LEADER 01842nam 2200373 n 450 001 996396661303316 005 20221108032755.0 035 $a(CKB)4330000000333662 035 $a(EEBO)2240940754 035 $a(UnM)99872720 035 $a(EXLCZ)994330000000333662 100 $a19860130d1661 uy | 101 0 $aeng 135 $aurbn||||a|bb| 200 12$aA sermon preached at the magnificent coronation of the most high and mighty King Charles the IId. King of Great Britain, France, and Ireland, defender of the faith, &c$b[electronic resource] $eAt the collegiate church of S. Peter Westminster, the 23d of April, (being S. George's Day) 1661. By the Right Reverend Father in God, George Lord Bishop of Worcester. Published by His Majesty's speciall command 210 $aLondon $cPrinted by R. Norton for T. Garthwait, at the Little North Door of S. Paul's$d1661 215 $a[8], 62, [2] p., [2] leaves of plates $cport 300 $aRunning title reads: A sermon preached at the coronation. 300 $aIn this edition the last line of B1r has "King.". Quires A and F-I are partly in the same setting as the edition with "Kings.". 300 $aThe last leaf is blank. 300 $aThe illustrations are filmed with preceding item on film. 300 $aReproduction of the original in the British Library. 330 $aeebo-0018 606 $aSermons, English$y17th century 615 0$aSermons, English 700 $aMorley$b George$f1597-1684.$01001151 801 0$bCu-RivES 801 1$bCu-RivES 801 2$bCStRLIN 801 2$bWaOLN 906 $aBOOK 912 $a996396661303316 996 $aA sermon preached at the magnificent coronation of the most high and mighty King Charles the IId. King of Great Britain, France, and Ireland, defender of the faith, &c$92403237 997 $aUNISA LEADER 01010nam a22002531i 4500 001 991002273169707536 005 20030526154725.0 008 030925s1970 it |||||||||||||||||ita 035 $ab12266000-39ule_inst 035 $aARCHE-031358$9ExL 040 $aBiblioteca Interfacoltà$bita$cA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l. 082 04$a809 100 1 $aPanareo, Enzo$0310319 245 10$aPolemiche letterarie del primo Novecento /$cEnzo Panareo 260 $aBari Santo Spirito :$bEdizioni del centro librario,$c[1970?] 300 $a1 v. ;$c26 cm 500 $aEstr. da: Galaesus, n. 3(1970) 650 4$aLetteratura italiana$xSec. 20.$xStudi critici 907 $a.b12266000$b02-04-14$c08-10-03 912 $a991002273169707536 945 $aLE002 Sal. Busta IV H 35/29$g1$i2002000054531$lle002$o-$pE0.00$q-$rn$so $t0$u0$v0$w0$x0$y.i12656914$z08-10-03 996 $aPolemiche letterarie del primo Novecento$9152520 997 $aUNISALENTO 998 $ale002$b08-10-03$cm$da $e-$fita$git $h0$i1 LEADER 03455nam 22007815 450 001 9910483052503321 005 20251127150401.0 010 $a3-319-45719-5 024 7 $a10.1007/978-3-319-45719-2 035 $a(CKB)3710000000872912 035 $a(DE-He213)978-3-319-45719-2 035 $a(MiAaPQ)EBC6296721 035 $a(MiAaPQ)EBC5576875 035 $a(Au-PeEL)EBL5576875 035 $a(OCoLC)958630890 035 $a(PPN)195510836 035 $a(EXLCZ)993710000000872912 100 $a20160906d2016 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aResearch in Attacks, Intrusions, and Defenses $e19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings /$fedited by Fabian Monrose, Marc Dacier, Gregory Blanc, Joaquin Garcia-Alfaro 205 $a1st ed. 2016. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2016. 215 $a1 online resource (XIII, 482 p. 126 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v9854 311 08$a3-319-45718-7 327 $aSystems security -- Low-level attacks and defenses -- Measurement studies.-Malware analysis -- Network security -- Systematization of knowledge and experience reports -- Web and mobile security. 330 $aThis book constitutes the refereed proceedings oft he 19th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2016, held in Evry, France, in September 2016. The 21 full papers presented were carefully reviewed and selected from 85 submissions. They are organized around the following topics: systems security; low-level attacks and defenses; measurement studies; malware analysis; network security; systematization of knowledge and experience reports; Web and mobile security. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v9854 606 $aData protection 606 $aElectronic data processing$xManagement 606 $aComputer networks 606 $aApplication software 606 $aSoftware engineering 606 $aAlgorithms 606 $aData and Information Security 606 $aIT Operations 606 $aComputer Communication Networks 606 $aComputer and Information Systems Applications 606 $aSoftware Engineering 606 $aAlgorithms 615 0$aData protection. 615 0$aElectronic data processing$xManagement. 615 0$aComputer networks. 615 0$aApplication software. 615 0$aSoftware engineering. 615 0$aAlgorithms. 615 14$aData and Information Security. 615 24$aIT Operations. 615 24$aComputer Communication Networks. 615 24$aComputer and Information Systems Applications. 615 24$aSoftware Engineering. 615 24$aAlgorithms. 676 $a005.7 702 $aMonrose$b Fabian$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDacier$b Marc$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBlanc$b Gregory$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGarcia-Alfaro$b Joaquin$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483052503321 996 $aResearch in Attacks, Intrusions, and Defenses$91912512 997 $aUNINA