LEADER 00907nam0 2200289 450 001 000024618 005 20090318104926.0 010 $a88-07-08040-0 100 $a20090318d1986----km-y0itay50------ba 101 0 $aita 102 $aIT 105 $ay-------001yy 200 1 $a<>nostra Italia$earretratezza socioculturale, clientelismo, trasformismo e ribellismo dall'unita ad oggi$fCarlo Tullio-Altan 210 $aMilano$cFeltrinelli$d1986 215 $a261 p.$d23 cm 225 2 $aSaggi 410 0$12001$aSaggi 500 10$a<>nostra Italia$943930 610 1 $aItalia$aVita politica$aSec. 19.-20. 610 1 $aSocietą$aItalia$aSec. 19.-20. 676 $a945.09$v19 700 1$aTullio-Altan,$bCarlo$0124992 801 0$aIT$bUNIPARTHENOPE$c20090318$gRICA$2UNIMARC 912 $a000024618 951 $a126/95$b80/CNR$cNAVA2$d2009 996 $aNostra Italia$943930 997 $aUNIPARTHENOPE LEADER 02939nam 22006255 450 001 9910437567603321 005 20251226195448.0 010 $a3-642-40597-5 024 7 $a10.1007/978-3-642-40597-6 035 $a(CKB)3710000000015937 035 $a(SSID)ssj0000986813 035 $a(PQKBManifestationID)11619762 035 $a(PQKBTitleCode)TC0000986813 035 $a(PQKBWorkID)10941688 035 $a(PQKB)11695964 035 $a(DE-He213)978-3-642-40597-6 035 $a(MiAaPQ)EBC3096887 035 $a(PPN)172429722 035 $a(EXLCZ)993710000000015937 100 $a20130814d2013 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aAdvances in Security of Information and Communication Networks $eFirst International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013. Proceedings /$fedited by Ali Ismail Awad, Aboul Ella Hassanien, Kensuke Baba 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (XII, 249 p. 104 illus.) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v381 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-40596-7 327 $aNetworking security -- Data and information security -- Authentication and privacy -- Security applications. 330 $aThis book constitutes the refereed proceedings of the International Conference on Advances in Security of Information and Communication Networks, Sec Net 2013, held in Cairo, Egypt, in September 2013. The 21 revised full papers presented were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on networking security; data and information security; authentication and privacy; security applications.                        . 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v381 606 $aData protection 606 $aComputer networks 606 $aData mining 606 $aData and Information Security 606 $aComputer Communication Networks 606 $aData Mining and Knowledge Discovery 615 0$aData protection. 615 0$aComputer networks. 615 0$aData mining. 615 14$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$aData Mining and Knowledge Discovery. 676 $a005.8 702 $aAwad$b Ali Ismail$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHassanien$b Aboul Ella$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBaba$b Kensuke$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910437567603321 996 $aAdvances in Security of Information and Communication Networks$92546628 997 $aUNINA