LEADER 01065nam a2200241 a 4500 001 991003972839707536 008 035 $ab14417492-39ule_inst 040 $aBibl. Dip.le Aggr. Scienze Giuridiche - Sez. Studi Giuridici$bita 082 0 $a330.9456 110 1 $aNapoli, Alessandro$0835370 245 10$aRapporto 1998 sull'economia e la società della provincia di Brindisi /$c[sotto la responsabilità di Alessandro Napoli] 260 $aBrindisi :$bProvincia di Brindisi,$cstampa 1999 300 $a228 p. ;$c30 cm. 500 $aIn testa al front.: Osservatorio Mezzogiorno 650 4$aEconomia$xProvincia di Brindisi 700 $aOsservatorio Mezzogiorno 907 $a.b14417492$b06-09-21$c03-09-21 912 $a991003972839707536 945 $aLE027 330.94 BRI01.01$g1$i2027000376292$lle027$og$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i15973694$z03-09-21 996 $aRapporto 1998 sull'economia e la società della provincia di Brindisi$91866971 997 $aUNISALENTO 998 $ale027$b - - $cm$da $e-$fita$git $h0$i0 LEADER 02761nam 22007095 450 001 9910416079503321 005 20251225183544.0 010 $a3-030-58295-7 024 7 $a10.1007/978-3-030-58295-1 035 $a(CKB)4100000011401152 035 $a(MiAaPQ)EBC6319935 035 $a(DE-He213)978-3-030-58295-1 035 $a(PPN)253256933 035 $a(EXLCZ)994100000011401152 100 $a20200826d2020 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCritical Information Infrastructures Security $e15th International Conference, CRITIS 2020, Bristol, UK, September 2?3, 2020, Proceedings /$fedited by Awais Rashid, Peter Popov 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (102 pages) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v12332 311 08$a3-030-58294-9 327 $aInvited Papers -- Attacks and Vulnerabilities -- Threat Modelling and Monitoring -- Networks and IoT. 330 $aChapter ?A Systematic Literature Review of Information Sources for Threat Modeling in the Power Systems Domain? is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v12332 606 $aData protection 606 $aApplication software 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aComputer networks$xSecurity measures 606 $aData and Information Security 606 $aComputer and Information Systems Applications 606 $aCryptology 606 $aComputer Communication Networks 606 $aMobile and Network Security 615 0$aData protection. 615 0$aApplication software. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer networks. 615 0$aComputer networks$xSecurity measures. 615 14$aData and Information Security. 615 24$aComputer and Information Systems Applications. 615 24$aCryptology. 615 24$aComputer Communication Networks. 615 24$aMobile and Network Security. 676 $a005.8 676 $a005.8 702 $aRashid$b Awais$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPopov$b Peter$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910416079503321 996 $aCritical Information Infrastructures Security$92584647 997 $aUNINA