LEADER 01743nam a2200349 i 4500 001 991003436369707536 005 20020503192419.0 008 990614s1997 it ||| | ita 020 $a880800323X 035 $ab10505489-39ule_inst 035 $aEXGIL120794$9ExL 040 $aDip.to Filol. Ling. e Lett.$bita 082 0 $a808.066651 100 1 $aBruni, Francesco$068736 245 10$aManuale di scrittura professionale :$bdal curriculum vitae ai documenti aziendali di /$cFrancesco Bruni e di Serena Fornasiero e Ailvana Goldmann 260 $a[Bologna] :$bZanichelli,$c[c1997] 300 $aVIII, 208 p. ;$c24 cm. 650 4$aCorrispondenza d'ufficio - Manuali 650 4$aItaliano scritto 650 4$aScrittura professionale 700 1 $aFornasiero, Serena$eauthor$4http://id.loc.gov/vocabulary/relators/aut$0168169 700 1 $aTamiozzo Goldmann, Silvana 907 $a.b10505489$b08-10-21$c27-06-02 912 $a991003436369707536 945 $aLE008 FL.M. (f.r.) XXIII 309$g1$i2008000000141$lle008$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i10582733$z27-06-02 945 $aLE016 808.066651 BRU 01.01$g1$i2016000075434$lle016$on$pE18.80$q-$rn$so $t0$u0$v0$w0$x0$y.i14702782$z27-03-08 945 $aLE021 DI9BISA88$g1$i2021000122705$lle021$nMazzella, Letizia$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i14144591$z03-11-05 945 $aLE023 Fondo Sobrero 198$g1$i2023000193112$lle023$og$pE14.98$q-$rn$so $t0$u0$v0$w0$x0$y.i15967268$z26-07-21 945 $aLE023 Fondo Sobrero 406$g1$i2023000197202$lle023$og$pE21.00$q-$rn$so $t0$u0$v0$w0$x0$y.i15979593$z08-10-21 996 $aManuale di scrittura professionale$91446138 997 $aUNISALENTO 998 $ale008$ale016$ale021$b01-01-99$cm$da $e-$fita$git $h0$i3 LEADER 05117nam 22007575 450 001 9910851986503321 005 20240423130334.0 010 $a9783031563263 010 $a3031563263 024 7 $a10.1007/978-3-031-56326-3 035 $a(CKB)31801408200041 035 $a(DE-He213)978-3-031-56326-3 035 $a(MiAaPQ)EBC31574258 035 $a(Au-PeEL)EBL31574258 035 $a(MiAaPQ)EBC31304059 035 $a(Au-PeEL)EBL31304059 035 $a(OCoLC)1432312413 035 $a(EXLCZ)9931801408200041 100 $a20240423d2024 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aICT Systems Security and Privacy Protection $e38th IFIP TC 11 International Conference, SEC 2023, Poznan, Poland, June 14?16, 2023, Revised Selected Papers /$fedited by Norbert Meyer, Anna Grocholewska-Czury?o 205 $a1st ed. 2024. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2024. 215 $a1 online resource (XIII, 378 p. 100 illus., 79 illus. in color.) 225 1 $aIFIP Advances in Information and Communication Technology,$x1868-422X ;$v679 311 08$a9783031563256 311 08$a3031563255 327 $aWeb Content Integrity Tamper-proof websites beyond HTTPS -- Privacy-Preserving Clustering for Multi-Dimensional Data Randomization under LDP -- Hierarchical Model-Based Cybersecurity Risk Assessment During System Design -- The Influence of Privacy Concerns on Cryptocurrency Acceptance -- Automated Enrichment of Logical Attack Graphs via Formal Ontologies -- Detecting Web Bots via Mouse Dynamics and Communication Metadata -- Practical Single-Round Secure Wildcard Pattern Matching -- Efficient non-interactive anonymous communication -- PointPuff An Ed25519 Optimization Implementation -- Detecting web tracking at the network layer -- What?s inside a node? Malicious IPFS nodes under the magnifying glass -- Quantum-secure Communication for Trusted Edge Computing with IoT Devices -- Evaluation of a Red Team Automation Tool in live Cyber Defence Exercises -- Automated and Improved Detection of Cyber Attacks via an Industrial IDS Probe -- An Accurate and Real-time Detection Method for Concealed Slow HTTP DoS in Backbone Network -- Towards An Information Privacy Competency Model for the Usage of Mobile Applications -- SecPassInput: Towards Secure Memory and Password Handling in Web Applications -- Bl0ck Paralyzing 802.11 connections through Block Ack frames -- Enhancing the ACME Protocol to Automate the Management of All X 509 Web Certificates -- MADONNA Browser-Based MAlicious Domain Detection through Optimized Neural Network with Feature Analysis -- Cyber Key Terrain Identification Using Adjusted PageRank Centrality -- Machine Learning Metrics for Network Datasets Evaluation -- Factors of Intention to Use a Photo Tool: Comparison between Privacy-enhancing and Non-privacy-enhancing Tools -- Real-time Platform Identification of VPN Video Streaming Based on Side-Channel Attack -- Toward the Establishment of Evaluating URL Embedding Methods using Intrinsic Evaluator viaMalicious URLs Detection -- Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication. 330 $aThis book constitutes the refereed proceedings of the 38th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2023, held in Poznan, Poland, in June 2023. The 26 full papers included in this book were carefully reviewed and selected from 84 submissions. They focus on topics such as access control and authentication; applied cryptography; mobile security; side-channel attacks; trust management, digital forensics; industry networks security, etc. . 410 0$aIFIP Advances in Information and Communication Technology,$x1868-422X ;$v679 606 $aData protection 606 $aComputer engineering 606 $aComputer networks 606 $aComputers 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData and Information Security 606 $aComputer Engineering and Networks 606 $aComputing Milieux 606 $aComputer Communication Networks 606 $aCryptology 615 0$aData protection. 615 0$aComputer engineering. 615 0$aComputer networks. 615 0$aComputers. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 14$aData and Information Security. 615 24$aComputer Engineering and Networks. 615 24$aComputing Milieux. 615 24$aComputer Communication Networks. 615 24$aCryptology. 676 $a005.8 702 $aMeyer$b Norbert$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGrocholewska-Czury?o$b Anna$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910851986503321 996 $aICT Systems Security and Privacy Protection$92034030 997 $aUNINA