top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Crystallization / J.W. Mullin
Crystallization / J.W. Mullin
Autore Mullin, J.W.
Edizione [3rd ed]
Pubbl/distr/stampa Oxford : Butterworth-Heinemann, copyr. 1993
Disciplina 660.294 298
Soggetto non controllato cristallizzazione (ingegneria)
ISBN 0-7506-1129-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-990000145530203316
Mullin, J.W.  
Oxford : Butterworth-Heinemann, copyr. 1993
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Customer satisfaction measurement for ISO 9000:2000 / Nigel Hill, Bill Self, Greg Roche
Customer satisfaction measurement for ISO 9000:2000 / Nigel Hill, Bill Self, Greg Roche
Autore Hill, Nigel
Pubbl/distr/stampa Oxford : Butterworth-Heinemann, 2002
Descrizione fisica xii, 148 p. : ill. ; 24 cm
Disciplina 658.812
Altri autori (Persone) Self, Billauthor
Roche, Gregauthor
Soggetto topico Aziende - Rapporti con la clientela
ISBN 9780750655132
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISALENTO-991001446929707536
Hill, Nigel  
Oxford : Butterworth-Heinemann, 2002
Materiale a stampa
Lo trovi qui: Univ. del Salento
Opac: Controlla la disponibilità qui
Cyber-physical attacks : a growing invisible threat / / George Loukas
Cyber-physical attacks : a growing invisible threat / / George Loukas
Autore Loukas George
Pubbl/distr/stampa Amsterdam, Netherlands : , : Butterworth-Heinemann, , 2015
Descrizione fisica 1 online resource (271 p.)
Disciplina 004
Soggetto topico Ubiquitous computing
Cyber intelligence (Computer security)
Embedded computer systems
Embedded Internet devices
Internet of things
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Cyber-Physical Attacks; Copyright Page; Dedication; Contents; 1 A Cyber-Physical World; Basic Concepts and Definitions of a Cyber-Physical World; Transducers; Controllers; Embedded Systems; Cyber-Physical Systems; The Internet of Things; Defining Cyber-Physical Attacks; Who Should Read This Book; Outline; Chapter 1: A Cyber-Physical World; Chapter 2: A History of Cyber-Physical Security Incidents; Chapter 3: Cyber-Physical Attacks on Implants and Vehicles; Chapter 4: Cyber-Physical Attacks on Industrial Control Systems; Chapter 5: Cyber-Physical Attack Steps
Chapter 6: Protection Mechanisms and Secure Design PrinciplesChapter 7: Physical-Cyber Attacks; Summary; Follow-Up Questions and Exercises; 2 A History of Cyber-Physical Security Incidents; Reported Incidents by Sector Affected; Energy; Water; Health; Transportation; Defense; A Discussion on the Cyber-Physical Security Incident Reports; Motivations; Second Order Cyber-Physical Dependencies; The Impact of Cyber-Physical Attacks; Summary; Follow-Up Questions and Exercises; 3 Cyber-Physical Attacks on Implants and Vehicles; Implantable Medical Devices; Insulin Pumps
Implantable Cardioverter DefibrillatorsVehicles; Unmanned Aerial Vehicles; Automobiles; Summary; Follow-Up Questions and Exercises; 4 Cyber-Physical Attacks on Industrial Control Systems; SCADA; SCADA Network Vulnerabilities; Factors Affecting SCADA Security; Strict Real-Time Requirements; Continuous Availability; Misguided Security Perceptions; Commercial-off-the-Shelf Hardware and Software; Interconnectivity; Internet Accessibility; Stuxnet: A Milestone in Industrial Control System Security; The Background; The Payload and the Attack; The Delivery; The Impact and the Aftermath
The Electric GridPower Generators; The Smart Grid; Summary; Follow-Up Questions and Exercises; 5 Cyber-Physical Attack Steps; Preliminary Research and Reconnaissance; Internet Research; Social Engineering; Watering Hole; Vulnerability Discovery; Intrusion; Full-Body Scanner; Intelligent Traffic Lights; Home Automation; Attack Delivery; Black Hole/Gray Hole; Code Injection; Command Injection; Communication Jamming; Denial of Service; False Data Injection: Communication-Based; False Data Injection: Database-Based; False Data Injection: Sensor-Based; Firmware Modification; Fuzzing; GPS Jamming
GPS Spoofing/MeaconingMalware Infection; Man-in-the-Middle; Network Isolation; Packet Sniffing; Password Cracking; Relay Attack; Replay Attack; Rogue Node; Sleep Deprivation; Supply Chain Attack; Antiforensics; Summary; Follow-Up Questions and Exercises; 6 Protection Mechanisms and Secure Design Principles; Protection Mechanisms; Authentication; Access Control; Firewall; Intrusion Detection; Antimalware; Application Whitelisting; Flow Whitelisting; Cryptography; Integrity Verification; Survivability; Secure Design Principles; Economy of Mechanism; Defense-in-Depth; Least-Privilege
Separation of Privilege
Record Nr. UNINA-9910583311703321
Loukas George  
Amsterdam, Netherlands : , : Butterworth-Heinemann, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data mining and predictive analysis [[electronic resource] ] : intelligence gathering and crime analysis / / Colleen McCue
Data mining and predictive analysis [[electronic resource] ] : intelligence gathering and crime analysis / / Colleen McCue
Autore McCue Colleen
Pubbl/distr/stampa Amsterdam ; ; Boston, : Butterworth-Heinemann, c2007
Descrizione fisica XXVII, 393 p.; ; 24 cm
Disciplina 363.25/6
Soggetto topico Crime analysis
Data mining
Law enforcement - Data processing
Criminal behavior, Prediction of
Soggetto genere / forma Electronic books.
ISBN 1-280-63650-5
9786610636501
0-08-046462-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910457313803321
McCue Colleen  
Amsterdam ; ; Boston, : Butterworth-Heinemann, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data mining and predictive analysis [[electronic resource] ] : intelligence gathering and crime analysis / / Colleen McCue
Data mining and predictive analysis [[electronic resource] ] : intelligence gathering and crime analysis / / Colleen McCue
Autore McCue Colleen
Pubbl/distr/stampa Amsterdam ; ; Boston, : Butterworth-Heinemann, c2007
Descrizione fisica XXVII, 393 p.; ; 24 cm
Disciplina 363.25/6
Soggetto topico Crime analysis
Data mining
Law enforcement - Data processing
Criminal behavior, Prediction of
ISBN 1-280-63650-5
9786610636501
0-08-046462-9
Classificazione 54.64
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910784361803321
McCue Colleen  
Amsterdam ; ; Boston, : Butterworth-Heinemann, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data mining and predictive analysis : intelligence gathering and crime analysis / / Colleen McCue
Data mining and predictive analysis : intelligence gathering and crime analysis / / Colleen McCue
Autore McCue Colleen
Edizione [1st ed.]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Butterworth-Heinemann, c2007
Descrizione fisica XXVII, 393 p.; ; 24 cm
Disciplina 363.25/6
363.256
Soggetto topico Crime analysis
Data mining
Law enforcement - Data processing
Criminal behavior, Prediction of
ISBN 1-280-63650-5
9786610636501
0-08-046462-9
Classificazione 54.64
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover -- Title page -- Copyright Page -- Table of Contents -- Foreword -- Preface -- Introduction -- How To Use This Book -- Bibliography -- Introductory Section -- 1 Basics -- 1.1 Basic Statistics -- 1.2 Inferential versus Descriptive Statistics and Data Mining -- 1.3 Population versus Samples -- 1.4 Modeling -- 1.5 Errors -- 1.6 Overfitting the Model -- 1.7 Generalizability versus Accuracy -- 1.8 Input/Output -- 1.9 Bibliography -- 2 Domain Expertise -- 2.1 Domain Expertise -- 2.2 Domain Expertise for Analysts -- 2.3 Compromise -- 2.4 Analyze Your Own Data -- 2.5 Bibliography -- 3 Data Mining -- 3.1 Discovery and Prediction -- 3.2 Confirmation and Discovery -- 3.3 Surprise -- 3.4 Characterization -- 3.5 "Volume Challenge" -- 3.6 Exploratory Graphics and Data Exploration -- 3.7 Link Analysis -- 3.8 Nonobvious Relationship Analysis (NORA) -- 3.9 Text Mining -- 3.10 Future Trends -- 3.11 Bibliography -- Methods -- 4 Process Models for Data Mining and Analysis -- 4.1 CIA Intelligence Process -- 4.2 CRISP-DM -- 4.3 Actionable Mining and Predictive Analysis for Public Safety and Security -- 4.4 Bibliography -- 5 Data -- 5.1 Getting Started -- 5.2 Types of Data -- 5.3 Data -- 5.4 Types of Data Resources -- 5.5 Data Challenges -- 5.6 How Do We Overcome These Potential Barriers? -- 5.7 Duplication -- 5.8 Merging Data Resources -- 5.9 Public Health Data -- 5.10 Weather and Crime Data -- 5.11 Bibliography -- 6 Operationally Relevant Preprocessing -- 6.1 Operationally Relevant Recoding -- 6.2 Trinity Sight -- 6.3 Duplication -- 6.4 Data Imputation -- 6.5 Telephone Data -- 6.6 Conference Call Example -- 6.7 Internet Data -- 6.8 Operationally Relevant Variable Selection -- 6.9 Bibliography -- 7 Predictive Analytics -- 7.1 How to Select a Modeling Algorithm, Part I -- 7.2 Generalizability versus Accuracy -- 7.3 Link Analysis.
7.4 Supervised versus Unsupervised Learning Techniques -- 7.5 Discriminant Analysis -- 7.6 Unsupervised Learning Algorithms -- 7.7 Neural Networks -- 7.8 Kohonan Network Models -- 7.9 How to Select a Modeling Algorithm, Part II -- 7.10 Combining Algorithms -- 7.11 Anomaly Detection -- 7.12 Internal Norms -- 7.13 Defining "Normal" -- 7.14 Deviations from Normal Patterns -- 7.15 Deviations from Normal Behavior -- 7.16 Warning! Screening versus Diagnostic -- 7.17 A Perfect World Scenario -- 7.18 Tools of the Trade -- 7.19 General Considerations and Some Expert Options -- 7.20 Variable Entry -- 7.21 Prior Probabilities -- 7.22 Costs -- 7.23 Bibliography -- 8 Public Safety-Specific Evaluation -- 8.1 Outcome Measures -- 8.2 Think Big -- 8.3 Training and Test Samples -- 8.4 Evaluating the Model -- 8.5 Updating or Refreshing the Model -- 8.6 Caveat Emptor -- 8.7 Bibliography -- 9 Operationally Actionable Output -- 9.1 Actionable Output -- Applications -- 10 Normal Crime -- 10.1 Knowing Normal -- 10.2 "Normal" Criminal Behavior -- 10.3 Get to Know "Normal" Crime Trends and Patterns -- 10.4 Staged Crime -- 10.5 Bibliography -- 11 Behavioral Analysis of Violent Crime -- 11.1 Case-Based Reasoning -- 11.2 Homicide -- 11.3 Strategic Characterization -- 11.4 Automated Motive Determination -- 11.5 Drug-Related Violence -- 11.6 Aggravated Assault -- 11.7 Sexual Assault -- 11.8 Victimology -- 11.9 Moving from Investigation to Prevention -- 11.10 Bibliography -- 12 Risk and Threat Assessment -- 12.1 Risk-Based Deployment -- 12.2 Experts versus Expert Systems -- 12.3 "Normal" Crime -- 12.4 Surveillance Detection -- 12.5 Strategic Characterization -- 12.6 Vulnerable Locations -- 12.7 Schools -- 12.8 Data -- 12.9 Accuracy versus Generalizability -- 12.10 "Cost" Analysis -- 12.11 Evaluation -- 12.12 Output -- 12.13 Novel Approaches to Risk and Threat Assessment.
12.14 Bibliography -- Case Examples -- 13 Deployment -- 13.1 Patrol Services -- 13.2 Structuring Patrol Deployment -- 13.3 Data -- 13.4 How To -- 13.5 Tactical Deployment -- 13.6 Risk-Based Deployment Overview -- 13.7 Operationally Actionable Output -- 13.8 Risk-Based Deployment Case Studies -- 13.9 Bibliography -- 14 Surveillance Detection -- 14.1 Surveillance Detection and Other Suspicious Situations -- 14.2 Natural Surveillance -- 14.3 Location, Location, Location -- 14.4 More Complex Surveillance Detection -- 14.5 Internet Surveillance Detection -- 14.6 How To -- 14.7 Summary -- 14.8 Bibliography -- Advanced Concepts and Future Trends -- 15 Advanced Topics -- 15.1 Intrusion Detection -- 15.2 Identify Theft -- 15.3 Syndromic Surveillance -- 15.4 Data Collection, Fusion and Preprocessing -- 15.5 Text Mining -- 15.6 Fraud Detection -- 15.7 Consensus Opinions -- 15.8 Expert Options -- 15.9 Bibliography -- 16 Future Trends -- 16.1 Text Mining -- 16.2 Fusion Centers -- 16.3 "Functional" Interoperability -- 16.4 "Virtual" Warehouses -- 16.5 Domain-Specific Tools -- 16.6 Closing Thoughts -- 16.7 Bibliography -- Index.
Altri titoli varianti Intelligence gathering and crime analysis
Record Nr. UNINA-9910825031203321
McCue Colleen  
Amsterdam ; ; Boston, : Butterworth-Heinemann, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Decision making : a management accounting perspective / Roland Fox, Alison Kennedy and Keith Sugden
Decision making : a management accounting perspective / Roland Fox, Alison Kennedy and Keith Sugden
Autore FOX, Roland
Pubbl/distr/stampa London : Butterworth-Heinemann, 1992
Descrizione fisica X, 391 p. ; 24 cm
Disciplina 657
Altri autori (Persone) KENNEDY, Alison
SUGDEN, Keith
Collana CIMA series, Stage
Soggetto topico Contabilità - Processo decisorio
ISBN 0-7506-0035-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-990000596450203316
FOX, Roland  
London : Butterworth-Heinemann, 1992
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Derivative instruments : a guide to theory and practice / Brian A. Eales, Moorad Choudhry
Derivative instruments : a guide to theory and practice / Brian A. Eales, Moorad Choudhry
Autore EALES, Brian A.
Pubbl/distr/stampa Oxford : Butterworth-Heinemann, c2003
Descrizione fisica X, 257 p. ; 24 cm + 1 CD-Rom
Disciplina 332.1
Altri autori (Persone) CHOUDHRY, Moorad
Collana Quantitative finance series
Soggetto topico Gestione finanziaria
ISBN 0-7506-5419-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-990002741170203316
EALES, Brian A.  
Oxford : Butterworth-Heinemann, c2003
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Derivative instruments [[electronic resource] ] : a guide to theory and practice / / Brian A. Eales, Moorad Choudhry
Derivative instruments [[electronic resource] ] : a guide to theory and practice / / Brian A. Eales, Moorad Choudhry
Autore Eales Brian Anthony
Pubbl/distr/stampa Oxford ; ; Boston, : Butterworth-Heinemann, 2003
Descrizione fisica 1 online resource (273 p.)
Disciplina 332.645
Altri autori (Persone) ChoudhryMoorad
Collana Quantitative finance series
Soggetto topico Derivative securities
Securities
Soggetto genere / forma Electronic books.
ISBN 1-281-02650-6
9786611026509
0-08-050389-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Derivative Instruments: A Guide to Theory and Practice; Copyright Page; Contents; Foreword; Preface; About the Authors; Chapter 1. Introduction to Derivatives; 1.1 Exchange-based futures contracts; 1.2 Forward contracts; 1.3 Options; 1.4 Swaps; 1.5 The future?; Chapter 2. Overview of Fixed Income Securities; 2.1 Basic concepts; 2.2 Bond price in continuous time; 2.3 Forward rates; Appendix 2.1 The integral; Appendix 2.2 The derivation of the bond price equation in continuous time; Chapter 3. Forwards and Futures Valuation; 3.1 Introduction; 3.2 Forwards and futures
3.3 The forward-spot parity 3.4 The basis and implied repo rate; Chapter 4. FRAs and Interest Rate Futures; 4.1 Forward rate agreements; 4.2 FRA mechanics; 4.3 Forward contracts; 4.4 Short-term interest rate futures; Chapter 5. Bond Futures; 5.1 Introduction; 5.2 Futures pricing; 5.3 Hedging using bond futures; 5.4 The margin process; Appendix 5.1 The conversion factor for the long gilt future; Chapter 6. Swaps; 6.1 Interest rate swaps; 6.2 Generic swap valuation; 6.3 Non-vanilla interest rate swaps; 6.4 Currency swaps; 6.5 Swaptions; 6.6 An overview of interest rate swap applications
Chapter 7. Credit Derivatives 7.1 Credit risk; 7.2 Credit risk and credit derivatives; 7.3 Credit event; 7.4 An introduction to collateralised debt obligations (CDOs); Appendix 7.1 Credit ratings; Chapter 8. Equity Futures Contracts; 8.1 Exchange-traded equity index and universal stock futures; 8.2 Operational characteristics of equity futures contracts; Chapter 9. Equity Swaps; 9.1 A basic equity swap; 9.2 Single-currency, fixed notional principal, equity index/sterling LIBOR swap; 9.3 Equity swap: fair pricing; Chapter 10. Equity and Equity Index Options; 10.1 Call options; 10.2 Put options
Chapter 11. Option Pricing 11.1 Introduction; 11.2 The Black and Scholes model; 11.3 Alternative pricing frameworks; 11.4 Monte Carlo simulation; Chapter 12. Equity-linked Structured Products; 12.1 Introduction; 12.2 Convertible bonds; 12.3 Currency considerations; 12.4 Guaranteed equity products; Index
Record Nr. UNINA-9910457298703321
Eales Brian Anthony  
Oxford ; ; Boston, : Butterworth-Heinemann, 2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Derivative instruments [[electronic resource] ] : a guide to theory and practice / / Brian A. Eales, Moorad Choudhry
Derivative instruments [[electronic resource] ] : a guide to theory and practice / / Brian A. Eales, Moorad Choudhry
Autore Eales Brian Anthony
Pubbl/distr/stampa Oxford ; ; Boston, : Butterworth-Heinemann, 2003
Descrizione fisica 1 online resource (273 p.)
Disciplina 332.645
Altri autori (Persone) ChoudhryMoorad
Collana Quantitative finance series
Soggetto topico Derivative securities
Securities
ISBN 1-281-02650-6
9786611026509
0-08-050389-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Derivative Instruments: A Guide to Theory and Practice; Copyright Page; Contents; Foreword; Preface; About the Authors; Chapter 1. Introduction to Derivatives; 1.1 Exchange-based futures contracts; 1.2 Forward contracts; 1.3 Options; 1.4 Swaps; 1.5 The future?; Chapter 2. Overview of Fixed Income Securities; 2.1 Basic concepts; 2.2 Bond price in continuous time; 2.3 Forward rates; Appendix 2.1 The integral; Appendix 2.2 The derivation of the bond price equation in continuous time; Chapter 3. Forwards and Futures Valuation; 3.1 Introduction; 3.2 Forwards and futures
3.3 The forward-spot parity 3.4 The basis and implied repo rate; Chapter 4. FRAs and Interest Rate Futures; 4.1 Forward rate agreements; 4.2 FRA mechanics; 4.3 Forward contracts; 4.4 Short-term interest rate futures; Chapter 5. Bond Futures; 5.1 Introduction; 5.2 Futures pricing; 5.3 Hedging using bond futures; 5.4 The margin process; Appendix 5.1 The conversion factor for the long gilt future; Chapter 6. Swaps; 6.1 Interest rate swaps; 6.2 Generic swap valuation; 6.3 Non-vanilla interest rate swaps; 6.4 Currency swaps; 6.5 Swaptions; 6.6 An overview of interest rate swap applications
Chapter 7. Credit Derivatives 7.1 Credit risk; 7.2 Credit risk and credit derivatives; 7.3 Credit event; 7.4 An introduction to collateralised debt obligations (CDOs); Appendix 7.1 Credit ratings; Chapter 8. Equity Futures Contracts; 8.1 Exchange-traded equity index and universal stock futures; 8.2 Operational characteristics of equity futures contracts; Chapter 9. Equity Swaps; 9.1 A basic equity swap; 9.2 Single-currency, fixed notional principal, equity index/sterling LIBOR swap; 9.3 Equity swap: fair pricing; Chapter 10. Equity and Equity Index Options; 10.1 Call options; 10.2 Put options
Chapter 11. Option Pricing 11.1 Introduction; 11.2 The Black and Scholes model; 11.3 Alternative pricing frameworks; 11.4 Monte Carlo simulation; Chapter 12. Equity-linked Structured Products; 12.1 Introduction; 12.2 Convertible bonds; 12.3 Currency considerations; 12.4 Guaranteed equity products; Index
Record Nr. UNINA-9910784337403321
Eales Brian Anthony  
Oxford ; ; Boston, : Butterworth-Heinemann, 2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui