| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA990001362880203316 |
|
|
Autore |
GODFREY, Jayne Maree |
|
|
Titolo |
Accounting theory / Jayne Godfrey, Allan Hodgson, Scott Holmes ; with contributions from Geoff Frost, Bryan Howieson, Ann Tarca |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Milton : J. Wiley & sons, 2003 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[5.ed] |
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Altri autori (Persone) |
|
HODGSON, Allan |
HOMES, Scott |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
|
|
|
|
|
Collocazione |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNISALENTO991002157299707536 |
|
|
Autore |
Lactantius, Lucius Caecilius Firmianus |
|
|
Titolo |
Lucii Caecilii Firmiani Lactantii Opera omnia, ad praestantissimam Lengletii-Dufresnoy editionem expressa ... editio novissima quae omnium instar esse potest, ad octoginta et amplius mss. codices quadraginta collata notisque uberioribus illustrata : praecedunt S. Marcellini papae, S. Marcelli papae, S. Eusebii papae, S. Melchiadis papae, Anonymi, Celsi, omnia quae extant Fragmenta |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Parisiis : excudebat Sirou, 1844 |
|
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Collana |
|
Patrologiae cursus completus sive bibliotheca universalis integra uniformis commoda oeconomica omnium SS. patrum doctorum scriptorumque ecclesiasticorum. Series prima, Patrologiae ; 6-7 |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Chiesa - Storia - Sec. 4. - Fonti |
Cristianesimo - Storia - Sec. 4. - Fonti |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910767586503321 |
|
|
Autore |
Naseer Qureshi Kashif |
|
|
Titolo |
Cybersecurity Vigilance and Security Engineering of Internet of Everything / / edited by Kashif Naseer Qureshi, Thomas Newe, Gwanggil Jeon, Abdellah Chehri |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2024.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (229 pages) |
|
|
|
|
|
|
Collana |
|
Internet of Things, Technology, Communications and Computing, , 2199-1081 |
|
|
|
|
|
|
|
|
Altri autori (Persone) |
|
NeweThomas |
JeonGwanggil |
ChehriAbdellah |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Telecommunication |
Cooperating objects (Computer systems) |
Internet of things |
Security systems |
Communications Engineering, Networks |
Cyber-Physical Systems |
Internet of Things |
Security Science and Technology |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Introduction -- Part A: Security Threats and Vulnerabilities -- Internet of Everything: Evolution and fundamental concepts -- Cybersecurity Threats and Attacks in IoE Networks -- Attacks Detection Mechanism for IoE Networks -- Cyber Resilience, Principles, and Practices -- Future Cybersecurity Challenges for IoE Networks -- Part B: Security Vigilance and Security Engineering for IoE Networks -- Networking and Security Architectures for IoE Networks -- Machine Learning-Based Detection and Prevention Systems for IoE -- Role of Blockchain Models for IoE Infrastructures and Applications -- Cybersecurity as a Service -- Big data Analytics for Cybersecurity in IoE Networks -- Cybersecurity Standards and Policies for CPS in IoE -- Future Privacy, and Trust Challenges for IoE Networks -- Conclusion. |
|
|
|
|
|
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book first discusses cyber security fundamentals then delves into security threats and vulnerabilities, security vigilance, and security engineering for Internet of Everything (IoE) networks. After an introduction, the first section covers the security threats and vulnerabilities or techniques to expose the networks to security attacks such as repudiation, tampering, spoofing, and elevation of privilege. The second section of the book covers vigilance or prevention techniques like intrusion detection systems, trust evaluation models, crypto, and hashing privacy solutions for IoE networks. This section also covers the security engineering for embedded and cyber-physical systems in IoE networks such as blockchain, artificial intelligence, and machine learning-based solutions to secure the networks. This book provides a clear overview in all relevant areas so readers gain a better understanding of IoE networks in terms of security threats, prevention, and other security mechanisms. Discusses cyber security threats and vulnerabilities, security vigilance, and security engineering for IoE networks; Provides prevention techniques like intrusion detection, trust evaluation, crypto, and hashing privacy solutions; Features tips to secure networks from security attacks like repudiation, tampering, spoofing, and elevation of privilege. |
|
|
|
|
|
|
|
| |