1.

Record Nr.

UNISA990001362880203316

Autore

GODFREY, Jayne Maree

Titolo

Accounting theory / Jayne Godfrey, Allan Hodgson, Scott Holmes ; with contributions from Geoff Frost, Bryan Howieson, Ann Tarca

Pubbl/distr/stampa

Milton : J. Wiley & sons, 2003

ISBN

0-470-80237-5

Edizione

[5.ed]

Descrizione fisica

XIV,762 p. ; 24 cm

Altri autori (Persone)

HODGSON, Allan

HOMES, Scott

Disciplina

657

Soggetti

Contabilità - Australia

Collocazione

657 GOD 1 (IRA 25 495)

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia



2.

Record Nr.

UNISALENTO991002157299707536

Autore

Lactantius, Lucius Caecilius Firmianus

Titolo

Lucii Caecilii Firmiani Lactantii Opera omnia, ad praestantissimam Lengletii-Dufresnoy editionem expressa ... editio novissima quae omnium instar esse potest, ad octoginta et amplius mss. codices quadraginta collata notisque uberioribus illustrata : praecedunt S. Marcellini papae, S. Marcelli papae, S. Eusebii papae, S. Melchiadis papae, Anonymi, Celsi, omnia quae extant Fragmenta

Pubbl/distr/stampa

Parisiis : excudebat Sirou, 1844

Descrizione fisica

2 v. ; 28 cm

Collana

Patrologiae cursus completus sive bibliotheca universalis integra uniformis commoda oeconomica omnium SS. patrum doctorum scriptorumque ecclesiasticorum. Series prima, Patrologiae ; 6-7

Disciplina

270.0922

Soggetti

Chiesa - Storia - Sec. 4. - Fonti

Cristianesimo - Storia - Sec. 4. - Fonti

Lingua di pubblicazione

Latino

Formato

Materiale a stampa

Livello bibliografico

Monografia



3.

Record Nr.

UNINA9910767586503321

Autore

Naseer Qureshi Kashif

Titolo

Cybersecurity Vigilance and Security Engineering of Internet of Everything / / edited by Kashif Naseer Qureshi, Thomas Newe, Gwanggil Jeon, Abdellah Chehri

Pubbl/distr/stampa

Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024

ISBN

3-031-45162-7

Edizione

[1st ed. 2024.]

Descrizione fisica

1 online resource (229 pages)

Collana

Internet of Things, Technology, Communications and Computing, , 2199-1081

Altri autori (Persone)

NeweThomas

JeonGwanggil

ChehriAbdellah

Disciplina

621.382

Soggetti

Telecommunication

Cooperating objects (Computer systems)

Internet of things

Security systems

Communications Engineering, Networks

Cyber-Physical Systems

Internet of Things

Security Science and Technology

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

Introduction -- Part A: Security Threats and Vulnerabilities -- Internet of Everything: Evolution and fundamental concepts -- Cybersecurity Threats and Attacks in IoE Networks -- Attacks Detection Mechanism for IoE Networks -- Cyber Resilience, Principles, and Practices -- Future Cybersecurity Challenges for IoE Networks -- Part B: Security Vigilance and Security Engineering for IoE Networks -- Networking and Security Architectures for IoE Networks -- Machine Learning-Based Detection and Prevention Systems for IoE -- Role of Blockchain Models for IoE Infrastructures and Applications -- Cybersecurity as a Service -- Big data Analytics for Cybersecurity in IoE Networks -- Cybersecurity Standards and Policies for CPS in IoE -- Future Privacy, and Trust Challenges for IoE Networks -- Conclusion.



Sommario/riassunto

This book first discusses cyber security fundamentals then delves into security threats and vulnerabilities, security vigilance, and security engineering for Internet of Everything (IoE) networks. After an introduction, the first section covers the security threats and vulnerabilities or techniques to expose the networks to security attacks such as repudiation, tampering, spoofing, and elevation of privilege. The second section of the book covers vigilance or prevention techniques like intrusion detection systems, trust evaluation models, crypto, and hashing privacy solutions for IoE networks. This section also covers the security engineering for embedded and cyber-physical systems in IoE networks such as blockchain, artificial intelligence, and machine learning-based solutions to secure the networks. This book provides a clear overview in all relevant areas so readers gain a better understanding of IoE networks in terms of security threats, prevention, and other security mechanisms. Discusses cyber security threats and vulnerabilities, security vigilance, and security engineering for IoE networks; Provides prevention techniques like intrusion detection, trust evaluation, crypto, and hashing privacy solutions; Features tips to secure networks from security attacks like repudiation, tampering, spoofing, and elevation of privilege.