LEADER 01210nam0 22003011i 450 001 UON00224714 005 20231205103431.407 010 $a84-376-0002-2 100 $a20030730d1990 |0itac50 ba 101 $aspa 102 $aES 105 $a|||| ||||| 200 1 $aCuatro obras$e(teatro, relatos, fantasía macabra, ensayos)$fAlfonso Rodríguez Castelao$gedición de Xesús Alonso Montero 210 $a4a ed 215 $aMadrid$cCátedra, 1990. 238 p.$d18 cm. 410 1$1001UON00172753$12001 $aLetras Hispánicas$1210 $aMadrid$cCátedra$v1 606 $aTEATRO SPAGNOLO$3UONC041351$2FI 620 $aES$dMadrid$3UONL000218 676 $a868$cLetteratura spagnola. Scritti miscellanei$v21 700 1$aCASTELAO$bAlfonso Rodríguez$3UONV136325$0330111 702 1$aALONSO MONTERO$bXesús$3UONV122896 712 $aCátedra$3UONV266175$4650 801 $aIT$bSOL$c20240220$gRICA 899 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$2UONSI 912 $aUON00224714 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$dSI CoSPA 8 L.H. 0001 $eSI LO 66859 5 0001 996 $aCuatro obras$993999 997 $aUNIOR LEADER 05217nam 22006735 450 001 9910845095303321 005 20240905150943.0 010 $a9783031479908 010 $a3031479904 024 7 $a10.1007/978-3-031-47990-8 035 $a(MiAaPQ)EBC31214020 035 $a(Au-PeEL)EBL31214020 035 $a(MiAaPQ)EBC31222621 035 $a(Au-PeEL)EBL31222621 035 $a(DE-He213)978-3-031-47990-8 035 $a(CKB)30942446100041 035 $a(OCoLC)1427383095 035 $a(EXLCZ)9930942446100041 100 $a20240315d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCritical Infrastructure Protection in the Light of the Armed Conflicts /$fedited by Tünde Anna Kovács, Zoltán Nyikes, Tamás Berek, Norbert Daruka, László Tóth 205 $a1st ed. 2024. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2024. 215 $a1 online resource (527 pages) 225 1 $aAdvanced Sciences and Technologies for Security Applications,$x2363-9466 311 08$a9783031479892 311 08$a3031479890 327 $a1. Intelligence and protection of key (critical) infrastructure objects -- 2. Examination of UV radiation during inert gas arc welding -- 3. Current legal challenges related to social networking sites -- 4. Cyber Threats to Consumers and Other Risks in the Field of E-commerce Security -- 5. Space Weather Effects on Critical Infrastructure -- 6. Exploring the Nexus Between Critical Infrastructure, Fragility and Peace Operations -- 7. Terrorist threats to African hospitals -- 8. Surface Modification of Metallic Materials using Laser and Plasma Technologies -- 9. Threats and Vulnerabilities in Web Applications and How to Avoid them -- 10. Managing climate change risks in critical infrastructure protection with examples from the European financial sector -- 11. Bionic Hand with Phalanx built-in servos -- 12. Review of the Maintenance Strategies, and Failures in the Aspects of the Reliability. 330 $aThis book summarizes the latest findings in critical infrastructure protection and related research areas. Armed conflicts and wars are now closer to Europe than at any time in the last several decades, and the protection of critical infrastructures has gained new prominence. This situation has also revealed the vulnerability of critical infrastructure and the importance of its protection. The development of technologies, cybertechnologies, and digitalization in all aspects of our daily lives implies new security challenges in critical infrastructure protection and security science and this book addresses the four main dimensions of critical infrastructure protection: 1. Physical protection 2. Cybersecurity 3. Political security 4. Individual security The issue of physical security has accompanied humanity since its birth. Nowadays, this issue has become even more important due to technological advances, as this is the security area that people physically experience?physical protection, including protection against explosions and ballistic attacks, but also defense of objects and guaranteeing transportation security. Cyberspace represents the fifth domain of warfare and a central security question in our age. The base of cyberspace defense is high-quality hardware and expert support. With our lives increasingly digital, cybersecurity's core elements include safety awareness and informatics. Political security, the third dimension, is shaped by diverse political ideologies influencing economies, societies, and other aspects of life. This book explores topics such as migration policies, defense against terrorism, national and international security, and public safety. The fourth dimension, individual security, spans healthcare, food safety, energy supplies, and economic security. Each chapter of this book emphasizes security, focusing on Central Europe while addressing global concerns. Authored by researchers, experts, and scholars, this book is invaluable for Ph.D. students, professionals, and educators worldwide. 410 0$aAdvanced Sciences and Technologies for Security Applications,$x2363-9466 606 $aSecurity systems 606 $aCooperating objects (Computer systems) 606 $aData protection 606 $aSecurity Science and Technology 606 $aCyber-Physical Systems 606 $aData and Information Security 615 0$aSecurity systems. 615 0$aCooperating objects (Computer systems) 615 0$aData protection. 615 14$aSecurity Science and Technology. 615 24$aCyber-Physical Systems. 615 24$aData and Information Security. 676 $a621 700 $aKovács$b Tünde Anna$01733510 701 $aNyikes$b Zoltán$01733511 701 $aBerek$b Tamás$01733512 701 $aDaruka$b Norbert$01733513 701 $aTóth$b László$0401621 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910845095303321 996 $aCritical Infrastructure Protection in the Light of the Armed Conflicts$94149352 997 $aUNINA