LEADER 01585nam--2200445---450- 001 990001129530203316 005 20050715141659.0 010 $a88-06-05140-7 035 $a000112953 035 $aUSA01000112953 035 $a(ALEPH)000112953USA01 035 $a000112953 100 $a20030128d1968----km-y0enga50------ba 101 0 $aita 102 $aIT 200 1 $aCultura e rivoluzione industriale$eInghilterra 1780-1950$fRaymond Williams$g[traduzione di Maria Teresa Grendi] 210 $aTorino$cEinaudi$d1968 215 $a407 p.$d18 cm 225 2 $aPiccola biblioteca Einaudi$iGeografia. Storia$v102 410 0$12001$aPiccola biblioteca Einaudi$iGeografia. Storia$v102 454 1$12001$aCulture and society 1780-1950$914674 606 $aRivoluzione industriale$yGran Bretagna 607 $aGran Bretagna$xCultura$z1780-1950 676 $a306.0942 700 1$aWILLIAMS,$bRaymond$0309364 801 0$aIT$bsalbc$gISBD 912 $a990001129530203316 951 $aII.5. 3870(XV B 1068)$b165405 L.M.$cXV B$d00094606 951 $aII.5. 3870a(XV B 1068 BIS)$b165406 L.M.$cXV B$d00094611 951 $aII.5. 3870b(XV B 1068 A)$b165407 L.M.$cXV B$d00094627 959 $aBK 969 $aUMA 979 $aPATRY$b90$c20030128$lUSA01$h1148 979 $aRENATO$b90$c20030325$lUSA01$h1122 979 $aANGELA$b90$c20030327$lUSA01$h1048 979 $aANGELA$b90$c20030327$lUSA01$h1049 979 $aPATRY$b90$c20040406$lUSA01$h1718 979 $aCOPAT6$b90$c20050715$lUSA01$h1417 996 $aCulture and society 1780-1950$914674 997 $aUNISA LEADER 01572nam--2200493---450- 001 990001265690203316 005 20130607151041.0 010 $a978-88-07-53027-2 035 $a000126569 035 $aUSA01000126569 035 $a(ALEPH)000126569USA01 035 $a000126569 100 $a20031119d2013----km-y0itay50------ba 101 0 $aita 102 $aIT 105 $ay|||z|||001yy 200 1 $aDi tutto resta un poco$eletteratura e cinema$fAntonio Tabucchi$ga cura di Anna Dolfi 210 $aMilano$cFeltrinelli$d2013 215 $a300 p.$d22 cm 225 2 $a<> comete 300 $aScritti in parte già pubblicati 410 0$12001$a<> comete 676 $a858.914 700 1$aTABUCCHI,$bAntonio$0164112 702 1$aDOLFI,$bAnna 801 0$aIT$bsalbc$gISBD 912 $a990001265690203316 951 $aVI.3.F. 145$b8618 L.G.$cVI.3.F.$d00341416 959 $aBK 969 $aUMA 979 $aSIAV1$b10$c20031119$lUSA01$h1324 979 $aSIAV5$b10$c20040114$lUSA01$h1749 979 $aSIAV4$b10$c20040212$lUSA01$h1003 979 $aSIAV3$b10$c20040212$lUSA01$h1010 979 $aSIAV6$b10$c20040212$lUSA01$h1018 979 $aSIAV1$b10$c20040217$lUSA01$h1202 979 $aSIAV7$b10$c20040218$lUSA01$h1654 979 $aSIAV7$b10$c20040218$lUSA01$h1655 979 $aSIAV6$b10$c20040318$lUSA01$h1214 979 $aSIAV6$b10$c20040324$lUSA01$h1031 979 $aPATRY$b90$c20040406$lUSA01$h1730 979 $aANNAMARIA$b90$c20130607$lUSA01$h1510 996 $aDi tutto resta un poco$9987075 997 $aUNISA LEADER 03568nam 22006135 450 001 9910746294103321 005 20251009082055.0 010 $a9789819950805 010 $a9819950805 024 7 $a10.1007/978-981-99-5080-5 035 $a(CKB)28270017000041 035 $a(MiAaPQ)EBC30749682 035 $a(Au-PeEL)EBL30749682 035 $a(OCoLC)1398569592 035 $a(DE-He213)978-981-99-5080-5 035 $a(EXLCZ)9928270017000041 100 $a20230919d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCybersecurity and Evolutionary Data Engineering $eSelect Proceedings of the 2nd International Conference, ICCEDE 2022 /$fedited by Raj Jain, Carlos M. Travieso, Sanjeev Kumar 205 $a1st ed. 2023. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2023. 215 $a1 online resource (377 pages) 225 1 $aLecture Notes in Electrical Engineering,$x1876-1119 ;$v1073 311 08$a9789819950799 327 $aCurrent Status of Challenges in Data Security: A Review -- Cyber Bullying: The growing menace in cyber space with its challenges and solutions -- Hybrid Feature Extraction for Analysis of Network System Security - IDS -- Stranger Trust Architecture: An advancement to Zero Trust Architecture -- Genetic algorithm optimized SVM for DoS Attack Detection in VANETs -- Digital and IoT forensic: Recent trends, methods and challenges -- Cloud Based Occlusion Aware Intrusion Detection System -- Comparative Analysis of Web Application based Encryption Methods -- Linking of Ontologies for Composition of Semantic Web Services using Knowledge Graph -- Fake image dataset generation of Sign Language using GAN -- Analysis of Multimodal Biometric System based on ECG Biometrics -- Performance Analysis of Nature Inspired Optimization based Watermarking Schemes. 330 $aThis book comprises the select proceedings of the 2nd International Conference on Cybersecurity and Evolutionary Data Engineering (ICCEDE 2022). The contents highlight cybersecurity and digital forensics, evolutionary data engineering, and data management for secure contemporary applications. It includes papers on data models, semantics, query language; AI-driven industrial automation, ERP, CRM data security; authentication and access control; cyberspace structure and models; and drone large data filtration, cleansing, and security, among others. This book is of immense interest to researchers in academia and industry working in the fields of electronics and data engineering. 410 0$aLecture Notes in Electrical Engineering,$x1876-1119 ;$v1073 606 $aData protection 606 $aEngineering$xData processing 606 $aCooperating objects (Computer systems) 606 $aData and Information Security 606 $aData Engineering 606 $aCyber-Physical Systems 615 0$aData protection. 615 0$aEngineering$xData processing. 615 0$aCooperating objects (Computer systems) 615 14$aData and Information Security. 615 24$aData Engineering. 615 24$aCyber-Physical Systems. 676 $a005.8 700 $aJain$b Raj$0714720 701 $aTravieso$b Carlos M$01429384 701 $aSanjeev Kumar$01863443 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910746294103321 996 $aCybersecurity and Evolutionary Data Engineering$94492967 997 $aUNINA