 $aIT Operations 606 $aGame Theory 615 0$aApplication software. 615 0$aComputer networks. 615 0$aData protection. 615 0$aAlgorithms. 615 0$aElectronic data processing$xManagement. 615 0$aGame theory. 615 14$aComputer and Information Systems Applications. 615 24$aComputer Communication Networks. 615 24$aData and Information Security. 615 24$aAlgorithms. 615 24$aIT Operations. 615 24$aGame Theory. 676 $a005.8 702 $aPoovendran$b Radha$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSaad$b Walid$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483525403321 996 $aDecision and Game Theory for Security$93032452 997 $aUNINA