LEADER 01345nam0-2200409---450 001 990005690730203316 005 20210820123837.0 035 $a000569073 035 $aUSA01000569073 035 $a(ALEPH)000569073USA01 035 $a000569073 100 $a20060307d1977----|||y0itaa50------ba 101 $aita 102 $ait 105 $a0 00||| 200 1 $a<> Re Sole$fLouis de Rouvroy de Saint-Simon$ga cura di Jean-Michel Gardair$g[trad. dal francese di Adalberto Cremonese] 210 $aMilano$cGarzanti$d1977 215 $aXX, 204 p.$d18 cm 225 2 $a<> grandi libri$v205 300 $aTrad. da: Memoires. 410 0$12001$a<> grandi libri$v205 454 $1001SA0017147$12001$aMemoires. 51.-59.$fLouis de Rouvroy de Saint-Simon.$920576 676 $a944.025 700 1$aSaint-Simon,$bClaude Henri : de$0126206 702 1$aGARDAIR,$bJean Michel 702 1$aCREMONESE,$bAdalberto 801 0$aIT$bSA$c20111219 912 $a990005690730203316 950 0$aDipar.to di Filosofia - Salerno$dDFFDC SAI$e7647 FIL 951 $aXV.18.A. 1138 (FDC SAI)$b7647 FIL$cXV.18.A$d481754 959 $aBK 969 $aFDECI 979 $c20121027$lUSA01$h1526 979 $c20121027$lUSA01$h1615 979 $aCHIARA$b90$c20141121$lUSA01$h1120 996 $aMemoires. 51.-59$920576 997 $aUNISA LEADER 06664nam 2200721 450 001 9910797822003321 005 20230315230538.0 010 $a0-12-802917-X 035 $a(CKB)3710000000527189 035 $a(EBL)4186519 035 $a(Au-PeEL)EBL4186519 035 $a(CaPaEBR)ebr11134709 035 $a(CaONFJC)MIL877811 035 $a(OCoLC)932340309 035 $a(MiAaPQ)EBC4186519 035 $a(PPN)193662868 035 $a(EXLCZ)993710000000527189 100 $a20160102h20162016 uy| 0 101 0 $aeng 135 $aur|n#|||||||| 181 $2rdacontent 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 00$aAutomating open source intelligence $ealgorithms for OSINT /$fedited by Robert Layton, Paul A. Watters 210 1$aAmsterdam :$cElsevier,$d[2016] 210 4$d©2016 215 $a1 online resource (212 pages) $cillustrations, charts 225 0 $aSyngress advanced topics in information security 300 $aDescription based upon print version of record. 311 $a0-12-802916-1 320 $aIncludes bibliographical references and index. 327 $aChapter 1 - The Automating of Open Source Intelligence; The Commercial Angle; Algorithms; References; Chapter 2 - Named Entity Resolution in Social Media; Introduction; Evaluating Semantic Processing Performance; Characterizing Semantic Processing Errors; Meaning Loss in Biblical Proverbs: A Case Study; Models for Improving Semantic Processing Performance; Discussion; References; Chapter 3 - Relative Cyberattack Attribution; Introduction; Basic Attack Structure; Anonymization on the Internet; Weaknesses in Anonymization 327 $aAttribution as a ConceptAbsolute Attribution; Relative Attribution; Relative attribution concepts; Inherent versus Learnt Behaviors; Hiding Behavior; Consistency of Behavior; Relative Attribution Techniques; Authorship Analysis; Limitations and Issues; Research Streams; Conclusions; References; Chapter 4 - Enhancing Privacy to Defeat Open Source Intelligence; Introduction; Scenario; Requirements and Threats; Preliminaries; The PIEMCP; Formal Security Analysis with CPN; Attack Scenarios; Verification Results; Removing Trusted ARM; Performance Analysis of FSSO-PIEMC 327 $aComparison to Existing ApproachConclusion and future work; References; Chapter 5 - Preventing Data Exfiltration: Corporate Patterns and Practices; What is Happening Around the World?; What is Happening in New Zealand?; Specifying the Problem; Problems Arising by Implementing Censorship; So, what should be done?; Summary; References; Chapter 6 - Gathering Intelligence on High-Risk Advertising and Film Piracy: A Study of the Digital Underground; Introduction; Advertising and risk; The digital millennium copyright act (DMCA); Chilling Effects Database; Google Transparency Report 327 $aMainstream advertising and how piracy is fundedHigh-Risk Advertising and their links to piracy websites; High-Risk Advertising: Case Studies in Canada; High-risk advertising: case studies in Australia; High-Risk Advertising: Case studies in New Zealand; Research Challenges; References; Chapter 7 - Graph Creation and Analysis for Linking Actors: Application to Social Data; Introduction; The Social Network Model; A Brief History of Graphs and Social Networks; Conceptual Framework; Graph Creation Techniques; Data Gathering; Defining and Computing Relationships; Disambiguation Techniques 327 $aGraph Analysis for OSINTStructural Observations; Density of a Graph; Neighborhood, Degree, Average Degree, and Degree Distribution; Paths and Average Path Length; Components; Characterizing Position of Nodes; Betweenness Centrality; Closeness Centrality; Structures and Communities of Nodes; Structural Patterns: Cliques and Cores; Communities; Modularity; Twitter Case Study; The Twitter Dataset; General Graph Metrics; Node Metrics and Profiles' Centrality; Communities; Conclusion; References; Chapter 8 - Ethical Considerations When Using Online Datasets for Research Purposes; Introduction 327 $aExisting Guidelines 330 $aAlgorithms for Automating Open Source Intelligence (OSINT) presents information on the gathering of information and extraction of actionable intelligence from openly available sources, including news broadcasts, public repositories, and more recently, social media. As OSINT has applications in crime fighting, state-based intelligence, and social research, this book provides recent advances in text mining, web crawling, and other algorithms that have led to advances in methods that can largely automate this process. The book is beneficial to both practitioners and academic researchers, with discussions of the latest advances in applications, a coherent set of methods and processes for automating OSINT, and interdisciplinary perspectives on the key problems identified within each discipline. Drawing upon years of practical experience and using numerous examples, editors Robert Layton, Paul Watters, and a distinguished list of contributors discuss Evidence Accumulation Strategies for OSINT, Named Entity Resolution in Social Media, Analyzing Social Media Campaigns for Group Size Estimation, Surveys and qualitative techniques in OSINT, and Geospatial reasoning of open data. Presents a coherent set of methods and processes for automating OSINTFocuses on algorithms and applications allowing the practitioner to get up and running quicklyIncludes fully developed case studies on the digital underground and predicting crime through OSINTDiscusses the ethical considerations when using publicly available online data 410 0$aSyngress advanced topics in information security 606 $aOpen source intelligence 606 $aInformation technology$xSocial aspects 606 $aBusiness intelligence$xComputer network resources 606 $aIntelligence service$xComputer network resources 606 $aData mining 606 $aInternet searching 606 $aComputational intelligence 615 0$aOpen source intelligence. 615 0$aInformation technology$xSocial aspects. 615 0$aBusiness intelligence$xComputer network resources. 615 0$aIntelligence service$xComputer network resources. 615 0$aData mining. 615 0$aInternet searching. 615 0$aComputational intelligence. 702 $aLayton$b Robert$f1986- 702 $aWatters$b Paul A. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910797822003321 996 $aAutomating open source intelligence$93691064 997 $aUNINA LEADER 02509nas 2200457 n 450 001 990008891920403321 005 20240229084617.0 011 $a0003-0147 035 $a000889192 035 $aFED01000889192 035 $a(Aleph)000889192FED01 035 $a000889192 091 $2CNR$aP 00000737 100 $a20090724a18679999km-y0itaa50------ba 101 0 $aeng 110 $aauu-------- 200 1 $aAmerican naturalist 207 1$a1867- 210 $aLancaster$cEssex Institute 452 0$12001$a<>American naturalist 530 0 $aAmerican naturalist 675 $a502 676 $a574/.05 676 $a570 712 02$aAmerican Society of Naturalists 801 0$aIT$bACNP$c20090723 859 4 $uhttp://acnp.cib.unibo.it/cgi-ser/start/it/cnr/dc-p1.tcl?catno=353&person=false&language=ITALIANO&libr=&libr_th=unina1$zBiblioteche che possiedono il periodico 901 $aSE 912 $a990008891920403321 958 $aBiblioteca Centralizzata. Facoltą di Agraria dell'Universitą Federico II di Napoli$b1971-1974;1977-1984;1986-2006;$c1984;$d105(1971)-108(1974); 111(1977)-124(1984); 127(1986)-168(2006);$ePer.Ingl. 102$fFAGBC 958 $aBiblioteca. Dipartimento delle Scienze Biologiche. Sez. di Biologia Evolutiva e Comparata dell'Universitą Federico II$b1973-1995;$c1975;$epozzo librario$fDBEC 958 $aBiblioteca. Dipartimento Scienze Biologiche. Sezione di Genetica Biologia Generale e Molecolare. Universitą degli Studi Federico II$b1956-1967;$fDGBM 959 $aFAGBC 959 $aDBEC 959 $aDGBM 996 $aAmerican naturalist$9239716 997 $aUNINA AP1 8 $6866-01$aNA087 Biblioteca Centralizzata. Facoltą di Agraria dell'Universitą Federico II di Napoli$bPer.Ingl. 102$ev. Universitą, 100 Palazzo Reale, 80055 Portici (NA)$m081-2539322$m081-7760229$nit AP1 8 $6866-02$aNA134 Biblioteca. Dipartimento delle Scienze Biologiche. Sez. di Biologia Evolutiva e Comparata dell'Universitą Federico II$bpozzo librario$ev. Paladino 39, 80134 Napoli (NA)$m(081) 2535032$m(081) 2535032$nit AP1 8 $6866-03$aNA186 Biblioteca. Dipartimento Scienze Biologiche. Sezione di Genetica Biologia Generale e Molecolare. Universitą degli Studi Federico II$ev. Mezzocannone,8, Napoli (NA)$m(081) 2534610$m(081) 2535032$nit AP2 40$aacnp.cib.unibo.it$nACNP Italian Union Catalogue of Serials$uhttp://acnp.cib.unibo.it/cgi-ser/start/it/cnr/df-p.tcl?catno=353&language=ITALIANO&libr=&person=&B=1&libr_th=unina&proposto=NO