LEADER 00874nam0-22002771i-450 001 990007996860403321 005 20180517141011.0 035 $a000799686 035 $aFED01000799686 035 $a(Aleph)000799686FED01 035 $a000799686 100 $a20050201d1954----km-y0itay50------ba 101 0 $aita 102 $aIT 200 1 $a<>rabdomante elettronico$emetodi ed apparecchi per scoprire nel sottosuolo l'acqua, i giacimenti di sostanze utili,la disposizione degli strati e la natura delle rocce$fG.A. Uglietti 210 $aMilano$cHoepli$d1954 215 $aXII,291 p.$d19 cm 610 0 $aRabdomante 700 1$aUglietti,$bGiorgio Antonio$0290078 801 0$aIT$bUNINA$2UNIMARC$gRICA 901 $aBK 912 $a990007996860403321 952 $a15 ID J/5-33$fDINID 959 $aDINID 996 $aRabdomante elettronico$9749954 997 $aUNINA LEADER 01078nam 2200325Ia 450 001 996396736103316 005 20200818211720.0 035 $a(CKB)4940000000058380 035 $a(EEBO)2240861032 035 $a(OCoLC)ocm12846776e 035 $a(OCoLC)12846776 035 $a(EXLCZ)994940000000058380 100 $a19851126d1660 uy | 101 0 $aeng 135 $aurbn||||a|bb| 200 14$aThe speech which the speaker of the House of Commons made unto the King in the banqueting-House at Whitehall, November 9, 1660$b[electronic resource] 210 $aLondon $cPrinted by John Bill ...$d1660 215 $a6 p 300 $aReproduction of original in Huntington Library. 330 $aeebo-0113 607 $aGreat Britain$xHistory$yCharles II, 1660-1685 700 $aGrimston$b Harbottle$cSir,$f1603-1685.$01001774 801 0$bEAA 801 1$bEAA 801 2$bm/c 801 2$bWaOLN 906 $aBOOK 912 $a996396736103316 996 $aThe speech which the speaker of the House of Commons made unto the king$92361178 997 $aUNISA LEADER 05395nam 22007455 450 001 9911007464003321 005 20250524130226.0 010 $a3-031-89360-3 024 7 $a10.1007/978-3-031-89360-5 035 $a(CKB)39124577100041 035 $a(DE-He213)978-3-031-89360-5 035 $a(MiAaPQ)EBC32130294 035 $a(Au-PeEL)EBL32130294 035 $a(EXLCZ)9939124577100041 100 $a20250524d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDigital Forensics and Cyber Crime $e15th EAI International Conference, ICDF2C 2024, Dubrovnik, Croatia, October 9?10, 2024, Proceedings, Part II /$fedited by Sanjay Goel, Ersin Uzun, Mengjun Xie, Sumantra Sarkar 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (XVII, 359 p. 127 illus., 104 illus. in color.) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v614 311 08$a3-031-89359-X 327 $a -- Security Analytics, Threat Intelligence, Multimedia Forensics. -- Assessing Threats: Security Boundary and Side-channel Attack Detection in the Metaverse. -- EG-SAN: Evolving Graph Self-Attention Networks for Detecting Illicit Activities in Cryptocurrency. -- Auto-TFCE: Automatic Tra?ic Feature Code Extraction Method and Its Application in Cyber Security. -- Improved Federated Learning Model Against Poisoning Attacks by Using Iterative Blockchain Validators. -- ThreatResponder: Dynamic Markov-based Defense Mechanism for Real-time Cyber Threats. -- Social Media Threat Intelligence: A Framework for Collecting and Categorizing Threat-Related Data. -- A Comprehensive Survey on Basic Safety Message Attacks and Their Detection. -- BGETC: An Encrypted Tra?ic Classification Method Based on BERT and GRU. -- AnGSL: Graph-Based Android Malware Detection Method. -- Attention-Guided Contrastive Masked Autoencoders for Self-supervised Cross-modal Biometric Matching. -- MSP: A Zero-latency Lightweight Website Fingerprinting Defense for Tor Network. -- An IP Anti-Geolocation Method Based on Constructed Landmarks. -- Burst Sequence Based Graph Neural Network for Video Tra?ic Identification. -- KP-WF: Cross-domain Few-shot Website Fingerprinting. -- Generative AI, Emerging Threats. -- Pixel-level Face Correction Task for More Generalized Deepfake Detection. -- Evaluating and Extending Techniques for Fine-Grained Text-Topic Prediction for Digital Forensic Data. -- Driven to Evidence: The Digital Forensic Trail of Vehicles. -- Autonomous Driving System Configuration Defect Detection Method Based on Fuzzing. -- Research on Minimum Receptive Field of Convolutional Neural Networks for Energy Analysis Attack. -- Heaker: Exfiltrating Data from Air-Gapped Computers via Thermal Signals. 330 $aThe two-volume set, LNICST 613 and 614, constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2024, held in Dubrovnik, Croatia, during October 9?10, 2024. The 40 full papers presented here were carefully selected and reviewed from 90 submissions. These papers have been organized in the following topical sections: Part I- Artificial Intelligence & Security; Multimedia Forensics; Intrusion Detection; Intrusion and Fraud Detection; Large Language Models, Advances in Security and Forensics; Advances in Security and Forensics. Part II- Security Analytics, Threat Intelligence, Multimedia Forensics; Generative AI, Emerging Threats. 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v614 606 $aData protection 606 $aApplication software 606 $aComputer systems 606 $aComputer networks 606 $aSoftware engineering 606 $aOperating systems (Computers) 606 $aData and Information Security 606 $aComputer and Information Systems Applications 606 $aComputer System Implementation 606 $aComputer Communication Networks 606 $aSoftware Engineering 606 $aOperating Systems 615 0$aData protection. 615 0$aApplication software. 615 0$aComputer systems. 615 0$aComputer networks. 615 0$aSoftware engineering. 615 0$aOperating systems (Computers) 615 14$aData and Information Security. 615 24$aComputer and Information Systems Applications. 615 24$aComputer System Implementation. 615 24$aComputer Communication Networks. 615 24$aSoftware Engineering. 615 24$aOperating Systems. 676 $a005.8 702 $aGoel$b Sanjay$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aUzun$b Ersin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aXie$b Mengjun$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSarkar$b Sumantra$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911007464003321 996 $aDigital Forensics and Cyber Crime$92022607 997 $aUNINA LEADER 03462nam 2200745 a 450 001 9910955136703321 005 20200520144314.0 010 $a1-282-48599-7 010 $a9786612485992 010 $a1-60473-352-7 035 $a(CKB)1000000000816893 035 $a(EBL)515625 035 $a(OCoLC)472608823 035 $a(SSID)ssj0000343939 035 $a(PQKBManifestationID)11256374 035 $a(PQKBTitleCode)TC0000343939 035 $a(PQKBWorkID)10307291 035 $a(PQKB)11166491 035 $a(StDuBDS)EDZ0000206347 035 $a(MiAaPQ)EBC515625 035 $a(MdBmJHUP)muse13690 035 $a(Au-PeEL)EBL515625 035 $a(CaPaEBR)ebr10340774 035 $a(CaONFJC)MIL248599 035 $a(EXLCZ)991000000000816893 100 $a20140131d2009 fy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 14$aThe trickster comes west $ePan-African influence in early Black diasporan narratives /$fBabacar M'Baye 205 $a1st ed. 210 $aJackson, [Miss.] $cUniversity Press of Mississippi$dc2009 215 $a1 online resource (258 p.) 300 $aDescription based upon print version of record. 311 08$a1-60473-233-4 320 $aIncludes bibliographical references and index. 327 $aAfrican and Puritan dimensions of Phillis Wheatley's poems and letters -- Pan-Africanism in Quobna Ottobah Cugoano's liberation discourse -- Pan-Africanism in Olaudah Equiano's interesting narrative -- Africanism and Methodism in the works of Elizabeth Hart Thwaites and Anne Hart Gilbert -- African and Caribbean patterns in Mary Prince's resistance. 330 8 $aIn the past, scholars have looked at narratives of the African diaspora only to discover how these memoirs, poems, and fictions related to the West. This book explores relationships among African-American, Afro-Caribbean, and Afro-British narratives of slavery and of New World and British oppression and what African influences brought to these diasporic expressions. The book relocates the beginnings of Pan-Africanism and suggests the strong influence of its theories of communal resistance, racial solidarity, and economic development on pioneering black narratives. 606 $aCaribbean literature (English)$xBlack authors$xHistory and criticism 606 $aAmerican literature$xAfrican American authors$xHistory and criticism 606 $aBlack people$xRace identity$zAmerica 606 $aPan-Africanism in literature 606 $aSlave narratives$xHistory and criticism 606 $aTricksters in literature 606 $aAfrican diaspora in literature 606 $aSlavery in literature 607 $aAmerica$xCivilization$xAfrican influences 615 0$aCaribbean literature (English)$xBlack authors$xHistory and criticism. 615 0$aAmerican literature$xAfrican American authors$xHistory and criticism. 615 0$aBlack people$xRace identity 615 0$aPan-Africanism in literature. 615 0$aSlave narratives$xHistory and criticism. 615 0$aTricksters in literature. 615 0$aAfrican diaspora in literature. 615 0$aSlavery in literature. 676 $a810.9/8960729 700 $aM'Baye$b Babacar$f1967-$01192861 801 0$bStDuBDS 801 1$bStDuBDS 906 $aBOOK 912 $a9910955136703321 996 $aThe trickster comes west$94377568 997 $aUNINA