LEADER 00983nam0-22002651i-450- 001 990003024110403321 005 20041020095734.0 035 $a000302411 035 $aFED01000302411 035 $a(Aleph)000302411FED01 035 $a000302411 100 $a20030910d1996----km-y0itay50------ba 101 0 $aita 102 $aIT 200 1 $aCaratteristiche e finalità del sistema creditizio italiano e riflessi per il mercato dell'usura$fUmberto Filotto 210 $aMilano$cUniversità commerciale Luigi Bocconi. Centro di economia monetaria e finanziaria Paolo Baffi$d1996 225 1 $aQuaderni di ricerca$fCentro di economia monetaria e finanziaria Paolo Baffi$v109 700 1$aFilotto,$bUmberto$0111522 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990003024110403321 952 $aPaper 1/109$fSES 959 $aSES 996 $aCaratteristiche e finalità del sistema creditizio italiano e riflessi per il mercato dell'usura$9467205 997 $aUNINA LEADER 03583oam 2200553 450 001 9910156195603321 005 20200727142942.0 024 7 $a10.4018/978-1-5225-1941-6 035 $a(OCoLC)1178541584 035 $a(MiFhGG)GVRL2W6G 035 $a(EXLCZ)993710000000971142 100 $a20170216h20172017 uy 0 101 0 $aeng 135 $aurun|---uuuua 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 00$aCybersecurity breaches and issues surrounding online threat protection /$fMichelle Moore, George Mason University, USA, editor 210 1$aHershey, Pennsylvania :$cInformation Science Reference,$d[2017] 210 4$d?2017 215 $a1 online resource (xxi, 408 pages) $ccolor illustrations, charts 225 1 $aAdvances in Information Security, Privacy, and Ethics (AISPE) Book Series,$x1948-9749 311 $a1-5225-1941-6 311 $a1-5225-1942-4 320 $aIncludes bibliographical references and index. 327 $aAn exploration regarding issues in insider threat / Jaeung Lee [and 3 others] -- The development of cybersecurity policy and legislative landscape in Latin America and Caribbean states / Indianna D. Minto-Coy, M. Georgia Gibson Henlin -- Internet pharmacy cybercrime: state policy mitigating risks 2000-2015 / Mary Schmeida, Ramona S. McNeal -- Identifying and analyzing the latent cyber threats in developing economies / Atul Bamrara -- Cybercrime investigation / Sujitha S., Parkavi R. -- Cybercrimes via virtual currencies in international business / Dincer Atli -- Cybersecurity and data breaches at schools / Libi Shen, Irene Chen, Anchi Su -- Detection protocol of possible crime scenes using internet of things (IoT) / Bashar Alohali -- Solutions for securing end user data over the cloud deployed applications / Akashdeep Bhardwaj -- Cloud computing and cybersecurity issues facing local enterprises / Emre Erturk -- SOHO users' perceptions of reliability and continuity of cloud-based services / Cornel L. Levy, Nilsa I. Elias -- Big data security framework for distributed cloud data centers / Chandu Thota [and 3 others] -- Robotics: Theory and Applications / Kijpokin Kasemsap. 330 3 $a"[This book] is an essential reference source for the latest scholarly research on the various types of unauthorized access or damage to electronic data. Featuring extensive coverage across a range of relevant perspectives and topics, such as robotics, cloud computing, and electronic data diffusion, this publication is ideally designed for academicians, researchers, computer engineers, graduate students, and practitioners seeking current research on the threats that exist in the world of technology"--Provided by publisher. 410 0$aAdvances in information security, privacy, and ethics (AISPE) book series. 606 $aComputer crimes$xPrevention 606 $aCyberterrorism$xPrevention 606 $aComputer security 610 $aCloud based services 610 $aCyber crime 610 $aData breaches 610 $aElectronic data diffusion 610 $aInternet of things (IoT) 610 $aRobotics 615 0$aComputer crimes$xPrevention. 615 0$aCyberterrorism$xPrevention. 615 0$aComputer security. 676 $a005.8 700 $aMoore$b Michelle$01249038 702 $aMoore$b Michelle$f1973- 801 0$bMiFhGG 801 1$bMiFhGG 906 $aBOOK 912 $a9910156195603321 996 $aCybersecurity breaches and issues surrounding online threat protection$92894702 997 $aUNINA