LEADER 00913nam0-22003371i-450- 001 990008040750403321 005 20080303103151.0 010 $a2-851-97-097-6 035 $a000804075 035 $aFED01000804075 035 $a(Aleph)000804075FED01 035 $a000804075 100 $a20050407d2004----km-y0itay50------ba 101 0 $afre 102 $aFR 105 $ay-------001yy 200 1 $aPaul Ricoeur$fce cahier a été dirigé par Myriam Revault d'Allonnes et François Azouvi 210 $aParis$cHerne$d2004 215 $a361 p.$d27 cm 225 1 $a<>Herne$v81 610 0 $aRicoeur, Paul 676 $a194 702 1$aAzouvi,$bFrançois 702 1$aRevault d'Allonnes,$bMyriam 801 0$aIT$bUNINA$c20050407$gRICA$2UNIMARC 901 $aBK 912 $a990008040750403321 952 $aP.1 FG 1243$fFLFBC 959 $aFLFBC 996 $aPaul Ricoeur$9755495 997 $aUNINA LEADER 02309aam 2200517I 450 001 9910711180603321 005 20151105023937.0 024 8 $aGOVPUB-C13-f623dab99d64b79b96e806c8f8b0fbb6 035 $a(CKB)5470000002480202 035 $a(OCoLC)927737216 035 $a(EXLCZ)995470000002480202 100 $a20151105d1992 ua 0 101 0 $aeng 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 12$aA guide to the selection of anti-virus tools and techniques /$fW. Timothy Polk, Lawrence E. Bassham III 210 1$aGaithersburg, MD :$cU.S. Dept. of Commerce, National Institute of Standards and Technology,$d1992. 215 $a1 online resource 225 1 $aNIST special publication ;$v800-5 300 $a1992. 300 $aContributed record: Metadata reviewed, not verified. Some fields updated by batch processes. 300 $aTitle from PDF title page. 300 $aWithdrawn. 320 $aIncludes bibliographical references. 330 3 $aComputer viruses continue to pose a threat to the integrity and availability of computer systems. This is especially true for users of personal computers. A variety of anti-virus tools are now available to help manage this threat. These tools use a wide range of techniques to detect, identify, and remove viruses. This guide provides criteria for judging the functionality, practicality, and convenience of anti-virus tools. It furnishes information which readers can use to determine which tools are best suited to target environments, but it does not weigh the merits of specific tools. 610 $aAvailability 610 $aChange detection 610 $aIntegrity 610 $aPersonal computer 610 $aPrecise identification 610 $aScanners 610 $aSystem monitor 610 $aVirus 610 $aVirus removal 700 $aPolk$b Tim$f1962-$01391024 701 $aBassham$b Lawrence E$01388740 701 $aPolk$b Tim$f1962-$01391024 712 02$aNational Institute of Standards and Technology (U.S.).$bComputer Security Division. 801 0$bNBS 801 1$bNBS 801 2$bGPO 906 $aBOOK 912 $a9910711180603321 996 $aA guide to the selection of anti-virus tools and techniques$93496256 997 $aUNINA LEADER 00829nam0-2200301 --450 001 9910777000503321 005 20240125144421.0 010 $a978-88-229-0858-2 020 $aIT$b2023-5864 100 $a20240125d2022----kmuy0itay5050 ba 101 0 $aita 102 $aIT 105 $a 001yy 200 1 $a<>chimico e l'ostrica$estudi su Primo Levi$fMario Barenghi 210 $aMacerata$cQuodlibet$d2022 215 $a200 p.$d22 cm 225 1 $aElements$v43 300 $aGià pubblicati 610 0 $aLevi, Primo <1919-1987> 676 $a853.914$v23 700 1$aBarenghi,$bMario$0168338 801 0$aIT$bUNINA$gREICAT$2UNIMARC 901 $aBK 912 $a9910777000503321 952 $a853.914 LEVIP/S 12$b2023/9673$fFLFBC 959 $aFLFBC 996 $aChimico e l'ostrica$93741648 997 $aUNINA