LEADER 01067cam0-22003371i-450- 001 990006710680403321 005 20160406083349.0 035 $a000671068 035 $aFED01000671068 035 $a(Aleph)000671068FED01 035 $a000671068 100 $a20010426d1963----km-y0itay50------ba 101 0 $aita 102 $aIT 105 $ay-------001yy 200 1 $a<>Responsabilità contrattuale delle associazioni sindacali$ela parte obbligatoria del contratto collettivo$fGiorgio Ghezzi 210 $aMilano$cA. Giuffrè$d1963 215 $a395 p.$d22 cm 225 1 $aSeminario giuridico della Università di Bologna$v27 700 1$aGhezzi,$bGiorgio$f<1932-2005>$0227398 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990006710680403321 952 $aDPR 28-43$b028074$fDEC 952 $aUNIVERSITÀ 8 (27)$b1423$fFSPBC 952 $aUNIVERSITÀ 29 (27)$b70670$fFGBC 959 $aDEC 959 $aFGBC 959 $aFSPBC 996 $aResponsabilità contrattuale delle associazioni sindacali$9615385 997 $aUNINA LEADER 02226nam a2200421 i 4500 001 991003676389707536 005 20021220115236.0 008 020723s2002 it ||| | ita 020 $a8870755630 035 $ab11846872-39ule_inst 035 $aLE01313190$9ExL 040 $aDip.to Matematica$beng 082 0 $a025.324 084 $aAMS 00A20 100 1 $aGambari, Stefano$044073 245 10$aDefinire e catalogare le risorse elettroniche :$bun'introduzione a ISBD(ER), AACR2 e metadati /$cStefano Gambari, Mauro Guerrini ; saggio introduttivo di Paul Gabriele Weston 260 $aMilano :$bBibliografica,$cc2002 300 $a457 p. ;$c21 cm. 490 0 $aBibliografia e biblioteconomia ;$v63 500 $aIncludes bibliographical references (p. 403-457) and notes 500 $aInclude bibliografia (p. 403-457) 650 4$aCataloging of electronic resources$xStandards 650 4$aDescriptive cataloging-Standards 650 4$aInternational Standard Bibliographic Description for electronic resources 650 4$aPubblicazioni elettroniche$xCatalogazione 700 1 $aGuerrini, Mauro$d<1953- >$eauthor$4http://id.loc.gov/vocabulary/relators/aut$05520 700 1 $aWeston, Paul Gabriele 907 $a.b11846872$b12-05-17$c20-12-02 912 $a991003676389707536 945 $aLE013 00A20 GAM11 (2002)$g1$i2013000135373$lle013$o-$pE0.00$q-$rl$s- $t0$u3$v0$w3$x0$y.i12099211$z20-12-02 945 $aLE002 Bibl. Ris. 1/63$g1$i2002000256478$lle002$o-$pE0.00$q-$rn$so $t0$u0$v0$w0$x0$y.i13050242$z07-01-04 945 $aLE001$g1$i2001000067169$lle001$nB.C.A. n. 121 del 31/12/2003$on$pE30.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i13120062$z01-03-04 945 $aLE005 020 GAM01. 01$g1$i2005000148392$lle005$o-$pE30.00$q-$rn$so $t0$u0$v0$w0$x0$y.i13890025$z06-10-04 945 $aLE025 ECO 025 GAM01.01$g1$i2025000136939$lle025$op$pE30.00$q-$rl$s- $t0$u1$v0$w1$x0$y.i14037221$z23-03-05 945 $aLE019 A22 MUS C 31$g1$i2019000014892$lle019$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i14156118$z22-11-05 996 $aDefinire e catalogare le risorse elettroniche$9105022 997 $aUNISALENTO 998 $ale029$ale013$ale001$ale005$ale002$ale025$b01-01-02$cm$da $e-$fita$git $h0$i1 LEADER 03080nam 22007215 450 001 9910349434103321 005 20251225203636.0 010 $a9783319935249 010 $a3319935240 024 7 $a10.1007/978-3-319-93524-9 035 $a(CKB)3810000000358673 035 $a(DE-He213)978-3-319-93524-9 035 $a(MiAaPQ)EBC6285885 035 $a(PPN)229494447 035 $a(EXLCZ)993810000000358673 100 $a20180620d2018 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Security Theory and Practice $e11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28?29, 2017, Proceedings /$fedited by Gerhard P. Hancke, Ernesto Damiani 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XII, 189 p. 56 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v10741 311 08$a9783319935232 311 08$a3319935232 320 $aIncludes bibliographical references and index. 330 $aThis volume constitutes the refereed proceedings of the 11th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2017, held in Heraklion, Crete, Greece, in September 2017. The 8 revised full papers and 4 short papers presented were carefully reviewed and selected from 35 submissions. The papers are organized in the following topical sections: security in emerging systems; security of data; trusted execution; defenses and evaluation; and protocols and algorithms. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v10741 606 $aData protection 606 $aApplication software 606 $aComputers, Special purpose 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData and Information Security 606 $aComputer and Information Systems Applications 606 $aSpecial Purpose and Application-Based Systems 606 $aComputer Communication Networks 606 $aCryptology 615 0$aData protection. 615 0$aApplication software. 615 0$aComputers, Special purpose. 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 14$aData and Information Security. 615 24$aComputer and Information Systems Applications. 615 24$aSpecial Purpose and Application-Based Systems. 615 24$aComputer Communication Networks. 615 24$aCryptology. 676 $a005.8 702 $aHancke$b Gerhard P$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDamiani$b Ernesto$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910349434103321 996 $aInformation Security Theory and Practice$92073240 997 $aUNINA