LEADER 01466cam0-22005051i-450- 001 990003362620403321 005 20051123120348.0 010 $a88-15-04709-3 035 $a000336262 035 $aFED01000336262 035 $a(Aleph)000336262FED01 035 $a000336262 100 $a20030910d1994----km-y0itay50------ba 101 0 $aita 102 $aIT 105 $ay-------001yy 200 1 $aAlla scoperta del possibile$eil mondo sorprendente di Albert O. Hirschman$fLuca Meldolesi 210 $aBologna$cil Mulino$dc1994 215 $a417 p.$d23 cm 225 1 $aSaggi$d0426 610 0 $aHirschman, Albert O.$aPensiero economico 676 $a330.1 676 $a330.092 700 1$aMeldolesi,$bLuca$f<1939- >$023463 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990003362620403321 952 $aMEL330.1B$b7197A$fDECBC 952 $aMEL330.1C$b7197C$fDECBC 952 $aMEL330.1D$b7237B$fDECBC 952 $aMEL330.1A$b7201B$fDECBC 952 $aMEL330.1E$b7197B$fDECBC 952 $aMEL330.1I$b7201A$fDECBC 952 $aMEL330.1F$b7237A$fDECBC 952 $aMEL330.1G$b7197D$fDECBC 952 $aMEL330.1H$b7201C$fDECBC 952 $aC/1 MEL/94$b15438$fSES 952 $aCOLLEZ. 75 (426)$b24919$fFSPBC 952 $aCollez. 117 (426)$b30264*$fFGBC 959 $aSES 959 $aFSPBC 959 $aDECBC 959 $aFGBC 996 $aAlla scoperta del possibile$9443401 997 $aUNINA LEADER 05483nam 2200661Ia 450 001 9910451453303321 005 20200520144314.0 010 $a1-281-00412-X 010 $a9786611004125 010 $a0-08-047557-4 035 $a(CKB)1000000000341465 035 $a(EBL)291716 035 $a(OCoLC)476050978 035 $a(SSID)ssj0000243166 035 $a(PQKBManifestationID)11210992 035 $a(PQKBTitleCode)TC0000243166 035 $a(PQKBWorkID)10320789 035 $a(PQKB)11565679 035 $a(MiAaPQ)EBC291716 035 $a(Au-PeEL)EBL291716 035 $a(CaPaEBR)ebr10172761 035 $a(CaONFJC)MIL100412 035 $a(EXLCZ)991000000000341465 100 $a20060922d2006 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 00$aSecuring HP NonStop servers in an open systems world$b[electronic resource] $eTCP/IP, OSS & SQL /$fXYPRO Technology 210 $aBurlington, MA $cElsevier Digital Press$dc2006 215 $a1 online resource (1001 p.) 300 $aIncludes index. 311 $a1-55558-344-X 327 $aFront Cover; Securing HP Non-StopTM Servers in an Open Systems World; Copyright Page; Contents; Foreword; Preface; Distinguished Contributors; Introduction; A Wider Perspective; Some New Terms; About This Handbook; Applying the Security; Chapter 1. Compliance Concepts; Representative Regulations; Analysis of Requirements in Common; Conclusions; Chapter 2. Changes to Safeguard Since G06.21; Safeguard Changes Included in Release G06.21; Safeguard Changes Included in Release G06.22; Safeguard Changes Included in Release G06.23; Safeguard Changes Included in Release G06.24; Explicit Nodes Example 327 $aSafeguard Changes Included in Release G06.25 Safeguard Changes Included in Release G06.26; Safeguard Changes Included in Release G06.27; Safeguard Changes Included in Release G06.28; Safeguard Changes Included in Release G06.29; Safeguard Subsystem Component Updates; Chapter 3. Securing Pathway Applications; Pathway Development; Pathway Run-Time Components; Chapter 4. TCP/IP; TCP/IP Security; TCP/IP Architecture; HP Non-Stop Server Implementation of TCP/IP; TCP/IP Applications; Firewalls and Routers; VPN; SSH Subsystem; Chapter 5. File Sharing Programs; Network File System (NFS) Subsystem 327 $aSamba Chapter 6. Non-Stop SQL and Database Security; What is Database Security?; Compiling and Executing Non-Stop SQL Programs; Securing Client Queries from ODBC/MX and JDBC/MX; Securing Dynamic SQL Queries; Non-Stop SQL Interactions with other Utilities; Chapter 7. Open Database Connectivity (ODBC) SQL/MP; Security Configuration; Auditing in ODBC; Other ODBC Programs and Utilities; Chapter 8. System Management Tools; Tandem Service Management (TSM) Subsystem; Open System Management (OSM); Distributed Systems Management/Software Configuration Manager; Chapter 9. The Guardian Gazette A-Z 327 $aADDTOSCF ScriptADDTCPIP Script; ALTERIP Script; APPPRVD System Program; APPSRVR System Program; CIMON System Program; CONFIG System Configuration File; CTCPIP0 and CTCPIP1 Scripts; CEVSMX System Program; Distributed Systems Management/Software Configuration Manager (DSM/SCM); ENOFT User Program; EVNTPRVD System Program; EVTMGR Program; FDIST System Program; FSCK System Utility; IAPRVD System Program; IAREPO File; IMPORT System Program; INIT0 and INIT1 Scripts; INITRD File; Integrity Non-Stop Compilers; LISTNER System Utility; LOGTCPIP Log File; LOGSCF Log Fill 8e; LOGTCP0 and LOGTCP1 Log File 327 $aLOGTCPIP Log File MXANCHOR File Configuration File; MXAUDSRV System Program; MXCMP User Program; MXESP System Program; MXGNAMES System Program; MXOAS System Program; MXOCFG System Program; MXODSN Configuration File; MXOMSG File; MXOSRVR System Program; MXRTDSRV System Program; MXUDR System Program; MXUTP System Program; Network File System (NFS) Subsystem; NFS; NOS System Program; NOSCOM User Program; NOSUTIL System Program; NS System Program; OSMINI Configuration File; OSSFM System Program; Object Code Accelerator (OCA) User Program; OEVPRVD System Program; OSH User Program 327 $aOpen System Management (OSM) 330 $aRecent corporate events have exposed the frequency and consequences of poor system security implementations and inadequate protection of private information. In a world of increasingly complex computing environments, myriad compliance regulations and the soaring costs of security breaches, it is economically essential for companies to become proactive in implementing effective system and data security measures. This volume is a comprehensive reference for understanding security risks, mitigations and best practices as they apply to the various components of these business-critical computing 606 $aClient/server computing$xSecurity measures 606 $aHewlett-Packard computers$xSecurity measures 606 $aComputer security 608 $aElectronic books. 615 0$aClient/server computing$xSecurity measures. 615 0$aHewlett-Packard computers$xSecurity measures. 615 0$aComputer security. 676 $a005.8 676 $a005.8 22 712 02$aXYPRO Technology Corporation. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910451453303321 996 $aSecuring HP NonStop servers in an open systems world$92471929 997 $aUNINA LEADER 01402nam 2200349Ia 450 001 996396765903316 005 20221108025100.0 035 $a(CKB)4330000000347437 035 $a(EEBO)2240871227 035 $a(OCoLC)19135330 035 $a(EXLCZ)994330000000347437 100 $a19890210d1689 uy | 101 0 $aeng 135 $aurbn||||a|bb| 200 14$aThe second part of The amours of Messalina, late Queen of Albion$b[electronic resource] $ewherein the secret court intrigues of the four last years reign are further pursued, particularly the imposture of the child /$fby a woman of quality .. 210 $aLondon $cPrinted for John Lyford$d1689 215 $a[4], 42 [i.e. 32] p 300 $aSometimes attributed to Gregorio Leti. Cf. NUC pre-1956 imprints. 300 $aA libel on Mary of Modena, Queen consort of James II. Cf. NUC pre-1956 imprints. 300 $aError in paging: p. 27-32 misprinted 37-42. 300 $aReproduction of the original in the Bodleian Library. 330 $aeebo-0014 607 $aGreat Britain$xHistory$y1660-1714 700 $aWoman of quality$ffl. 1689-1690.$01008787 701 $aLeti$b Gregorio$f1630-1701.$0192430 801 0$bUMI 801 1$bUMI 801 2$bWaOLN 906 $aBOOK 912 $a996396765903316 996 $aThe second part of The amours of Messalina, late Queen of Albion$92349457 997 $aUNISA