![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
2025 |
![]() ![]() Author: Colantonio Alessandro Publisher: Gallucci Bros Nel tranquillo villaggio di Buona Lena ogni giorno è uguale all'altro. Nessun pericolo, nessuna sorpresa, sempre la stessa routine: raccogliere risorse e costruire. Alex non ne può più, finché incontra Glitch, un misterioso mercante che le offre una mod, e poi un'altra, e un'altra ancora - sfere magiche in grado di trasportarla in mondi diversi, esattamente come lei li desidera. Ma aldilà dei portali aperti dalle mod il confine tra sogno e illusione si fa sempre più sottile. Tra avventure e combattimenti, Alex sarà costretta a scegliere tra i mondi che ha creato e i suoi vecchi amici, tra il fascino dell'ignoto e quello che, forse, conta davvero. Prima che sia troppo tardi... Età di lettura: da 10 anni. € 14,90
Scontato: € 14,16
|
![]() ![]() Author: Colantonio Alessandro Publisher: Coppola Editore € 10,00
|
2024 |
![]() ![]() Author: Colantonio Alessandro Publisher: Coppola Editore Leggende Metropolitane. Le bugie dei videogiocatori € 10,00
|
![]() ![]() Author: Colantonio Alessandro Publisher: Coppola Editore Un viaggio in uno dei più famosi franchise di sempre. L'universo dei Pokémon fra videogiochi, anime, gadget. Alessandro Colantonio ci porta a spasso con Pikachu a ritroso del tempo, dalla nascita dei Pocket Monsters al loro successo che dura incondizionato ancora oggi, di generazione in generazione. Gotta catch 'em all! € 10,00
Scontato: € 9,50
|
1912 |
![]() ![]() Author: Colantonio Alessandro, Di Pietro Roberto, Ocello Alberto Publisher: World Scientific Pub Co Inc With continuous growth in the number of information objects and the users that can access these objects, ensuring that access is compliant with company policies has become a big challenge. Role-based Access Control (RBAC) — a policy-neutral access control model that serves as a bridge between academia and industry — is probably the most suitable security model for commercial applications.Interestingly, role design determines RBAC's cost. When there are hundreds or thousands of users within an organization, with individual functions and responsibilities to be accurately reflected in terms of access permissions, only a well-defined role engineering process allows for significant savings of time and money while protecting data and systems.Among role engineering approaches, searching through access control systems to find de facto roles embedded in existing permissions is attracting increasing interest. The focus falls on role mining, which is applied data mining techniques to automate — to the extent possible — the role design task.This book explores existing role mining algorithms and offers insights into the automated role design approaches proposed in the literature. Alongside theory, this book acts as a practical guide for using role mining tools when implementing RBAC. Beside a comprehensive survey of role mining techniques deeply rooted in academic research, this book also provides a summary of the role-based approach, access control concepts and describes a typical role engineering process.Among the pioneering works on role mining, this book blends business elements with data mining theory, and thus further extends the applications of role mining into business practice. This makes it a useful guide for all academics, IT and business professionals. € 100,30
|
|