LEADER 01548nam a2200301 i 4500 001 991003567049707536 005 20020503200311.0 008 001103s1976 it ||| | ita 035 $ab10524885-39ule_inst 035 $aEXGIL123123$9ExL 040 $aBiblioteca Interfacoltà$bita 082 0 $a390.09452 245 13$aIl mondo popolare in Lombardia 260 $aMilano :$bSilvana,$c1976- 300 $av. ;$c19 cm. 650 4$aLombardia - Usi e costumi 907 $a.b10524885$b02-04-14$c27-06-02 912 $a991003567049707536 945 $aLE002 Dir. V D 1 I$cV. 1$g1$i2002000478795$lle002$o-$pE0.00$q-$rl$so $t0$u0$v0$w0$x0$y.i1060358x$z27-06-02 945 $aLE002 Dir. V D 1 II$cV. 2$g20021$i2002000478818$lle002$o-$pE0.00$q-$rl$so $t0$u0$v0$w0$x0$y.i10603591$z27-06-02 945 $aLE002 Dir. V D 1 III$cV. 3$g1$i2002000478825$lle002$o-$pE0.00$q-$rl$so $t0$u0$v0$w0$x0$y.i10603608$z27-06-02 945 $aLE002 Dir. V D 1 IV$cV. 4$g1$i2002000478832$lle002$o-$pE0.00$q-$rl$so $t0$u0$v0$w0$x0$y.i1060361x$z27-06-02 945 $aLE002 Dir. V D 1 VIII$cVIII$g1$i2002000752130$lle002$o-$pE0.00$q-$rn$so $t0$u0$v0$w0$x0$y.i14748733$z09-05-08 945 $aLE002 A Dir. V D 1 VIII bis$g2$i2002000752147$lle002$o-$pE0.00$q-$rn$so $t0$u0$v0$w0$x0$y.i14748745$z09-05-08 945 $aLE002 A Dir. V D 1 IV bis$cIV$g2$i2002000752192$lle002$og$pE0.00$q-$rn$so $t0$u0$v0$w0$x0$y.i14748848$z09-05-08 996 $aMondo popolare in Lombardia$9216775 997 $aUNISALENTO 998 $ale002$b01-01-00$cm$da $e-$fita$git $h3$i4 LEADER 04587nam 22007815 450 001 9910298969803321 005 20200705060332.0 010 $a3-319-11391-7 024 7 $a10.1007/978-3-319-11391-3 035 $a(CKB)3710000000332332 035 $a(EBL)1967924 035 $a(OCoLC)908088246 035 $a(SSID)ssj0001424440 035 $a(PQKBManifestationID)11844605 035 $a(PQKBTitleCode)TC0001424440 035 $a(PQKBWorkID)11362958 035 $a(PQKB)11327704 035 $a(MiAaPQ)EBC1967924 035 $a(DE-He213)978-3-319-11391-3 035 $a(PPN)18352070X 035 $a(EXLCZ)993710000000332332 100 $a20150105d2014 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCyber Defense and Situational Awareness /$fedited by Alexander Kott, Cliff Wang, Robert F. Erbacher 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (337 p.) 225 1 $aAdvances in Information Security,$x1568-2633 ;$v62 300 $aDescription based upon print version of record. 311 $a3-319-11390-9 320 $aIncludes bibliographical references. 327 $aPreview -- Foundations and Challenges -- Cyber and Kinetic -- Formation of Awareness -- Network-wide Awareness -- Cognition and Technology -- Cognitive Process -- Visualization and Analysts -- Inference and Ontology -- Learning and Semantics -- Impact Assessment -- Attack Projection -- Metrics of Security -- Mission Resilience -- Concluding Thoughts. 330 $aThis book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, predicting and assessing impact of cyber attacks, and achieving resilience of cyber and physical mission. Chapters include case studies, recent research results and practical insights described specifically for this book. Situational awareness is exceptionally prominent in the field of cyber defense. It involves science, technology and practice of perception, comprehension and projection of events and entities in cyber space. Chapters discuss the difficulties of achieving cyber situational awareness ? along with approaches to overcoming the difficulties - in the relatively young field of cyber defense where key phenomena are so unlike the more conventional physical world. Cyber Defense and Situational Awareness is designed as a reference for practitioners of cyber security and developers of technology solutions for cyber defenders. Advanced-level students and researchers focused on security of computer networks will also find this book a valuable resource. 410 0$aAdvances in Information Security,$x1568-2633 ;$v62 606 $aComputer security 606 $aComputer networks 606 $aData encryption (Computer science) 606 $aApplication software 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 615 0$aComputer security. 615 0$aComputer networks. 615 0$aData encryption (Computer science) 615 0$aApplication software. 615 14$aSystems and Data Security. 615 24$aComputer Communication Networks. 615 24$aCryptology. 615 24$aInformation Systems Applications (incl. Internet). 676 $a004 676 $a004.6 676 $a005.7 676 $a005.8 702 $aKott$b Alexander$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWang$b Cliff$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aErbacher$b Robert F$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910298969803321 996 $aCyber Defense and Situational Awareness$92199990 997 $aUNINA