LEADER 01327nam0 22003251i 450 001 UON00351386 005 20231205104342.965 010 $a978-88-555-2918-1 100 $a20100127d2007 |0itac50 ba 101 $aita 102 $aIT 105 $a|||| ||||| 200 1 $aConiuratio Catilinae$fGaio Sallustio Crispo$ga cura di Italo Mariotti 210 $aBologna$cPatron$d2007 215 $a718 p.$d22 cm 410 1$1001UON00087215$12001 $aTesti e manuali per l'insegnamento universitario del latino$fcollana diretta da Alfonso Traina$v92 606 $aLETTERATURA LATINA$3UONC026272$2FI 620 $aIT$dBologna$3UONL000085 676 $a870$cLetteratura latina$v21 700 1$aSALLUSTIUS CRISPUS$bGaius$3UONV063458$0154956 702 1$aMARIOTTI$bItalo$3UONV065064 712 $aPātron$3UONV265630$4650 790 1$aCRISPUS, Gaius Sallustius$zSALLUSTIUS CRISPUS, Gaius$3UONV141509 790 0$aSALLUSTIO$zSALLUSTIUS CRISPUS, Gaius$3UONV141510 801 $aIT$bSOL$c20240220$gRICA 899 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$2UONSI 912 $aUON00351386 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$dSI T 2 SALL. 0101 $eSI MC 32924 7 996 $aConiuratio Catilinae$91224581 997 $aUNIOR LEADER 02958nam 22006855 450 001 9910298977603321 005 20251226202922.0 010 $a3-662-45670-2 024 7 $a10.1007/978-3-662-45670-5 035 $a(CKB)3710000000306320 035 $a(SSID)ssj0001386048 035 $a(PQKBManifestationID)11746788 035 $a(PQKBTitleCode)TC0001386048 035 $a(PQKBWorkID)11349333 035 $a(PQKB)10091099 035 $a(DE-He213)978-3-662-45670-5 035 $a(MiAaPQ)EBC6306751 035 $a(MiAaPQ)EBC5584864 035 $a(Au-PeEL)EBL5584864 035 $a(OCoLC)1066178644 035 $a(PPN)183097467 035 $a(EXLCZ)993710000000306320 100 $a20141113d2014 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aApplications and Techniques in Information Security $eInternational Conference, ATIS 2014, Melbourne, Australia, November 26-28, 2014. Proceedings /$fedited by Lynn Batten, Gang Li, Wenjia Niu, Matthew Warren 205 $a1st ed. 2014. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2014. 215 $a1 online resource (XII, 266 p. 120 illus.) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v490 300 $aIncludes index. 311 08$a3-662-45669-9 327 $aApplications -- Curbing cyber crimes -- Data privacy -- Digital forensics -- Security implementations. 330 $aThis book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2014, held in Melbourne, Australia, in November 2014. The 16 revised full papers and 8 short papers presented were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on applications; curbing cyber crimes; data privacy; digital forensics; security implementations. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v490 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData and Information Security 606 $aCryptology 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 14$aData and Information Security. 615 24$aCryptology. 676 $a005.8 702 $aBatten$b Lynn$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLi$b Gang$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aNiu$b Wenjia$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWarren$b Matthew$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910298977603321 996 $aApplications and Techniques in Information Security$92028776 997 $aUNINA