1.

Record Nr.

UNINA9910783898503321

Titolo

Child sexual abuse : a feminist reader / / edited by Emily Driver and Audrey Droisen

Pubbl/distr/stampa

New York : , : New York University Press, , 1989

ISBN

90-04-63591-2

90-411-1034-8

1-134-98724-2

0-415-00605-8

1-134-98725-0

1-280-06030-1

9780203392590

0-203-39259-0

Descrizione fisica

1 online resource (289 p.)

Altri autori (Persone)

DriverEmily

DroisenAudrey

Disciplina

362.7/6/0971

Soggetti

Child sexual abuse - Canada

Child sexual abuse - Canada - Prevention

Sexually abused children - Services for - Canada

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes bibliographical references and indexes.

Nota di contenuto

Book Cover; Title; Contents; List of Tables; About the Authors; THE MEANING OF SEXUAL ABUSE IN CHILDHOOD; HISTORICAL PERSPECTIVES; DEFINITIONS AND ETHICS; STATISTICAL DIMENSIONS; A COMMUNITY MODEL; TRAUMA TO THE CHILD VICTIM; HEALING OF THE CHILD SURVIVOR; HEALING THE FAMILY; HEALING OF OFFENDERS; HEALING OF SOCIETY; IMPLICATIONS FOR PRACTICE AND RESEARCH; Bibliography; Name Index; Subject Index

Sommario/riassunto

A comprehensive overview of the causes, treatment and prevention of child sexual abuse which approaches the problem from the perspectives of the victims, their families and the offenders themselves.



2.

Record Nr.

UNINA9910366657003321

Autore

Thomas Tony

Titolo

Machine learning approaches in cyber security analytics / / Tony Thomas, Athira P. Vijayaraghavan, Sabu Emmanuel

Pubbl/distr/stampa

Singapore : , : Springer Singapore : , : Imprint : Springer, , [2020]

ISBN

9789811517068

981-15-1706-1

Descrizione fisica

1 online resource (217 pages)

Disciplina

005.8

Soggetti

Computer security

Application software

Data encryption (Computer science)

Computer crimes

Data structures (Computer science)

Seguretat informàtica

Xifratge (Informàtica)

Aprenentatge automàtic

Delictes informàtics

Systems and Data Security

Information Systems Applications (incl. Internet)

Cryptology

Cybercrime

Data Structures

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

Chapter 1. Introduction -- Chapter 2. Machine Learning Algorithms -- Chapter 3. Machine Learning in Cyber Security Analytics -- Chapter 4. Applications of Support Vector Machines -- Chapter 5. Applications of Nearest Neighbor -- Chapter 6. Applications of Clustering -- Chapter 7. Applications of Dimensionality Reduction -- Chapter 8. Applications of other Machine Learning Methods.

Sommario/riassunto

This book introduces various machine learning methods for cyber



security analytics. With an overwhelming amount of data being generated and transferred over various networks, monitoring everything that is exchanged and identifying potential cyber threats and attacks poses a serious challenge for cyber experts. Further, as cyber attacks become more frequent and sophisticated, there is a requirement for machines to predict, detect, and identify them more rapidly. Machine learning offers various tools and techniques to automate and quickly predict, detect, and identify cyber attacks. .