LEADER 01042nam0 2200289 450 001 000019497 005 20081118113538.0 010 $a3540979622 100 $a20081118d1993----km-y0itay50------ba 101 0 $aeng 102 $aUS 105 $ay-------001yy 200 1 $a<>introduction to partial differential equations$fMichael Renardy, Robert C. Rogers 210 $aNew York$cSpringer$dc1993 215 $aXIII, 428 p.$d25 cm 225 2 $aTexts in applied mathematics$v13 410 0$12001$aTexts in applied mathematics 500 10$a<>introduction to partial differential equations$934149 610 1 $aEquazioni differenziali alle derivate parziali 676 $a515.353$v20$9Equazioni differenziali alle derivate parziali. 700 1$aRenardy,$bMichael$042293 701 1$aRogers,$bRobert C.$042294 801 0$aIT$bUNIPARTHENOPE$c20081118$gRICA$2UNIMARC 912 $a000019497 951 $aM 515.353/62$bM 1186$cDSA$d2008 996 $aIntroduction to partial differential equations$934149 997 $aUNIPARTHENOPE LEADER 00917cam0 22002771 450 001 SOBE00053970 005 20200928122043.0 010 $a9788843017515 100 $a20161118d2013 |||||ita|0103 ba 101 $aita 102 $aIT 200 1 $aDescrivere il mondo$eteoria e pratica del metodo etnografico in sociologia$fGiampietro Gobo 210 $aRoma$cCarocci$d2013 215 $a220 p.$d22 cm 225 2 $aStudi superiori$v933 410 1$1001SOBE00016801$12001 $a*Studi superiori$v933 700 1$aGobo$b, Giampietro$3SOBA00013630$4070$0142123 801 0$aIT$bUNISOB$c20200928$gRICA 850 $aUNISOB 852 $aUNISOB$j300$m167572 912 $aSOBE00053970 940 $aM 102 Monografia moderna SBN 941 $aM 957 $a300$b004915$gSI$d167572$racquisto$tV$1menle$2UNISOB$3UNISOB$420161118110434.0$520200928122043.0$6bethb 996 $aDescrivere il mondo$9228460 997 $aUNISOB LEADER 06044nam 22008415 450 001 9910484150903321 005 20251226202539.0 024 7 $a10.1007/11555827 035 $a(CKB)1000000000213253 035 $a(SSID)ssj0000316901 035 $a(PQKBManifestationID)11258554 035 $a(PQKBTitleCode)TC0000316901 035 $a(PQKBWorkID)10276725 035 $a(PQKB)10005376 035 $a(DE-He213)978-3-540-31981-8 035 $a(MiAaPQ)EBC3067901 035 $a(PPN)123097541 035 $a(EXLCZ)991000000000213253 100 $a20100315d2005 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aComputer Security - ESORICS 2005 $e10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings /$fedited by Sabrina De Capitani di Vimercati, Paul Syverson, Dieter Gollmann 205 $a1st ed. 2005. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2005. 215 $a1 online resource (XII, 516 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v3679 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-540-31981-6 311 08$a3-540-28963-1 320 $aIncludes bibliographical references and index. 327 $aComputerized Voting Machines: A View from the Trenches -- XML Access Control with Policy Matching Tree -- Semantic Access Control Model: A Formal Specification -- A Generic XACML Based Declarative Authorization Scheme for Java -- Specification and Validation of Authorisation Constraints Using UML and OCL -- Unified Index for Mobile Object Data and Authorizations -- On Obligations -- A Practical Voter-Verifiable Election Scheme -- Machine-Checked Security Proofs of Cryptographic Signature Schemes -- Sanitizable Signatures -- Limits of the Cryptographic Realization of Dolev-Yao-Style XOR -- Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study -- Augmented Oblivious Polynomial Evaluation Protocol and Its Applications -- Using Attack Trees to Identify Malicious Attacks from Authorized Insiders -- An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts -- Towards a Theory of Intrusion Detection -- On Scalability and Modularisation inthe Modelling of Network Security Systems -- Sybil-Resistant DHT Routing -- Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks -- Quantifying Probabilistic Information Flow in Computational Reactive Systems -- Enforcing Non-safety Security Policies with Program Monitors -- Soundness of Formal Encryption in the Presence of Key-Cycles -- Privacy Preserving Clustering -- Abstractions Preserving Parameter Confidentiality -- Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation -- Security Notions for Disk Encryption -- Local View Attack on Anonymous Communication -- Browser Model for Security Analysis of Browser-Based Protocols. 330 $aForeword from the Program Chairs These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security (ESORICS), held S- tember 12?14, 2005 in Milan, Italy. In response to the call for papers 159 papers were submitted to the conf- ence. These paperswere evaluated on the basis of their signi?cance, novelty,and technical quality. Each paper was reviewed by at least three members of the program committee. The program committee meeting was held electronically, holding intensive discussion over a period of two weeks. Of the papers subm- ted, 27 were selected for presentation at the conference, giving an acceptance rate of about 16%. The conference program also includes an invited talk by Barbara Simons. There is a long list of people who volunteered their time and energy to put together the symposiom and who deserve acknowledgment. Thanks to all the members of the program committee, and the external reviewers, for all their hard workin evaluating and discussing papers. We are also very grateful to all those people whose work ensured a smooth organizational process: Pierangela Samarati, who served as General Chair, Claudio Ardagna, who served as P- licity Chair, Dieter Gollmann who served as Publication Chair and collated this volume, and Emilia Rosti and Olga Scotti for helping with local arrangements. Last, but certainly not least, our thanks go to all the authors who submitted papers and all the attendees. We hope you ?nd the program stimulating. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v3679 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aOperating systems (Computers) 606 $aDatabase management 606 $aElectronic data processing$xManagement 606 $aComputers and civilization 606 $aCryptology 606 $aComputer Communication Networks 606 $aOperating Systems 606 $aDatabase Management 606 $aIT Operations 606 $aComputers and Society 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aComputer networks. 615 0$aOperating systems (Computers) 615 0$aDatabase management. 615 0$aElectronic data processing$xManagement. 615 0$aComputers and civilization. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aOperating Systems. 615 24$aDatabase Management. 615 24$aIT Operations. 615 24$aComputers and Society. 676 $a005.8 701 $aDe Capitani di Vimercati$b Sabrina$0724909 701 $aSyverson$b Paul F$01760069 701 $aGollmann$b Dieter$0634137 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484150903321 996 $aComputer security--ESORICS 2005$94198849 997 $aUNINA