LEADER 01071cam0 2200289 450 001 E600200009587 005 20210309115636.0 010 $a8846458818 100 $a20050426d2004 |||||ita|0103 ba 101 $aita 102 $aIT 200 1 $a<>laureati in Italia$ele indagini di AlmaLaurea su scelte formative, orientamento al lavoro e occupabilità$fcur. Andrea Cammelli$gMichele La Rosa$gscritti di Vando Borghi [et al.] 210 $aMilano$cFranco Angeli$d2004 215 $a223 p.$d23 cm 225 2 $aSociologia del lavoro$v94 410 1$1001LAEC00021092$12001 $a*Sociologia del lavoro$v94 702 1$aCammelli, Andrea$3A600200030423$4070 702 1$aLa Rosa, Michele$3A600200030424$4070 801 0$aIT$bUNISOB$c20210309$gRICA 850 $aUNISOB 852 $aUNISOB$j300$m125240 912 $aE600200009587 940 $aM 102 Monografia moderna SBN 941 $aM 957 $a300$b003795$gSi$d125240$racquisto$1diguida$2UNISOB$3UNISOB$420050426080904.0$520190909170047.0$6Spinosa 996 $aLaureati in Italia$9749313 997 $aUNISOB LEADER 02841nam 22006495 450 001 9910254987403321 005 20251226203316.0 010 $a981-10-2741-2 024 7 $a10.1007/978-981-10-2741-3 035 $a(CKB)3710000000873039 035 $a(DE-He213)978-981-10-2741-3 035 $a(MiAaPQ)EBC6302196 035 $a(MiAaPQ)EBC5594925 035 $a(Au-PeEL)EBL5594925 035 $a(OCoLC)959366861 035 $a(PPN)195511905 035 $a(EXLCZ)993710000000873039 100 $a20160926d2016 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aApplications and Techniques in Information Security $e6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedings /$fedited by Lynn Batten, Gang Li 205 $a1st ed. 2016. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2016. 215 $a1 online resource (XVI, 163 p. 30 illus.) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v651 311 08$a981-10-2740-4 320 $aIncludes bibliographical references and index. 327 $aInvited speeches -- Attacks on data security systems -- Detection of attacks on data security systems -- Data security -- Data privacy. 330 $aThis book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2016, held in Cairns, Australia, October 2016. The 10 revised full papers and three short papers presented together with two invited talks were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on invited speeches; attacks on data security systems; detection of attacks on data security systems; data security; data privacy. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v651 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aAlgorithms 606 $aData and Information Security 606 $aCryptology 606 $aAlgorithms 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aAlgorithms. 615 14$aData and Information Security. 615 24$aCryptology. 615 24$aAlgorithms. 676 $a005.8 702 $aBatten$b Lynn$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLi$b Gang$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910254987403321 996 $aApplications and Techniques in Information Security$92028776 997 $aUNINA