LEADER 00955nam0-2200325---450- 001 990009629060403321 005 20121009092412.0 010 $a88-430-3431-6 035 $a000962906 035 $aFED01000962906 035 $a(Aleph)000962906FED01 035 $a000962906 100 $a20121009d2005----km-y0itay50------ba 101 0 $aita 102 $aIT 105 $ay-------001yy 200 1 $aCritica e progetto$ele culture in Italia dagli anni Sessanta a oggi: studi in onore di Alberto Asor Rosa$fa cura di Lucinda Spera 210 $aRoma$cCarocci$d2005 215 $a127 p.$d22 cm 225 1 $aLingue e letterature Carocci$v50 610 0 $aAsor Rosa, Alberto 676 $a850.900914$v22$zita 702 1$aSpera,$bLucinda 801 0$aIT$bUNINA$gREICAT$2UNIMARC 901 $aBK 912 $a990009629060403321 952 $aCollez. 2214 (50)$b49685$fFSPBC 959 $aFSPBC 996 $aCritica e progetto$9351288 997 $aUNINA LEADER 01540oam 2200421 450 001 9910716796403321 005 20210802130710.0 035 $a(CKB)5470000002524207 035 $a(OCoLC)1262573140 035 $a(EXLCZ)995470000002524207 100 $a20210802d2021 ua 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyber threats in the pipeline $eusing lessons from the Colonial ransomware attack to defend critical infrastructure : hearing before the Committee on Homeland Security, House of Representatives, One Hundred Seventeenth Congress, first session, June 9, 2021 210 1$aWashington :$cU.S. Government Publishing Office,$d2021. 215 $a1 online resource (iii, 58 pages) 300 $a"Serial no. 117-15." 320 $aIncludes bibliographical reference. 517 $aCyber threats in the pipeline 606 $aPipelines$xProtection$zUnited States 606 $aMalware (Computer software)$zUnited States 606 $aExtortion$zUnited States 606 $aComputer security$xGovernment policy$zUnited States 608 $aLegislative hearings.$2lcgft 615 0$aPipelines$xProtection 615 0$aMalware (Computer software) 615 0$aExtortion 615 0$aComputer security$xGovernment policy 801 0$bGPO 801 1$bGPO 801 2$bGPO 906 $aBOOK 912 $a9910716796403321 996 $aCyber threats in the pipeline$93497973 997 $aUNINA