000697765 000__ 01629cam\a2200433Ii\4500 000697765 001__ 697765 000697765 005__ 20230306135755.0 000697765 006__ m\\\\\o\\d\\\\\\\\ 000697765 007__ cr\cn\nnnunnun 000697765 008__ 140305s2014\\\\gw\a\\\\ob\\\\000\0\eng\d 000697765 020__ $$a9783319041476$$qelectronic book 000697765 020__ $$a3319041479$$qelectronic book 000697765 020__ $$z9783319041469 000697765 035__ $$aSP(OCoLC)ocn871422685 000697765 035__ $$aSP(OCoLC)871422685 000697765 035__ $$a697765 000697765 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dYDXCP$$dDEBBG$$dGW5XE$$dIDEBK$$dCOO 000697765 049__ $$aISEA 000697765 050_4 $$aTK5105.59$$bN48 2014eb 000697765 08204 $$a005.8$$223 000697765 24500 $$aNetworks and network analysis for defence and security$$h[electronic resource] /$$cAnthony J. Masys, editor. 000697765 264_1 $$aCham [Germany] :$$bSpringer,$$c2014. 000697765 300__ $$a1 online resource (xviii, 287 pages) :$$bcolored illustrations. 000697765 336__ $$atext$$btxt$$2rdacontent 000697765 337__ $$acomputer$$bc$$2rdamedia 000697765 338__ $$aonline resource$$bcr$$2rdacarrier 000697765 4901_ $$aLecture notes in social networks 000697765 504__ $$aIncludes bibliographical references. 000697765 506__ $$aAccess limited to authorized users. 000697765 588__ $$aDescription based on online resource; title from pdf information screen (viewed March 5, 2014). 000697765 650_0 $$aComputer networks$$xSecurity measures. 000697765 650_0 $$aCommunication$$xNetwork analysis. 000697765 650_0 $$aComputer crimes. 000697765 7001_ $$aMasys, Anthony J.,$$eeditor. 000697765 830_0 $$aLecture notes in social networks. 000697765 85280 $$bebk$$hSpringerLink 000697765 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://dx.doi.org/10.1007/978-3-319-04147-6$$zOnline Access 000697765 909CO $$ooai:library.usi.edu:697765$$pGLOBAL_SET 000697765 980__ $$aEBOOK 000697765 980__ $$aBIB 000697765 982__ $$aEbook 000697765 983__ $$aOnline 000697765 994__ $$a92$$bISE