| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA990006531360403321 |
|
|
Autore |
Scudiero, Michele |
|
|
Titolo |
In tema di obbligo di residenza del fallito : Note in margine ad una sentenza della Corte Costituzionale / MicheleScudiero |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Locazione |
|
|
|
|
|
|
Collocazione |
|
BUSTA I A 10 |
BUSTA I B 115 |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
"Estratto dalla 'Rassegna di diritto pubblico'. 1962, fasc. II-III". |
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNISA996392832003316 |
|
|
Autore |
Johnson Richard <1573-1659?> |
|
|
Titolo |
The pleasant conceites of Old Hobson the merry Londoner [[electronic resource] ] : full of humorous discourses, and witty meriments. Whereat the quickest wittes may laugh, and the wiser sort take pleasure |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Printed at London, : [By G. Eld] for Iohn Wright, and are to bee sold at his shoppe neere Christ-Church gate, 1607 |
|
|
|
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Printer's name from STC. |
Dedication signed: Richard Iohnson. |
Signatures: [A]-Fâ´ (-[A]1, F4). |
Reproduction of the original in the British Library. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
|
|
|
|
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910782274703321 |
|
|
Autore |
Zou Xukai <1963-> |
|
|
Titolo |
Trust and security in collaborative computing [[electronic resource] /] / Xukai Zou, Yuan-Shun Dai, Yi Pan |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Hackensack, NJ, : World Scientific, c2008 |
|
|
|
|
|
|
|
ISBN |
|
1-281-93358-9 |
9786611933586 |
981-279-088-8 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (248 p.) |
|
|
|
|
|
|
Collana |
|
Computer and network security ; ; v. 2 |
|
|
|
|
|
|
Altri autori (Persone) |
|
DaiYuan-Shun |
PanYi <1960-> |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer security |
Groupware (Computer software) |
Computer networks - Security measures |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Contents; Preface; Acknowledgments; List of Figures; List of Tables; 1. Introduction; 1.1 Overview of Trusted Collaborative Computing; 1.2 Basic Concepts in Terms of Security; 1.3 Basic Concepts in Terms of Reliability; 1.4 Abbreviations and Notations; 1.5 Outline; 2. Secure Group Communication (SGC); 2.1 Overview of Secure Group Communication (SGC); 2.2 Typical Group Key Management Schemes for SGC; 2.2.1 Centralized Group Key Distribution; 2.2.1.1 Key Tree (Logical Key Hierarchy); 2.2.1.2 Other Proposed Schemes; 2.2.2 De-centralized Group Key Management; 2.2.2.1 Iolus |
2.2.2.2 Other Proposed Schemes 2.2.3 (Distributed) Contributory Group Key Agreement; 2.2.3.1 Tree based Group Di.e-Hellman Key Agreement; 2.2.3.2 Other Proposed Schemes; 2.2.4 Distributed Group Key Distribution; 2.2.4.1 DGKD; 2.3 Enhanced Group Key Management for SGC; 2.3.1 SGC for Wireless and Mobile Ad Hoc Networks; 2.3.1.1 CRTDH; 2.3.1.2 Other Proposed Schemes; 2.3.2 Authenticated Key Exchange (AKE); 2.3.2.1 AUTH-CRTDH; 2.3.2.2 Other Proposed Schemes; 2.3.3 Self-Healing Key Distribution; 2.3.3.1 Self-Healing based on Polynomials and Secret Sharing; 2.3.3.2 Other Proposed |
|
|
|
|
|
|
|
|
|
|
|
Schemes |
2.3.4 Block-free Group Key Management 2.3.4.1 BF-TGDH; 2.3.5 Secure Dynamic Conferencing; 2.3.5.1 KTDCKM-SDC; 2.3.5.2 Other Proposed Schemes; 2.4 Conclusion; 3. Cryptography based Access Control; 3.1 Overview of Access Control in Collaborative Computing; 3.2 An Efficient Differential Access Control (DIF-AC) Scheme; 3.2.1 System Description and Initialization; 3.2.2 System Dynamics and Maintenance; 3.2.3 Discussion; 3.3 Cryptographic Hierarchical Access Control (CHAC) Schemes; 3.3.1 HACModel; 3.3.2 Directly Dependent Key Schemes; 3.3.3 Indirectly Dependent Key Schemes |
3.3.4 Polynomial and Interpolation based Schemes 3.3.5 An Efficient CHAC Scheme with Locality; 3.4 A Uniform CHAC Scheme Based on Access Polynomials; 3.4.1 Principle; 3.4.2 Key Computation/Derivation; 3.4.3 Node/Vertex Level Dynamics; 3.4.4 User Level Dynamics; 3.4.5 Security and Performance Analysis; 3.4.5.1 Security Analysis; 3.4.5.2 Performance Analysis; 3.4.6 An Illustrative Example and Experiment Results; 3.4.7 Discussion; 3.4.7.1 Enforcement of Other Access Models; 3.5 Conclusion; 4. Intrusion Detection and Defense; 4.1 Overview of Intrusion Detection and Defense; 4.2 Intruding Attacks |
4.3 Intrusion Detection Models 4.3.1 Anomaly Modeling; 4.3.2 Misuse Modeling; 4.3.3 Specification Modeling; 4.4 Intrusion Response; 4.5 DoS/DDoS Attacks ; 4.5.1 Typical DoS Attacks; 4.5.1.1 DoS Flooding Attacks; 4.5.1.2 Redirection Attacks; 4.5.1.3 Service Exploits; 4.5.2 Distributed Denial of Service (DDoS) Attacks; 4.5.2.1 DDoS Attack Steps; 4.5.2.2 DDoS Tools; 4.6 Typical DoS/DDoS Defense Mechanisms; 4.6.1 Single-node Defending Method; 4.6.2 Multiple-node Defending Methods; 4.6.2.1 Path Identification; 4.6.3 Honeypot; 4.7 Defending against DoS/DDoS Attacks-Traceback; 4.7.1 ICMP Traceback. |
4.7.2 (Probabilistic) IP Packet Marking |
|
|
|
|
|
|
Sommario/riassunto |
|
Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing - one of the objectives for the next generation of the Internet. It includes the functions of data communication, resource sharing, group cooperation, and task allocation. One popular example of collaborative computing is grid computing. This monograph considers the latest efforts to develop a trusted environment with the high security and reliability needed for collaborative computing. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
4. |
Record Nr. |
UNINA9910409668803321 |
|
|
Autore |
Bramer Max |
|
|
Titolo |
Principles of Data Mining / / by Max Bramer |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
London : , : Springer London : , : Imprint : Springer, , 2020 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[4th ed. 2020.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (576 pages) |
|
|
|
|
|
|
Collana |
|
Undergraduate Topics in Computer Science, , 1863-7310 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Information storage and retrieval |
Database management |
Artificial intelligence |
Computer programming |
Information Storage and Retrieval |
Database Management |
Artificial Intelligence |
Programming Techniques |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Introduction to Data Mining -- Data for Data Mining -- Introduction to Classification: Naïve Bayes and Nearest Neighbour -- Using Decision Trees for Classification -- Decision Tree Induction: Using Entropy for Attribute Selection -- Decision Tree Induction: Using Frequency Tables for Attribute Selection -- Estimating the Predictive Accuracy of a Classifier -- Continuous Attributes -- Avoiding Overfitting of Decision Trees -- More About Entropy -- Inducing Modular Rules for Classification -- Measuring the Performance of a Classifier -- Dealing with Large Volumes of Data -- Ensemble Classification -- Comparing Classifiers -- Associate Rule Mining I -- Associate Rule Mining II -- Associate Rule Mining III -- Clustering -- Mining -- Classifying Streaming Data -- Classifying Streaming Data II: Time-dependent Data -- An Introduction to Neural Networks -- Appendix A – Essential Mathematics -- Appendix B – Datasets -- Appendix C – Sources of Further Information -- Appendix D – Glossary and Notation -- Appendix E – Solutions to Self-assessment Exercises -- Index. |
|
|
|
|
|
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book explains and explores the principal techniques of Data Mining, the automatic extraction of implicit and potentially useful information from data, which is increasingly used in commercial, scientific and other application areas. It focuses on classification, association rule mining and clustering. Each topic is clearly explained, with a focus on algorithms not mathematical formalism, and is illustrated by detailed worked examples. The book is written for readers without a strong background in mathematics or statistics and any formulae used are explained in detail. It can be used as a textbook to support courses at undergraduate or postgraduate levels in a wide range of subjects including Computer Science, Business Studies, Marketing, Artificial Intelligence, Bioinformatics and Forensic Science. As an aid to self-study, it aims to help general readers develop the necessary understanding of what is inside the 'black box' so they can use commercial data mining packages discriminatingly, as well as enabling advanced readers or academic researchers to understand or contribute to future technical advances in the field. Each chapter has practical exercises to enable readers to check their progress. A full glossary of technical terms used is included. Principles of Data Mining includes descriptions of algorithms for classifying streaming data, both stationary data, where the underlying model is fixed, and data that is time-dependent, where the underlying model changes from time to time - a phenomenon known as concept drift. The expanded fourth edition gives a detailed description of a feed-forward neural network with backpropagation and shows how it can be used for classification. |
|
|
|
|
|
|
|
| |