LEADER 01867nam0 22004093i 450 001 CFI0528660 005 20251003044143.0 010 $a8815055274 100 $a20140508d1996 ||||0itac50 ba 101 | $aita 102 $ait 181 1$6z01$ai $bxxxe 182 1$6z01$an 200 1 $aˆLa ‰gestione dei rischi finanziari nella banca$fGiuseppe Lusignani 210 $aBologna$cIl mulino$d\1996! 215 $a453 p.$d24 cm. 225 | $aStrumenti$i. Economia 410 0$1001CFI0011208$12001 $aStrumenti$i. Economia 606 $aBANCHE$xATTIVITA FINANZIARIA$2FIR$3MILC049280$9I 676 $a332.1$9BANCHE$v21 676 $a332.7$9CREDITO$v12 676 $a332.7$9CREDITO$v19 696 $aIstituti di credito$aSistemi bancari$aBanchi $aIndustria bancaria 699 $aBanche$yIstituti di credito 699 $aBanche$ySistemi bancari 699 $aBanche$yBanchi 699 $aBanche$yIndustria bancaria 700 1$aLusignani$b, Giuseppe$f <1958- >$3MILV170967$4070$0437479 801 3$aIT$bIT-000000$c20140508 850 $aIT-BN0095 $aIT-NA0452 901 $bNAP IS$cISFSE $nSezione di materie economiche e sociali dell' ex Istituto sulle strutture finanziarie e lo sviluppo economico 901 $bNAP 01$cPOZZO LIB.$nVi sono collocati fondi di economia, periodici di ingegneria e scienze, periodici di economia e statistica e altri fondi comprendenti documenti di economia pervenuti in dono. 912 $aCFI0528660 950 0$aBiblioteca Centralizzata di Ateneo$c1 v.$d 01POZZO LIB.ECON MON 8107$e 0101 0000098225E VMA 1 v. (Precedente collocazione: GUERRAZZI B 1004)$fB $h20080312$i20080312 977 $a 01$a IS 996 $aGestione dei rischi finanziari nella banca$963555 997 $aUNISANNIO LEADER 06013nam 22007215 450 001 9910349311303321 005 20251113181316.0 010 $a3-030-24907-7 024 7 $a10.1007/978-3-030-24907-6 035 $a(CKB)4100000008707657 035 $a(DE-He213)978-3-030-24907-6 035 $a(MiAaPQ)EBC5922778 035 $a(PPN)238488470 035 $a(EXLCZ)994100000008707657 100 $a20190710d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity, Privacy, and Anonymity in Computation, Communication, and Storage $e12th International Conference, SpaCCS 2019, Atlanta, GA, USA, July 14?17, 2019, Proceedings /$fedited by Guojun Wang, Jun Feng, Md Zakirul Alam Bhuiyan, Rongxing Lu 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (XVI, 506 p. 317 illus., 142 illus. in color.) 225 1 $aInformation Systems and Applications, incl. Internet/Web, and HCI,$x2946-1642 ;$v11611 300 $aIncludes index. 311 08$a3-030-24906-9 327 $aProtecting Your Smartphone from Theft Using Accelerometer -- Ransomware Attack Protection: A Cryptographic Approach -- A Lightweight Secure Communication Protocol for IoT devices using Physically Unclonable Function -- Blockchain-based Mobility Management for LTE and Beyond -- EPT: EDNS Privacy Tunnel for DNS -- Ensuring Data Integrity in Fog Computing Based Healthcare Systems -- Modelling Security Requirements for Software Development with Common Criteria -- Visualization of DNS Tunneling Attacks using Parallel Coordinates Technique -- A Data-Driven Network Intrusion Detection Model based on Host Clustering and Integrated Learning: A Case Study on Botnet Detection -- Towards H-SDN Traffic Analytic Through Visual Analytics and Machine Learning -- End-to-end Encryption Schemes for Online Social Networks -- Touch Analysis: An Empirical Evaluation of Machine Learning Classification Algorithms on Touch Data -- Paper Document Authentication Using Print-scan Resistant Image Hashing and Public-key Cryptography -- TLShps: SDN-based TLS Handshake Protocol Simplification for IoT -- Data Protection Labware for Secure Mobile Software Development -- Multi-Round Bidding Strategy Based on Game Theory for Crowdsensing Task -- Information Leakage in Wearable Applications -- An Encryption based Approach to Protect Fog Federations from Rogue Nodes -- Python Scrapers for Scraping Cryptomarkets on Tor -- Characteristics of Bitcoin Transactions on Cryptomarkets -- Effectiveness of Machine Learning based Intrusion Detection Systems -- DNS Flood Attack Mitigation Utilizing Hot-lists and Stale Content Updates -- Attack-Aware Recovery Controller-Switch-Link Cost Minimization Placement Algorithm in Software-Defined Networking -- Challenges and Future Direction of Time-Sensitive Software-Defined Networking (TSSDN) in Automation industry -- Method of Deep Web Collection for Mobile Application Store Based on Category Keyword Searching -- Using machine learning to find anomalies in fieldbus network traffic -- Cyber Weapons Storage Mechanisms -- A New Intrusion Detection System Based on Gated Recurrent Unit(GRU) and Genetic Algorithm -- Topic Model Based Android Malware Detection -- A Verifiable Encryption Scheme Supporting Fuzzy Search -- A Verifiable Fully Homomorphic Encryption Scheme -- Secure Communication in UAV Assisted HetNets: A Proposed Model -- Detection of Application-Layer Tunnels with Rules and Machine Learning -- A Study on Anonymous Protocol in a Permission Blockchain with Ensure Privacy for a Member -- Automated Construction of Malware Families -- A Closer Look At Anonymous Proxy Re-encryption Schemes -- Approximate String Matching for DNS Anomaly Detection. 330 $aThis book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage, SpaCCS 2019, held in Atlanta, GA, USA in July 2019. The 37 full papers were carefully reviewed and selected from 109 submissions. The papers cover many dimensions including security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage. 410 0$aInformation Systems and Applications, incl. Internet/Web, and HCI,$x2946-1642 ;$v11611 606 $aData protection 606 $aComputers 606 $aComputer networks 606 $aComputer engineering 606 $aArtificial intelligence 606 $aData and Information Security 606 $aComputing Milieux 606 $aComputer Communication Networks 606 $aComputer Engineering and Networks 606 $aArtificial Intelligence 615 0$aData protection. 615 0$aComputers. 615 0$aComputer networks. 615 0$aComputer engineering. 615 0$aArtificial intelligence. 615 14$aData and Information Security. 615 24$aComputing Milieux. 615 24$aComputer Communication Networks. 615 24$aComputer Engineering and Networks. 615 24$aArtificial Intelligence. 676 $a005.8 676 $a005.8 702 $aWang$b Guojun$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aFeng$b Jun$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBhuiyan$b Md Zakirul Alam$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLu$b Rongxing$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910349311303321 996 $aSecurity, Privacy, and Anonymity in Computation, Communication, and Storage$92295526 997 $aUNINA