LEADER 01921nam--2200457---450- 001 990001607860203316 005 20090610143546.0 010 $a88-387-2416-4 035 $a000160786 035 $aUSA01000160786 035 $a(ALEPH)000160786USA01 035 $a000160786 100 $a20040427d2003----km-y0enga50------ba 101 0 $aita 102 $aIT 105 $ay|||z|||001yy 200 1 $aDenuncia di inizio attivitą e relazione asseverata$eguida pratica con normativa, giurisprudenza e moduli operativi$fAntonino Cimellaro, Emanuele Montini 205 $a2. ed. aggiornata con: modifica al titolo 5. della Costituzione, legge 21 dicembre 2001, n.443, legge 1. agosto 2002, n.166, testo Unico dell'edilizia modificato dal d.lgs. 27 dicembre 2002, n.301 e d.l. 24 giugno 2003, n.147 210 $aRimini$cMaggioli$d2003 215 $a258 p.$d24 cm$eCD-ROM 225 2 $aEdilizia & Urbanistica$v257 300 $aCon CD-ROM contenente: Moduli operativi per la procedura di inizio attivitą, il procedimento sanzionatorio, il contenzioso amministrativo, schemi di relazioni asseverate 410 0$12001$aEdilizia & Urbanistica$v146 606 0 $aConcessione edilizia 676 $a346.450045 700 1$aCIMELLARO,$bAntonino$0258923 701 1$aMONTINI,$bEmanuele$0297553 801 0$aIT$bsalbc$gISBD 912 $a990001607860203316 951 $aXXIV.3.P 130 (IG V 650 A)$b39750 G.$cXXIV.3.P 130 (IG V)$d00132119 959 $aBK 969 $aGIU 979 $aMARIA$b10$c20040427$lUSA01$h1326 979 $aRENATO$b90$c20040610$lUSA01$h1237 979 $aRENATO$b90$c20040610$lUSA01$h1237 979 $aRENATO$b90$c20040610$lUSA01$h1239 979 $aFIORELLA$b90$c20070601$lUSA01$h1236 979 $aRSIAV5$b90$c20090610$lUSA01$h1435 979 $aFIORELLA$b90$c20120201$lUSA01$h1452 996 $aDenuncia di inizio attivitą e relazione asseverata$9744260 997 $aUNISA LEADER 03673nam 2200601 450 001 9910784270503321 005 20230125201326.0 010 $a1-59693-051-9 035 $a(CKB)1000000000339662 035 $a(EBL)286933 035 $a(OCoLC)437176655 035 $a(SSID)ssj0000264796 035 $a(PQKBManifestationID)11201015 035 $a(PQKBTitleCode)TC0000264796 035 $a(PQKBWorkID)10291229 035 $a(PQKB)10838022 035 $a(Au-PeEL)EBL286933 035 $a(CaPaEBR)ebr10160961 035 $a(CaBNVSL)mat09101010 035 $a(IEEE)9101010 035 $a(MiAaPQ)EBC286933 035 $a(EXLCZ)991000000000339662 100 $a20200729d2006 uy 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aUnderstanding Voice over IP security /$fAlan B. Johnston, David M. Piscitello 210 1$aBoston, Massachusetts :$cArtech House,$d©2006. 210 2$a[Piscataqay, New Jersey] :$cIEEE Xplore,$d[2006] 215 $a1 online resource (285 p.) 225 1 $aArtech House telecommunications library 300 $aDescription based upon print version of record. 311 $a1-59693-050-0 320 $aIncludes bibliographical references and index. 327 $aUnderstanding Voice over IP Security; Contents; Foreword; Acknowledgments; 1 Introduction 1; 2 Basic Security Concepts: Cryptography 7; 3 VoIP Systems 29; 4 Internet Threats and Attacks 51; 5 Internet Security Architectures 73; 6 Security Protocols 101; 7 General Client and Server Security Principles 121; 8 Authentication 135; 9 Signaling Security 145; 10 Media Security 163; 11 Identity 193; 12 PSTN Gateway Security 225; 13 Spam and Spit 237; 14 Conclusions 247; Index 253; Recent Titles in the Artech House Telecommunications Library 330 3 $aThis authoritative and practical book offers a current and comprehensive understanding of VoIP (Voice over IP) security. You learn how to design and implement secure VoIP networks and services, and how to integrate VoIP securely in existing data networks. You discover how emerging IETF SIP and media security standards will affect future VoIP deployment, and how end-to-end encryption may be deployed to eventually protect all VoIP calls. The book explains Internet security basics, attack types and methods, and details all the key security aspects of a data and VoIP systems and networks, including identity, authentication, signaling, and media encryption. This practical resource discusses security architectures of perimeter vs. end-to-end security in terms of VoIP systems. You also find security approaches and architectures in related applications, such as the World Wide Web, Secure Shell, and the PSTN. A chapter on client and server security discusses general security of Internet hosts in a VoIP system. What's more, the book presents current techniques to combat spam and covers the future problems of spim (spam over instant messaging) and spit (spam over internet telephony).$cPublisher abstract. 410 0$aArtech House telecommunications library. 606 $aInternet telephony$xSecurity measures 606 $aTCP/IP (Computer network protocol)$xSecurity measures 615 0$aInternet telephony$xSecurity measures. 615 0$aTCP/IP (Computer network protocol)$xSecurity measures. 676 $a005.8 700 $aJohnston$b Alan B.$0523308 701 $aPiscitello$b David M$01546083 801 0$bCaBNVSL 801 1$bCaBNVSL 801 2$bCaBNVSL 906 $aBOOK 912 $a9910784270503321 996 $aUnderstanding Voice over IP security$93801427 997 $aUNINA