| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910305147603321 |
|
|
Titolo |
ISO/IEC 9945-2:19939 ANSI/IEEE Std 1003.2-1993: ISO/IEC/IEEE International Standard - Information technology . Part 2, Shell and Utilities : Portable Operating System Interface (POSIX(R)) / / Portable Applications of the IEEE Computer Society |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
New York : , : IEEE, , 1993 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (1328 pages) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
POSIX (Computer software standard) |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Sommario/riassunto |
|
This standard is part of the POSIX¨ series of standards for applications and user interfaces to open systems. It defines the applications interface to a shell command language and a set of utility programs for complex manipulation. When the User Portability Utilities Option is included, the standard also defines a common environment for general-purpose time-sharing users on character-oriented display terminals. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910299859703321 |
|
|
Autore |
Abbass Hussein A |
|
|
Titolo |
Computational Red Teaming : Risk Analytics of Big-Data-to-Decisions Intelligent Systems / / by Hussein A. Abbass |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2015.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (239 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Computational intelligence |
Telecommunication |
Information retrieval |
Computer architecture |
Computational Intelligence |
Communications Engineering, Networks |
Data Storage Representation |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references at the end of each chapters and index. |
|
|
|
|
|
|
|
|
Nota di contenuto |
|
The Art of Red Teaming -- Analytics of Risk and Challenge -- Big–Data–to–Decisions Red Teaming Systems -- Case Studies on Computational Red Teaming -- The Way Forward. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Written to bridge the information needs of management and computational scientists, this book presents the first comprehensive treatment of Computational Red Teaming (CRT). The author describes an analytics environment that blends human reasoning and computational modeling to design risk-aware and evidence-based smart decision making systems. He presents the Shadow CRT Machine, which shadows the operations of an actual system to think with decision makers, challenge threats, and design remedies. This is the first book to generalize red teaming (RT) outside the military and |
|
|
|
|
|
|
|
|
|
|
security domains and it offers coverage of RT principles, practical and ethical guidelines. The author utilizes Gilbert’s principles for introducing a science. Simplicity: where the book follows a special style to make it accessible to a wide range of readers. Coherence: where only necessary elements from experimentation, optimization, simulation, data mining, big data, cognitive information processing, and system thinking are blended together systematically to present CRT as the science of Risk Analytics and Challenge Analytics. Utility: where the author draws on a wide range of examples, ranging from job interviews to Cyber operations, before presenting three case studies from air traffic control technologies, human behavior, and complex socio-technical systems involving real-time mining and integration of human brain data in the decision making environment. • Presents first comprehensive treatment of Computational Red Teaming; • Provides balanced coverage of the topic from the perspectives of risk thinking and computational modeling; • Includes thorough coverage of the computational approach to the problem; • Links risk analytics and challenge analytics with the right set of computational tools to assess risk in complex, “big-data”situations. |
|
|
|
|
|
| |