1.

Record Nr.

UNISA990003583460203316

Autore

GRANDO, Alberto <1957- >

Titolo

Tecnologia innovazione operations / Grando, Verona, Vicari

Pubbl/distr/stampa

Milano : Egea, 2010

ISBN

978-88-238-2135-4

Edizione

[2. ed]

Descrizione fisica

XVIII, 405 p. ; 24 cm

Collana

I manuali ; 57

Altri autori (Persone)

VERONA, Gianmario

VICARI, Salvio

Disciplina

658.4062

Soggetti

Aziende - Innovazione tecnologica

Collocazione

658.406 GRA 1

Lingua di pubblicazione

Italiano

Formato

Materiale a stampa

Livello bibliografico

Monografia



2.

Record Nr.

UNISA990005625210203316

Autore

ARTUS, Thomas

Titolo

L'  Isle des hermaphrodites / edition, introduction et notes par Claude-Gilbert Dubois

Pubbl/distr/stampa

Geneve, : Droz, 1996

Descrizione fisica

204 p. ; 18 cm

Collana

Textes littéraires français ; 467

Disciplina

840.4

Collocazione

AA 840.4 ART

Lingua di pubblicazione

Francese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Opera Anonima attribuita a Thomas Artus Sieur d'Embry (cfr. BNF).

3.

Record Nr.

UNINA9910908378603321

Autore

Syed Aamiruddin

Titolo

Supply Chain Software Security : AI, IoT, and Application Security / / by Aamiruddin Syed

Pubbl/distr/stampa

Berkeley, CA : , : Apress : , : Imprint : Apress, , 2024

ISBN

9798868807992

Edizione

[1st ed. 2024.]

Descrizione fisica

1 online resource (574 pages)

Disciplina

005.8

Soggetti

Supply chain management

Computer security

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Includes index.

Nota di contenuto

PART I: FOUNDATION OF NEXT-GEN SUPPLY CHAIN SECURITY -- Chapter 1: The New Era of Supply Chain Security -- Chapter 2: Key Technologies Shaping the Future -- PART II: APPLICATION SECURITY IN



THE SUPPLY CHAIN -- Chapter 3: The Anatomy of Supply Chain Applications -- Chapter 4: Application Security Best Practices -- Chapter 5: DevSecOps in Supply Chain Management -- PART III: LEVERAGING AI AND IOT FOR SECURITY -- Chapter 6: AI-Powered Threat Detection and Response -- Chapter 7: IoT Security and Monitoring -- PART IV: CASE STUDIES AND PRACTICAL IMPLEMENTATION -- Chapter 8: Case Studies in Next-Gen Supply Chain Security -- Chapter 9: Implementing Next-Gen Security in Your Supply Chain -- PART V: FUTURE TRENDS AND CHALLENGES -- Chapter 10: Future Trends in Supply Chain Security -- Chapter 11: Navigating Emerging Challenges.

Sommario/riassunto

Delve deep into the forefront of technological advancements shaping the future of supply chain safety and resilience. By exploring the intersection of artificial intelligence (AI), the Internet of Things (IoT), and application security, this book presents a comprehensive guide to understanding, adopting, and integrating these technologies to fortify the supply chain against contemporary threats. You’ll begin by laying the groundwork, highlighting the evolving threat landscape and how technology has shaped supply chain dynamics over the years. As you venture further, the next few chapters delve into the core technologies: AI's transformative role in predictive analytics and risk management, IoT's capabilities and challenges in supply chain management, and the pivotal role of application security in ensuring data integrity and transactional safety. You’ll then transition into an integrative approach, emphasizing the synergies and challenges when combining AI, IoT, and application security. The subsequent chapters focus on examining emerging trends and analyzing case studies that showcase both the vulnerabilities of supply chains and how they can be fortified using next-gen technologies. In a world where supply chains are the lifeblood of global commerce, ensuring their security has never been more critical. Supply Chain Security offers an in-depth exploration of the strategies, technologies, and best practices essential for safeguarding these complex networks. You Will: Understand the transformative role of AI and IoT in revolutionizing supply chain security, enhancing visibility, and predicting potential disruptions before they occur. Uncover the intricacies of application security within the supply chain, learning how to fortify digital infrastructures against emerging cyber threats. Gain invaluable insights into compliance and ethical considerations, ensuring your operations adhere to evolving regulations and promote sustainability and social responsibility.