top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Privacy in statistical databases : UNESCO Chair in Data Privacy, International Conference, PSD 2020, Tarragona, Spain, September 23-25, 2020 : proceedings / / Josep Domingo-Ferrer, Krishnamurty Muralidhar (editors)
Privacy in statistical databases : UNESCO Chair in Data Privacy, International Conference, PSD 2020, Tarragona, Spain, September 23-25, 2020 : proceedings / / Josep Domingo-Ferrer, Krishnamurty Muralidhar (editors)
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2020]
Descrizione fisica 1 online resource (XI, 370 p. 25 illus.)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Database security
Data protection
Statistics - Databases
ISBN 3-030-57521-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Privacy models -- Microdata protection -- Protection of statistical tables -- Protection of interactive and mobility databases -- Record linkage and alternative methods -- Synthetic data -- Data quality -- Case studies.
Record Nr. UNINA-9910427714303321
Cham, Switzerland : , : Springer, , [2020]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Privacy in statistical databases : UNESCO Chair in Data Privacy, International Conference, PSD 2020, Tarragona, Spain, September 23-25, 2020 : proceedings / / Josep Domingo-Ferrer, Krishnamurty Muralidhar (editors)
Privacy in statistical databases : UNESCO Chair in Data Privacy, International Conference, PSD 2020, Tarragona, Spain, September 23-25, 2020 : proceedings / / Josep Domingo-Ferrer, Krishnamurty Muralidhar (editors)
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2020]
Descrizione fisica 1 online resource (XI, 370 p. 25 illus.)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Database security
Data protection
Statistics - Databases
ISBN 3-030-57521-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Privacy models -- Microdata protection -- Protection of statistical tables -- Protection of interactive and mobility databases -- Record linkage and alternative methods -- Synthetic data -- Data quality -- Case studies.
Record Nr. UNISA-996418295203316
Cham, Switzerland : , : Springer, , [2020]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Protecting consumer information : can data breaches be prevented? : hearing before the Subcommittee on Commerce, Manufacturing, and Trade of the Committee on Energy and Commerce, House of Representatives, One Hundred Thirteenth Congress, second session, February 5, 2014
Protecting consumer information : can data breaches be prevented? : hearing before the Subcommittee on Commerce, Manufacturing, and Trade of the Committee on Energy and Commerce, House of Representatives, One Hundred Thirteenth Congress, second session, February 5, 2014
Pubbl/distr/stampa Washington : , : U.S. Government Publishing Office, , 2015
Descrizione fisica 1 online resource (iii, 204 pages) : illustrations
Soggetto topico Data protection - United States
Database security - United States
Computer crimes - United States - Prevention
Consumer protection - United States
Computer crimes - Prevention
Consumer protection
Data protection
Database security
Soggetto genere / forma Legislative hearings.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Protecting Consumer Information
Record Nr. UNINA-9910708181903321
Washington : , : U.S. Government Publishing Office, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Protecting personal consumer information from cyber attacks and data breaches : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Thirteenth Congress, second session, March 26, 2014
Protecting personal consumer information from cyber attacks and data breaches : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Thirteenth Congress, second session, March 26, 2014
Pubbl/distr/stampa Washington : , : U.S. Government Publishing Office, , 2014
Descrizione fisica 1 online resource (iii, 111 pages) : illustrations
Collana S. hrg.
Soggetto topico Data protection - United States
Consumer protection - United States
Database security - United States
Computer security - United States
Identity theft - United States - Prevention
Privacy, Right of - United States
Computer security
Consumer protection
Data protection
Database security
Identity theft - Prevention
Privacy, Right of
Soggetto genere / forma Legislative hearings.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Protecting personal consumer information from cyber attacks and data breaches
Record Nr. UNINA-9910703545303321
Washington : , : U.S. Government Publishing Office, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Safeguarding Critical E-Documents [[electronic resource] ] : Implementing a Program for Securing Confidential Information Assets
Safeguarding Critical E-Documents [[electronic resource] ] : Implementing a Program for Securing Confidential Information Assets
Autore Smallwood Robert F. <1959->
Pubbl/distr/stampa New York, : Wiley, 2012
Descrizione fisica 1 online resource (285 p.)
Disciplina 005.8
658.472
Soggetto topico BUSINESS & ECONOMICS / Information Management
Computer security
Cyberspace - Security measures
Cyberspace -- Security measures
Database security
Electronic records
Computer security - Security measures
Cyberspace
ISBN 1-119-20490-9
1-280-79277-9
9786613703163
1-118-28687-1
Classificazione BUS083000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Safeguarding Critical E-Documents; Contents; Foreword; Preface; Acknowledgments; PART I THE PROBLEM AND BASIC TOOLS; CHAPTER 1 The Problem: Securing Confidential Electronic Documents; WikiLeaks: A Wake-Up Call; U.S. Government Attempts to Protect Intellectual Property; Threats Persist across the Pond: U.K. Companies on Guard; Increase in Corporate and Industrial Espionage; Risks of Medical Identity Theft; Why Don't Organizations Safeguard Their Information Assets?; The Blame Game: Where Does Fault Lie When Information Is Leaked?; Consequences of Not Employing E-Document Security; Notes
CHAPTER 2 Information Governance: The Crucial First Step First, Better Policies; Then, Better Technology for Better Enforcement; Defining Information Governance; Accountability Is Key; Why IG Is Good Business; Impact of a Successful IG Program; Critical Factors in an IG Program; Who Should Determine IG Policies?; Notes; PART II Information Platform Risks and Countermeasures; CHAPTER 3 Managing E-Documents and Records; Enterprise Content Management; Document Management Principles; The Goal: Document Lifecycle Security; Electronic Document Management Systems; Records Management Principles
Electronic Records Management Notes; CHAPTER 4 Information Governance and Security for E-mail Messages; Employees Regularly Expose Organizations to E-mail Risk; E-mail Policies Should Be Realistic and Technology Agnostic; Is E-mail Encryption the Answer?; Common E-mail Security Mistakes; E-mail Security Myths; E-record Retention: Fundamentally a Legal Issue; Preserve E-mail Integrity and Admissibility with Automatic Archiving; E-mail Archiving Rationale: Compliance, Legal, and Business Reasons; Don't Confuse E-mail Archiving with Backup; No Personal Archiving in the Workplace
Are All E-mails Records?Destructive Retention of E-mail; Notes; CHAPTER 5 Information Governance and Security for Instant Messaging; Instant Messaging Security Threats; Stealing Information through Hijacking and Impersonation; Denial-of-Service Attacks Freeze Access; Network Sniffers and Unauthorized Disclosure of Information Assets; Best Practices for Business IM Use; Technology to Monitor IM; Tips for Safer IM; Notes; CHAPTER 6 Information Governance and Security for Social Media; Types of Social Media in Web 2.0; Social Media in the Enterprise
Key Ways Social Media Is Different from E-mail and Instant Messaging Biggest Security Threats of Social Media; Legal Risks of Social Media Posts; Tools to Archive Facebook and Twitter; IG Considerations for Social Media; Notes; CHAPTER 7 Information Governance and Security for Mobile Devices; Current Trends in Mobile Computing; Security Risks of Mobile Computing; Securing Mobile Data; IG for Mobile Computing; Building Security into Mobile Applications; Real Threats Are Poorly Understood; Innovation versus Security: Choices and Trade-Offs; Best Practices to Secure Mobile Applications; Notes
CHAPTER 8 Information Governance and Security for Cloud Computing Use
Record Nr. UNINA-9910141258503321
Smallwood Robert F. <1959->  
New York, : Wiley, 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Secure data management : 5th VLDB workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, proceedings / / edited by Willem Jonker and Milan Petkovic
Secure data management : 5th VLDB workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, proceedings / / edited by Willem Jonker and Milan Petkovic
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Germany ; ; New York, New York : , : Springer, , [2008]
Descrizione fisica 1 online resource (X, 229 p.)
Disciplina 004
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Computers - Access control
Database security
ISBN 3-540-85259-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Keynote Paper -- How Anonymous Is k-Anonymous? Look at Your Quasi-ID -- Database Security -- Simulatable Binding: Beyond Simulatable Auditing -- ARUBA: A Risk-Utility-Based Algorithm for Data Disclosure -- Responding to Anomalous Database Requests -- Auditing Inference Based Disclosures in Dynamic Databases -- Trust Management -- An Approach to Evaluate Data Trustworthiness Based on Data Provenance -- Exploiting Preferences for Minimal Credential Disclosure in Policy-Driven Trust Negotiations -- A Trusted Approach to E-Commerce -- Privacy Protection -- A Game-Theoretical Approach to Data-Privacy Protection from Context-Based Inference Attacks: A Location-Privacy Protection Case Study -- Query Rewriting for Access Control on Semantic Web -- Security and Privacy in Healthcare -- On the Facilitation of Fine-Grained Access to Distributed Healthcare Data -- A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare -- Position Papers -- A Methodology for Bridging between RBAC and an Arbitrary Application Program -- An Anonymity Model Achievable Via Microaggregation -- Engineering Privacy Requirements in Business Intelligence Applications.
Record Nr. UNINA-9910485026303321
Berlin, Germany ; ; New York, New York : , : Springer, , [2008]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Secure data management : 5th VLDB workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, proceedings / / edited by Willem Jonker and Milan Petkovic
Secure data management : 5th VLDB workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, proceedings / / edited by Willem Jonker and Milan Petkovic
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Germany ; ; New York, New York : , : Springer, , [2008]
Descrizione fisica 1 online resource (X, 229 p.)
Disciplina 004
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Computers - Access control
Database security
ISBN 3-540-85259-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Keynote Paper -- How Anonymous Is k-Anonymous? Look at Your Quasi-ID -- Database Security -- Simulatable Binding: Beyond Simulatable Auditing -- ARUBA: A Risk-Utility-Based Algorithm for Data Disclosure -- Responding to Anomalous Database Requests -- Auditing Inference Based Disclosures in Dynamic Databases -- Trust Management -- An Approach to Evaluate Data Trustworthiness Based on Data Provenance -- Exploiting Preferences for Minimal Credential Disclosure in Policy-Driven Trust Negotiations -- A Trusted Approach to E-Commerce -- Privacy Protection -- A Game-Theoretical Approach to Data-Privacy Protection from Context-Based Inference Attacks: A Location-Privacy Protection Case Study -- Query Rewriting for Access Control on Semantic Web -- Security and Privacy in Healthcare -- On the Facilitation of Fine-Grained Access to Distributed Healthcare Data -- A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare -- Position Papers -- A Methodology for Bridging between RBAC and an Arbitrary Application Program -- An Anonymity Model Achievable Via Microaggregation -- Engineering Privacy Requirements in Business Intelligence Applications.
Record Nr. UNISA-996465635003316
Berlin, Germany ; ; New York, New York : , : Springer, , [2008]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Securing SQL server : protecting your database from attackers / / Denny Cherry
Securing SQL server : protecting your database from attackers / / Denny Cherry
Autore Cherry Denny
Edizione [Third edition.]
Pubbl/distr/stampa Amsterdam, Netherlands : , : Syngress, , 2015
Descrizione fisica 1 online resource (xxii, 440 pages) : illustrations
Disciplina 005.8
Soggetto topico Database security
ISBN 0-12-801375-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910793702903321
Cherry Denny  
Amsterdam, Netherlands : , : Syngress, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Securing SQL server : protecting your database from attackers / / Denny Cherry
Securing SQL server : protecting your database from attackers / / Denny Cherry
Autore Cherry Denny
Edizione [Third edition.]
Pubbl/distr/stampa Amsterdam, Netherlands : , : Syngress, , 2015
Descrizione fisica 1 online resource (xxii, 440 pages) : illustrations
Disciplina 005.8
Soggetto topico Database security
ISBN 0-12-801375-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910827682603321
Cherry Denny  
Amsterdam, Netherlands : , : Syngress, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS 2014) : Wrocław, Poland September 11, 2014 / / Institute of Electrical and Electronics Engineers
Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS 2014) : Wrocław, Poland September 11, 2014 / / Institute of Electrical and Electronics Engineers
Pubbl/distr/stampa Los Alamitos, CA : , : IEEE, , [2014]
Descrizione fisica 1 online resource (x, 90 pages) : illustrations
Disciplina 005.8
Soggetto topico Database security
ISBN 1-4799-8309-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Preface -- Committees -- Sponsors -- Full Papers -- ANDRUBIS - 1,000,000 Apps Later: A View on Current Android Malware Behaviors -- Security and Privacy Measurements in Social Networks: Experiences and Lessons Learned -- Classification of SSL Servers based on their SSL Handshake for Automated Security Assessment -- Are We Missing Labels? A Study of the Availability of Ground-Truth in Network Security Research -- EyeBit: Eye-Tracking Approach for Enforcing Phishing Prevention Habits -- Short Papers -- The Vulnerability Dataset of a Large Software Ecosystem -- MATATABI: Multi-layer Threat Analysis Platform with Hadoop -- Collaborative Repository for Cybersecurity Data and Threat Information -- Author Index.
Altri titoli varianti 2014 Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security
Record Nr. UNISA-996280085603316
Los Alamitos, CA : , : IEEE, , [2014]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui