000798248 000__ 01648cam\a2200433Ii\4500 000798248 001__ 798248 000798248 005__ 20230306143514.0 000798248 006__ m\\\\\o\\d\\\\\\\\ 000798248 007__ cr\cn\nnnunnun 000798248 008__ 170829s2017\\\\sz\a\\\\ob\\\\000\0\eng\d 000798248 019__ $$a1003077371$$a1003207537$$a1003315743 000798248 020__ $$a9783319617176$$q(electronic book) 000798248 020__ $$a3319617176$$q(electronic book) 000798248 020__ $$z9783319617169 000798248 020__ $$z3319617168 000798248 0247_ $$a10.1007/978-3-319-61717-6$$2doi 000798248 035__ $$aSP(OCoLC)on1002110098 000798248 035__ $$aSP(OCoLC)1002110098$$z(OCoLC)1003077371$$z(OCoLC)1003207537$$z(OCoLC)1003315743 000798248 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dYDX$$dUAB 000798248 049__ $$aISEA 000798248 050_4 $$aQA76.9.A25 000798248 08204 $$a005.8$$223 000798248 1001_ $$aMatulevičius, Raimundas,$$eauthor. 000798248 24510 $$aFundamentals of secure system modelling /$$cRaimundas Matulevičius. 000798248 264_1 $$aCham, Switzerland :$$bSpringer,$$c2017. 000798248 300__ $$a1 online resource (xx, 218 pages) :$$billustrations. 000798248 336__ $$atext$$btxt$$2rdacontent 000798248 337__ $$acomputer$$bc$$2rdamedia 000798248 338__ $$aonline resource$$bcr$$2rdacarrier 000798248 504__ $$aIncludes bibliographical references. 000798248 506__ $$aAccess limited to authorized users. 000798248 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed August 29, 2017). 000798248 650_0 $$aComputer security. 000798248 650_0 $$aComputer networks$$xSecurity measures. 000798248 77608 $$iPrint version:$$z3319617168$$z9783319617169$$w(OCoLC)988287560 000798248 852__ $$bebk 000798248 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-61717-6$$zOnline Access$$91397441.1 000798248 909CO $$ooai:library.usi.edu:798248$$pGLOBAL_SET 000798248 980__ $$aEBOOK 000798248 980__ $$aBIB 000798248 982__ $$aEbook 000798248 983__ $$aOnline 000798248 994__ $$a92$$bISE