LEADER 01655nam 2200433 a 450 001 9910146150803321 005 20230828231037.0 010 $a88-87298-45-9 035 $a(CKB)1000000000280208 035 $a(NjP)3988775 035 $a(MH)009290800-4 035 $a(EXLCZ)991000000000280208 100 $a20031006d2002 uy 0 101 0 $aita 200 12$aL'antiretorica dei valori $esaggi sulla cultura italiana del primo Novecento /$fMirella Pasini, Daniele Rolando$b[electronic resource] 210 $aGenova $cName$dc2002 215 $a1 online resource (266 p. ) 225 1 $aFilosofia ;$v2 320 $aIncludes bibliographical references and index. 410 0$aFilosofia (Name (Firm)) ;$v2. 517 $aAntiretorica dei valori 517 $aL'antiretorica dei valori 517 $aL'antiretorica dei valori : saggi sulla cultura italiana del primo Novecento 517 $aL?antiretorica dei valori 606 $aEthics$zItaly 606 $aPhilosophy, Italian$y19th century 606 $aPhilosophy, Italian$y20th century 615 0$aEthics 615 0$aPhilosophy, Italian 615 0$aPhilosophy, Italian 700 $aPasini$b Mirella$0525980 701 $aRolando$b Daniele$01021909 801 0$bItFiC 801 1$bItFiC 906 $aBOOK 912 $a9910146150803321 996 $aL'antiretorica dei valori$92427013 997 $aUNINA 999 $aThis Record contains information from the Harvard Library Bibliographic Dataset, which is provided by the Harvard Library under its Bibliographic Dataset Use Terms and includes data made available by, among others the Library of Congress LEADER 01732nam 2200409Ka 450 001 9910698969703321 005 20090624084756.0 035 $a(CKB)5470000002398177 035 $a(OCoLC)407023142 035 $a(EXLCZ)995470000002398177 100 $a20090624d2009 ua 0 101 0 $aeng 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation security training requirements$b[electronic resource] $ea role-and performance-based model (draft) : recommendations of the National Institute of Standards and Technology /$fMark Wilson, Kevin Stine, Pauline Bowen 205 $aRev. 1, Draft. 210 1$aGaithersburg, MD :$cU.S. Dept. of Commerce, National Institute of Standards and Technology,$d[2009] 215 $aviii, 48, A-1-C-12 pages $cdigital, PDF file 225 1 $aNIST special publication ;$v800-16.$aInformation security 300 $aTitle from title screen (viewed on June 23, 2009). 300 $a"March, 2009." 517 $aInformation security training requirements 606 $aData protection$xStudy and teaching$xGovernment policy$zUnited States 606 $aComputer security$xStudy and teaching$xGovernment policy$zUnited States 615 0$aData protection$xStudy and teaching$xGovernment policy 615 0$aComputer security$xStudy and teaching$xGovernment policy 700 $aWilson$b Mark$0437776 701 $aStine$b Kevin$01391687 701 $aBowen$b Pauline$01351624 712 02$aNational Institute of Standards and Technology (U.S.) 801 0$bGPO 801 1$bGPO 906 $aBOOK 912 $a9910698969703321 996 $aInformation security training requirements$93445655 997 $aUNINA LEADER 00631ojm 2200229z- 450 001 9910155744203321 005 20230913112557.0 010 $a1-5124-4638-6 035 $a(CKB)3710000000976095 035 $a(BIP)058891951 035 $a(EXLCZ)993710000000976095 100 $a20231107c2017uuuu -u- - 101 0 $aeng 200 10$aCross-Pollination 210 $cLerner 215 $a1 online resource (24 p.) 330 8 $ahttps://ebooks.lernerbooks.com/reader/9781467762243 700 $aBoothroyd$b Jennifer$01435213 906 $aAUDIO 912 $a9910155744203321 996 $aCross-Pollination$93594654 997 $aUNINA