LEADER 01710nam0 22003133i 450 001 996287841803316 005 20190327144559.0 010 $a978-88-288-0851-0 100 $a20190111d2018----||||0itac50 ba 101 $aita 102 $aIT 200 1 $a<> riforma penitenziaria (dd.lgs. 121, 123, 124/2018)$ein vigore dal 10 novembre 2018$ela semplificazione delle procedure e la definizione agevolata dei procedimenti per i condannati fino a 18 mesi$ala riforma dell'assistenza sanitaria in ambito penitenziario$ale nuove disposizioni in materia di vita penitenziaria$ale novità in tema di lavoro penitenziario$acondannati minorenni: le misure penali di comunità, l'intervento educativo e la riorganizzazione degli istituti penali per i minorenni$fdi F. Fiorentin 210 $aMilano$cGiuffrè Francis Lefebvre$d2018 215 $a130 p.$d28 225 $aOfficina del diritto 410 0$1001000359355$12001$aOfficina del diritto 606 0 $aIstituti di prevenzione e di pena$xOrdinamento$yLegislazione$2BNCF 700 1$aFIORENTIN,$bFabio$0477760 801 0$aIT$bsalbc$gISBD 912 $a996287841803316 951 $aXXX.A. Coll. 223/ 166$b89659 G.$cXXX.A. Coll. 223/$d428000 959 $aBK 969 $aGIU 996 $aRiforma penitenziaria (dd.lgs. 121, 123, 124$91549210 996 $aCondannati minorenni: le misure penali di comunità, l'intervento educativo e la riorganizzazione degli istituti penali per i minorenni$91549214 996 $aLe nuove disposizioni in materia di vita penitenziaria$91549212 996 $aLa riforma dell'assistenza sanitaria in ambito penitenziario$91549211 996 $aLe novità in tema di lavoro penitenziario$91549213 997 $aUNISA LEADER 01140nam 2200385 450 001 9910586681303321 005 20221013030309.0 010 $a1-78984-292-1 035 $a(CKB)4950000000721712 035 $a(NjHacI)994950000000721712 035 $a(EXLCZ)994950000000721712 100 $a20221013d2021 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aLagomorpha characteristics /$fedited by Mari?a-Jose? Argente, Mari?a Luz Garcia Pardo, Kevin Dalton 210 1$aLondon, England :$cIntechOpen,$d[2021] 210 4$d©2021 215 $a1 online resource (144 pages) $cillustrations 311 $a1-78984-291-3 320 $aIncludes bibliographical references. 606 $aLagomorpha 615 0$aLagomorpha. 676 $a599.32 702 $aArgente$b Mari?a-Jose? 702 $aLuz Garcia Pardo$b Mari?a 702 $aDalton$b Kevin 801 0$bNjHacI 801 1$bNjHacl 906 $aBOOK 912 $a9910586681303321 996 $aLagomorpha Characteristics$92822338 997 $aUNINA LEADER 04772nam 22008415 450 001 9910484139203321 005 20251226200115.0 010 $a3-319-31863-2 024 7 $a10.1007/978-3-319-31863-9 035 $a(CKB)3710000000627372 035 $a(SSID)ssj0001658853 035 $a(PQKBManifestationID)16441664 035 $a(PQKBTitleCode)TC0001658853 035 $a(PQKBWorkID)14988016 035 $a(PQKB)11368931 035 $a(DE-He213)978-3-319-31863-9 035 $a(MiAaPQ)EBC6300618 035 $a(MiAaPQ)EBC5586403 035 $a(Au-PeEL)EBL5586403 035 $a(OCoLC)945921224 035 $a(PPN)192772066 035 $a(EXLCZ)993710000000627372 100 $a20160328d2016 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aIntelligence and Security Informatics $e11th Pacific Asia Workshop. PAISI 2016, Auckland, New Zealand, April 19, 2016, Proceedings /$fedited by Michael Chau, G. Alan Wang, Hsinchun Chen 205 $a1st ed. 2016. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2016. 215 $a1 online resource (XII, 203 p. 52 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v9650 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-319-31862-4 327 $aThe Use of Reference Graphs in the Entity Resolution of Criminal Networks -- Heterogeneous Information Networks Bi-clustering with Similarity Regularization -- A Profile-Based Authorship Attribution Approach to Forensic Identification in Chinese Online Messages -- Multilevel Syntactic Parsing Based on Recursive Restricted Boltzmann Machines and Learning to Rank -- Stratified Over-sampling Bagging Method for Random Forests on Imbalanced Data -- Revisiting Attribute Independence Assumption in Probabilistic Unsupervised Anomaly Detection -- Incremental Privacy-Preserving Association Rule Mining Using Negative Border -- Differentially Private Multi-task Learning -- Intelligent Recognition of Spontaneous Expression Using Motion Magnification of Spatio-Temporal Data -- Cyber security and Infrastructure Protection k-NN Classification of Malware in HTTPS Traffic Using the Metric Space Approach -- A Syntactic Approach for Detecting Viral Polymorphic Malware Variants -- Small State Acquisition of Offensive Cyber warfare Capabilities: Towards Building an Analytical Framework -- Data-Driven Stealthy Injection Attacks on Smart Grid with Incomplete Measurements -- Information Security in Software Engineering, Analysis of Developers Communications about Security in Social Q&A Website. 330 $aThis book constitutes the refereed proceedings of the 11th Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2016, held in Auckland, New Zealand, in April 2016 in conjunction with PAKDD 2016, the 20th Pacific-Asia Conference on Knowledge Discovery and Data Mining. The 7 revised full papers presented together with 7 short papers were carefully reviewed and selected from 23 submissions. The papers cover network-based data analytics, data and text mining, and cyber security and infrastructure protection. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v9650 606 $aData protection 606 $aInformation storage and retrieval systems 606 $aData mining 606 $aComputers and civilization 606 $aApplication software 606 $aArtificial intelligence 606 $aData and Information Security 606 $aInformation Storage and Retrieval 606 $aData Mining and Knowledge Discovery 606 $aComputers and Society 606 $aComputer and Information Systems Applications 606 $aArtificial Intelligence 615 0$aData protection. 615 0$aInformation storage and retrieval systems. 615 0$aData mining. 615 0$aComputers and civilization. 615 0$aApplication software. 615 0$aArtificial intelligence. 615 14$aData and Information Security. 615 24$aInformation Storage and Retrieval. 615 24$aData Mining and Knowledge Discovery. 615 24$aComputers and Society. 615 24$aComputer and Information Systems Applications. 615 24$aArtificial Intelligence. 676 $a005.8 702 $aChau$b Michael$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWang$b G. Alan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aChen$b Hsinchun$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484139203321 996 $aIntelligence and Security Informatics$9771944 997 $aUNINA