LEADER 01001nam--2200361---450- 001 990003681350203316 005 20120727123742.0 010 $a978-0-521-76044-7 035 $a000368135 035 $aUSA01000368135 035 $a(ALEPH)000368135USA01 035 $a000368135 100 $a20120727d2011----km-y0itay50------ba 101 $aeng 102 $aGB 105 $a||||||||001yy 200 1 $aPolis and revolution$eresponding to oligarchy in classical Athens$fJulia L. Shear 210 $aCambridge$cCambridge University$d2011 215 $aXV,368 p.$d24 cm 410 0$12001 454 1$12001 461 1$1001-------$12001 606 0 $aAtene$xPolitica$zSec. 5.-4. a.C.$2BNCF 676 $a938.505 700 1$aSHEAR,$bJulia L.$0612726 801 0$aIT$bsalbc$gISBD 912 $a990003681350203316 951 $aHPG 419$b1045 DIPSUM 959 $aBK 969 $aDSA 979 $aDSA$b90$c20120727$lUSA01$h1237 996 $aPolis and revolution$91140630 997 $aUNISA LEADER 01650nam 2200397 n 450 001 996391170503316 005 20221108065738.0 035 $a(CKB)1000000000659706 035 $a(EEBO)2240925356 035 $a(UnM)99854343 035 $a(EXLCZ)991000000000659706 100 $a19920721d1631 uy | 101 0 $alat 135 $aurbn||||a|bb| 200 00$aPeregrini, id est, vt vulgo perhibetur, Vincentii Lirinensis, Adversus prophanas hæreses, commonitoria duo$b[electronic resource] 205 $aEditio repurgata, cæteris purior & emendatior.$bHuic adijcitur Augustini Liber de hæresibus. 210 $aOxoniæ $cExcudebat G[uilielmus] T[urner] Academiæ celeberrimæ typographus, impensis Guilielmi Webb$d1631 215 $a[12], 274, [2] p 300 $aPrinter's name from STC. 300 $aTitle page in red and black. 300 $aThe first leaf is blank except for signature-mark "A"; the second leaf is blank. 300 $aWith a final errata leaf. 300 $aReproduction of the original in the University of Illinois (Urbana-Champaign Campus). Library. 330 $aeebo-0167 606 $aHeresies, Christian$vControversial literature$vEarly works to 1800 615 0$aHeresies, Christian 700 $aVincent$cof Le?rins, Saint,$fd. ca. 450.$0500245 702 $aAugustine$cSaint, Bishop of Hippo.$4aut 801 0$bCu-RivES 801 1$bCu-RivES 801 2$bCStRLIN 801 2$bWaOLN 906 $aBOOK 912 $a996391170503316 996 $aPeregrini, id est, vt vulgo perhibetur, Vincentii Lirinensis, Adversus prophanas hæreses, commonitoria duo$92357523 997 $aUNISA LEADER 03645nam 22008175 450 001 9910590068903321 005 20250812053214.0 010 $a9783031157776 010 $a303115777X 024 7 $a10.1007/978-3-031-15777-6 035 $a(MiAaPQ)EBC7077207 035 $a(Au-PeEL)EBL7077207 035 $a(CKB)24739004900041 035 $a(DE-He213)978-3-031-15777-6 035 $a(PPN)264191560 035 $a(EXLCZ)9924739004900041 100 $a20220823d2022 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation and Communications Security $e24th International Conference, ICICS 2022, Canterbury, UK, September 5?8, 2022, Proceedings /$fedited by Cristina Alcaraz, Liqun Chen, Shujun Li, Pierangela Samarati 205 $a1st ed. 2022. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2022. 215 $a1 online resource (649 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v13407 311 08$aPrint version: Alcaraz, Cristina Information and Communications Security Cham : Springer International Publishing AG,c2022 9783031157769 320 $aIncludes bibliographical references and index. 327 $aCryptography -- Authentication -- Privacy and Anonymity -- Attacks and Vulnerability Analysis -- Artificial Intelligence for Detection -- Network Security and Forensics. . 330 $aThis LNCS 13407 constitutes the refereed proceedings of the 24th International Conference on Information and Communications Security, ICICS 2022, held in Canterbury, UK,, in September 2022. The 34 revised full papers presented in the book were carefully selected from 150 submissions The papers are organized around the following topics: Cryptography, Authentication, Privacy and Anonymity, Attacks and Vulnerability Analysis, Artificial Intelligence for Detection, and Network Security and Forensics. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v13407 606 $aData structures (Computer science) 606 $aInformation theory 606 $aDatabase management 606 $aData mining 606 $aApplication software 606 $aImage processing$xDigital techniques 606 $aComputer vision 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData Structures and Information Theory 606 $aDatabase Management 606 $aData Mining and Knowledge Discovery 606 $aComputer and Information Systems Applications 606 $aComputer Imaging, Vision, Pattern Recognition and Graphics 606 $aCryptology 615 0$aData structures (Computer science) 615 0$aInformation theory. 615 0$aDatabase management. 615 0$aData mining. 615 0$aApplication software. 615 0$aImage processing$xDigital techniques. 615 0$aComputer vision. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 14$aData Structures and Information Theory. 615 24$aDatabase Management. 615 24$aData Mining and Knowledge Discovery. 615 24$aComputer and Information Systems Applications. 615 24$aComputer Imaging, Vision, Pattern Recognition and Graphics. 615 24$aCryptology. 676 $a005.8 702 $aAlcaraz$b Cristina 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910590068903321 996 $aInformation and Communications Security$9771899 997 $aUNINA