LEADER 01229nam0 2200277 i 450 001 SUN0019009 005 20200609110414.250 010 $a01-256-3455-2 100 $a20040706d1997 |0engc50 ba 101 $aeng 102 $aGB 105 $a|||| ||||| 200 1 $aStem cells$fedited by Christopher S. Potten 210 $aLondon$cAcademic$d1997 215 $axiii, 474 p., [8] p. di tav.$cill.$d25 cm. 620 $aGB$dLondon$3SUNL000015 676 $a616.02774$cCellule staminali$v22 702 1$aPotten$b, Christopher S.$3SUNV015123 712 $aAcademic$3SUNV000123$4650 790 1$aPotten, C. S.$zPotten, Christopher S.$3SUNV101885 801 $aIT$bSOL$c20200615$gRICA 856 4 $uhttp://books.google.it/books?id=HS12eC2z4r8C&pg=PA1&dq=Stem+cells+/+edited+by+Christopher+S.+Potten&hl=it&ei=xEotTvuKPMz3sgbopfz3Dw&sa=X&oi=book_result&ct=book-preview-link&resnum=2&ved=0CEMQuwUwAQ#v=onepage&q&f=false 912 $aSUN0019009 950 $aUFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI SCIENZE E TECNOLOGIE AMBIENTALI BIOLOGICHE E FARMACEUTICHE$d17CONS Kb7 $e17FSA757 20040706 $sSottolineato 996 $aStem cells$9786361 997 $aUNICAMPANIA LEADER 03241nam 2200697Ia 450 001 9911019444603321 005 20200520144314.0 010 $a9786611841072 010 $a9781281841070 010 $a1281841072 010 $a9780470772898 010 $a0470772891 010 $a9780470772904 010 $a0470772905 024 7 $a10.1002/9780470772898 035 $a(CKB)1000000000555734 035 $a(EBL)366876 035 $a(SSID)ssj0000173165 035 $a(PQKBManifestationID)11169771 035 $a(PQKBTitleCode)TC0000173165 035 $a(PQKBWorkID)10164652 035 $a(PQKB)11063843 035 $a(MiAaPQ)EBC366876 035 $a(CaBNVSL)mat08040062 035 $a(IDAMS)0b00006485f0e347 035 $a(IEEE)8040062 035 $a(OCoLC)264621173 035 $a(PPN)226271110 035 $a(Perlego)2761799 035 $a(EXLCZ)991000000000555734 100 $a20080212d2008 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aHost Identity Protocol (HIP) $etowards the secure mobile Internet /$fAndrei Gurtov 210 $aChichester, West Sussex, England ;$aHoboken, NJ, USA $cWiley$dc2008 215 $a1 online resource (323 p.) 225 1 $aWiley series on communications networking & distributed systems 225 1 $aWiley series in communications networking & distributed systems 300 $aDescription based upon print version of record. 311 08$a9780470997901 311 08$a0470997907 320 $aIncludes bibliographical references and index. 327 $aForeword / Jari Arkko -- Foreword / David Hutchison -- Introduction to network security -- Architectural overview -- Base protocol -- Main extensions -- Advanced extensions -- Performance measurements -- Lightweight HIP -- Infrastructure support -- Middlebox traversal -- Name resolution -- Micromobility -- Communication privacy -- Possible HIP applications -- Application interface -- Integrating HIP with other protocols -- Installing and using HIP. 330 $a"Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is time to see what HIP can do in larger scale in the real world. In order to make that happen, the world needs a HIP book, and now we have it." - Jari Arkko, Internet Area Director, IETF One of the challenges facing the current Internet architecture is the incorporation of mobile and multi-homed terminals (hosts), and an overall lack of protection against Denial-of-Service attacks and identity spoofing. The Host Identity Protocol (HI 410 0$aWiley series in communications networking & distributed systems. 606 $aWireless Internet$xSecurity measures 606 $aHost Identity Protocol (Computer network protocol) 615 0$aWireless Internet$xSecurity measures. 615 0$aHost Identity Protocol (Computer network protocol) 676 $a005.8 700 $aGurtov$b Andrei$0523693 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911019444603321 996 $aHost identity protocol (HIP$9828965 997 $aUNINA