Crystallization / J.W. Mullin |
Autore | Mullin, J.W. |
Edizione | [3rd ed] |
Pubbl/distr/stampa | Oxford : Butterworth-Heinemann, copyr. 1993 |
Disciplina | 660.294 298 |
Soggetto non controllato | cristallizzazione (ingegneria) |
ISBN | 0-7506-1129-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-990000145530203316 |
Mullin, J.W. | ||
Oxford : Butterworth-Heinemann, copyr. 1993 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Customer satisfaction measurement for ISO 9000:2000 / Nigel Hill, Bill Self, Greg Roche |
Autore | Hill, Nigel |
Pubbl/distr/stampa | Oxford : Butterworth-Heinemann, 2002 |
Descrizione fisica | xii, 148 p. : ill. ; 24 cm |
Disciplina | 658.812 |
Altri autori (Persone) |
Self, Billauthor
Roche, Gregauthor |
Soggetto topico | Aziende - Rapporti con la clientela |
ISBN | 9780750655132 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISALENTO-991001446929707536 |
Hill, Nigel | ||
Oxford : Butterworth-Heinemann, 2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. del Salento | ||
|
Cyber-physical attacks : a growing invisible threat / / George Loukas |
Autore | Loukas George |
Pubbl/distr/stampa | Amsterdam, Netherlands : , : Butterworth-Heinemann, , 2015 |
Descrizione fisica | 1 online resource (271 p.) |
Disciplina | 004 |
Soggetto topico |
Ubiquitous computing
Cyber intelligence (Computer security) Embedded computer systems Embedded Internet devices Internet of things |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Cyber-Physical Attacks; Copyright Page; Dedication; Contents; 1 A Cyber-Physical World; Basic Concepts and Definitions of a Cyber-Physical World; Transducers; Controllers; Embedded Systems; Cyber-Physical Systems; The Internet of Things; Defining Cyber-Physical Attacks; Who Should Read This Book; Outline; Chapter 1: A Cyber-Physical World; Chapter 2: A History of Cyber-Physical Security Incidents; Chapter 3: Cyber-Physical Attacks on Implants and Vehicles; Chapter 4: Cyber-Physical Attacks on Industrial Control Systems; Chapter 5: Cyber-Physical Attack Steps
Chapter 6: Protection Mechanisms and Secure Design PrinciplesChapter 7: Physical-Cyber Attacks; Summary; Follow-Up Questions and Exercises; 2 A History of Cyber-Physical Security Incidents; Reported Incidents by Sector Affected; Energy; Water; Health; Transportation; Defense; A Discussion on the Cyber-Physical Security Incident Reports; Motivations; Second Order Cyber-Physical Dependencies; The Impact of Cyber-Physical Attacks; Summary; Follow-Up Questions and Exercises; 3 Cyber-Physical Attacks on Implants and Vehicles; Implantable Medical Devices; Insulin Pumps Implantable Cardioverter DefibrillatorsVehicles; Unmanned Aerial Vehicles; Automobiles; Summary; Follow-Up Questions and Exercises; 4 Cyber-Physical Attacks on Industrial Control Systems; SCADA; SCADA Network Vulnerabilities; Factors Affecting SCADA Security; Strict Real-Time Requirements; Continuous Availability; Misguided Security Perceptions; Commercial-off-the-Shelf Hardware and Software; Interconnectivity; Internet Accessibility; Stuxnet: A Milestone in Industrial Control System Security; The Background; The Payload and the Attack; The Delivery; The Impact and the Aftermath The Electric GridPower Generators; The Smart Grid; Summary; Follow-Up Questions and Exercises; 5 Cyber-Physical Attack Steps; Preliminary Research and Reconnaissance; Internet Research; Social Engineering; Watering Hole; Vulnerability Discovery; Intrusion; Full-Body Scanner; Intelligent Traffic Lights; Home Automation; Attack Delivery; Black Hole/Gray Hole; Code Injection; Command Injection; Communication Jamming; Denial of Service; False Data Injection: Communication-Based; False Data Injection: Database-Based; False Data Injection: Sensor-Based; Firmware Modification; Fuzzing; GPS Jamming GPS Spoofing/MeaconingMalware Infection; Man-in-the-Middle; Network Isolation; Packet Sniffing; Password Cracking; Relay Attack; Replay Attack; Rogue Node; Sleep Deprivation; Supply Chain Attack; Antiforensics; Summary; Follow-Up Questions and Exercises; 6 Protection Mechanisms and Secure Design Principles; Protection Mechanisms; Authentication; Access Control; Firewall; Intrusion Detection; Antimalware; Application Whitelisting; Flow Whitelisting; Cryptography; Integrity Verification; Survivability; Secure Design Principles; Economy of Mechanism; Defense-in-Depth; Least-Privilege Separation of Privilege |
Record Nr. | UNINA-9910583311703321 |
Loukas George | ||
Amsterdam, Netherlands : , : Butterworth-Heinemann, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Data mining and predictive analysis [[electronic resource] ] : intelligence gathering and crime analysis / / Colleen McCue |
Autore | McCue Colleen |
Pubbl/distr/stampa | Amsterdam ; ; Boston, : Butterworth-Heinemann, c2007 |
Descrizione fisica | XXVII, 393 p.; ; 24 cm |
Disciplina | 363.25/6 |
Soggetto topico |
Crime analysis
Data mining Law enforcement - Data processing Criminal behavior, Prediction of |
Soggetto genere / forma | Electronic books. |
ISBN |
1-280-63650-5
9786610636501 0-08-046462-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910457313803321 |
McCue Colleen | ||
Amsterdam ; ; Boston, : Butterworth-Heinemann, c2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Data mining and predictive analysis [[electronic resource] ] : intelligence gathering and crime analysis / / Colleen McCue |
Autore | McCue Colleen |
Pubbl/distr/stampa | Amsterdam ; ; Boston, : Butterworth-Heinemann, c2007 |
Descrizione fisica | XXVII, 393 p.; ; 24 cm |
Disciplina | 363.25/6 |
Soggetto topico |
Crime analysis
Data mining Law enforcement - Data processing Criminal behavior, Prediction of |
ISBN |
1-280-63650-5
9786610636501 0-08-046462-9 |
Classificazione | 54.64 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910784361803321 |
McCue Colleen | ||
Amsterdam ; ; Boston, : Butterworth-Heinemann, c2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Data mining and predictive analysis : intelligence gathering and crime analysis / / Colleen McCue |
Autore | McCue Colleen |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Amsterdam ; ; Boston, : Butterworth-Heinemann, c2007 |
Descrizione fisica | XXVII, 393 p.; ; 24 cm |
Disciplina |
363.25/6
363.256 |
Soggetto topico |
Crime analysis
Data mining Law enforcement - Data processing Criminal behavior, Prediction of |
ISBN |
1-280-63650-5
9786610636501 0-08-046462-9 |
Classificazione | 54.64 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover -- Title page -- Copyright Page -- Table of Contents -- Foreword -- Preface -- Introduction -- How To Use This Book -- Bibliography -- Introductory Section -- 1 Basics -- 1.1 Basic Statistics -- 1.2 Inferential versus Descriptive Statistics and Data Mining -- 1.3 Population versus Samples -- 1.4 Modeling -- 1.5 Errors -- 1.6 Overfitting the Model -- 1.7 Generalizability versus Accuracy -- 1.8 Input/Output -- 1.9 Bibliography -- 2 Domain Expertise -- 2.1 Domain Expertise -- 2.2 Domain Expertise for Analysts -- 2.3 Compromise -- 2.4 Analyze Your Own Data -- 2.5 Bibliography -- 3 Data Mining -- 3.1 Discovery and Prediction -- 3.2 Confirmation and Discovery -- 3.3 Surprise -- 3.4 Characterization -- 3.5 "Volume Challenge" -- 3.6 Exploratory Graphics and Data Exploration -- 3.7 Link Analysis -- 3.8 Nonobvious Relationship Analysis (NORA) -- 3.9 Text Mining -- 3.10 Future Trends -- 3.11 Bibliography -- Methods -- 4 Process Models for Data Mining and Analysis -- 4.1 CIA Intelligence Process -- 4.2 CRISP-DM -- 4.3 Actionable Mining and Predictive Analysis for Public Safety and Security -- 4.4 Bibliography -- 5 Data -- 5.1 Getting Started -- 5.2 Types of Data -- 5.3 Data -- 5.4 Types of Data Resources -- 5.5 Data Challenges -- 5.6 How Do We Overcome These Potential Barriers? -- 5.7 Duplication -- 5.8 Merging Data Resources -- 5.9 Public Health Data -- 5.10 Weather and Crime Data -- 5.11 Bibliography -- 6 Operationally Relevant Preprocessing -- 6.1 Operationally Relevant Recoding -- 6.2 Trinity Sight -- 6.3 Duplication -- 6.4 Data Imputation -- 6.5 Telephone Data -- 6.6 Conference Call Example -- 6.7 Internet Data -- 6.8 Operationally Relevant Variable Selection -- 6.9 Bibliography -- 7 Predictive Analytics -- 7.1 How to Select a Modeling Algorithm, Part I -- 7.2 Generalizability versus Accuracy -- 7.3 Link Analysis.
7.4 Supervised versus Unsupervised Learning Techniques -- 7.5 Discriminant Analysis -- 7.6 Unsupervised Learning Algorithms -- 7.7 Neural Networks -- 7.8 Kohonan Network Models -- 7.9 How to Select a Modeling Algorithm, Part II -- 7.10 Combining Algorithms -- 7.11 Anomaly Detection -- 7.12 Internal Norms -- 7.13 Defining "Normal" -- 7.14 Deviations from Normal Patterns -- 7.15 Deviations from Normal Behavior -- 7.16 Warning! Screening versus Diagnostic -- 7.17 A Perfect World Scenario -- 7.18 Tools of the Trade -- 7.19 General Considerations and Some Expert Options -- 7.20 Variable Entry -- 7.21 Prior Probabilities -- 7.22 Costs -- 7.23 Bibliography -- 8 Public Safety-Specific Evaluation -- 8.1 Outcome Measures -- 8.2 Think Big -- 8.3 Training and Test Samples -- 8.4 Evaluating the Model -- 8.5 Updating or Refreshing the Model -- 8.6 Caveat Emptor -- 8.7 Bibliography -- 9 Operationally Actionable Output -- 9.1 Actionable Output -- Applications -- 10 Normal Crime -- 10.1 Knowing Normal -- 10.2 "Normal" Criminal Behavior -- 10.3 Get to Know "Normal" Crime Trends and Patterns -- 10.4 Staged Crime -- 10.5 Bibliography -- 11 Behavioral Analysis of Violent Crime -- 11.1 Case-Based Reasoning -- 11.2 Homicide -- 11.3 Strategic Characterization -- 11.4 Automated Motive Determination -- 11.5 Drug-Related Violence -- 11.6 Aggravated Assault -- 11.7 Sexual Assault -- 11.8 Victimology -- 11.9 Moving from Investigation to Prevention -- 11.10 Bibliography -- 12 Risk and Threat Assessment -- 12.1 Risk-Based Deployment -- 12.2 Experts versus Expert Systems -- 12.3 "Normal" Crime -- 12.4 Surveillance Detection -- 12.5 Strategic Characterization -- 12.6 Vulnerable Locations -- 12.7 Schools -- 12.8 Data -- 12.9 Accuracy versus Generalizability -- 12.10 "Cost" Analysis -- 12.11 Evaluation -- 12.12 Output -- 12.13 Novel Approaches to Risk and Threat Assessment. 12.14 Bibliography -- Case Examples -- 13 Deployment -- 13.1 Patrol Services -- 13.2 Structuring Patrol Deployment -- 13.3 Data -- 13.4 How To -- 13.5 Tactical Deployment -- 13.6 Risk-Based Deployment Overview -- 13.7 Operationally Actionable Output -- 13.8 Risk-Based Deployment Case Studies -- 13.9 Bibliography -- 14 Surveillance Detection -- 14.1 Surveillance Detection and Other Suspicious Situations -- 14.2 Natural Surveillance -- 14.3 Location, Location, Location -- 14.4 More Complex Surveillance Detection -- 14.5 Internet Surveillance Detection -- 14.6 How To -- 14.7 Summary -- 14.8 Bibliography -- Advanced Concepts and Future Trends -- 15 Advanced Topics -- 15.1 Intrusion Detection -- 15.2 Identify Theft -- 15.3 Syndromic Surveillance -- 15.4 Data Collection, Fusion and Preprocessing -- 15.5 Text Mining -- 15.6 Fraud Detection -- 15.7 Consensus Opinions -- 15.8 Expert Options -- 15.9 Bibliography -- 16 Future Trends -- 16.1 Text Mining -- 16.2 Fusion Centers -- 16.3 "Functional" Interoperability -- 16.4 "Virtual" Warehouses -- 16.5 Domain-Specific Tools -- 16.6 Closing Thoughts -- 16.7 Bibliography -- Index. |
Altri titoli varianti | Intelligence gathering and crime analysis |
Record Nr. | UNINA-9910825031203321 |
McCue Colleen | ||
Amsterdam ; ; Boston, : Butterworth-Heinemann, c2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Decision making : a management accounting perspective / Roland Fox, Alison Kennedy and Keith Sugden |
Autore | FOX, Roland |
Pubbl/distr/stampa | London : Butterworth-Heinemann, 1992 |
Descrizione fisica | X, 391 p. ; 24 cm |
Disciplina | 657 |
Altri autori (Persone) |
KENNEDY, Alison
SUGDEN, Keith |
Collana | CIMA series, Stage |
Soggetto topico | Contabilità - Processo decisorio |
ISBN | 0-7506-0035-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-990000596450203316 |
FOX, Roland | ||
London : Butterworth-Heinemann, 1992 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Derivative instruments : a guide to theory and practice / Brian A. Eales, Moorad Choudhry |
Autore | EALES, Brian A. |
Pubbl/distr/stampa | Oxford : Butterworth-Heinemann, c2003 |
Descrizione fisica | X, 257 p. ; 24 cm + 1 CD-Rom |
Disciplina | 332.1 |
Altri autori (Persone) | CHOUDHRY, Moorad |
Collana | Quantitative finance series |
Soggetto topico | Gestione finanziaria |
ISBN | 0-7506-5419-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-990002741170203316 |
EALES, Brian A. | ||
Oxford : Butterworth-Heinemann, c2003 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Derivative instruments [[electronic resource] ] : a guide to theory and practice / / Brian A. Eales, Moorad Choudhry |
Autore | Eales Brian Anthony |
Pubbl/distr/stampa | Oxford ; ; Boston, : Butterworth-Heinemann, 2003 |
Descrizione fisica | 1 online resource (273 p.) |
Disciplina | 332.645 |
Altri autori (Persone) | ChoudhryMoorad |
Collana | Quantitative finance series |
Soggetto topico |
Derivative securities
Securities |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-02650-6
9786611026509 0-08-050389-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Derivative Instruments: A Guide to Theory and Practice; Copyright Page; Contents; Foreword; Preface; About the Authors; Chapter 1. Introduction to Derivatives; 1.1 Exchange-based futures contracts; 1.2 Forward contracts; 1.3 Options; 1.4 Swaps; 1.5 The future?; Chapter 2. Overview of Fixed Income Securities; 2.1 Basic concepts; 2.2 Bond price in continuous time; 2.3 Forward rates; Appendix 2.1 The integral; Appendix 2.2 The derivation of the bond price equation in continuous time; Chapter 3. Forwards and Futures Valuation; 3.1 Introduction; 3.2 Forwards and futures
3.3 The forward-spot parity 3.4 The basis and implied repo rate; Chapter 4. FRAs and Interest Rate Futures; 4.1 Forward rate agreements; 4.2 FRA mechanics; 4.3 Forward contracts; 4.4 Short-term interest rate futures; Chapter 5. Bond Futures; 5.1 Introduction; 5.2 Futures pricing; 5.3 Hedging using bond futures; 5.4 The margin process; Appendix 5.1 The conversion factor for the long gilt future; Chapter 6. Swaps; 6.1 Interest rate swaps; 6.2 Generic swap valuation; 6.3 Non-vanilla interest rate swaps; 6.4 Currency swaps; 6.5 Swaptions; 6.6 An overview of interest rate swap applications Chapter 7. Credit Derivatives 7.1 Credit risk; 7.2 Credit risk and credit derivatives; 7.3 Credit event; 7.4 An introduction to collateralised debt obligations (CDOs); Appendix 7.1 Credit ratings; Chapter 8. Equity Futures Contracts; 8.1 Exchange-traded equity index and universal stock futures; 8.2 Operational characteristics of equity futures contracts; Chapter 9. Equity Swaps; 9.1 A basic equity swap; 9.2 Single-currency, fixed notional principal, equity index/sterling LIBOR swap; 9.3 Equity swap: fair pricing; Chapter 10. Equity and Equity Index Options; 10.1 Call options; 10.2 Put options Chapter 11. Option Pricing 11.1 Introduction; 11.2 The Black and Scholes model; 11.3 Alternative pricing frameworks; 11.4 Monte Carlo simulation; Chapter 12. Equity-linked Structured Products; 12.1 Introduction; 12.2 Convertible bonds; 12.3 Currency considerations; 12.4 Guaranteed equity products; Index |
Record Nr. | UNINA-9910457298703321 |
Eales Brian Anthony | ||
Oxford ; ; Boston, : Butterworth-Heinemann, 2003 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Derivative instruments [[electronic resource] ] : a guide to theory and practice / / Brian A. Eales, Moorad Choudhry |
Autore | Eales Brian Anthony |
Pubbl/distr/stampa | Oxford ; ; Boston, : Butterworth-Heinemann, 2003 |
Descrizione fisica | 1 online resource (273 p.) |
Disciplina | 332.645 |
Altri autori (Persone) | ChoudhryMoorad |
Collana | Quantitative finance series |
Soggetto topico |
Derivative securities
Securities |
ISBN |
1-281-02650-6
9786611026509 0-08-050389-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Derivative Instruments: A Guide to Theory and Practice; Copyright Page; Contents; Foreword; Preface; About the Authors; Chapter 1. Introduction to Derivatives; 1.1 Exchange-based futures contracts; 1.2 Forward contracts; 1.3 Options; 1.4 Swaps; 1.5 The future?; Chapter 2. Overview of Fixed Income Securities; 2.1 Basic concepts; 2.2 Bond price in continuous time; 2.3 Forward rates; Appendix 2.1 The integral; Appendix 2.2 The derivation of the bond price equation in continuous time; Chapter 3. Forwards and Futures Valuation; 3.1 Introduction; 3.2 Forwards and futures
3.3 The forward-spot parity 3.4 The basis and implied repo rate; Chapter 4. FRAs and Interest Rate Futures; 4.1 Forward rate agreements; 4.2 FRA mechanics; 4.3 Forward contracts; 4.4 Short-term interest rate futures; Chapter 5. Bond Futures; 5.1 Introduction; 5.2 Futures pricing; 5.3 Hedging using bond futures; 5.4 The margin process; Appendix 5.1 The conversion factor for the long gilt future; Chapter 6. Swaps; 6.1 Interest rate swaps; 6.2 Generic swap valuation; 6.3 Non-vanilla interest rate swaps; 6.4 Currency swaps; 6.5 Swaptions; 6.6 An overview of interest rate swap applications Chapter 7. Credit Derivatives 7.1 Credit risk; 7.2 Credit risk and credit derivatives; 7.3 Credit event; 7.4 An introduction to collateralised debt obligations (CDOs); Appendix 7.1 Credit ratings; Chapter 8. Equity Futures Contracts; 8.1 Exchange-traded equity index and universal stock futures; 8.2 Operational characteristics of equity futures contracts; Chapter 9. Equity Swaps; 9.1 A basic equity swap; 9.2 Single-currency, fixed notional principal, equity index/sterling LIBOR swap; 9.3 Equity swap: fair pricing; Chapter 10. Equity and Equity Index Options; 10.1 Call options; 10.2 Put options Chapter 11. Option Pricing 11.1 Introduction; 11.2 The Black and Scholes model; 11.3 Alternative pricing frameworks; 11.4 Monte Carlo simulation; Chapter 12. Equity-linked Structured Products; 12.1 Introduction; 12.2 Convertible bonds; 12.3 Currency considerations; 12.4 Guaranteed equity products; Index |
Record Nr. | UNINA-9910784337403321 |
Eales Brian Anthony | ||
Oxford ; ; Boston, : Butterworth-Heinemann, 2003 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|