LEADER 01050nam0-22003251i-450- 001 990006786100403321 005 20001010 035 $a000678610 035 $aFED01000678610 035 $a(Aleph)000678610FED01 035 $a000678610 100 $a20001010d--------km-y0itay50------ba 101 0 $aita 105 $ay-------001yy 200 1 $aReddito di impresa e reddito professionale$fMaria Antonietta Grippa Salvetti 210 $aMilano$cA. Giuffrè$d1993. 215 $a140 p.$d21 cm 225 1 $aUniversita di Pisa. Seminario per le scienze giuridiche e politiche. Pubblicazioni$v38 610 0 $aImprese - Redditi - Tributi - Legislazione 610 0 $aLavoratori autonomi - Tributi - Legislazione 676 $a343.450526 700 1$aGrippa Salvetti,$bMaria Antonietta$0240670 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990006786100403321 952 $aUNIV. 164 (38)$b22251$fFSPBC 959 $aFSPBC 996 $aReddito di impresa e reddito professionale$9635745 997 $aUNINA DB $aGEN01 LEADER 01764nlm0 22004931i 450 001 990009253460403321 010 $a9783540689140 035 $a000925346 035 $aFED01000925346 035 $a(Aleph)000925346FED01 035 $a000925346 100 $a20100926d2008----km-y0itay50------ba 101 0 $aeng 102 $aDE 135 $adrnn-008mamaa 200 1 $aApplied Cryptography and Network Security$bRisorsa elettronica$e6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings$fedited by Steven M. Bellovin, Rosario Gennaro, Angelos Keromytis, Moti Yung 210 $aBerlin ; Heidelberg$cSpringer$d2008 225 1 $aLecture Notes in Computer Science$x0302-9743$v5037 230 $aDocumento elettronico 336 $aTesto 337 $aFormato html, pdf 702 1$aBellovin,$bSteven M. 702 1$aGennaro,$bRosario 702 1$aKeromytis,$bAngelos 702 1$aYung,$bMoti 801 0$aIT$bUNINA$gREICAT$2UNIMARC 856 4 $zFull text per gli utenti Federico II$uhttp://dx.doi.org/10.1007/978-3-540-68914-0 901 $aEB 912 $a990009253460403321 961 $aComputer Communication Networks 961 $aComputer Communication Networks 961 $aComputer science 961 $aComputer Science 961 $aComputers and Society 961 $aData Encryption 961 $aData encryption (Computer science) 961 $aData protection 961 $aInformation systems 961 $aInformation Systems 961 $aInformation Systems Applications (incl.Internet) 961 $aManagement of Computing and Information Systems 961 $aSystems and Data Security 996 $aApplied Cryptography and Network Security$9771881 997 $aUNINA LEADER 01238nam 2200349Ia 450 001 996393906503316 005 20221108042903.0 035 $a(CKB)4940000000116220 035 $a(EEBO)2240920444 035 $a(OCoLC)11875857 035 $a(EXLCZ)994940000000116220 100 $a19850402d1687 uy | 101 0 $aeng 135 $aurbn||||a|bb| 200 12$aA third letter to A person of quality$b[electronic resource] $ebeing a vindication of the former, in answer to a late pamphlet intituled A discourse of the use of images, &c 210 $aLondon $cPrinted for Ben. Griffin, and are to be sold by Randal Taylor...$d1687 215 $a[3], 34 p 300 $aAttributed to Edward Pelling. Cf. Halkett & Laing (2nd ed.) 300 $a"The former" is a reference to: The antiquity of the Protestant religion. 300 $aReproduction of original in Huntington Library. 330 $aeebo-0113 606 $aIdols and images 615 0$aIdols and images. 700 $aPelling$b Edward$fd. 1718.$01001494 801 0$bEAA 801 1$bEAA 801 2$bm/c 801 2$bWaOLN 906 $aBOOK 912 $a996393906503316 996 $aA third letter to A person of quality$92369698 997 $aUNISA