LEADER 00917nam a22002411i 4500 001 991002052389707536 005 20040121095956.0 008 040407s1961 it a||||||||||||||||ita 035 $ab12863543-39ule_inst 035 $aARCHE-084316$9ExL 040 $aDip.to Scienze Storiche$bita$cA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l. 082 04$a759.5 100 1 $aVerani, Cesare$0484363 245 13$aUn pittore finora sconosciuto :$bAlfano da Rieti /$cCesare Verani 260 $aRieti :$bTip. Nobili,$c1961 300 $a1 v. :$bill. ;$c25 cm 600 04$aAlfano :$cda Rieti 907 $a.b12863543$b02-04-14$c16-04-04 912 $a991002052389707536 945 $aLE009 ARTE MISC. 54/7 (Fondo Bottari)$g1$iLE009-3529/7$lle009$o-$pE0.00$q-$rn$so $t0$u0$v0$w0$x0$y.i13424130$z16-04-04 996 $aPittore finora sconosciuto$9302746 997 $aUNISALENTO 998 $ale009$b16-04-04$cm$da $e-$fita$git $h3$i1 LEADER 02444nam 22005655 450 001 9910741148403321 005 20230812172011.0 010 $a3-031-39828-9 024 7 $a10.1007/978-3-031-39828-5 035 $a(MiAaPQ)EBC30685233 035 $a(Au-PeEL)EBL30685233 035 $a(DE-He213)978-3-031-39828-5 035 $a(PPN)272260002 035 $a(CKB)27972952500041 035 $a(EXLCZ)9927972952500041 100 $a20230812d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aNetwork and System Security $e17th International Conference, NSS 2023, Canterbury, UK, August 14?16, 2023, Proceedings /$fedited by Shujun Li, Mark Manulis, Atsuko Miyaji 205 $a1st ed. 2023. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2023. 215 $a1 online resource (404 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v13983 311 08$aPrint version: Li, Shujun Network and System Security Cham : Springer,c2023 9783031398278 327 $aAttacks and Malware -- Blockchain -- Cryptography and Privacy -- Machine Learning -- Security through Hardware -- Security in the Wild. . 330 $aThis book constitutes the refereed proceedings of the 17th International Conference on Network and System Security, NSS 2023, held in Canterbury, UK, August 14?16, 2023. The 12 full and 9 short papers presented together with 2 invited talks in this book were carefully reviewed and selected from 64 submissions. They focus on Attacks and Malware, Blockchain, Security through Hardware, Machine learning and much more. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v13983 606 $aComputer networks$xSecurity measures 606 $aData protection 606 $aMobile and Network Security 606 $aSecurity Services 615 0$aComputer networks$xSecurity measures. 615 0$aData protection. 615 14$aMobile and Network Security. 615 24$aSecurity Services. 676 $a005.8 676 $a005.8 700 $aLi$b Shujun$01059002 701 $aManulis$b Mark$01423747 701 $aMiyaji$b Atsuko$01354841 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910741148403321 996 $aNetwork and System Security$93552105 997 $aUNINA