Cybersecurity and decision makers : data security and digital trust / / Marie de Fréminville |
Autore | Fréminville Marie de |
Pubbl/distr/stampa | Hoboken, N.J. : , : ISTE Ltd / John Wiley and Sons Inc, , 2020 |
Descrizione fisica | 1 online resource (225 pages) : illustrations |
Disciplina | 495.932 |
Soggetto topico |
Business - Data processing - Security measures
Computer security - Management |
ISBN |
1-119-72037-0
1-119-72035-4 1-119-72036-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910812211803321 |
Fréminville Marie de
![]() |
||
Hoboken, N.J. : , : ISTE Ltd / John Wiley and Sons Inc, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cybersecurity of digital service chains : challenges, methodologies, and tools / / editors, Joanna Kołodziej, Matteo Repetto, Armend Duzha |
Autore | Kołodziej Joanna |
Pubbl/distr/stampa | Cham, : Springer International Publishing AG, 2022 |
Descrizione fisica | 1 online resource (xi, 257 pages) : illustrations (chiefly color) |
Altri autori (Persone) |
RepettoMatteo
DuzhaArmend |
Collana | Lecture notes in computer science |
Soggetto topico |
Business - Data processing - Security measures
Computer networks - Security measures |
Soggetto non controllato |
cloud computing
computer crime computer networks computer security cryptography cyber security data communication systems data flow architectures data management systems data security electromagnetic interference and compatibility general programming languages health informatics intrusion detection network protocols network security network simulations sensors and actuators signal processing telecommunication traffic |
ISBN | 3-031-04036-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Reference Architecture for Management of Security Operations in Digital Service Chains Efficient flow monitoring in digital services Intelligent Transportation Systems models, challenges, security aspects NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic Detecting unknown attacks through system behavior analysis Signature-based detection of botnet DDoS attacks Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation Blockchain-based task and information management in computational cloud systems |
Record Nr. | UNINA-9910558694303321 |
Kołodziej Joanna
![]() |
||
Cham, : Springer International Publishing AG, 2022 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cybersecurity of digital service chains : challenges, methodologies, and tools / / editors, Joanna Kołodziej, Matteo Repetto, Armend Duzha |
Autore | Kołodziej Joanna |
Pubbl/distr/stampa | Cham, : Springer International Publishing AG, 2022 |
Descrizione fisica | 1 online resource (xi, 257 pages) : illustrations (chiefly color) |
Altri autori (Persone) |
RepettoMatteo
DuzhaArmend |
Collana | Lecture notes in computer science |
Soggetto topico |
Business - Data processing - Security measures
Computer networks - Security measures |
Soggetto non controllato |
cloud computing
computer crime computer networks computer security cryptography cyber security data communication systems data flow architectures data management systems data security electromagnetic interference and compatibility general programming languages health informatics intrusion detection network protocols network security network simulations sensors and actuators signal processing telecommunication traffic |
ISBN | 3-031-04036-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Reference Architecture for Management of Security Operations in Digital Service Chains Efficient flow monitoring in digital services Intelligent Transportation Systems models, challenges, security aspects NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic Detecting unknown attacks through system behavior analysis Signature-based detection of botnet DDoS attacks Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation Blockchain-based task and information management in computational cloud systems |
Record Nr. | UNISA-996472069303316 |
Kołodziej Joanna
![]() |
||
Cham, : Springer International Publishing AG, 2022 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Facing cyber threats head on : protecting yourself and your business / / Brian Minick |
Autore | Minick Brian |
Pubbl/distr/stampa | Lanham, Maryland : , : Rowman & Littlefield Publishers, , 2016 |
Descrizione fisica | 1 online resource (127 pages) : illustrations, photographs |
Disciplina | 658.4/78 |
Soggetto topico |
Business - Data processing - Security measures
Information technology - Security measures Data protection Computer security |
ISBN |
1-4422-6548-5
1-4422-6549-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910792317903321 |
Minick Brian
![]() |
||
Lanham, Maryland : , : Rowman & Littlefield Publishers, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Facing cyber threats head on : protecting yourself and your business / / Brian Minick |
Autore | Minick Brian |
Pubbl/distr/stampa | Lanham, Maryland : , : Rowman & Littlefield Publishers, , 2016 |
Descrizione fisica | 1 online resource (127 pages) : illustrations, photographs |
Disciplina | 658.4/78 |
Soggetto topico |
Business - Data processing - Security measures
Information technology - Security measures Data protection Computer security |
ISBN |
1-4422-6548-5
1-4422-6549-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910823197903321 |
Minick Brian
![]() |
||
Lanham, Maryland : , : Rowman & Littlefield Publishers, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Obstructions in security-aware business processes : analysis, detection, and handling / / Julius Holderer |
Autore | Holderer Julius |
Pubbl/distr/stampa | Wiesbaden, : Springer Nature, 2022 |
Descrizione fisica | 1 online resource (xxi, 341 pages) : illustrations (chiefly color) |
Soggetto topico | Business - Data processing - Security measures |
Soggetto non controllato |
IT-Security
Business Process Management Security and Privacy Process Security Compliance Process Automation Process Modeling Petri Net Process Mining Data Mining |
ISBN | 3-658-38154-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Why the Automation of Regulation Can Obstruct Business Processes Security-Related Obstructability in Process-Aware Information Systems Obstruction Modeling OLive-M: A SecANet Use Case for Model-Based Obstruction Solving OLive-L: SecANet Use Case for Log-Based Obstruction Solving Towards Intelligent Security- and Process-Aware Information Systems Bibliography |
Record Nr. | UNINA-9910585779703321 |
Holderer Julius
![]() |
||
Wiesbaden, : Springer Nature, 2022 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Obstructions in security-aware business processes : analysis, detection, and handling / / Julius Holderer |
Autore | Holderer Julius |
Pubbl/distr/stampa | Wiesbaden, : Springer Nature, 2022 |
Descrizione fisica | 1 online resource (xxi, 341 pages) : illustrations (chiefly color) |
Soggetto topico | Business - Data processing - Security measures |
Soggetto non controllato |
IT-Security
Business Process Management Security and Privacy Process Security Compliance Process Automation Process Modeling Petri Net Process Mining Data Mining |
ISBN | 3-658-38154-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Why the Automation of Regulation Can Obstruct Business Processes Security-Related Obstructability in Process-Aware Information Systems Obstruction Modeling OLive-M: A SecANet Use Case for Model-Based Obstruction Solving OLive-L: SecANet Use Case for Log-Based Obstruction Solving Towards Intelligent Security- and Process-Aware Information Systems Bibliography |
Record Nr. | UNISA-996483156803316 |
Holderer Julius
![]() |
||
Wiesbaden, : Springer Nature, 2022 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Storage |
Pubbl/distr/stampa | Needham, MA, : TechTarget |
Descrizione fisica | 1 online resource |
Disciplina | 004 |
Soggetto topico |
Information storage and retrieval systems - Business
Business - Data processing - Security measures Computer storage devices |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Altri titoli varianti |
Storage decisions
Storage magazine |
Record Nr. | UNINA-9910339021803321 |
Needham, MA, : TechTarget | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|