000781949 000__ 01657cam\a2200445Ii\4500 000781949 001__ 781949 000781949 005__ 20230306143228.0 000781949 006__ m\\\\\o\\d\\\\\\\\ 000781949 007__ cr\cn\nnnunnun 000781949 008__ 170504s2017\\\\sz\\\\\\ob\\\\000\0\eng\d 000781949 019__ $$a985871764$$a986062520$$a986272300$$a986632824 000781949 020__ $$a9783319543086$$q(electronic book) 000781949 020__ $$a3319543083$$q(electronic book) 000781949 020__ $$z9783319543062 000781949 020__ $$z3319543067 000781949 035__ $$aSP(OCoLC)ocn985470549 000781949 035__ $$aSP(OCoLC)985470549$$z(OCoLC)985871764$$z(OCoLC)986062520$$z(OCoLC)986272300$$z(OCoLC)986632824 000781949 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dGW5XE$$dEBLCP$$dYDX$$dN$T$$dOCLCF$$dIDB$$dUAB 000781949 043__ $$ae-fr--- 000781949 049__ $$aISEA 000781949 050_4 $$aQA76.9.A25 000781949 08204 $$a005.8$$223 000781949 1001_ $$aBaumard, Philippe,$$eauthor. 000781949 24510 $$aCybersecurity in France /$$cPhilippe Baumard. 000781949 264_1 $$aCham, Switzerland :$$bSpringer,$$c2017. 000781949 300__ $$a1 online resource. 000781949 336__ $$atext$$btxt$$2rdacontent 000781949 337__ $$acomputer$$bc$$2rdamedia 000781949 338__ $$aonline resource$$bcr$$2rdacarrier 000781949 4901_ $$aSpringerBriefs in cybersecurity 000781949 504__ $$aIncludes bibliographical references. 000781949 506__ $$aAccess limited to authorized users. 000781949 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed May 10, 2017). 000781949 650_0 $$aComputer security$$zFrance. 000781949 77608 $$iPrint version:$$z9783319543062$$z3319543067$$w(OCoLC)970684086 000781949 830_0 $$aSpringerBriefs in cybersecurity. 000781949 852__ $$bebk 000781949 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-54308-6$$zOnline Access$$91397441.1 000781949 909CO $$ooai:library.usi.edu:781949$$pGLOBAL_SET 000781949 980__ $$aEBOOK 000781949 980__ $$aBIB 000781949 982__ $$aEbook 000781949 983__ $$aOnline 000781949 994__ $$a92$$bISE