LEADER 01313nam--2200409---450- 001 990001058190203316 005 20060323124929.0 035 $a0105819 035 $aUSA010105819 035 $a(ALEPH)000105819USA01 035 $a0105819 100 $a20020325d--------km-y0itay0103----ba 101 $aita 102 $aIT 110 $aaga-------- 200 1 $aSylva mala$fbollettino del Centro studi archeologici di Boscoreale e Boscotrecase 210 $aBoscoreale$cCentro studi archeologici$dv. 215 $aill.$c27 cm 300 $aTit. della cop. - Comincia nel 1980. - Descrizione basata su : Anno 2, nm. 1-6 (1981) 326 $aBimestrale 410 $12001 421 1$1001-------$12001 430 1$1001-------$12001 606 0 $aCampania$xArcheologia$xPeriodici 676 $a937 712 02$aCentro studi archeologici 801 0$aIT$bsalbc$gISBD 912 $a990001058190203316 958 $bFONDO$cAnno 2, nm. 1-6 (1981), noo 1-6(1983)-anno n.1-6(1984) 959 $aSE 979 $aPATTY$b90$c20020325$lUSA01$h1531 979 $c20020403$lUSA01$h1745 979 $aPATRY$b90$c20040406$lUSA01$h1713 979 $aPAOLA$b90$c20060323$lUSA01$h1249 979 $aPAOLA$b90$c20060323$lUSA01$h1249 996 $aSylva mala$9976130 997 $aUNISA LEADER 01519nlm0 22004571i 450 001 990009253500403321 010 $a9783540690191 035 $a000925350 035 $aFED01000925350 035 $a(Aleph)000925350FED01 035 $a000925350 100 $a20100926d2008----km-y0itay50------ba 101 0 $aeng 102 $aDE 135 $adrnn-008mamaa 200 1 $aTransactions on Data Hiding and Multimedia Security III$bRisorsa elettronica$fedited by Yun Q. Shi 210 $aBerlin ; Heidelberg$cSpringer$d2008 225 1 $aLecture Notes in Computer Science$x1861-3043$v4920 230 $aDocumento elettronico 336 $aTesto 337 $aFormato html, pdf 702 1$aShi,$bYun Q. 801 0$aIT$bUNINA$gREICAT$2UNIMARC 856 4 $zFull text per gli utenti Federico II$uhttp://dx.doi.org/10.1007/978-3-540-69019-1 901 $aEB 912 $a990009253500403321 961 $aAlgorithm Analysis and Problem Complexity 961 $aComputer science 961 $aComputer Science 961 $aComputer software 961 $aComputers and Society 961 $aData Encryption 961 $aData encryption (Computer science) 961 $aData protection 961 $aInformation Systems 961 $aManagement of Computing and Information Systems 961 $aMultimedia Information Systems 961 $aMultimedia systems 961 $aSystems and Data Security 996 $aTransactions on Data Hiding and Multimedia Security III$9774337 997 $aUNINA LEADER 00919nam0-22003371i-450 001 990000509160403321 005 20191120122633.0 035 $a000050916 035 $aFED01000050916 035 $a(Aleph)000050916FED01 035 $a000050916 100 $a20001010d1975----km-y0itay50------ba 101 0 $aeng 102 $aUS 105 $ay-------001yy 200 1 $aAdvances in computers$fedited by M. Rubinoff and C. Y. Marshall 210 $aNev York$cAcademic Press$d1975 215 $aXI, 248 p.$cill.$d24 cm 225 1 $aAdvances in computers$v13 702 1$aRubinoff,$bMorris 702 1$aMarshall,$bC. Yovits 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990000509160403321 952 $a10 F III 24$b8684$fDINEL 952 $a02 52 C 16$b2198$fFINBN 959 $aFINBN 959 $aDINEL 996 $aAdvances in computers$9332902 997 $aUNINA DB $aING01