LEADER 01372nam2-2200373---450- 001 990003233440203316 005 20090504132118.0 010 $a978-1-4073-0378-9 035 $a000323344 035 $aUSA01000323344 035 $a(ALEPH)000323344USA01 035 $a000323344 100 $a20090504d2009----km-y0itay50------ba 101 0 $aeng 102 $aGB 105 $a||||||||001yy 200 1 $aImage and ritual in the Aztec world$eselected papers of the ?Ritual Americas? conferences$forganized by the Société des Américanistes de Belgique in collaboration with the Red Europea de Estudios Amerindios, Louvain-la-Neuve (Belgium), 2-5 April 2008$gedited by Sylvie Peperstraete 210 $aOxford$cArcheopress$d2009 215 $a134 p.$cill.$d30 cm 225 2 $aBAR International series$v1896 410 0$1001000018484$aBAR International series 606 0 $aScavi archeologici$yMessico$2BNCF 676 $a972.018 702 1$aPEPERSTRAETE,$bSylvie 712 02$aSociété des Américanistes de Belgique 801 0$aIT$bsalbc$gISBD 912 $a990003233440203316 951 $aXI.5. Coll.12/539$b216118 LM$cXI.5.$d00190614 959 $aBK 969 $aUMA 979 $aSENATORE$b90$c20090504$lUSA01$h1314 979 $aSENATORE$b90$c20090504$lUSA01$h1321 996 $aImage and ritual in the Aztec world$91013645 997 $aUNISA LEADER 03961nam 22007815 450 001 996202526603316 005 20200701104635.0 010 $a3-319-10506-X 024 7 $a10.1007/978-3-319-10506-2 035 $a(CKB)3710000000228638 035 $a(SSID)ssj0001354085 035 $a(PQKBManifestationID)11768665 035 $a(PQKBTitleCode)TC0001354085 035 $a(PQKBWorkID)11322495 035 $a(PQKB)10799229 035 $a(DE-He213)978-3-319-10506-2 035 $a(MiAaPQ)EBC6294958 035 $a(MiAaPQ)EBC5595617 035 $a(Au-PeEL)EBL5595617 035 $a(OCoLC)890600881 035 $a(PPN)181351609 035 $a(EXLCZ)993710000000228638 100 $a20140903d2014 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aComputer Safety, Reliability, and Security$b[electronic resource] $e33rd International Conference, SAFECOM 2014, Florence, Italy, September 10-12, 2014. Proceedings /$fedited by Andrea Bondavalli, Felicita Di Giandomenico 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (XXIV, 356 p. 131 illus.) 225 1 $aProgramming and Software Engineering ;$v8666 300 $aIncludes index. 311 $a3-319-10505-1 327 $aVerification &Validation Techniques -- Automotive Systems -- Coverage Models and Mitigation Techniques -- Assurance cases and arguments -- System Analysis -- Security and Trust -- Notations/Languages for Safety-related aspects -- Safety and Security. 330 $aThis book constitutes the refereed proceedings of the 33nd International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2014, held in Florence, Italy, in September 2014. The 20 revised full papers presented together with 3 practical experience reports were carefully reviewed and selected from 85 submissions. The papers are organized in topical sections on fault injection techniques, verification and validation techniques, automotive systems, coverage models and mitigation techniques, assurance cases and arguments, system analysis, security and trust, notations/languages for safety related aspects, safety and security. 410 0$aProgramming and Software Engineering ;$v8666 606 $aComputer logic 606 $aComputer organization 606 $aSoftware engineering 606 $aComputer security 606 $aApplication software 606 $aLogics and Meanings of Programs$3https://scigraph.springernature.com/ontologies/product-market-codes/I1603X 606 $aComputer Systems Organization and Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13006 606 $aSoftware Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I14029 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Applications$3https://scigraph.springernature.com/ontologies/product-market-codes/I23001 615 0$aComputer logic. 615 0$aComputer organization. 615 0$aSoftware engineering. 615 0$aComputer security. 615 0$aApplication software. 615 14$aLogics and Meanings of Programs. 615 24$aComputer Systems Organization and Communication Networks. 615 24$aSoftware Engineering. 615 24$aSystems and Data Security. 615 24$aComputer Applications. 676 $a005.8 702 $aBondavalli$b Andrea$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDi Giandomenico$b Felicita$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996202526603316 996 $aComputer Safety, Reliability, and Security$92175020 997 $aUNISA LEADER 01240nas a2200301 i 4500 001 991002996659707536 005 20240129152452.0 008 071105c19869999gw mr p 0 a ger d 022 0 $a0179-1990 035 $ab13613728-39ule_inst 040 $aDip.to Studi Giuridici$bita 082 0 $a681.3 245 00$aComputer und Recht :$bForum für die Praxis des Rechts der Datenverarbeitung, Kommunikation und Automation 246 03$aCR 246 03$aCuR. Computer und Recht 260 $aKöln :$bO. Schmidt,$c1986- 500 $aVaria il complemento del titolo 500 $aCod. CNR: PT01086174 592 $aLE027 2007-2009; 907 $a.b13613728$b02-04-14$c05-11-07 912 $a991002996659707536 945 $aLE027$c2007$g1$iLE027-23097$lle027$on$pE406.40$q-$rn$so$t18$u0$v0$w0$x0$y.i14594821$z05-11-07 945 $aLE027$g1$lle027$op$pE0.00$q-$rn$so$t18$u0$v0$w0$x0$y.i14594833$z05-11-07 945 $aLE027$c2008$g1$iLE027-24536$lle027$on$pE368.00$q-$rn$so$t18$u0$v0$w0$x0$y.i1469928x$z19-03-08 945 $aLE027$c2009$g1$iLE027-27250$lle027$on$pE389.34$q-$rn$so$t18$u0$v0$w0$x0$y.i14956858$z21-04-09 996 $aComputer und Recht$91216572 997 $aUNISALENTO 998 $ale027$b05-11-07$cs$da$e-$fger$ggw$h0$i0