LEADER 01346nam a22002651i 4500 001 991001201249707536 005 20031209200542.0 008 040407s1934 it |||||||||||||||||ita 035 $ab12734263-39ule_inst 035 $aARCHE-071390$9ExL 040 $aDip.to Scienze Storiche$bita$cA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l. 082 04$a945.107 110 2 $aSardegna $05552 245 10$aDispacci di Corte, Ministeriali e Vice-regi concernenti gli affari politici, giuridici ed ecclesiastici del Regno di Sardegna :$b1720-1721 /$ca cura del dott. Francesco Loddo-Canepa 260 $aRoma :$bSocietà nazionale per la storia del Risorgimento,$c1934 300 $aXXVII, 271 p. ;$c26 cm 440 0$aBiblioteca Scientifica.$nSerie 2,$pFonti ;$v1 650 4$aRegno di Sardegna. 1717-1861$y1720-1721$xFonti 700 1 $aLoddo Canepa, Francesco$eauthor$4http://id.loc.gov/vocabulary/relators/aut$0185002 907 $a.b12734263$b02-04-14$c16-04-04 912 $a991001201249707536 945 $aLE009 STOR.63-153b/1$g1$i2009000213852$lle009$o-$pE0.00$q-$rn$so $t0$u0$v0$w0$x0$y.i13268910$z16-04-04 996 $aDispacci di Corte, Ministeriali e Vice-regi concernenti gli affari politici, giuridici ed ecclesiastici del Regno di Sardegna$93369568 997 $aUNISALENTO 998 $ale009$b16-04-04$cm$da $e-$fita$git $h0$i1 LEADER 02390nam 2200625 450 001 9910164930703321 005 20240214223409.0 010 $a0-19-068654-5 010 $a0-19-069469-6 035 $a(CKB)3710000001064425 035 $a(StDuBDS)EDZ0001679759 035 $a(MiAaPQ)EBC4806712 035 $a(PPN)203705807 035 $a(EXLCZ)993710000001064425 100 $a20170509d2016 fy| 0 101 0 $aeng 135 $aur||||||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 14$aThe cybersecurity dilemma $ehacking, trust, and fear between nations /$fBen Buchanan 210 1$aOxford :$cOxford University Press,$d2016. 215 $a1 online resource (viii, 290 p.) 311 $a0-19-066501-7 320 $aIncludes bibliographical references and index. 330 8 $aWhy do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This text draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that intruding into other countries' networks has enormous defensive value as well. 606 $aCyber intelligence (Computer security) 606 $aCyberterrorism$xPrevention 606 $aNational security$xTechnological innovations 606 $aInternet$xSecurity measures 606 $aInternet$9eng$2eurovoc 606 $acomputer crime$9eng$2eurovoc 606 $ainnovation$9eng$2eurovoc 606 $aartificial intelligence$9eng$2eurovoc 606 $acomputer piracy$9eng$2eurovoc 606 $afight against crime$9eng$2eurovoc 615 0$aCyber intelligence (Computer security) 615 0$aCyberterrorism$xPrevention. 615 0$aNational security$xTechnological innovations. 615 0$aInternet$xSecurity measures. 615 7$aInternet 615 7$acomputer crime 615 7$ainnovation 615 7$aartificial intelligence 615 7$acomputer piracy 615 7$afight against crime 676 $a005.8 686 $a32.24.56$2EP-CLASS 700 $aBuchanan$b Ben$01222753 801 0$bStDuBDS 801 1$bStDuBDS 906 $aBOOK 912 $a9910164930703321 996 $aThe cybersecurity dilemma$92836490 997 $aUNINA