LEADER 01020nam a2200301 i 4500 001 991001421029707536 005 20020507125651.0 008 010625s|||| it ||| | ita 020 $a8824418074 035 $ab10218336-39ule_inst 035 $aLE02985615$9ExL 040 $aISUFI - Sett. Diritti e Politiche Euromediterranee$bita 082 0 $a005 100 1 $aPomante, Gianluca$0260316 245 10$aHacker e computer crimes /$cGianluca Pomante 260 $aNapoli :$bEsselibri-Simone,$c2000 300 $a144 p. ;$c21 cm 490 0 $aDiritto & informatica ;$v15 650 4$aCrimini informatici 650 4$aHacker 650 4$aInformatica - crimini 650 4$aSicurezza dei dati 907 $a.b10218336$b17-02-17$c27-06-02 912 $a991001421029707536 945 $aLE029 005 POM01.01$g1$iLE029-2593$lle029$o-$pE0.00$q-$rn$so $t0$u0$v0$w0$x0$y.i1026730x$z27-06-02 996 $aHacker e computer crimes$9208466 997 $aUNISALENTO 998 $ale029$b01-01-01$cm$da $e-$fita$git $h0$i1 LEADER 01369nam0 22003493i 450 001 NAP0499491 005 20251003044254.0 010 $a9780898716863 100 $a20101201e20091992||||0itac50 ba 101 | $aeng 102 $aus 181 1$6z01$ai $bxxxe 182 1$6z01$an 200 1 $aˆThe ‰linear complementarity problem$fRichard W. Cottle, Jong-Shi Pang, Richard E. Stone 210 $aPhiladelphia$cSIAM$d2009 215 $aXXVII, 761 p.$d23 cm 225 | $aClassics in applied mathematics$v60 300 $aRipr. facs. dell'ed.: Boston : Academic press, 1992 410 0$1001MIL0114867$12001 $aClassics in applied mathematics$v60 676 $a519.7$9MATEMATICA APPLICATA. PROGRAMMAZIONE$v14 676 $a519.76$9PROGRAMMAZIONE. PROGRAMMAZIONE NON LINEARE$v22 700 1$aCottle$b, Richard W.$3MILV035486$4070$0104963 701 1$aPang$b, Jong-Shi$3MILV068834$4070$0104964 701 1$aStone$b, Richard E.$3MILV068835$4070$0104965 801 3$aIT$bIT-000000$c20101201 850 $aIT-BN0095 901 $bNAP 01$cSALA DING $n$ 912 $aNAP0499491 950 0$aBiblioteca Centralizzata di Ateneo$c1 v.$d 01SALA DING 519.7 COT.li$e 0102 0000082665 VMA A4 1 v.$fY $h20101014$i20101201 977 $a 01 996 $aLinear complementarity problem$91525877 997 $aUNISANNIO