LEADER 01333nam0 22003133i 450 001 CAG0040066 005 20170908093240.0 100 $a20080820d1968 ||||0itac50 ba 101 | $aita 102 $ait 181 1$6z01$ai $bxxxe 182 1$6z01$an 200 1 $a˜Il œgiorno dell'invasione$fdi David Howarth$gtraduzione di Elsa Pelitti 210 $aMilano$cLonganesi$dc1968 215 $a287 p.$d19 cm. 225 | $a˜I œsuper pocket$v44 410 0$1001RAV0105811$12001 $a˜I œsuper pocket$v44$1702 1$aCarrega$b, Ugo$3CFIV016448$4730 500 10$aDawn of D-Day. -$3RAV0152671$9CFIV033236$91483079 700 1$aHowarth$b, David$f <1912-1991>$3CFIV033236$4070$0150304 702 1$aPelitti$b, Elsa$3CFIV111658$4730 790 1$aHowarth$b, David Armine$3SBNV046058$zHowarth, David <1912-1991> 801 3$aIT$bIT-NA0079$c20080820 850 $aIT-AV0137$aIT-CE0060 912 $aCAG0040066 950 0$aBiblioteca Comunale "Nunzia Festa"$c1 v.$d 94ADULTI I 497$e 94 0000013405 B 1 v.$fT $i20110401 950 0$a Associazione storica Medio Volturno$c1 V.$d ASCANELLI 940.54 HOWAD$e ASASM0000048535 A 1 VOLUME$fZ $h20080820$i20080820 977 $a 94$a AS 996 $aDawn of D-Day$91483079 997 $aUNISANNIO LEADER 03088oam 2200613I 450 001 9910797026503321 005 20230725060952.0 010 $a1-4398-9155-9 010 $a0-429-18443-3 010 $a1-4398-9463-9 024 7 $a10.1201/9781439894637 035 $a(CKB)3710000000391605 035 $a(EBL)1648320 035 $a(SSID)ssj0001457944 035 $a(PQKBManifestationID)12523623 035 $a(PQKBTitleCode)TC0001457944 035 $a(PQKBWorkID)11444207 035 $a(PQKB)10483290 035 $a(MiAaPQ)EBC1648320 035 $a(Au-PeEL)EBL1648320 035 $a(CaPaEBR)ebr11167520 035 $a(OCoLC)908079522 035 $a(EXLCZ)993710000000391605 100 $a20180706d2010 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aAccess control, security, and trust $ea logical approach /$fby Shiu-Kai Chin and Susan Beth Older 205 $aFirst edition. 210 1$aBoca Raton, FL :$cChapman and Hall/CRC, an imprint of Taylor and Francis,$d2010. 215 $a1 online resource (348 p.) 225 1 $aChapman & Hall/CRC Cryptography and Network Security 300 $a"A Chapman & Hall Book." 311 $a1-58488-862-8 320 $aIncludes bibliographical references and index. 327 $aFront cover; Contents; List of Tables; List of Figures; Preface; Chapter 1. Access Control, Security, Trust, and Logic; Part I: Preliminaries; Chapter 2. A Language for Access Control; Chapter 3. Reasoning about Access Control; Chapter 4. Basic Concepts; Chapter 5. Security Policies; Part II: Distributed Access Control; Chapter 6. Digital Authentication; Chapter 7. Delegation; Chapter 8. Networks: Case Studies; Part III: Isolation and Sharing; Chapter 9. A Primer on Computer Hardware; Chapter 10. Virtual Machines and Memory Protection 327 $aChapter 11. Access Control Using Descriptors and CapabilitiesChapter 12. Access Control Using Lists and Rings; Part IV: Access Policies; Chapter 13. Confidentiality and Integrity Policies; Chapter 14. Role-Based Access Control; Appendix A; Summary of the Access-Control Logic; Bibliography; Notation Index; Back cover 330 3 $aDeveloped from the authors? courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use a single access control logic based on a simple propositional modal logic. 410 0$aChapman & Hall/CRC cryptography and network security. 606 $aComputers$xAccess control 606 $aSystem design 615 0$aComputers$xAccess control. 615 0$aSystem design. 676 $a005.8 700 $aChin$b Shiu-Kai$01563491 702 $aOlder$b Susan Beth 801 0$bFlBoTFG 801 1$bFlBoTFG 906 $aBOOK 912 $a9910797026503321 996 $aAccess control, security, and trust$93831947 997 $aUNINA