LEADER 00834nam0-22002771i-450- 001 990004493130403321 005 19990530 035 $a000449313 035 $aFED01000449313 035 $a(Aleph)000449313FED01 035 $a000449313 100 $a19990530d1934----km-y0itay50------ba 101 0 $aita 105 $ay-------001yy 200 1 $aColtura e lettere in Friuli nei secoli XIII e XIV$fFrancesco Fattorello 210 $aUdine$cIstituto delle edizioni Accademiche$d1934 215 $aVII, 189 p.$d18 cm 225 1 $aCollezione Forum Julii 700 1$aFattorello,$bFrancesco$0179492 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990004493130403321 952 $a3/IX D 11$bbibl.12553$fFLFBC 959 $aFLFBC 996 $aColtura e lettere in Friuli nei secoli XIII e XIV$9547023 997 $aUNINA LEADER 02286nam0 22004453i 450 001 CFI0177446 005 20251003044129.0 010 $a8815023836 100 $a20130827d1990 ||||0itac50 ba 101 | $aita$ceng 102 $ait 181 1$6z01$ai $bxxxe 182 1$6z01$an 183 1$6z01$anc$2RDAcarrier 200 1 $aˆLa ‰prima rivoluzione industriale$fPhyllis Deane 205 $aNuova ed 210 $aBologna$cIl mulino$d1990 215 $a387 p.$d22 cm 225 | $aˆLe ‰vie della civiltà 300 $aTraduzione di Carla Rosio. 410 0$1001CFI0025045$12001 $aˆLe ‰vie della civiltà 500 10$aˆThe ‰first Industrial Revolution$3CFI0026265$9CFIV015226$913259 606 $aRivoluzione industriale$2FIR$3CFIC006140$9E 606 $aRIVOLUZIONE INDUSTRIALE$xINGHILTERRA$xSEC. 18.$2FIR$3MILC033672$9I 676 $a303.483$9CAUSE DEL CAMBIAMENTO SOCIALE. SVILUPPO DELLA SCIENZA E DELLA TECNICA$v21 676 $a330.941$9Storia economica (Situazioni e condizioni economiche). Gran Bretagna$v12 676 $a330.94107$9SITUAZIONI E CONDIZIONI ECONOMICHE. GRAN BRETAGNA. 1714-1837$v19 700 1$aDeane$b, Phyllis$3CFIV015226$4070$0118677 702 1$aRosio$b, Carla$3SBLV050486$4730 801 3$aIT$bIT-000000$c20130827 850 $aIT-BN0095 $aIT-SA0060 $aIT-NA0070 $aIT-AV0045 901 $bNAP MV$cR $nSala Padri 901 $bNAP BU$c6 B $nPropedeutica. Formato cm. 20,1-28. 901 $bNAP 01$cPOZZO LIB.$nVi sono collocati fondi di economia, periodici di ingegneria e scienze, periodici di economia e statistica e altri fondi comprendenti documenti di economia pervenuti in dono. 901 $bNAP 27$cSALA $n$ 912 $aCFI0177446 950 0$aBiblioteca Centralizzata di Ateneo$c1 v. in due copie$d 01POZZO LIB.ECON MON 5355$e 0101 0000115165E VMA (bis 1 v. (2. copia; Precedente collocazione GUERRAZZI B 1146)$fB $h20080429$i20080429$c1 v. in due copie$d 01POZZO LIB.ECON MON 5355$e 0101 0700264655E VMA 1 v. (Precedente collocazione 26 EC 465)$fB $h20220801$i20220801 977 $a 01$a 27$a BU$a MV 996 $aFirst industrial revolution$913259 997 $aUNISANNIO LEADER 03029nam 22006495 450 001 9910483297303321 005 20251226193517.0 010 $a3-319-07536-5 024 7 $a10.1007/978-3-319-07536-5 035 $a(CKB)3710000000143845 035 $a(SSID)ssj0001274637 035 $a(PQKBManifestationID)11858394 035 $a(PQKBTitleCode)TC0001274637 035 $a(PQKBWorkID)11333307 035 $a(PQKB)10408935 035 $a(DE-He213)978-3-319-07536-5 035 $a(MiAaPQ)EBC3093206 035 $a(PPN)179766163 035 $a(EXLCZ)993710000000143845 100 $a20140604d2014 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aApplied Cryptography and Network Security $e12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings /$fedited by Ioana Boureanu, Philippe Owesarski, Serge Vaudenay 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (XVIII, 586 p. 127 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v8479 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-319-07535-7 327 $aKey exchange -- Primitive construction -- Attacks (public-key cryptography) -- Hashing -- Cryptanalysis and attacks (symmetric cryptography) -- Network security -- Signatures -- System security.- Secure computation. 330 $aThis book constitutes the refereed proceedings of the 12th International Conference on Applied Cryptography and Network Security, ACNS 2014, held in Lausanne, Switzerland, in June 2014. The 33 revised full papers included in this volume were carefully reviewed and selected from 147 submissions. They are organized in topical sections on key exchange; primitive construction; attacks (public-key cryptography); hashing; cryptanalysis and attacks (symmetric cryptography); network security; signatures; system security; and secure computation. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v8479 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer science 606 $aData and Information Security 606 $aCryptology 606 $aTheory of Computation 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer science. 615 14$aData and Information Security. 615 24$aCryptology. 615 24$aTheory of Computation. 676 $a005.8 702 $aBoureanu$b Ioana$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aOwesarski$b Philippe$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aVaudenay$b Serge$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910483297303321 996 $aApplied Cryptography and Network Security$9771881 997 $aUNINA