LEADER 01267nam2-2200373---450- 001 990003533320203316 005 20110525121945.0 010 $a978-88-348-1609-7 035 $a000353332 035 $aUSA01000353332 035 $a(ALEPH)000353332USA01 035 $a000353332 100 $a20110525d2010----km-y0itay50------ba 101 $aita 102 $aIT 105 $a||||||||001yy 200 1 $a<> comunicazione economico-finanziaria nell'annual report$emodelli teorici e metodi di ricerca empirica$fGiulio Greco 210 $aTorino$cGiappichelli$d2010 215 $aX, 169 p.$d24 cm 225 2 $aStudi e ricerche di economia aziendale$v26 410 0$1001000317847$12001$aStudi e ricerche di economia aziendale$v, 26 606 0 $aInformazione economico-finanziaria$2BNCF 676 $a658.45 700 1$aGRECO,$bGiulio$0610028 801 0$aIT$bsalbc$gISBD 912 $a990003533320203316 951 $aXXX.B. Coll. 103/ 26$b19702 E.C.$cXXX.B. Coll.$d00296813 959 $aBK 969 $aECO 979 $aCHIARA$b90$c20110525$lUSA01$h1216 979 $aCHIARA$b90$c20110525$lUSA01$h1218 979 $aCHIARA$b90$c20110525$lUSA01$h1219 996 $aComunicazione economico-finanziaria nell'annual report$91113990 997 $aUNISA LEADER 08212nam 22008055 450 001 996466121003316 005 20200630030258.0 010 $a3-540-49497-9 024 7 $a10.1007/11935308 035 $a(CKB)1000000000283880 035 $a(SSID)ssj0000318245 035 $a(PQKBManifestationID)11283548 035 $a(PQKBTitleCode)TC0000318245 035 $a(PQKBWorkID)10310092 035 $a(PQKB)10401544 035 $a(DE-He213)978-3-540-49497-3 035 $a(MiAaPQ)EBC3068489 035 $a(PPN)123139775 035 $a(EXLCZ)991000000000283880 100 $a20100301d2006 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation and Communications Security$b[electronic resource] $e8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings /$fedited by Peng Ning, Ninghui Li 205 $a1st ed. 2006. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2006. 215 $a1 online resource (XIV, 562 p.) 225 1 $aSecurity and Cryptology ;$v4307 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-49496-0 320 $aIncludes bibliographical references and index. 327 $aSecurity Protocols -- Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer -- A Robust and Secure RFID-Based Pedigree System (Short Paper) -- A Topological Condition for Solving Fair Exchange in Byzantine Environments -- A Security Analysis of the Precise Time Protocol (Short Paper) -- Applied Crytography -- An Identity-Based Proxy Signature Scheme from Pairings -- Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks (Short Paper) -- Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper) -- Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Size -- Trace-Driven Cache Attacks on AES (Short Paper) -- Access Control and Systems Security -- A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols -- Defining and Measuring Policy Coverage in Testing Access Control Policies -- Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper) -- An Operating System Design for the Security Architecture for Microprocessors -- Privacy and Malicious Code -- Point-Based Trust: Define How Much Privacy Is Worth -- Efficient Protocols for Privacy Preserving Matching Against Distributed Datasets -- Quantifying Information Leakage in Tree-Based Hash Protocols (Short Paper) -- An Anonymous Authentication Scheme for Identification Card -- A Wireless Covert Channel on Smart Cards (Short Paper) -- Network Security -- From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution -- Mathematical Foundations for the Design of a Low-Rate DoS Attack to Iterative Servers (Short Paper) -- An Independent Function-Parallel Firewall Architecture for High-Speed Networks (Short Paper) -- Estimating Accuracy of Mobile-Masquerader Detection Using Worst-Case and Best-Case Scenario -- An Enhanced N-Way Exchange-Based Incentive Scheme for P2P File Sharing (Short Paper) -- Systems Security -- Provably Correct Runtime Enforcement of Non-interference Properties -- An Attack on SMC-Based Software Protection -- Modular Behavior Profiles in Systems with Shared Libraries (Short Paper) -- Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic -- Cryptanalysis -- Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards -- Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper) -- Seifert?s RSA Fault Attack: Simplified Analysis and Generalizations -- The Fairness of Perfect Concurrent Signatures -- Applied Cryptography and Network Security -- Secure Set Membership Using 3Sat -- Left-to-Right Signed-Bit ?-Adic Representations of n Integers (Short Paper) -- Universal Designated Verifier Signature Without Delegatability -- Tracing HTTP Activity Through Non-cooperating HTTP Proxies (Short Paper) -- Security Implementations -- A Fast RSA Implementation on Itanium 2 Processor -- Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper) -- Threshold Implementations Against Side-Channel Attacks and Glitches -- Hardware-and-Software-Based Security Architecture for Broadband Router (Short Paper). 330 $aIt is our great pleasure to welcome you to the Eighth International Conference on Information and Communications Security (ICICS 2006), held in Raleigh, North Carolina, USA, December 4?7, 2006. The ICICS conference series is an established forum that brings together researchersand scholars involved in m- tiple disciplines of Information and Communications Security in order to foster exchangeof ideas. The past sevenICICS conferences wereheld in Beijing, China (ICICS 1997); Sydney, Australia (ICICS 1999); Xi?an China (ICICS 2001); S- gapore (ICICS 2002); Hohhot City, China (ICICS 2003); Malaga, Spain (ICICS 2004); and Beijing, China (ICICS 2005). The conference proceedings of the past seven events have been published by Springer in the Lecture Notes in Computer Science series, in LNCS1334,LNCS1726,LNCS2229,LNCS 2513,LNCS 2836, LNCS 3269, and LNCS 3783, respectively. This year we received a total of 119 submissions on various aspects of - hoc and sensor network security. The Program Committee selected 22 regular papers and 17 short papers that cover a variety of topics, including security protocols, applied cryptography and cryptanalysis, access control in distributed systems, privacy, malicious code, network and systems security, and security implementations. Putting together ICICS 2006 was a team e?ort. First of all, we would like to thank the authors of every paper, whether accepted or not, for submitting their papers to ICICS 2006. We would like to express our gratitude to the Program Committee members and the external reviewers, who worked very hard in - viewing the papers and providing suggestions for their improvements. 410 0$aSecurity and Cryptology ;$v4307 606 $aData encryption (Computer science) 606 $aComputer security 606 $aManagement information systems 606 $aComputer science 606 $aComputers and civilization 606 $aComputer communication systems 606 $aAlgorithms 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputers and civilization. 615 0$aComputer communication systems. 615 0$aAlgorithms. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aManagement of Computing and Information Systems. 615 24$aComputers and Society. 615 24$aComputer Communication Networks. 615 24$aAlgorithm Analysis and Problem Complexity. 676 $a005.8 702 $aNing$b Peng$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLi$b Ninghui$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aInternational Conference on Information and Communications Security 906 $aBOOK 912 $a996466121003316 996 $aInformation and Communications Security$9771899 997 $aUNISA LEADER 01002nam a2200265 i 4500 001 991003557209707536 005 20020509124244.0 008 010704s1979 it ||| | ita 035 $ab11180080-39ule_inst 035 $aPARLA184205$9ExL 040 $aDip.to Filosofia$bita 082 0 $a810.9 100 1 $aPisanti, Tommaso$0221003 245 10$aLiterature and society :$bl'esperienza inglese e nordamericana /$cTommaso Pisanti, Helen Allison 260 $aFirenze :$bBulgarini,$c1979 300 $aIV, 655 p. ;$c24 cm. 650 4$aLetteratura americana 650 4$aLetteratura inglese 700 1 $aAllison, Helen$eauthor$4http://id.loc.gov/vocabulary/relators/aut$0736758 907 $a.b11180080$b21-09-06$c28-06-02 912 $a991003557209707536 945 $aLE005IF XIII E 55$g1$iLE005IFA-15410$lle005$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i11327303$z28-06-02 996 $aLiterature and society$91457086 997 $aUNISALENTO 998 $ale005$b01-01-01$cm$da $e-$fita$git $h0$i1 LEADER 01592aam 2200397I 450 001 9910710564603321 005 20160426110502.0 024 8 $aGOVPUB-C13-4052959d1a9e8f99c6393ac84696abc1 035 $a(CKB)5470000002477650 035 $a(OCoLC)947844150 035 $a(EXLCZ)995470000002477650 100 $a20160426d1985 ua 0 101 0 $aeng 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aRelationships between mechanical properties and performance of inks as the basis for quality control techniques $epart III /$fDonald L. Hunston; George W. Bullman 210 1$aGaithersburg, MD :$cU.S. Dept. of Commerce, National Institute of Standards and Technology,$d1985. 215 $a1 online resource 225 1 $aNBSIR ;$v85-3180 300 $a1985. 300 $aContributed record: Metadata reviewed, not verified. Some fields updated by batch processes. 300 $aTitle from PDF title page. 320 $aIncludes bibliographical references. 517 $aRelationships between mechanical properties and performance of inks as the basis for quality control techniques 700 $aHunston$b Donald L$01388146 701 $aBullman$b George W$01418518 701 $aHunston$b Donald L$01388146 712 02$aUnited States.$bNational Bureau of Standards. 801 0$bNBS 801 1$bNBS 801 2$bGPO 906 $aBOOK 912 $a9910710564603321 996 $aRelationships between mechanical properties and performance of inks as the basis for quality control techniques$93533080 997 $aUNINA LEADER 04737nam 2200793Ia 450 001 9910972163603321 005 20200520144314.0 010 $a9786613596215 010 $a9781280547119 010 $a1280547111 010 $a9780803271340 010 $a0803271344 035 $a(CKB)2670000000180952 035 $a(OCoLC)797825769 035 $a(CaPaEBR)ebrary10559296 035 $a(SSID)ssj0000637852 035 $a(PQKBManifestationID)11382859 035 $a(PQKBTitleCode)TC0000637852 035 $a(PQKBWorkID)10703040 035 $a(PQKB)10197512 035 $a(SSID)ssj0000348364 035 $a(PQKBManifestationID)11254337 035 $a(PQKBTitleCode)TC0000348364 035 $a(PQKBWorkID)10345840 035 $a(PQKB)10557116 035 $a(MiAaPQ)EBC915021 035 $a(MdBmJHUP)muse3744 035 $a(Au-PeEL)EBL915021 035 $a(CaPaEBR)ebr10559296 035 $a(CaONFJC)MIL359621 035 $a(OCoLC)793207972 035 $a(Perlego)4519497 035 $a(EXLCZ)992670000000180952 100 $a20110407d2011 ub 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 14$aThe life of Hon. William F. Cody, known as Buffalo Bill /$fWilliam F. Cody ; edited and with an introduction by Frank Christianson 205 $a1st ed. 210 $aLincoln $cUniversity of Nebraska Press$dc2011 215 $a1 online resource (1169 p.) 225 1 $aThe papers of William F. "Buffalo Bill" Cody 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a9780803232914 311 08$a0803232918 320 $aIncludes bibliographical references and index. 327 $aIntro -- Title Page -- Copyright Page -- Contents -- List of Illustrations -- Series Editor's Preface -- Editor's Introduction -- A Note on the Text -- Acknowledgments -- William F. Cody's Life: A Chronology -- The Life of Hon. William F. Cody,Known as Buffalo Bill -- Appendix 1: Cody andVisual Culture -- Appendix 2: Letters -- Appendix 3: Cody and Celebrity -- Notes -- Select Bibliography -- Index -- Title Page -- Copyright Page -- Contents -- List of Illustrations -- Series Editor's Preface -- Editor's Introduction -- A Note on the Text -- Acknowledgments -- William F. Cody's Life: A Chronology -- The Life of Hon. William F. Cody,Known as Buffalo Bill -- Appendix 1: Cody andVisual Culture -- Appendix 2: Letters -- Appendix 3: Cody and Celebrity -- Notes -- Select Bibliography -- Index. 330 8 $aWhat we know of Buffalo Bill Cody (1846&#8211;1917) is more myth than man. Yet the stage persona that took audiences by storm was based on the very real encounters of William F. Cody with the American West. This autobiography, infused with the drama of dime novels and stage melodramas that would transform the author into an American icon, recounts a boy&#8217;s move to the Kansas territory, where his father hoped to homestead, and his subsequent life on the frontier, following his career from trapper to buffalo hunter to Army scout, guide, and Indian fighter. Written when Cody was thirty-three years old, this life story captures both the hard reality of frontier life and the sensational image to which a boy of the time might aspire: the Indian fights, buffalo hunting, and Pony Express escapades that popular history contributed to the myth-making of Buffalo Bill. It is this movement between the personal and the mythic, plain facts and tall tales, William F. Cody and Buffalo Bill, that gives this autobiography its fascination and its power. Based on the original 1879 edition, this volume provides a new introduction, historical materials, and twenty-six additional images. It reveals both the William F. Cody of personal history and the Buffalo Bill of American mythology&#8212;and, finally, the curious reality that partakes of both. For information about the Buffalo Bill Cody archive, visit www.codyarchive.org. 410 0$aPapers of William F. "Buffalo Bill" Cody. 517 3 $aLife of Honorable William F. Cody, known as Buffalo Bill 606 $aPioneers$zWest (U.S.)$vBiography 606 $aScouts (Reconnaissance)$zWest (U.S.)$vBiography 606 $aFrontier and pioneer life$zWest (U.S.) 615 0$aPioneers 615 0$aScouts (Reconnaissance) 615 0$aFrontier and pioneer life 676 $a978/.02092 676 $aB 700 $aBuffalo Bill$f1846-1917.$01804825 701 $aChristianson$b Frank$01804826 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910972163603321 996 $aThe life of Hon. William F. Cody, known as Buffalo Bill$94363260 997 $aUNINA LEADER 05336nam 2200661Ia 450 001 9910139339603321 005 20200520144314.0 010 $a9786613813954 010 $a9781282253308 010 $a1282253301 010 $a9781118033265 010 $a1118033264 010 $a9781118031513 010 $a1118031512 035 $a(CKB)2560000000060926 035 $a(EBL)661619 035 $a(OCoLC)705538685 035 $a(SSID)ssj0000484468 035 $a(PQKBManifestationID)11344113 035 $a(PQKBTitleCode)TC0000484468 035 $a(PQKBWorkID)10594453 035 $a(PQKB)10130712 035 $a(MiAaPQ)EBC661619 035 $a(Perlego)2768180 035 $a(EXLCZ)992560000000060926 100 $a19901017d1991 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aFoundations of coding $etheory and applications of error-correcting codes, with an introduction to cryptography and information theory /$fJiri Adamek 210 $aChichester ;$aNew York $cWiley$dc1991 215 $a1 online resource (356 p.) 300 $aDescription based upon print version of record. 311 08$a9780471621874 311 08$a0471621870 320 $aIncludes bibliographical references and index. 327 $aFoundations of Coding: Theory and Applications of Error-Correcting Codes with an Introduction to Cryptography and Information Theory; Contents; CONTENTS; Introduction; Part I Coding and Information Theory; 1 Coding and Decoding; 1.1 Coding; 1.2 Unique Decoding; 1.3 Block Codes and Instantaneous Codes; 1.4 Some Important Block Codes; 1.5 Construction of Instantaneous Codes; 1.6 Kraft's Inequality; 1.7 McMillan's Theorem; Exercises; Notes; 2 Huffman Codes; 2.1 Information Source; 2.2 Huffman Codes; 2.3 Construction of Binary Huffman Codes; 2.4 Example; 2.5 Construction of General Huffman Codes 327 $aExercisesNotes; 3 Data Compression and Entropy; 3.1 An Example of Data Compression; 3.2 The Idea of Entropy; 3.3 The Definition of Entropy; 3.4 An Example; 3.5 Maximum and Minimum Entropy; 3.6 Extensions of a Source; 3.7 Entropy and Average Length; 3.8 Shannon's Noiseless Coding Theorem; 3.9 Concluding Remarks; Exercises; Notes; 4 Reliable Communication Through Unreliable Channels; 4.1 Binary Symmetric Channels; 4.2 Information Rate; 4.3 An Example of Increased Reliability; 4.4 Hamming Distance; 4.5 Detection of Errors; 4.6 Correction of Errors; 4.7 Channel Capacity 327 $a4.8 Shannon's Fundamental TheoremExercises; Notes; Part II Error-Correcting Codes; 5 Binary Linear Codes; 5.1 Binary Addition and Multiplication; 5.2 Codes Described by Equations; 5.3 Binary Linear Codes; 5.4 Parity Check Matrix; 5.5 Hamming Codes-Perfect Codes for Single Errors; 5.6 The Probability of Undetected Errors; Exercises; Notes; Notes; 6 Groups and Standard Arrays; 6.1 Commutative Groups; 6.2 Subgroups and Cosets; 6.3 Decoding by Standard Arrays; Exercises; 7 Linear Algebra; 7.1 Fields and Rings; 7.2 The Fields Zp; 7.3 Linear Spaces; 7.4 Finite-Dimensional Spaces; 7.5 Matrices 327 $a7.6 Operations on Matrices7.7 Orthogonal Complement; Exercises; Notes; 8 Linear Codes; 8.1 Generator Matrix; 8.2 Parity Check Matrix; 8.3 Syndrome; 8.4 Detection and Correction of Errors; 8.5 Extended Codes and Other Modifications; 8.6 Simultaneous Correction and Detection of Errors; 8.7 MacWilliams Identity; Exercises; Notes; 9 Reed-Muller Codes: Weak Codes with Easy Decoding; 9.1 Boolean Functions; 9.2 Boolean Polynomials; 9.3 Reed-Muller Codes; 9.4 Geometric Interpretation: Three-Dimensional Case; 9.5 Geometric Interpretation: General Case; 9.6 Decoding Reed-Muller Codes; Exercises; Notes 327 $a10 Cyclic Codes10.1 Generator Polynomial; 10.2 Encoding Cyclic Codes; 10.3 Parity Check Polynomial; 10.4 Decoding Cyclic Codes; 10.5 Error-Trapping Decoding; 10.6 Golay Code: A Perfect Code for Triple Errors; 10.7 Burst Errors; 10.8 Fire Codes: High-Rate Codes for Burst Errors; Exercises; Notes; 11 Polynomials and Finite Fields; 11.1 Zeros of Polynomials; 11.2 Algebraic Extensions of a Field; 11.3 Galois Fields; 11.4 Primitive Elements; 11.5 The Characteristic of a Field; 11.6 Minimal Polynomial; 11.7 Order; 11.8 The Structure of Finite Fields; 11.9 Existence of Galois Fields; Exercises 327 $aNotes 330 $aAlthough devoted to constructions of good codes for error control, secrecy or data compression, the emphasis is on the first direction. Introduces a number of important classes of error-detecting and error-correcting codes as well as their decoding methods. Background material on modern algebra is presented where required. The role of error-correcting codes in modern cryptography is treated as are data compression and other topics related to information theory. The definition-theorem proof style used in mathematics texts is employed through the book but formalism is avoided wherever possible. 606 $aCoding theory 606 $aAlgebra 615 0$aCoding theory. 615 0$aAlgebra. 676 $a003/.54 700 $aAdamek$b Jiri$cing.$055617 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910139339603321 996 $aFoundations of coding$9835089 997 $aUNINA LEADER 03880nam 22007095 450 001 9911016079203321 005 20250717130334.0 010 $a3-031-98334-3 024 7 $a10.1007/978-3-031-98334-4 035 $a(MiAaPQ)EBC32218096 035 $a(Au-PeEL)EBL32218096 035 $a(CKB)39660053300041 035 $a(DE-He213)978-3-031-98334-4 035 $a(OCoLC)1530383294 035 $a(EXLCZ)9939660053300041 100 $a20250717d2025 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 14$aThe Future of Urban Living: Smart Cities and Sustainable Infrastructure Technologies $eProceedings of the 1st International Conference on Advanced Sustainability Engineering and Technology (ICASET?25) /$fedited by Chakib El Mokhi, Hanaa Hachimi, Anand Nayyar 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (577 pages) 225 1 $aSustainable Civil Infrastructures,$x2366-3413 311 08$a3-031-98333-5 330 $aThis book provides a comprehensive manual for researchers, practitioners, policymakers as well as students striving to achieve environmental sustainment. It is exploring advanced developments in smart cities infrastructure and sustainability engineering. In addition, this book delivers advanced methodologies, emerging and innovative technologies that shape sustainable urban technologies. Including the renewable energy systems of tomorrow, to low-impact manufacturing procedures today; every section provides insight and real-world implementation. The book bridges the gap between theory and practice, making it an essential tool to turn sustainability challenges into opportunities. Salient characteristics comprise: 1. Global perspective: Allows for flexibility in solutions given a multitude of successful examples around the world from different cultural and geographic locations. 2. Multidisciplinary approach: Integrating perspectives from engineering, environmental science, economics and policy studies for holistic problem solving. 3. Financial sustainability: Innovative business models to make sustainable solutions good for the environment and even better economically. This provoking literature questions conventional wisdom and promotes adventurous visions of sustainability. By highlighting emerging trends in cloud computing, cybersecurity, and big data for urban development, readers are prepared to lead the next paradigm shift in sustainable innovation. 410 0$aSustainable Civil Infrastructures,$x2366-3413 606 $aSustainability 606 $aSociology, Urban 606 $aTechnology$xSociological aspects 606 $aInformation technology 606 $aUrban policy 606 $aUrban ecology (Biology) 606 $aSustainability 606 $aUrban Sociology 606 $aInformation and Communication Technologies (ICT) 606 $aUrban Policy 606 $aUrban Ecology 615 0$aSustainability. 615 0$aSociology, Urban. 615 0$aTechnology$xSociological aspects. 615 0$aInformation technology. 615 0$aUrban policy. 615 0$aUrban ecology (Biology) 615 14$aSustainability. 615 24$aUrban Sociology. 615 24$aInformation and Communication Technologies (ICT). 615 24$aUrban Policy. 615 24$aUrban Ecology. 676 $a304.2 700 $aEl Mokhi$b Chakib$01834764 701 $aHachimi$b Hanaa$01834765 701 $aNayyar$b Anand$01379041 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911016079203321 996 $aThe Future of Urban Living: Smart Cities and Sustainable Infrastructure Technologies$94412610 997 $aUNINA LEADER 01616oas 2200505 a 450 001 9910559695003321 005 20251106213014.0 011 $a2787-9151 035 $a(OCoLC)1332987786 035 $a(CONSER) 2023231206 035 $a(CKB)2560000000075370 035 $a(DE-599)ZDB3196005-4 035 $a(EXLCZ)992560000000075370 100 $a20110607a20119999 uy 101 0 $acze 135 $aur|n||||||||| 200 00$aCornova $erevue C?eske? spolec?nosti pro vy?zkum 18. stoleti? a Filozoficke? fakulty Univerzity Karlovy v Praze 210 $aPraha $cUniverzita Karlova v Praze, Filozoficka? fakulta 215 $a1 online resource 311 08$a1804-6983 531 1 $aCornova 606 $aEnlightenment$zEurope$vPeriodicals 606 $aSie?cle des Lumie?res$zEurope$vPe?riodiques 606 $aEnlightenment$2fast$3(OCoLC)fst00912527 607 $aEurope$xHistory$y18th century$vPeriodicals 607 $aEurope$xHistoire$y18e sie?cle$vPe?riodiques 607 $aEurope$2fast$1https://id.oclc.org/worldcat/entity/E39PBJxCxPbbk4CPJDQJb4r6rq 608 $aHistory.$2fast 608 $aPeriodicals.$2fast 615 0$aEnlightenment 615 6$aSie?cle des Lumie?res 615 7$aEnlightenment. 712 02$aC?eska? spolec?nost pro vy?zkum 18. stoleti?. 712 02$aUniverzita Karlova.$bFilozoficka? fakulta. 801 0$bUX1 801 1$bUX1 801 2$bOCLCF 801 2$bINU 801 2$bOCLCL 801 2$bUEJ 801 2$bOCLCQ 906 $aJOURNAL 912 $a9910559695003321 996 $aCornova$92833768 997 $aUNINA