LEADER 02150nam 2200589 a 450 001 9910455030003321 005 20200520144314.0 010 $a1-281-25259-X 010 $a1-84719-241-6 035 $a(CKB)1000000000774620 035 $a(EBL)944980 035 $a(OCoLC)796383997 035 $a(SSID)ssj0000336828 035 $a(PQKBManifestationID)12061763 035 $a(PQKBTitleCode)TC0000336828 035 $a(PQKBWorkID)10283954 035 $a(PQKB)11050572 035 $a(MiAaPQ)EBC944980 035 $a(PPN)228016193 035 $a(Au-PeEL)EBL944980 035 $a(CaPaEBR)ebr10453745 035 $a(CaONFJC)MIL125259 035 $a(EXLCZ)991000000000774620 100 $a20110408d2007 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aDocumentum content management foundations$b[electronic resource] $eEMC proven professional certification exam E20-120 study guide : learn the technical fundamentals of the EMC documentum platform while effectively preparing for the E20-120 exam /$fPawan Kumar 210 $aBirmingham, U.K. $cPackt Pub.$d2007 215 $a1 online resource (285 p.) 225 1 $aFrom technologies to solutions 300 $aIncludes index. 311 $a1-84719-240-8 327 $apt. 1. Fundamentals -- pt. 2. Security -- pt. 3. User interface -- pt. 4. Application development -- pt. 5. Advanced concepts. 330 $aLearn the technical fundamentals of the EMC Documentum platform while effectively preparing for the E20-120 exam 410 0$aFrom technologies to solutions. 606 $aWeb sites$xManagement$xExaminations$vStudy guides 606 $aDatabase management$xExaminations$vStudy guides 608 $aElectronic books. 615 0$aWeb sites$xManagement$xExaminations 615 0$aDatabase management$xExaminations 676 $a005.74 700 $aKumar$b Pawan$0879207 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910455030003321 996 $aDocumentum content management foundations$92205949 997 $aUNINA LEADER 06079nam 22008655 450 001 996465313803316 005 20200704024206.0 010 $a3-642-04766-1 024 7 $a10.1007/978-3-642-04766-4 035 $a(CKB)1000000000784730 035 $a(SSID)ssj0000318194 035 $a(PQKBManifestationID)11205753 035 $a(PQKBTitleCode)TC0000318194 035 $a(PQKBWorkID)10307955 035 $a(PQKB)10373222 035 $a(DE-He213)978-3-642-04766-4 035 $a(MiAaPQ)EBC3064632 035 $a(PPN)139958975 035 $a(EXLCZ)991000000000784730 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aIdentity and Privacy in the Internet Age$b[electronic resource] $e14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009, Proceedings /$fedited by Audun Jøsang, Torleiv Maseng, Svein J. Knapskog 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (X, 303 p.) 225 1 $aSecurity and Cryptology ;$v5838 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-04765-3 320 $aIncludes bibliographical references and index. 327 $aSession 1: Anonymity and Privacy -- On the Effectiveness of Privacy Breach Disclosure Legislation in Europe: Empirical Evidence from the US Stock Market -- Facilitating the Adoption of Tor by Focusing on a Promising Target Group -- A Parallelism-Based Approach to Network Anonymization -- Security Usability of Petname Systems -- Session 2: Modelling and Design -- An Analysis of Widget Security -- Trade-Offs in Cryptographic Implementations of Temporal Access Control -- Blunting Differential Attacks on PIN Processing APIs -- Session 3: Network Layer Security -- Characterising Anomalous Events Using Change - Point Correlation on Unsolicited Network Traffic -- An Improved Attack on TKIP -- Session 4: Security for Mobile Users -- ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System -- A Mechanism for Identity Delegation at Authentication Level -- Introducing Sim-Based Security Tokens as Enabling Technology for Mobile Real-Time Services -- Towards True Random Number Generation in Mobile Environments -- Session 5: Embedded Systems and Mechanisms -- Towards Modelling Information Security with Key-Challenge Petri Nets -- Security and Trust for the Norwegian E-Voting Pilot Project E-valg 2011 -- Advanced SIM Capabilities Supporting Trust-Based Applications -- Towards Practical Enforcement Theories -- Session 6: Protocols and Protocol Analysis -- Security Analysis of AN.ON?s Payment Scheme -- Formal Analysis of the Estonian Mobile-ID Protocol -- Generating In-Line Monitors for Rabin Automata. 330 $aThis book constitutes the refereed proceedings of the 14th International Conference on Secure IT Systems, NordSec 2009, held in Oslo, Norway, October 14-16, 2009. The 20 revised full papers and 8 short papers presented were carefully reviewed and selected from 52 submissions. Under the theme Identity and Privacy in the Internet Age, this year's conference explored policies, strategies and technologies for protecting identities and the growing flow of personal information passing through the Internet and mobile networks under an increasingly serious threat picture. Among the contemporary security issues discussed were Security Services Modeling, Petri Nets, Attack Graphs, Electronic Voting Schemes, Anonymous Payment Schemes, Mobile ID-Protocols, SIM Cards, Network Embedded Systems, Trust, Wireless Sensor Networks, Privacy, Privacy Disclosure Regulations, Financial Cryptography, PIN Verification, Temporal Access Control, Random Number Generators, and some more. 410 0$aSecurity and Cryptology ;$v5838 606 $aApplication software 606 $aInformation storage and retrieval 606 $aCoding theory 606 $aInformation theory 606 $aComputer security 606 $aData structures (Computer science) 606 $aData encryption (Computer science) 606 $aComputer Applications$3https://scigraph.springernature.com/ontologies/product-market-codes/I23001 606 $aInformation Storage and Retrieval$3https://scigraph.springernature.com/ontologies/product-market-codes/I18032 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aData Structures and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15009 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 608 $aKongress.$2swd 608 $aOslo (2009)$2swd 615 0$aApplication software. 615 0$aInformation storage and retrieval. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aComputer security. 615 0$aData structures (Computer science). 615 0$aData encryption (Computer science). 615 14$aComputer Applications. 615 24$aInformation Storage and Retrieval. 615 24$aCoding and Information Theory. 615 24$aSystems and Data Security. 615 24$aData Structures and Information Theory. 615 24$aCryptology. 676 $a005.8 686 $aDAT 461f$2stub 686 $aSS 4800$2rvk 702 $aJøsang$b Audun$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMaseng$b Torleiv$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKnapskog$b Svein J$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aNordic Conference on Secure IT Systems 906 $aBOOK 912 $a996465313803316 996 $aIdentity and Privacy in the Internet Age$9773685 997 $aUNISA LEADER 01055cam a22002774a 4500 001 991000321509707536 005 20080623084455.0 008 080505s2008 it a b 001 0dita d 010 $a2008355406 020 $a9788815124166 035 $ab13840885-39ule_inst 040 $aDip.to Studi Storici$bita 082 $a929.75 100 1 $aFiorentino, Carlo M.$0471624 245 13$aLa corte dei Savoia, 1849-1900 /$cCarlo M. Fiorentino 260 $aBologna :$bIl mulino,$c[2008] 300 $a367 p. :$bill. ;$c22 cm. 490 0 $aBiblioteca storica 600 30$aSavoia $xCorte$y1849-1900 907 $a.b13840885$b28-01-14$c08-07-09 912 $a991000321509707536 945 $aLE023 929.75 FIO 1 1 $g1$i2023000110522$lle023$o-$pE27.00$q-$rn$so $t0$u0$v0$w0$x0$y.i14989852$z08-07-09 945 $aLE023 929.75 FIO 1 1 bis$g1$i2023000113660$lle023$o-$pE27.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i15029414$z16-11-09 996 $aCorte dei Savoia, 1849-1900$9229458 997 $aUNISALENTO 998 $ale023$b08-07-09$cm$da $e-$fita$git $h3$i0