LEADER 01472nam0-2200421li-450 001 990000136750203316 005 20180312154842.0 010 $a88-7019-233-4 035 $a0013675 035 $aUSA010013675 035 $a(ALEPH)000013675USA01 035 $a0013675 100 $a20001109d1984----km-y0itay0103----ba 101 0 $aita 102 $aIT 200 1 $a<> robot industriali$egestione e applicazioni pratiche$fJoseph F. Engelberger$gintroduzione di Isaac Asimov$gpresentazione e appendice a cura di Daniele Fabrizi$g[traduzione di Maria Chiara Galavotti Salmon con la collaborazione di Mario Salmon] 210 $aBologna$cCalderini$dcopyr. 1984 215 $aXVI, 204 p.$cill.$d24 cm 312 $aTrad. di: robotics in practice 312 $aTrad. di: Robotics in practice 454 0$12001$aRobotics in practice$928537 610 1 $arobot$aapplicazioni nell'industria 676 $a629892$9. 700 1$aEngelberger,$bJoseph F.$03976 702 1$aASIMOV,$bIsaac 702 1$aFabrizi,$bDaniele 801 $aSistema bibliotecario di Ateneo dell' Università di Salerno$gRICA 912 $a990000136750203316 951 $a629.892 ENG (A)$b0000748 959 $aBK 969 $aTEC 979 $c19910409 979 $c20001110$lUSA01$h1711 979 $c20020403$lUSA01$h1621 979 $aPATRY$b90$c20040406$lUSA01$h1610 979 $aPATRY$b90$c20070829$lUSA01$h0932 996 $aRobotics in practice$928537 997 $aUNISA LEADER 01021nam--2200349---450- 001 990005779090203316 005 20121113103022.0 035 $a000577909 035 $aUSA01000577909 035 $a(ALEPH)000577909USA01 035 $a000577909 100 $a20121113d19551954km-y0itay50------ba 101 0 $aita$agrc 102 $aIT 105 $aaf||z|||001yy 200 1 $aIstorie$fErodoto$gantologia di passi scelti e coordinati a cura di Dino Alasia 205 $a5. ed 210 $aFirenze$cLa nuova Italia$d1955 (stampa 1954) 215 $a239 p., [2] carte di tav.$cill.$d21 cm 225 2 $a<> classici della Nuova Italia$v6 410 0$12001$a<> classici della Nuova Italia$v6 676 $a930 700 0$aHERODOTUS$0162857 702 1$aALASIA,$bDino 801 0$aIT$bsalbc$gISBD 912 $a990005779090203316 951 $aXV.8. 92$b221964 L.M.$cXV.8. 959 $aBK 969 $aFSO 979 $aANNAMARIA$b90$c20121113$lUSA01$h1030 996 $aIstorie$9283893 997 $aUNISA LEADER 01754nam a2200277 i 4500 001 991000652719707536 008 080513s2007 caua b 001 0 eng d 020 $a0596009631 020 $a9780596009632 035 $ab13890463-39ule_inst 040 $aDip.to Ingegneria dell'Innovazione$beng 082 0 $a005.8$222 245 00$aSecurity power tools /$cBryan Burns ... [et al.] 260 $aBeijing :$bO'Reilly,$cc2007 300 $axxxii, 822 p. :$bill. ;$c24 cm 504 $aIncludes bibliographical references and index 505 0 $aPart 1. Legal and ethics. Legal and ethics issues -- Part 2. Reconnaissance. Network scanning -- Vulnerability scanning -- LAN reconnaissance -- Wireless reconnaissance -- Custom packet generation -- Part 3. Penetration. Metasploit -- Wireless penetration -- Exploitation framework applications -- Custom exploitation -- Part 4. Control. Backdoors -- Rootkits -- Part 5. Defense. Proactive defense : firewalls -- Host hardening -- Securing communications -- Email security and anti-spam -- Device security testing -- Part 6. Monitoring. Network capture -- Network monitoring -- Host monitoring -- Part 7. Discovery. Forensics -- Application fuzzing -- Binary reverse engineering. 650 4$aComputer networks$xSecurity measures 650 4$aComputer security 700 1 $aBurns, Bryan$eauthor$4http://id.loc.gov/vocabulary/relators/aut$0151784 907 $a.b13890463$b28-01-14$c24-03-10 912 $a991000652719707536 945 $aLE026 005.8 D BUR 01.01 2007$g1$i2026000055701$lle026$nProf. Tommasi / Biblioteca$op$pE46.89$q-$rn$s- $t1$u0$v0$w0$x0$y.i15098217$z25-03-10 996 $aSecurity power tools$91440779 997 $aUNISALENTO 998 $ale026$b13-05-08$cm$da $e-$feng$gcc $h0$i0