Asset protection through security awareness / / Tyler Justin Speed
| Asset protection through security awareness / / Tyler Justin Speed |
| Autore | Speed Tyler Justin |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Boca Raton, Fla. : , : CRC Press, , 2012 |
| Descrizione fisica | 1 online resource (520 p.) |
| Disciplina | 658.4/78 |
| Soggetto topico |
Computer networks - Security measures
Information technology - Security measures Business enterprises - Security measures |
| Soggetto genere / forma | Electronic books. |
| ISBN |
0-367-38181-8
0-429-09346-2 1-4665-5141-0 1-283-59642-3 9786613908872 1-4398-0983-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Title Page; Copyright; Contents; INTRODUCTION; WHAT IS INFORMATION SECURITY?; CHAPTER 1: CREATING A CULTURE OF SECURITY AWARENESS; CHAPTER 2: OVERVIEW OF SECURITY AWARENESS CATEGORIES; CHAPTER 3: WHO IS AN IS PROFESSIONAL?; CHAPTER 4: DIPLOMACY; CHAPTER 5: PRIVACY CONCERNS; CHAPTER 6: INTERDEPARTMENTAL SECURITY; CHAPTER 7: RISK MANAGEMENT; CHAPTER 8: SOCIAL ENGINEERING; CHAPTER 9: INCIDENT DETECTION AND RESPONSE; CHAPTER 10: PHYSICAL SECURITY; CHAPTER 11: PCI COMPLIANCE; CHAPTER 12: BUSINESS CONTINUITY PLANNING; CHAPTER 13: USER AUTHENTICATION METHODS
CHAPTER 14: COMPUTER AND NETWORK FORENSICSCHAPTER 15: MALWARE; CHAPTER 16: CRAFTING A SECURITY POLICY; CHAPTER 17: PERFORMING SECURITY ANALYSES AND AUDITS; CHAPTER 18: ACCESS CONTROL; CHAPTER 19: SECURITY CHECKLISTS; INDEX; ABOUT THE AUTHOR |
| Record Nr. | UNINA-9910457879103321 |
Speed Tyler Justin
|
||
| Boca Raton, Fla. : , : CRC Press, , 2012 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Asset protection through security awareness / / Tyler Justin Speed
| Asset protection through security awareness / / Tyler Justin Speed |
| Autore | Speed Tyler Justin |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Boca Raton, Fla. : , : CRC Press, , 2012 |
| Descrizione fisica | 1 online resource (520 p.) |
| Disciplina | 658.4/78 |
| Soggetto topico |
Computer networks - Security measures
Information technology - Security measures Business enterprises - Security measures |
| ISBN |
0-367-38181-8
0-429-09346-2 1-4665-5141-0 1-283-59642-3 9786613908872 1-4398-0983-6 |
| Classificazione | BUS073000COM032000COM053000 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Title Page; Copyright; Contents; INTRODUCTION; WHAT IS INFORMATION SECURITY?; CHAPTER 1: CREATING A CULTURE OF SECURITY AWARENESS; CHAPTER 2: OVERVIEW OF SECURITY AWARENESS CATEGORIES; CHAPTER 3: WHO IS AN IS PROFESSIONAL?; CHAPTER 4: DIPLOMACY; CHAPTER 5: PRIVACY CONCERNS; CHAPTER 6: INTERDEPARTMENTAL SECURITY; CHAPTER 7: RISK MANAGEMENT; CHAPTER 8: SOCIAL ENGINEERING; CHAPTER 9: INCIDENT DETECTION AND RESPONSE; CHAPTER 10: PHYSICAL SECURITY; CHAPTER 11: PCI COMPLIANCE; CHAPTER 12: BUSINESS CONTINUITY PLANNING; CHAPTER 13: USER AUTHENTICATION METHODS
CHAPTER 14: COMPUTER AND NETWORK FORENSICSCHAPTER 15: MALWARE; CHAPTER 16: CRAFTING A SECURITY POLICY; CHAPTER 17: PERFORMING SECURITY ANALYSES AND AUDITS; CHAPTER 18: ACCESS CONTROL; CHAPTER 19: SECURITY CHECKLISTS; INDEX; ABOUT THE AUTHOR |
| Record Nr. | UNINA-9910781524603321 |
Speed Tyler Justin
|
||
| Boca Raton, Fla. : , : CRC Press, , 2012 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Becoming a global chief security executive officer : a how to guide for next generation security leaders / / Roland Cloutier
| Becoming a global chief security executive officer : a how to guide for next generation security leaders / / Roland Cloutier |
| Autore | Cloutier Roland |
| Pubbl/distr/stampa | Kidlington, Oxford ; ; Waltham, Massachusetts : , : Butterworth-Heinemann, an imprint of Elsevier, , 2016 |
| Descrizione fisica | 1 online resource (0 p.) |
| Disciplina | 658.155 |
| Soggetto topico |
Security systems - Management
Business enterprises - Security measures |
| ISBN | 0-12-802781-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910296987303321 |
Cloutier Roland
|
||
| Kidlington, Oxford ; ; Waltham, Massachusetts : , : Butterworth-Heinemann, an imprint of Elsevier, , 2016 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The complete guide to physical security / / Paul R. Baker, Daniel J. Benny
| The complete guide to physical security / / Paul R. Baker, Daniel J. Benny |
| Autore | Baker Paul R. <1958-> |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Boca Raton : , : CRC Press, , 2013 |
| Descrizione fisica | 1 online resource (349 p.) |
| Disciplina |
658.4/7
658.47 |
| Altri autori (Persone) | BennyDaniel J |
| Soggetto topico |
Business enterprises - Security measures
Security systems Computer security Private security services |
| Soggetto genere / forma | Electronic books. |
| ISBN |
0-429-13389-8
1-4665-8868-3 1-4200-9964-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Front Cover; Contents; Preface; The Authors; The Contributors; Chapter 1 - Physical Security Planning; Chapter 2 - Vulnerability Assessments; Chapter 3 - Security Design and Planning; Chapter 4 - Security Construction Projects; Chapter 5 - Protection in Depth; Chapter 6 - Perimeter Protection; Chapter 7 - Access Control; Chapter 8 - Physical Protection Systems; Chapter 9 - CCTV and IP Video; Chapter 10 - Keys, Locks, and Safes; Chapter 11 - Biometrics; Chapter 12 - Security Guard Force; Chapter 13 - Central Station Design; Chapter 14 - Government Security
Chapter 15 - Financial Institutions and BanksChapter 16 - Data Center Protection; Chapter 17 - Total System Cost; Chapter 18 - Security Master Plan; Chapter 19 - Security Foresight; Chapter 20 - Security Leadership; Back Cover |
| Record Nr. | UNINA-9910462621703321 |
Baker Paul R. <1958->
|
||
| Boca Raton : , : CRC Press, , 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The complete guide to physical security / / Paul R. Baker, Daniel J. Benny
| The complete guide to physical security / / Paul R. Baker, Daniel J. Benny |
| Autore | Baker Paul <1958, > |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Boca Raton : , : CRC Press, , 2013 |
| Descrizione fisica | 1 online resource (349 p.) |
| Disciplina |
658.4/7
658.47 |
| Altri autori (Persone) | BennyDaniel J |
| Soggetto topico |
Business enterprises - Security measures
Security systems Computer security Private security services |
| ISBN |
0-429-13389-8
1-4665-8868-3 1-4200-9964-7 |
| Classificazione | BUS073000BUS093000LAW041000 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Front Cover; Contents; Preface; The Authors; The Contributors; Chapter 1 - Physical Security Planning; Chapter 2 - Vulnerability Assessments; Chapter 3 - Security Design and Planning; Chapter 4 - Security Construction Projects; Chapter 5 - Protection in Depth; Chapter 6 - Perimeter Protection; Chapter 7 - Access Control; Chapter 8 - Physical Protection Systems; Chapter 9 - CCTV and IP Video; Chapter 10 - Keys, Locks, and Safes; Chapter 11 - Biometrics; Chapter 12 - Security Guard Force; Chapter 13 - Central Station Design; Chapter 14 - Government Security
Chapter 15 - Financial Institutions and BanksChapter 16 - Data Center Protection; Chapter 17 - Total System Cost; Chapter 18 - Security Master Plan; Chapter 19 - Security Foresight; Chapter 20 - Security Leadership; Back Cover |
| Record Nr. | UNINA-9910786040003321 |
Baker Paul <1958, >
|
||
| Boca Raton : , : CRC Press, , 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The complete guide to physical security / / Paul R. Baker and Daniel J. Benny
| The complete guide to physical security / / Paul R. Baker and Daniel J. Benny |
| Autore | Baker Paul R. <1958-> |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Boca Raton, : CRC Press, 2013 |
| Descrizione fisica | 1 online resource (349 p.) |
| Disciplina |
658.4/7
658.47 |
| Altri autori (Persone) | BennyDaniel J |
| Soggetto topico |
Business enterprises - Security measures
Security systems Computer security Private security services |
| ISBN |
0-429-13389-8
1-4665-8868-3 1-4200-9964-7 |
| Classificazione | BUS073000BUS093000LAW041000 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Front Cover; Contents; Preface; The Authors; The Contributors; Chapter 1 - Physical Security Planning; Chapter 2 - Vulnerability Assessments; Chapter 3 - Security Design and Planning; Chapter 4 - Security Construction Projects; Chapter 5 - Protection in Depth; Chapter 6 - Perimeter Protection; Chapter 7 - Access Control; Chapter 8 - Physical Protection Systems; Chapter 9 - CCTV and IP Video; Chapter 10 - Keys, Locks, and Safes; Chapter 11 - Biometrics; Chapter 12 - Security Guard Force; Chapter 13 - Central Station Design; Chapter 14 - Government Security
Chapter 15 - Financial Institutions and BanksChapter 16 - Data Center Protection; Chapter 17 - Total System Cost; Chapter 18 - Security Master Plan; Chapter 19 - Security Foresight; Chapter 20 - Security Leadership; Back Cover |
| Record Nr. | UNINA-9910963267303321 |
Baker Paul R. <1958->
|
||
| Boca Raton, : CRC Press, 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cyber intelligence-driven risk : how to build and use cyber intelligence for business risk decisions / / Richard O. Moore III
| Cyber intelligence-driven risk : how to build and use cyber intelligence for business risk decisions / / Richard O. Moore III |
| Autore | Moore Richard O., III, <1971-> |
| Pubbl/distr/stampa | Hoboken, New Jersey : , : Wiley, , [2021] |
| Descrizione fisica | 1 online resource (188 pages) |
| Disciplina | 658.47 |
| Soggetto topico | Business enterprises - Security measures |
| ISBN |
1-119-67694-0
1-119-67689-4 1-119-67691-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910555126103321 |
Moore Richard O., III, <1971->
|
||
| Hoboken, New Jersey : , : Wiley, , [2021] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Design against crime : crime proofing everyday products / / edited by Paul Ekblom
| Design against crime : crime proofing everyday products / / edited by Paul Ekblom |
| Pubbl/distr/stampa | Boulder, Colorado : , : Lynne Rienner Publishers, , 2012 |
| Descrizione fisica | 1 online resource (307 p.) |
| Disciplina | 364.4/9 |
| Collana | Crime Prevention Studies |
| Soggetto topico |
Theft - Prevention
Business enterprises - Security measures Security systems Crime prevention |
| Soggetto genere / forma | Electronic books. |
| ISBN | 1-58826-940-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
""Book Title""; ""Table of Contents""; ""List of Tables and Figures""; ""Tables""; ""3.1 Project Management Process""; ""4.1 Geographical Spread of Interview Participants""; ""4.2 Sectors That Participants Represented""; ""4.3 Producing a Scoring System for Vulnerability Factors""; ""4.4 Producing a Scoring System for Security Factors""; ""5.1 Positive and Negative Externalities and Social Costs and Benefits""; ""5.2 Simplified Direct Regulatory Model for Credit Card Fraud Reduction""; ""5.3 Simplified Cap-and-Trade Model for Credit Card Fraud Reduction""
""6.1 Ratio of Differences in Locking Practices for the Prototype Bicycle Parking Stands Compared to the Control Sheffield Stands""""8.1 Principal Packaging Solutions and Technologies Against Counterfeiting""; ""10.1 Handbag Theft in Supermarkets, Rates per 1,000 Warwickshire Residents""; ""10.2 Victim-Reported Handbag Theft Description""; ""10.3 What Drew Your Attention to the Trolley Safe?""; ""11.1 AT CUT PRICES: Characteristics That Make FMCGAttractive to Thieves""; ""Figures""; ""3.1 Four Main Activity Areas of the Design Life Cycle That Make Up the Framework"" ""3.2 The DAC Evaluation Framework""""3.3 Example of a Page from the DAC Evaluation Framework Publication""; ""6.1 The Prototype Bicycle Parking Stands""; ""6.2 Fraction of Time Bicycle Parking Stands Were Observed as Unused""; ""6.3 Locking Practices for Sheffield Stands vs. the Prototype Bicycle Parking Stands as a Single Group""; ""6.4 Locking Practices for Sheffield Stands and Each Prototype Bicycle Parking Stand""; ""7.1 Sketch of an Early Version of a CT Bin""; ""7.2 CT Bin on a Sydney Railway Platform""; ""9.1 Final Version of the Grippa Clip""; ""9.2 The Chelsea Clip"" ""9.3 Poster Advertising the Grippa Clip""""9.4 Card Hanger for the Grippa Clip""; ""9.5 The Grippa Clip with the Handbag Logo""; ""10.1 Monthly Distribution of Recorded Handbag Theft Incidents Across Warwickshire Supermarkets, November 2006�October 2008""; ""10.2 Distribution of Recorded Handbag Theft Incidents Across 27 Warwickshire Supermarkets, November 2006�October 2008""; ""10.3 Handbag Theft Victimization by Age Group Across 27 Warwickshire Supermarkets""; ""10.4 A Trolley Safe Fitted to a Shallow Trolley"" ""10.5 Recorded Handbag Thefts from Trolleys at the Treatment and Control Sites Before and After Intervention, November 2006�January 2009""""10.6 Customer Comments on the Trolley Safes""; ""10.7 Observations on Trolley Safe Usage Over Time, October 2008�January 2009""; ""Foreword""; ""Acknowledgments""; ""1-Introduction""; ""Notes""; ""2-The Security Function Framework""; ""Introduction""; ""Specification: A Fit-for-Purpose Framework?""; ""The Security Function Framework""; ""Conclusion""; ""Notes""; ""3-Embedding Crime Prevention Within Design""; ""Traditional Evaluations"" ""The Design Against Crime Evaluation Framework"" |
| Record Nr. | UNINA-9910462783603321 |
| Boulder, Colorado : , : Lynne Rienner Publishers, , 2012 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Design against crime : crime proofing everyday products / / edited by Paul Ekblom
| Design against crime : crime proofing everyday products / / edited by Paul Ekblom |
| Pubbl/distr/stampa | Boulder, Colorado : , : Lynne Rienner Publishers, , 2012 |
| Descrizione fisica | 1 online resource (307 p.) |
| Disciplina | 364.4/9 |
| Collana | Crime Prevention Studies |
| Soggetto topico |
Theft - Prevention
Business enterprises - Security measures Security systems Crime prevention |
| ISBN | 1-58826-940-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
""Book Title""; ""Table of Contents""; ""List of Tables and Figures""; ""Tables""; ""3.1 Project Management Process""; ""4.1 Geographical Spread of Interview Participants""; ""4.2 Sectors That Participants Represented""; ""4.3 Producing a Scoring System for Vulnerability Factors""; ""4.4 Producing a Scoring System for Security Factors""; ""5.1 Positive and Negative Externalities and Social Costs and Benefits""; ""5.2 Simplified Direct Regulatory Model for Credit Card Fraud Reduction""; ""5.3 Simplified Cap-and-Trade Model for Credit Card Fraud Reduction""
""6.1 Ratio of Differences in Locking Practices for the Prototype Bicycle Parking Stands Compared to the Control Sheffield Stands""""8.1 Principal Packaging Solutions and Technologies Against Counterfeiting""; ""10.1 Handbag Theft in Supermarkets, Rates per 1,000 Warwickshire Residents""; ""10.2 Victim-Reported Handbag Theft Description""; ""10.3 What Drew Your Attention to the Trolley Safe?""; ""11.1 AT CUT PRICES: Characteristics That Make FMCGAttractive to Thieves""; ""Figures""; ""3.1 Four Main Activity Areas of the Design Life Cycle That Make Up the Framework"" ""3.2 The DAC Evaluation Framework""""3.3 Example of a Page from the DAC Evaluation Framework Publication""; ""6.1 The Prototype Bicycle Parking Stands""; ""6.2 Fraction of Time Bicycle Parking Stands Were Observed as Unused""; ""6.3 Locking Practices for Sheffield Stands vs. the Prototype Bicycle Parking Stands as a Single Group""; ""6.4 Locking Practices for Sheffield Stands and Each Prototype Bicycle Parking Stand""; ""7.1 Sketch of an Early Version of a CT Bin""; ""7.2 CT Bin on a Sydney Railway Platform""; ""9.1 Final Version of the Grippa Clip""; ""9.2 The Chelsea Clip"" ""9.3 Poster Advertising the Grippa Clip""""9.4 Card Hanger for the Grippa Clip""; ""9.5 The Grippa Clip with the Handbag Logo""; ""10.1 Monthly Distribution of Recorded Handbag Theft Incidents Across Warwickshire Supermarkets, November 2006�October 2008""; ""10.2 Distribution of Recorded Handbag Theft Incidents Across 27 Warwickshire Supermarkets, November 2006�October 2008""; ""10.3 Handbag Theft Victimization by Age Group Across 27 Warwickshire Supermarkets""; ""10.4 A Trolley Safe Fitted to a Shallow Trolley"" ""10.5 Recorded Handbag Thefts from Trolleys at the Treatment and Control Sites Before and After Intervention, November 2006�January 2009""""10.6 Customer Comments on the Trolley Safes""; ""10.7 Observations on Trolley Safe Usage Over Time, October 2008�January 2009""; ""Foreword""; ""Acknowledgments""; ""1-Introduction""; ""Notes""; ""2-The Security Function Framework""; ""Introduction""; ""Specification: A Fit-for-Purpose Framework?""; ""The Security Function Framework""; ""Conclusion""; ""Notes""; ""3-Embedding Crime Prevention Within Design""; ""Traditional Evaluations"" ""The Design Against Crime Evaluation Framework"" |
| Record Nr. | UNINA-9910786102403321 |
| Boulder, Colorado : , : Lynne Rienner Publishers, , 2012 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Design against crime : crime proofing everyday products / / edited by Paul Ekblom
| Design against crime : crime proofing everyday products / / edited by Paul Ekblom |
| Pubbl/distr/stampa | Boulder, Colorado : , : Lynne Rienner Publishers, , 2012 |
| Descrizione fisica | 1 online resource (307 p.) |
| Disciplina | 364.4/9 |
| Collana | Crime Prevention Studies |
| Soggetto topico |
Theft - Prevention
Business enterprises - Security measures Security systems Crime prevention |
| ISBN | 1-58826-940-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
""Book Title""; ""Table of Contents""; ""List of Tables and Figures""; ""Tables""; ""3.1 Project Management Process""; ""4.1 Geographical Spread of Interview Participants""; ""4.2 Sectors That Participants Represented""; ""4.3 Producing a Scoring System for Vulnerability Factors""; ""4.4 Producing a Scoring System for Security Factors""; ""5.1 Positive and Negative Externalities and Social Costs and Benefits""; ""5.2 Simplified Direct Regulatory Model for Credit Card Fraud Reduction""; ""5.3 Simplified Cap-and-Trade Model for Credit Card Fraud Reduction""
""6.1 Ratio of Differences in Locking Practices for the Prototype Bicycle Parking Stands Compared to the Control Sheffield Stands""""8.1 Principal Packaging Solutions and Technologies Against Counterfeiting""; ""10.1 Handbag Theft in Supermarkets, Rates per 1,000 Warwickshire Residents""; ""10.2 Victim-Reported Handbag Theft Description""; ""10.3 What Drew Your Attention to the Trolley Safe?""; ""11.1 AT CUT PRICES: Characteristics That Make FMCGAttractive to Thieves""; ""Figures""; ""3.1 Four Main Activity Areas of the Design Life Cycle That Make Up the Framework"" ""3.2 The DAC Evaluation Framework""""3.3 Example of a Page from the DAC Evaluation Framework Publication""; ""6.1 The Prototype Bicycle Parking Stands""; ""6.2 Fraction of Time Bicycle Parking Stands Were Observed as Unused""; ""6.3 Locking Practices for Sheffield Stands vs. the Prototype Bicycle Parking Stands as a Single Group""; ""6.4 Locking Practices for Sheffield Stands and Each Prototype Bicycle Parking Stand""; ""7.1 Sketch of an Early Version of a CT Bin""; ""7.2 CT Bin on a Sydney Railway Platform""; ""9.1 Final Version of the Grippa Clip""; ""9.2 The Chelsea Clip"" ""9.3 Poster Advertising the Grippa Clip""""9.4 Card Hanger for the Grippa Clip""; ""9.5 The Grippa Clip with the Handbag Logo""; ""10.1 Monthly Distribution of Recorded Handbag Theft Incidents Across Warwickshire Supermarkets, November 2006�October 2008""; ""10.2 Distribution of Recorded Handbag Theft Incidents Across 27 Warwickshire Supermarkets, November 2006�October 2008""; ""10.3 Handbag Theft Victimization by Age Group Across 27 Warwickshire Supermarkets""; ""10.4 A Trolley Safe Fitted to a Shallow Trolley"" ""10.5 Recorded Handbag Thefts from Trolleys at the Treatment and Control Sites Before and After Intervention, November 2006�January 2009""""10.6 Customer Comments on the Trolley Safes""; ""10.7 Observations on Trolley Safe Usage Over Time, October 2008�January 2009""; ""Foreword""; ""Acknowledgments""; ""1-Introduction""; ""Notes""; ""2-The Security Function Framework""; ""Introduction""; ""Specification: A Fit-for-Purpose Framework?""; ""The Security Function Framework""; ""Conclusion""; ""Notes""; ""3-Embedding Crime Prevention Within Design""; ""Traditional Evaluations"" ""The Design Against Crime Evaluation Framework"" |
| Record Nr. | UNINA-9910809277703321 |
| Boulder, Colorado : , : Lynne Rienner Publishers, , 2012 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||