01128nam0-2200325 --450 991031155700332120190308101348.0978-88-8212-574-520190308d2007----kmuy0itay5050 baitaIT 001yyBoiardo, Ariosto e i libri di battagliaatti del convegno, Scandiano-Reggio Emilia-Bologna, 3-6 ottobre 2005a cura di Andrea Canova e Paola Vecchi GalliNovaraInterlinea2007551 p.24 cm.Studi53Studi boiardeschiCentro studi Matteo Maria Boiardo7Poemi cavallereschi italianiSec. 15.-16.Congressi2005Boiardo, Matteo MariaCongressi2005Ariosto, LudovicoCongressi2005851.0330921Canova,Andrea<1967- >Vecchi Galli,PaolaITUNINAREICATUNIMARCBK9910311557003321851.033 CAN 1Bibl.2019FLFBCFLFBCBoiardo, Ariosto e i libri di battaglia1022550UNINA03700nam 22007095 450 991025484910332120251113185836.0981-10-5107-010.1007/978-981-10-5107-4(CKB)4100000000587325(DE-He213)978-981-10-5107-4(MiAaPQ)EBC5061640(PPN)204531942(EXLCZ)99410000000058732520170927d2017 u| 0engurnn#008mamaatxtrdacontentcrdamediacrrdacarrierPredictive Computing and Information Security /by P.K. Gupta, Vipin Tyagi, S.K. Singh1st ed. 2017.Singapore :Springer Nature Singapore :Imprint: Springer,2017.1 online resource (xxi, 162 pages) illustrations981-10-5106-2 Includes bibliographical references.Introduction -- Predictive Computing and Information Security: A Technical Review -- Predictive Computing -- Cloud Based Predictive Computing -- IoT based Predictive Computing -- Information Security -- Cloud Based Information Security -- IoT Based Information Security -- Applications of Predictive Computing -- Appendix.This book describes various methods and recent advances in predictive computing and information security. It highlights various predictive application scenarios to discuss these breakthroughs in real-world settings. Further, it addresses state-of-art techniques and the design, development and innovative use of technologies for enhancing predictive computing and information security.   Coverage also includes the frameworks for eTransportation and eHealth, security techniques, and algorithms for predictive computing and information security based on Internet-of-Things and Cloud computing. As such, the book offers a valuable resource for graduate students and researchers interested in exploring predictive modeling techniques and architectures to solve information security, privacy and protection issues in future communication.Data protectionData structures (Computer science)Information theoryData miningApplication softwareComputational intelligenceInformation storage and retrieval systemsData and Information SecurityData Structures and Information TheoryData Mining and Knowledge DiscoveryComputer and Information Systems ApplicationsComputational IntelligenceInformation Storage and RetrievalData protection.Data structures (Computer science).Information theory.Data mining.Application software.Computational intelligence.Information storage and retrieval systems.Data and Information Security.Data Structures and Information Theory.Data Mining and Knowledge Discovery.Computer and Information Systems Applications.Computational Intelligence.Information Storage and Retrieval.005.8Gupta P.Kauthttp://id.loc.gov/vocabulary/relators/aut859862Tyagi Vipinauthttp://id.loc.gov/vocabulary/relators/autSingh S.Kauthttp://id.loc.gov/vocabulary/relators/autBOOK9910254849103321Predictive Computing and Information Security2545051UNINA