LEADER 02448nlm0 22006611i 450 001 990009257880403321 010 $a9783540886259 035 $a000925788 035 $aFED01000925788 035 $a(Aleph)000925788FED01 035 $a000925788 100 $a20100926d2008----km-y0itay50------ba 101 0 $aeng 102 $aDE 135 $adrnn-008mamaa 200 1 $aInformation and Communications Security$bRisorsa elettronica$e10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008 Proceedings$fedited by David Hutchison, Takeo Kanade, Josef Kittler, Jon M. Kleinberg, Friedemann Mattern, John C. Mitchell, Moni Naor, Oscar Nierstrasz, C. Pandu Rangan, Bernhard Steffen, Madhu Sudan, Demetri Terzopoulos, Doug Tygar, Moshe Y. Vardi, Gerhard Weikum, Liqun Chen, Mark D. Ryan, Guilin Wang 210 $aBerlin ; Heidelberg$cSpringer$d2008 225 1 $aLecture Notes in Computer Science$x0302-9743$v5308 230 $aDocumento elettronico 336 $aTesto 337 $aFormato html, pdf 702 1$aChen,$bLiqun 702 1$aHutchison,$bDavid 702 1$aKanade,$bTakeo 702 1$aKittler,$bJosef 702 1$aKleinberg,$bJon M. 702 1$aMattern,$bFriedemann 702 1$aMitchell,$bJohn C. 702 1$aNaor,$bMoni 702 1$aNierstrasz,$bOscar 702 1$aPandu Rangan,$bC. 702 1$aRyan,$bMark D. 702 1$aSteffen,$bBernhard 702 1$aSudan,$bMadhu 702 1$aTerzopoulos,$bDemetri 702 1$aTygar,$bDoug 702 1$aVardi,$bMoshe Y. 702 1$aWang,$bGuilin 702 1$aWeikum,$bGerhard 801 0$aIT$bUNINA$gREICAT$2UNIMARC 856 4 $zFull text per gli utenti Federico II$uhttp://dx.doi.org/10.1007/978-3-540-88625-9 901 $aEB 912 $a990009257880403321 961 $aAlgorithm Analysis and Problem Complexity 961 $aCoding and Information Theory 961 $aCoding theory 961 $aComputer Communication Networks 961 $aComputer Communication Networks 961 $aComputer Science 961 $aComputer software 961 $aData Encryption 961 $aData encryption (Computer science) 961 $aData protection 961 $aData structures (Computer science) 961 $aData Structures, Cryptology and Information Theory 961 $aSystems and Data Security 996 $aInformation and Communications Security$9771899 997 $aUNINA LEADER 02075oam 2200601I 450 001 9910777390403321 005 20230207223319.0 010 $a1-134-70472-0 010 $a1-134-70473-9 010 $a1-280-32962-9 010 $a9780203270487 010 $a0-203-27048-7 010 $a0-203-13105-3 024 7 $a10.4324/9780203131053 035 $a(CKB)1000000000001018 035 $a(SSID)ssj0000277421 035 $a(PQKBManifestationID)11253988 035 $a(PQKBTitleCode)TC0000277421 035 $a(PQKBWorkID)10240915 035 $a(PQKB)10582700 035 $a(MiAaPQ)EBC165854 035 $a(Au-PeEL)EBL165854 035 $a(CaPaEBR)ebr5004193 035 $a(CaONFJC)MIL32962 035 $a(OCoLC)50758936 035 $a(EXLCZ)991000000000001018 100 $a20180331d1997 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 14$aThe book of hiding $egender, ethnicity, annihilation, and Esther /$fTimothy K. Beal 210 1$aLondon ;$aNew York :$cRoutledge,$d1997. 215 $axiii, 152 p 225 1 $aBiblical limits 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a0-415-16779-5 311 $a0-415-16780-9 320 $aIncludes bibliographical references (p. 141-148) and index. 327 $achapter INTRODUCTION -- Dislocating Beginnings -- chapter 1 WRITING OUT, I -- chapter 2 PALIMPSEST -- chapter 3 THE BIBLE AS MORAL LITERATURE -- chapter 4 WRITING OUT, II -- chapter 5 FINDING ONESELF SIGNED UP -- chapter 6 INSOMNIA AND A LOST DREAM OF WRITING -- chapter 7 SUBVERSIVE EXCESSES -- chapter 8 COMING OUT. 410 0$aBiblical limits. 606 $aGroup identity$xBiblical teaching 615 0$aGroup identity$xBiblical teaching. 676 $a222/.906 700 $aBeal$b Timothy K$g(Timothy Kandler),$f1963,$01561928 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910777390403321 996 $aThe book of hiding$93829068 997 $aUNINA