1.

Record Nr.

UNINA9910309527803321

Titolo

Insolvenzordnung : InsO mit EuInsVOlz / herausgegeben von Karsten Schmidt

Pubbl/distr/stampa

München : C.H. Beck, 2016

ISBN

978-3-406-68250-6

Edizione

[19. Auflage]

Descrizione fisica

XXXVIII, 2700 p. ; 21 cm

Collana

Beck'sche Kurz=Kommentare ; 27

Disciplina

346.430 66

Locazione

FGBC

Collocazione

XVIII 32 (27. 19. ED)

Lingua di pubblicazione

Tedesco

Formato

Materiale a stampa

Livello bibliografico

Monografia



2.

Record Nr.

UNINA9910960757103321

Autore

Norton Kingsley

Titolo

Setting up new services in the NHS : 'just add water!' / / Kingsley Norton

Pubbl/distr/stampa

London ; ; Philadelphia, : Jessica Kingsley, 2006

ISBN

9786611007287

9781281007285

1281007285

9781846425523

1846425522

Edizione

[1st ed.]

Descrizione fisica

1 online resource (210 p.)

Collana

Community, culture, and change ; ; 13

Disciplina

362.10680941

Soggetti

Health planning - Great Britain

National health services - Great Britain - Administration

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Cover; Setting Up New Servicesin the NHS:'Just Add Water!'; Contents; PREFACE; ACKNOWLEDGEMENTS; Part I:Setting Up theReplication Project; 1.Recipe and Ingredients; 2.The Blending; Part II:The New Services in Operation; 3.First Helpings; 4.Second Helpings; 5.Aftertaste; Part III:Reviewing the Project; 6.The Proof of the Pudding; 7.A Last Supper; 8.To Future Chefs; APPENDIX:NOTES OF THE EXTENDED REPLICATION MEETING; REFERENCES; SUBJECT INDEX; AUTHOR INDEX

Sommario/riassunto

Kingsley Norton takes the reader, step-by-step, through the entire process of setting up new services within the National Health Service. His wealth of hands-on experience and practical advice makes this book essential reading for anyone interested in management and the NHS or public services and attempting to innovate.



3.

Record Nr.

UNINA9910633913903321

Titolo

Predictive Data Security using AI : Insights and Issues of Blockchain, IoT, and DevOps / / edited by Hiren Kumar Thakkar, Mayank Swarnkar, Robin Singh Bhadoria

Pubbl/distr/stampa

Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023

ISBN

981-19-6290-1

Edizione

[1st ed. 2023.]

Descrizione fisica

1 online resource (222 pages)

Collana

Studies in Computational Intelligence, , 1860-9503 ; ; 1065

Disciplina

006.3

Soggetti

Data protection

Internet of things

Artificial intelligence

Data and Information Security

Internet of Things

Artificial Intelligence

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di bibliografia

Includes bibliographical references.

Nota di contenuto

Introduction to Data Security with Machine Learning: Traditional Methods vs Recent Trends -- Data Security and Predictive Informatics: Issues, Challenges, and Opportunities -- Data Security Analytics using Machine Learning: Supervised and Unsupervised Approaches -- Data Security in Data Servers: Implementation of Security in Data Servers, Content Delivery Network Servers and Proxy Servers -- Data Security in Multimedia using AI: Perspective and Practices -- Data Security in Blockchain: Data Generation, Analysis and Predictions.

Sommario/riassunto

This contributed volume consists of 11 chapters that specifically cover the security aspects of the latest technologies such as Blockchain, IoT, and DevOps, and how to effectively deal with them using Intelligent techniques. Moreover, machine learning (ML) and deep learning (DL) algorithms are also not secured and often manipulated by attackers for data stealing. This book also discusses the types of attacks and offers novel solutions to counter the attacks on ML and DL algorithms. This book describes the concepts and issues with figures and the supporting arguments with facts and charts. In addition to that, the book provides



the comparison of different security solutions in terms of experimental results with tables and charts. Besides, the book also provides the future directions for each chapter and novel alternative approaches, wherever applicable. Often the existing literature provides domain-specific knowledge such as the description of security aspects. However, the readers find it difficult to understand how to tackle the application-specific security issues. This book takes one step forward and offers the security issues, current trends, and technologies supported by alternate solutions. Moreover, the book provides thorough guidance on the applicability of ML and DL algorithms to deal with application-specific security issues followed by novel approaches to counter threats to ML and DL algorithms. The book includes contributions from academicians, researchers, security experts, security architectures, and practitioners and provides an in-depth understanding of the mentioned issues.