LEADER 00879cam0 2200253 450 001 E600200029689 005 20210402074608.0 100 $a20070928d1912 |||||ita|0103 ba 101 $aita 102 $aIT 200 1 $aCirca l'età e la natura della lex latina di Eraclea$fEttore Pais 210 $aPisa$cSpoerri$d1912 215 $a43-108 p.$d23 cm 300 $aEstr. da : "Studi Storici per l'antichità classica", V(1912)1-2 700 1$aPais$b, Ettore$3A600200043561$4070$0137588 801 0$aIT$bUNISOB$c20210402$gRICA 850 $aUNISOB 852 $aUNISOB$j900$m77972 912 $aE600200029689 940 $aM 102 Monografia moderna SBN 941 $aM 957 $a900$b002756$gSi$d77972$racquisto$1pregresso3$2UNISOB$3UNISOB$420070928084422.0$520210402074608.0$6rovito 996 $aCirca l'età e la natura della lex latina di Eraclea$9809625 997 $aUNISOB LEADER 02511nam 22005415 450 001 996465713403316 005 20230329163105.0 010 $a3-319-94496-7 024 7 $a10.1007/978-3-319-94496-8 035 $a(CKB)3810000000358704 035 $a(DE-He213)978-3-319-94496-8 035 $a(MiAaPQ)EBC6284681 035 $a(PPN)229494765 035 $a(EXLCZ)993810000000358704 100 $a20180619d2018 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aEngineering Secure Software and Systems$b[electronic resource] $e10th International Symposium, ESSoS 2018, Paris, France, June 26-27, 2018, Proceedings /$fedited by Mathias Payer, Awais Rashid, Jose M. Such 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (IX, 133 p. 36 illus.) 225 1 $aTheoretical Computer Science and General Issues,$x2512-2029 ;$v10953 300 $aIncludes index. 311 $a3-319-94495-9 330 $aThis book constitutes the refereed proceedings of the 10th International Symposium on Engineering Secure Software and Systems, ESSoS 2018, held in Paris, France, in June 2018. The 10 papers, consisting of 7 regular and 3 idea papers, were carefully reviewed and selected from 26 submissions. They focus on the construction of secure software, which is becoming an increasingly challenging task due to the complexity of modern applications, the growing sophistication of security requirements, the multitude of available software technologies, and the progress of attack vectors. 410 0$aTheoretical Computer Science and General Issues,$x2512-2029 ;$v10953 606 $aData protection 606 $aComputers 606 $aData and Information Security 606 $aComputing Milieux 615 0$aData protection. 615 0$aComputers. 615 14$aData and Information Security. 615 24$aComputing Milieux. 676 $a005.8 702 $aPayer$b Mathias$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aRashid$b Awais$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSuch$b Jose M$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465713403316 996 $aEngineering Secure Software and Systems$9774151 997 $aUNISA