top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
2018 9th IFIP International Conference on New Technologies, Mobility and Security : 26-28 February 2018, Paris, France / / IEEE Communications Society
2018 9th IFIP International Conference on New Technologies, Mobility and Security : 26-28 February 2018, Paris, France / / IEEE Communications Society
Pubbl/distr/stampa Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2018
Descrizione fisica 1 online resource (87 pages)
Disciplina 005.8
Soggetto topico Mobile computing - Security measures
Wireless communication systems - Security measures
Computer networks - Security measures
ISBN 1-5386-3662-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996279510003316
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
2018 9th IFIP International Conference on New Technologies, Mobility and Security : 26-28 February 2018, Paris, France / / IEEE Communications Society
2018 9th IFIP International Conference on New Technologies, Mobility and Security : 26-28 February 2018, Paris, France / / IEEE Communications Society
Pubbl/distr/stampa Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2018
Descrizione fisica 1 online resource (87 pages)
Disciplina 005.8
Soggetto topico Mobile computing - Security measures
Wireless communication systems - Security measures
Computer networks - Security measures
ISBN 1-5386-3662-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910265257403321
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
2019 10th IFIP International Conference on New Technologies, Mobility and Security : 24-26 June 2019, Canary Islands-Spain / / IEEE Communications Society
2019 10th IFIP International Conference on New Technologies, Mobility and Security : 24-26 June 2019, Canary Islands-Spain / / IEEE Communications Society
Pubbl/distr/stampa Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2019
Descrizione fisica 1 online resource (68 pages)
Disciplina 005.8
Soggetto topico Mobile computing - Security measures
Wireless communication systems - Security measures
Computer networks - Security measures
ISBN 1-7281-1542-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910330959803321
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
2019 10th IFIP International Conference on New Technologies, Mobility and Security : 24-26 June 2019, Canary Islands-Spain / / IEEE Communications Society
2019 10th IFIP International Conference on New Technologies, Mobility and Security : 24-26 June 2019, Canary Islands-Spain / / IEEE Communications Society
Pubbl/distr/stampa Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2019
Descrizione fisica 1 online resource (68 pages)
Disciplina 005.8
Soggetto topico Mobile computing - Security measures
Wireless communication systems - Security measures
Computer networks - Security measures
ISBN 1-7281-1542-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996575274503316
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
AAA and network security for mobile access [[electronic resource] ] : radius, diameter, EAP, PKI and IP mobility / / Madjid Nakhjiri and Mahsa Nakhjiri
AAA and network security for mobile access [[electronic resource] ] : radius, diameter, EAP, PKI and IP mobility / / Madjid Nakhjiri and Mahsa Nakhjiri
Autore Nakhjiri Madjid
Edizione [1st edition]
Pubbl/distr/stampa Chichester, England ; ; Hoboken, NJ, : John Wiley & Sons, c2005
Descrizione fisica 1 online resource (319 p.)
Disciplina 004.62
005.8
Altri autori (Persone) NakhjiriMahsa
Soggetto topico Wireless Internet - Security measures
Mobile computing - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-280-24272-8
9786610242726
0-470-01746-5
0-470-01745-7
Classificazione 54.32
53.72
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto AAA AND NETWORK SECURITY FOR MOBILE ACCESS; Contents; Foreword; Preface; About the Author; Chapter 1 The 3 "A"s: Authentication, Authorization, Accounting; 1.1 Authentication Concepts; 1.1.1 Client Authentication; 1.1.2 Message Authentication; 1.1.3 Mutual Authentication; 1.1.4 Models for Authentication Messaging; 1.1.4.1 Two-Party Authentication Model; 1.1.4.2 Three-Party Authentication Model; 1.1.5 AAA Protocols for Authentication Messaging; 1.1.5.1 User-AAA Server; 1.1.5.2 NAS-AAA Server Communications; 1.1.5.3 Supplicant (User)-NAS Communications; 1.2 Authorization
1.2.1 How is it Different from Authentication?1.2.2 Administration Domain and Relationships with the User; 1.2.3 Standardization of Authorization Procedures; 1.2.3.1 Authorization Messaging; 1.2.3.2 Policy Framework and Authorization; 1.3 Accounting; 1.3.1 Accounting Management Architecture; 1.3.1.1 Accounting Across Administrative Domains; 1.3.2 Models for Collection of Accounting Data; 1.3.2.1 Polling Models for Accounting; 1.3.2.2 Event-Driven Models for Accounting; 1.3.3 Accounting Security; 1.3.4 Accounting Reliability; 1.3.4.1 Interim Accounting; 1.3.4.2 Transport Protocols
1.3.4.3 Fail-Over Mechanisms1.3.5 Prepaid Service: Authorization and Accounting in Harmony; 1.4 Generic AAA Architecture; 1.4.1 Requirements on AAA Protocols Running on NAS; 1.5 Conclusions and Further Resources; 1.6 References; Chapter 2 Authentication; 2.1 Examples of Authentication Mechanisms; 2.1.1 User Authentication Mechanisms; 2.1.1.1 Basic PPP User Authentication Mechanisms; 2.1.1.2 Shortcoming of PPP Authentication Methods; 2.1.1.3 Extensible Authentication Protocol (EAP) as Extension to PPP; 2.1.1.4 SIM-Based Authentication; 2.1.2 Example of Device Authentication Mechanisms
2.1.2.1 Public Key Certificate-Based Authentication2.1.2.2 Basics of Certificate-Based Authentication; 2.1.3 Examples of Message Authentication Mechanisms; 2.1.3.1 HMAC-MD5; 2.2 Classes of Authentication Mechanisms; 2.2.1 Generic Authentication Mechanisms; 2.2.1.1 Extensible Authentication Protocol (EAP); 2.2.1.2 EAP Messaging; 2.3 Further Resources; 2.4 References; Chapter 3 Key Management Methods; 3.1 Key Management Taxonomy; 3.1.1 Key Management Terminology; 3.1.2 Types of Cryptographic Algorithms; 3.1.3 Key Management Functions; 3.1.4 Key Establishment Methods; 3.1.4.1 Key Transport
3.1.4.2 Key Agreement3.1.4.3 Manual Key Establishment; 3.2 Management of Symmetric Keys; 3.2.1 EAP Key Management Methods; 3.2.2 Diffie-Hellman Key Agreement for Symmetric Key Generation; 3.2.2.1 Problems with Diffie-Hellman; 3.2.3 Internet Key Exchange for Symmetric Key Agreement; 3.2.4 Kerberos and Single Sign On; 3.2.4.1 Kerberos Issues; 3.2.5 Kerberized Internet Negotiation of Keys (KINK); 3.3 Management of Public Keys and PKIs; 3.4 Further Resources; 3.5 References; Chapter 4 Internet Security and Key Exchange Basics; 4.1 Introduction: Issues with Link Layer-Only Security
4.2 Internet Protocol Security
Record Nr. UNINA-9910143692503321
Nakhjiri Madjid  
Chichester, England ; ; Hoboken, NJ, : John Wiley & Sons, c2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
AAA and network security for mobile access [[electronic resource] ] : radius, diameter, EAP, PKI and IP mobility / / Madjid Nakhjiri and Mahsa Nakhjiri
AAA and network security for mobile access [[electronic resource] ] : radius, diameter, EAP, PKI and IP mobility / / Madjid Nakhjiri and Mahsa Nakhjiri
Autore Nakhjiri Madjid
Edizione [1st edition]
Pubbl/distr/stampa Chichester, England ; ; Hoboken, NJ, : John Wiley & Sons, c2005
Descrizione fisica 1 online resource (319 p.)
Disciplina 004.62
005.8
Altri autori (Persone) NakhjiriMahsa
Soggetto topico Wireless Internet - Security measures
Mobile computing - Security measures
ISBN 1-280-24272-8
9786610242726
0-470-01746-5
0-470-01745-7
Classificazione 54.32
53.72
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto AAA AND NETWORK SECURITY FOR MOBILE ACCESS; Contents; Foreword; Preface; About the Author; Chapter 1 The 3 "A"s: Authentication, Authorization, Accounting; 1.1 Authentication Concepts; 1.1.1 Client Authentication; 1.1.2 Message Authentication; 1.1.3 Mutual Authentication; 1.1.4 Models for Authentication Messaging; 1.1.4.1 Two-Party Authentication Model; 1.1.4.2 Three-Party Authentication Model; 1.1.5 AAA Protocols for Authentication Messaging; 1.1.5.1 User-AAA Server; 1.1.5.2 NAS-AAA Server Communications; 1.1.5.3 Supplicant (User)-NAS Communications; 1.2 Authorization
1.2.1 How is it Different from Authentication?1.2.2 Administration Domain and Relationships with the User; 1.2.3 Standardization of Authorization Procedures; 1.2.3.1 Authorization Messaging; 1.2.3.2 Policy Framework and Authorization; 1.3 Accounting; 1.3.1 Accounting Management Architecture; 1.3.1.1 Accounting Across Administrative Domains; 1.3.2 Models for Collection of Accounting Data; 1.3.2.1 Polling Models for Accounting; 1.3.2.2 Event-Driven Models for Accounting; 1.3.3 Accounting Security; 1.3.4 Accounting Reliability; 1.3.4.1 Interim Accounting; 1.3.4.2 Transport Protocols
1.3.4.3 Fail-Over Mechanisms1.3.5 Prepaid Service: Authorization and Accounting in Harmony; 1.4 Generic AAA Architecture; 1.4.1 Requirements on AAA Protocols Running on NAS; 1.5 Conclusions and Further Resources; 1.6 References; Chapter 2 Authentication; 2.1 Examples of Authentication Mechanisms; 2.1.1 User Authentication Mechanisms; 2.1.1.1 Basic PPP User Authentication Mechanisms; 2.1.1.2 Shortcoming of PPP Authentication Methods; 2.1.1.3 Extensible Authentication Protocol (EAP) as Extension to PPP; 2.1.1.4 SIM-Based Authentication; 2.1.2 Example of Device Authentication Mechanisms
2.1.2.1 Public Key Certificate-Based Authentication2.1.2.2 Basics of Certificate-Based Authentication; 2.1.3 Examples of Message Authentication Mechanisms; 2.1.3.1 HMAC-MD5; 2.2 Classes of Authentication Mechanisms; 2.2.1 Generic Authentication Mechanisms; 2.2.1.1 Extensible Authentication Protocol (EAP); 2.2.1.2 EAP Messaging; 2.3 Further Resources; 2.4 References; Chapter 3 Key Management Methods; 3.1 Key Management Taxonomy; 3.1.1 Key Management Terminology; 3.1.2 Types of Cryptographic Algorithms; 3.1.3 Key Management Functions; 3.1.4 Key Establishment Methods; 3.1.4.1 Key Transport
3.1.4.2 Key Agreement3.1.4.3 Manual Key Establishment; 3.2 Management of Symmetric Keys; 3.2.1 EAP Key Management Methods; 3.2.2 Diffie-Hellman Key Agreement for Symmetric Key Generation; 3.2.2.1 Problems with Diffie-Hellman; 3.2.3 Internet Key Exchange for Symmetric Key Agreement; 3.2.4 Kerberos and Single Sign On; 3.2.4.1 Kerberos Issues; 3.2.5 Kerberized Internet Negotiation of Keys (KINK); 3.3 Management of Public Keys and PKIs; 3.4 Further Resources; 3.5 References; Chapter 4 Internet Security and Key Exchange Basics; 4.1 Introduction: Issues with Link Layer-Only Security
4.2 Internet Protocol Security
Record Nr. UNINA-9910830716303321
Nakhjiri Madjid  
Chichester, England ; ; Hoboken, NJ, : John Wiley & Sons, c2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Android forensics [[electronic resource] ] : investigation, analysis, and mobile security for Google Android / / Andrew Hoog ; John McCash, technical editor
Android forensics [[electronic resource] ] : investigation, analysis, and mobile security for Google Android / / Andrew Hoog ; John McCash, technical editor
Autore Hoog Andrew
Edizione [1st edition]
Pubbl/distr/stampa Waltham, MA, : Syngress, c2011
Descrizione fisica 1 online resource (393 p.)
Disciplina 005.4
005.4/46
005.446
363.25
Soggetto topico Smartphones - Security measures
Mobile computing - Security measures
Data recovery (Computer science)
Computer crimes - Investigation
Soggetto genere / forma Electronic books.
ISBN 1-283-28146-5
9786613281463
1-59749-652-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Android Forensics; Copyright; Dedication; Contents; Acknowledgements; Introduction; Chapter 1; Chapter 2; Chapter 3; Chapter 4; Chapter 5; Chapter 6; Chapter 7; Website; About the Author; About the Technical Editor; Chapter 1 -Android and mobile forensics; Introduction; Android platform; Linux, open source software, and forensics; Android Open Source Project; Internationalization; Android Market; Android forensics; Summary; References; Chapter 2 -Android hardware platforms; Introduction; Overview of core components; Overview of different device types; ROM and boot loaders
ManufacturersAndroid updates; Specific devices; Summary; References; Chapter 3 -Android software development kit and android debug bridge; Introduction; Android platforms; Software development kit (SDK); Android security model; Forensics and the SDK; Summary; References; Chapter 4 -Android file systems and data structures; Introduction; Data in the Shell; Type of memory; File systems; Mounted file systems; Summary; References; Chapter 5 -Android device, data, and app security; Introduction; Data theft targets and attack vectors; Security considerations; Individual security strategies
Corporate security strategiesApp development security strategies; Summary; References; Chapter 6 -Android forensic techniques; Introduction; Procedures for handling an Android device; Imaging Android USB mass storage devices; Logical techniques; Physical techniques; Summary; References; Chapter 7 -Android application and forensic analysis; Introduction; Analysis techniques; FAT forensic analysis; YAFFS2 forensic analysis; Android app analysis and reference; Summary; References; Index
Record Nr. UNINA-9910461406503321
Hoog Andrew  
Waltham, MA, : Syngress, c2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Android forensics : investigation, analysis, and mobile security for Google Android / / Andrew Hoog ; John McCash, technical editor
Android forensics : investigation, analysis, and mobile security for Google Android / / Andrew Hoog ; John McCash, technical editor
Autore Hoog Andrew
Edizione [1st edition]
Pubbl/distr/stampa Waltham, MA, : Syngress, c2011
Descrizione fisica 1 online resource (393 p.)
Disciplina 005.4
005.4/46
005.446
363.25
Soggetto topico Smartphones - Security measures
Mobile computing - Security measures
Data recovery (Computer science)
Computer crimes - Investigation
ISBN 1-283-28146-5
9786613281463
1-59749-652-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Android Forensics; Copyright; Dedication; Contents; Acknowledgements; Introduction; Chapter 1; Chapter 2; Chapter 3; Chapter 4; Chapter 5; Chapter 6; Chapter 7; Website; About the Author; About the Technical Editor; Chapter 1 -Android and mobile forensics; Introduction; Android platform; Linux, open source software, and forensics; Android Open Source Project; Internationalization; Android Market; Android forensics; Summary; References; Chapter 2 -Android hardware platforms; Introduction; Overview of core components; Overview of different device types; ROM and boot loaders
ManufacturersAndroid updates; Specific devices; Summary; References; Chapter 3 -Android software development kit and android debug bridge; Introduction; Android platforms; Software development kit (SDK); Android security model; Forensics and the SDK; Summary; References; Chapter 4 -Android file systems and data structures; Introduction; Data in the Shell; Type of memory; File systems; Mounted file systems; Summary; References; Chapter 5 -Android device, data, and app security; Introduction; Data theft targets and attack vectors; Security considerations; Individual security strategies
Corporate security strategiesApp development security strategies; Summary; References; Chapter 6 -Android forensic techniques; Introduction; Procedures for handling an Android device; Imaging Android USB mass storage devices; Logical techniques; Physical techniques; Summary; References; Chapter 7 -Android application and forensic analysis; Introduction; Analysis techniques; FAT forensic analysis; YAFFS2 forensic analysis; Android app analysis and reference; Summary; References; Index
Record Nr. UNINA-9910789440003321
Hoog Andrew  
Waltham, MA, : Syngress, c2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Android forensics : investigation, analysis, and mobile security for Google Android / / Andrew Hoog ; John McCash, technical editor
Android forensics : investigation, analysis, and mobile security for Google Android / / Andrew Hoog ; John McCash, technical editor
Autore Hoog Andrew
Edizione [1st edition]
Pubbl/distr/stampa Waltham, MA, : Syngress, c2011
Descrizione fisica 1 online resource (393 p.)
Disciplina 005.4
005.4/46
005.446
363.25
Soggetto topico Smartphones - Security measures
Mobile computing - Security measures
Data recovery (Computer science)
Computer crimes - Investigation
ISBN 1-283-28146-5
9786613281463
1-59749-652-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Android Forensics; Copyright; Dedication; Contents; Acknowledgements; Introduction; Chapter 1; Chapter 2; Chapter 3; Chapter 4; Chapter 5; Chapter 6; Chapter 7; Website; About the Author; About the Technical Editor; Chapter 1 -Android and mobile forensics; Introduction; Android platform; Linux, open source software, and forensics; Android Open Source Project; Internationalization; Android Market; Android forensics; Summary; References; Chapter 2 -Android hardware platforms; Introduction; Overview of core components; Overview of different device types; ROM and boot loaders
ManufacturersAndroid updates; Specific devices; Summary; References; Chapter 3 -Android software development kit and android debug bridge; Introduction; Android platforms; Software development kit (SDK); Android security model; Forensics and the SDK; Summary; References; Chapter 4 -Android file systems and data structures; Introduction; Data in the Shell; Type of memory; File systems; Mounted file systems; Summary; References; Chapter 5 -Android device, data, and app security; Introduction; Data theft targets and attack vectors; Security considerations; Individual security strategies
Corporate security strategiesApp development security strategies; Summary; References; Chapter 6 -Android forensic techniques; Introduction; Procedures for handling an Android device; Imaging Android USB mass storage devices; Logical techniques; Physical techniques; Summary; References; Chapter 7 -Android application and forensic analysis; Introduction; Analysis techniques; FAT forensic analysis; YAFFS2 forensic analysis; Android app analysis and reference; Summary; References; Index
Record Nr. UNINA-9910820237003321
Hoog Andrew  
Waltham, MA, : Syngress, c2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Android security internals : an in-depth guide to android's security architecture / / by Nikolay Elenkov ; [foreword by Jon Sawyer]
Android security internals : an in-depth guide to android's security architecture / / by Nikolay Elenkov ; [foreword by Jon Sawyer]
Autore Elenkov Nikolay
Edizione [1st edition]
Pubbl/distr/stampa San Francisco : , : No Starch Press, , [2015]
Descrizione fisica 1 online resource (434 p.)
Disciplina 004.1675
Soggetto topico Operating systems (Computers) - Security measures
Smartphones - Security measures
Mobile computing - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-4571-8549-0
1-59327-641-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto About the Author; Brief Contents; Contents in Detail; Foreword; Acknowledgments; Introduction; Who This Book Is For; Prerequisites; Android Versions; How Is This Book Organized?; Conventions; Chapter 1: Android's Security Model; Android's Architecture; Linux Kernel; Native User Space; Dalvik VM; Java Runtime Libraries; System Services; Inter-Process Communication; Binder; Android Framework Libraries; Applications; Android's Security Model; Application Sandboxing; Permissions; IPC; Code Signing and Platform Keys; Multi-User Support; SELinux; System Updates; Verified Boot; Summary
Chapter 2: Permissions The Nature of Permissions; Requesting Permissions; Permission Management; Permission Protection Levels; Permission Assignment; Permission Enforcement; Kernel-Level Enforcement; Native Daemon-Level Enforcement; Framework-Level Enforcement; System Permissions; Signature Permissions; Development Permissions; Shared User ID; Custom Permissions; Public and Private Components; Activity and Service Permissions; Broadcast Permissions; Content Provider Permissions; Static Provider Permissions; Dynamic Provider Permissions; Pending Intents; Summary; Chapter 3: Package Management
Android Application Package Format Code Signing; Java Code Signing; Android Code Signing; APK Install Process; Location of Application Packages and Data; Active Components; Installing a Local Package; Updating a Package; Installing Encrypted APKs; Forward Locking; Android 4.1 Forward Locking Implementation; Encrypted Apps and Google Play; Package Verification; Android Support for Package Verification; Google Play Implementation; Summary; Chapter 4: User Management; Multi-User Support Overview; Types of Users; The Primary User (Owner); Secondary Users; Restricted Profiles; Guest User
User Management Command-Line Tools; User States and Related Broadcasts; User Metadata; The User List File; User Metadata Files; User System Directory; Per-User Application Management; Application Data Directories; Application Sharing; External Storage; External Storage Implementations; Multi-User External Storage; External Storage Permissions; Other Multi-User Features; Summary; Chapter 5: Cryptographic Providers; JCA Provider Architecture; Cryptographic Service Providers; JCA Engine Classes; Obtaining an Engine Class Instance; Algorithm Names; Secure Random; Message Digest; Signature; Cipher
MacKey; SecretKey and PBEKey; PublicKey, PrivateKey, and KeyPair; KeySpec; KeyFactory; SecretKeyFactory; Key Pair Generator; KeyGenerator; KeyAgreement; KeyStore; CertificateFactory and CertPath; CertPathValidator and CertPathBuilder; Android JCA Providers; Harmony's Crypto Provider; Android's Bouncy Castle Provider; AndroidOpenSSL Provider; OpenSSL; Using a Custom Provider; Spongy Castle; Summary; Chapter 6: Network Security and PKI ; PKI and SSL Overview; Public Key Certificates; Direct Trust and Private CAs; Public Key Infrastructure; Certificate Revocation; JSSE Introduction; Secure Sockets
Peer Authentication
Record Nr. UNINA-9910459905203321
Elenkov Nikolay  
San Francisco : , : No Starch Press, , [2015]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui