top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Critical Infrastructure Protection XIII : 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11–12, 2019, Revised Selected Papers / / edited by Jason Staggs, Sujeet Shenoi
Critical Infrastructure Protection XIII : 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11–12, 2019, Revised Selected Papers / / edited by Jason Staggs, Sujeet Shenoi
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XVI, 328 p. 1 illus.)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Computers - Law and legislation
Information technology - Law and legislation
Computer networks
Software engineering
Application software
Data and Information Security
Legal Aspects of Computing
Computer Communication Networks
Software Engineering
Computer and Information Systems Applications
ISBN 3-030-34647-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910357849303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Critical Infrastructure Protection XIV : 14th IFIP WG 11.10 International Conference, ICCIP 2020, Arlington, VA, USA, March 16–17, 2020, Revised Selected Papers / / edited by Jason Staggs, Sujeet Shenoi
Critical Infrastructure Protection XIV : 14th IFIP WG 11.10 International Conference, ICCIP 2020, Arlington, VA, USA, March 16–17, 2020, Revised Selected Papers / / edited by Jason Staggs, Sujeet Shenoi
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XVI, 331 p. 112 illus.)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Application software
Computer networks
Computers - Law and legislation
Information technology - Law and legislation
Data and Information Security
Computer and Information Systems Applications
Computer Communication Networks
Legal Aspects of Computing
ISBN 3-030-62840-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Aviation Infrastructure Security -- Cyber-Physical Security of Air Traffic Surveillance Systems -- Simulation-Based Logic Bomb Identification and Verification for Unmanned Aerial Vehicles -- Assessing the Cyber Risk of Small Unmanned Aerial Vehicles -- Cyber State Requirements for Design and Validation of Trust in the Critical Transportation Infrastructure -- Vehicle Infrastructure Security -- An Efficient Blockchain Authentication Scheme for Vehicular Ad-Hoc Networks -- Engaging Empirical Dynamic Modeling to Detect Intrusions in Cyber-Physical Systems -- Telecommunications Systems Security -- Multi-Channel Security Through Data Fragmentation -- Securing an InfiniBand Network and its Effect on Performance -- Industrial Control Systems Security -- Cyber-Resilient SCADA Systems via Secure State Restoration -- Vulnerability Assessments of Building Management Systems -- Forensic Investigation of a Hacked Industrial Robot -- Cyber-Physical Systems Security -- Distributed Bias Detection in Cyber-Physical Systems -- Comparison of Design-Centric and Data-Centric Methods for Distributed Attack Detection in Cyber-Physical Systems -- Infrastructure Modeling and Simulation -- A Model-Based Safety-Security Risk Analysis Framework for Interconnected Critical Infrastructures -- Creating a Cross-Domain Simulation Framework for Risk Analyses of Cities -- Modeling Telecommunications Infrastructures Using the CISIApro 2.0 Simulator.
Record Nr. UNINA-9910447243003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Critical Infrastructure Protection XVI : 16th IFIP WG 11.10 International Conference, ICCIP 2022, Virtual Event, March 14–15, 2022, Revised Selected Papers / / edited by Jason Staggs, Sujeet Shenoi
Critical Infrastructure Protection XVI : 16th IFIP WG 11.10 International Conference, ICCIP 2022, Virtual Event, March 14–15, 2022, Revised Selected Papers / / edited by Jason Staggs, Sujeet Shenoi
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (303 pages)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Computer engineering
Computer networks
Computers - Law and legislation
Information technology - Law and legislation
Data and Information Security
Computer Engineering and Networks
Legal Aspects of Computing
ISBN 3-031-20137-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Contents -- Contributing Authors -- Preface -- I THEMES AND ISSUES -- Chapter 1 NATIONAL CYBER RESILIENCE AND ROLES FOR PUBLIC AND PRIVATE SECTOR STAKEHOLDERS -- 1. Introduction -- 2. Related Work -- 2.1 Cyber Infrastructure Threats -- 2.2 Cyber Infrastructure Resilience -- 3. Cyber Infrastructure and Threats -- 3.1 Cyber Infrastructure Model -- 3.2 Cyber Infrastructure Threats -- 4. National-Scale Resilience Model -- 4.1 Cyber Infrastructure and Resilience -- 4.2 Basic Resilience Model -- 4.3 Applying Resilience to Cyber Infrastructure -- 4.4 Measuring Practices in Cyber Infrastructure -- 5. Implementing the Resilience Model -- 5.1 Phase 1: Prepare -- 5.2 Phase 2: Implement -- 5.3 Phase 3: Test -- 5.4 Phase 4: Evaluate -- 6. Stakeholders and Roles -- 6.1 Cyber Resilience Government Stakeholders -- 6.2 Building Cyber Infrastructure Resilience -- 7. Conclusions -- References -- Chapter 2 ARE EUROPEAN SECURITY POLICIES READY FOR ADVANCED METERING SYSTEMS WITH CLOUD BACK-ENDS? -- 1. Introduction -- 2. Background -- 2.1 Advanced Metering System Evolution -- 2.2 European Union Cyber Security Legislation -- 3. Research Methodology Overview -- 4. Reference Model -- 5. Framework to Legislation Mapping -- 6. Cloud-Secure AMS Policy Framework -- 7. Conclusions -- Acknowledgements -- References -- II INDUSTRIAL CONTROL SYSTEMS SECURITY -- Chapter 3 IMPORTANCE OF CYBER SECURITY ANALYSIS IN THE OPERATIONAL TECHNOLOGY SYSTEM LIFECYCLE -- 1. Introduction -- 2. Project Background and Overview -- 3. Assessment Methodology -- 4. Research Findings -- 4.1 Device Command Processing -- 4.2 IMS/AMS Operator Workstations -- 4.3 Safety Instrumented SystemCommunications -- 4.4 Security Control Performance -- 4.5 Assessment Questions and Findings -- 4.6 Architecture Comparison -- 5. Recommendations -- 6. Discussion -- 7. Conclusions -- Acknowledgements.
References -- Chapter 4 TRUSTED VIRTUALIZATION-BASED PROGRAMMABLE LOGIC CONTROLLER RESILIENCE USING A BACKFIT APPROACH -- 1. Introduction -- 2. Related Work -- 3. Virtualization for Trust and Resilience -- 3.1 PLC Virtualization -- 3.2 Remote TPM-Based Attestation -- 4. Experiments and Results -- 4.1 Experimental Environment -- 4.2 Resilience Experiments and Results -- 5. Conclusions -- References -- III ADDITIVE MANUFACTURING SYSTEMS -- Chapter 5 ATTACK-DEFENSE MODELING OF MATERIAL EXTRUSION ADDITIVE MANUFACTURING SYSTEMS -- 1. Introduction -- 2. Additive Manufacturing Workflow -- 3. Additive Manufacturing Threats -- 3.1 Threats Leveraging Additive Manufacturing -- 3.2 Threats Against Additive Manufacturing -- 4. Material Extrusion Additive Manufacturing -- 5. Attack-Defense Modeling -- 6. Material Extrusion Attack-Defense Model -- 6.1 Design Phase Attack-Defense Model -- 6.2 Slicing Phase Attack-Defense Model -- 6.3 Printing Phase Attack-Defense Model -- 7. Material Extrusion Case Studies -- 7.1 Printer Annamieke -- 7.2 Printer Beatrijs -- 7.3 Printer Cathelijne -- 8. Material Extrusion Attacks -- 8.1 Design Phase Attack -- 8.2 Slicing Phase Attacks -- 8.3 Printing Phase Attack -- 9. Discussion -- 10. Conclusions -- Acknowledgement -- References -- Chapter 6 MANIPULATION OF G-CODE TOOLPATH FILES IN 3D PRINTERS: ATTACKS AND MITIGATIONS -- 1. Introduction -- 2. Background and Related Work -- 2.1 Additive Manufacturing Process Chain -- 2.2 Process Chain Attacks -- 3. G-Code Toolpath File Attack Surface -- 4. G-Code Toolpath File Exploitation -- 4.1 Software Execution Vulnerability -- 4.2 Software Execution Attack -- 5. G-Code Toolpath File Attacks -- 5.1 Temperature Modification Attacks -- 5.2 Infill Exclusion Attacks -- 6. Attack Results and Mitigations -- 6.1 Attack Effectiveness Experiments -- 6.2 Temperature Modification Experiments.
6.3 Infill Exclusion Experiments -- 6.4 Discussion -- 7. Mitigations -- 8. Conclusions -- Acknowledgement -- References -- Chapter 7 DETECTING PART ANOMALIES INDUCED BY CYBER ATTACKS ON A POWDER BED FUSION ADDITIVE MANUFACTURING SYSTEM -- 1. Introduction -- 2. Related Work -- 3. Powder Bed Fusion -- 3.1 Powder Bed Fusion Process -- 3.2 Selective Laser Sintering Printer -- 4. Powder Bed Fusion Printer Anomalies -- 5. Anomaly Detection Method -- 5.1 Data Collection -- 5.2 Data Processing -- 5.3 Data Analysis -- 6. Anomaly Creation Attacks -- 7. Experimental Setup and Results -- 7.1 Experimental Setup -- 7.2 Anomaly Detection Results -- 8. Discussion -- 9. Conclusions -- Acknowledgement -- References -- Chapter 8 LOW-MAGNITUDE INFILL STRUCTURE MANIPULATION ATTACKS ON FUSED FILAMENT FABRICATION 3D PRINTERS -- 1. Introduction -- 2. Related Work -- 3. Low-Magnitude Infill Structure Attacks -- 3.1 Attack Success Criteria -- 3.2 Printing Accuracy -- 3.3 Attacking Infill Structures -- 4. Attack Implementation -- 4.1 Attack Overview -- 4.2 Attack Plan -- 5. Evaluation Results -- 5.1 Stealthiness Performance -- 5.2 Mechanical Strength Impacts -- 6. Analysis and Discussion -- 7. Attack Countermeasures -- 8. Conclusions -- Acknowledgement -- References -- IV INFRASTRUCTURE DEVICE SECURITY -- Chapter 9 LEVERAGING CONFIDENTIAL COMPUTING TO ENABLE SECURE INFORMATION SHARING -- 1. Introduction -- 2. Background and Related Work -- 2.1 Confidential Computing -- 2.2 RISC-V Instruction Set Architecture -- 2.3 Keystone Enclave -- 2.4 Related Work -- 3. Experimental Configuration -- 4. Proposed Development -- 5. Experimental Results and Analysis -- 6. Conclusions -- References -- Chapter 10 EVALUATING THE USE OF BOOT IMAGE ENCRYPTION ON THE TALOS II ARCHITECTURE -- 1. Introduction -- 2. Background -- 2.1 Talos II Architecture -- 2.2 PNOR Image Structure.
2.3 Initial Program Load -- 2.4 Ciphers -- 2.5 Secure Key Management -- 3. Related Work -- 3.1 Secure Firmware Updates Using AES -- 3.2 Image Encryption -- 4. Experimental Setup -- 4.1 Microcontroller Setup -- 5. Experimental Methodology -- 5.1 Experimental Factors -- 5.2 Data Collection -- 5.3 Application Scenarios -- 5.4 Assumptions -- 6. Experimental Results and Analysis -- 6.1 Boot Image Encryption Performance Impact -- 6.2 Comparison of Encryption Methods -- 6.3 Encryption Ratio -- 7. Conclusions -- References -- V TELECOMMUNICATIONS SYSTEMS SECURITY -- Chapter 11 SECURING INFINIBAND TRAFFIC WITH BLUEFIELD-2 DATA PROCESSING UNITS -- 1. Introduction -- 2. Background and Related Work -- 2.1 InfiniBand Network Overview -- 2.2 Convergent Technologies -- 2.3 Security Concepts -- 3. Testbed Design -- 4. Experimental Scenarios -- 5. Experimental Results -- 6. Conclusions -- References.
Record Nr. UNINA-9910633936603321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Critical Infrastructure Protection XVII [[electronic resource] ] : 17th IFIP WG 11.10 International Conference, ICCIP 2023, Arlington, VA, USA, March 13–14, 2023, Revised Selected Papers / / edited by Jason Staggs, Sujeet Shenoi
Critical Infrastructure Protection XVII [[electronic resource] ] : 17th IFIP WG 11.10 International Conference, ICCIP 2023, Arlington, VA, USA, March 13–14, 2023, Revised Selected Papers / / edited by Jason Staggs, Sujeet Shenoi
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (X, 253 p. 84 illus., 7 illus. in color.)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Computer engineering
Computer networks
Computers - Law and legislation
Information technology - Law and legislation
Data and Information Security
Computer Engineering and Networks
Legal Aspects of Computing
ISBN 3-031-49585-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Themes and Issues -- Redefining Homeland Security -- Smart Grid Risks and Impacts -- Smart-Grid-Enabled Business Cases and the Consequences of Cyber Attacks -- Consequence Verification During Risk Assessments of Smart Grids -- Measuring the Impacts of Power Outages on Internet Hosts in the United States -- Network and Telecommunications Systems Security -- Analyzing Discrepancies in Whole-Network Provenance -- A Contextual Integrity Property to Impede Privacy Violations in 5G Networks -- Infrastructure Security -- Modeling and Assessing the Impacts of Cyber Threats on Interdependent Critical Infrastructures -- Security-Enhanced Orchestration Platform for Building Management Systems -- Practical Deep Neural Network Protection for Unmodified Applications in Intel Software Guard Extension Environments -- Automobile Security -- A Cyber Security Analysis Methodology for Evaluating Automobile Risk Exposures -- Real-Time Attack Detection in Modern Automobile Controller Area Networks.
Record Nr. UNINA-9910799493803321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
A Critical Mind [[electronic resource] ] : Hanns Ullrich’s Footprint in Internal Market Law, Antitrust and Intellectual Property / / edited by Christine Godt, Matthias Lamping
A Critical Mind [[electronic resource] ] : Hanns Ullrich’s Footprint in Internal Market Law, Antitrust and Intellectual Property / / edited by Christine Godt, Matthias Lamping
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (790 pages)
Disciplina 343.0721
Collana MPI Studies on Intellectual Property and Competition Law
Soggetto topico Information technology - Law and legislation
Mass media - Law and legislation
IT Law, Media Law, Intellectual Property
ISBN 3-662-65974-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part I: European Legal Order -- Market Access and Competition Rules of the EU – Was their Constitutionalization Based on a Judicial Error? -- Renewing the Van Gend Pledge – Continuity and Resilience in the Court’s Construction and Defense of the Supranational Character of EU Law -- Why is the Regulation of Enforcement through the EU so Difficult? -- Part II: Competition -- On the Political Nature of Competition Law -- Competition Law and Political Influence of Large Corporations – How Antitrust Analysis Can Capture the Link between Political and Economic Institutions That Affect Market Competition -- Cutting into Diamonds: Competition Law, IPR, Trade Secrets and the Case of ‘Big Data’ -- FRAND Declarations and the ‘Third-Party Effect’ – A Contract Law and Competition Law Perspective -- In Rem Effect of Licensing Declarations – Hanns Ullrich’s Traces in Recent Case Law -- Part III: Intellectual Property -- Mapping the Intangible Economy -- Exclusive Rights for a Purpose – Intellectual Property as a Framework Regulation of Innovation Markets -- From a Rights-Based to a Procedural Approach: Re-Purposing the Exercise of Intellectual Property Rights -- How to Stay Modern Feudalism? Comparing EU and US Methodologies in Containing Post-Sale Restraints by Way of IP Exhaustion -- Virtual Patent Networks and Their Network Effects -- The Public Interest in Compulsory Licensing: Examining the Complementarity Between IP and Competition Law -- Part IV: Data Economy -- Digital Sovereignty and Governance in the Data Economy: Data Trusteeship instead of Property Rights on Data -- Incentives for Data-Sharing as a Case on (Regulating) Knowledge Externalities -- Some Remarks on the Subjective Profiles of the EOSC Project, Especially from the Perspective of IP Law -- Part V: Artificial Intelligence -- Inventorship in the Age of Artificial Intelligence -- Artificial Intelligence and the Technicality Requirement of Patent Law -- Patent Infringement by Development and Use of Artificial Intelligence Systems, Specifically Artificial Neural Networks -- Part VI: Digital Media -- Copyright, News, and ‘Information Products’ under the New DSM Copyright Directive -- Media, Legal Tech and Modern Copyright Law German Lawyers in the Digital World -- Media Policy and Copyright in Europe: The Progressive Expansion of the Law for Broadcasters to Online Platforms -- Part VII: Biotechnology -- Gene Editing Technology Patents or Monopolization of Scientific Knowledge and Health Care? -- A Comprehensive Approach to Plant Variety Rights and Patents in the Field of Innovative Plants -- Part VIII: Global Market Order -- TRIPS through a Military Looking Glass -- A Transactional Approach to Intellectual Property -- Manufacturing for Export: A TRIPS-Consistent Pro-Competitive Exception -- Reductionist Intellectual Property Protection and Expansionist (and ‘Prodevelopment’) Competition Rules as a Human Rights Imperative? Enhancing Technology Transfer to the Global South -- Caught Between Post- and Neo-Colonialism – IP for Traditional Knowledge, Traditional Cultural Expressions and Indigenous Resources.
Record Nr. UNINA-9910734847403321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybercrimes and Financial Crimes in the Global Era [[electronic resource] /] / edited by Yanping Liu, Minghai Tian, Yanming Shao
Cybercrimes and Financial Crimes in the Global Era [[electronic resource] /] / edited by Yanping Liu, Minghai Tian, Yanming Shao
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (334 pages)
Disciplina 345.0268
Soggetto topico Private international law
Conflict of laws
International law
Comparative law
Information technology - Law and legislation
Mass media - Law and legislation
Criminal law
Private International Law, International and Foreign Law, Comparative Law
IT Law, Media Law, Intellectual Property
Criminal Law and Criminal Procedure Law
ISBN 981-19-3189-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto An Analysis of the Reasons for the Rise of Financial Crimes and the Decline of Violent Crimes -- Main Challenges Facing to the China's Criminal Legislation on Punishing Financial Crimes -- Criminal Regulations of China's Cybercrime and Its International Cooperation -- Main Trends in the Development of International Crime in the Implementation of Cybertechnologies -- Compliance Against Computer Crimes -- Risks of Cyberspace to Fundamental Rights in the Global Era -- Combating Criminal Computer at Council of Europe -- Digital Technology as a Source of Criminal Risks.
Record Nr. UNINA-9910586635903321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data Protection without Data Protectionism : The Right to Protection of Personal Data and Data Transfers in EU Law and International Trade Law / / by Tobias Naef
Data Protection without Data Protectionism : The Right to Protection of Personal Data and Data Transfers in EU Law and International Trade Law / / by Tobias Naef
Autore Naef Tobias
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 electronic resource (431 p.)
Disciplina 343.407
Collana EYIEL Monographs - Studies in European and International Economic Law
Soggetto topico Commercial law
European Economic Community
International law
Trade regulation
Information technology - Law and legislation
Mass media - Law and legislation
Civil rights
European communities
European Economic Law
International Economic Law, Trade Law
IT Law, Media Law, Intellectual Property
European Fundamental Rights and Freedoms
ISBN 3-031-19893-X
978-3-031-19892-2
978-3-031-19893-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Introduction -- Part One - European Data Protection Law -- 2 The Global Right to Data Protection -- 3. The Restrictive Effect of the Legal Mechanisms for Data Transfers in the European Union -- Part Two - International Trade Law -- 4. Restrictions on Data Transfers and the WTO -- 5. Restrictions on Data Transfers and Trade -- Part Three -- 6. Concluding Remarks: Data Protection without Data Protectionism.
Record Nr. UNINA-9910634051603321
Naef Tobias  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital Services and Platforms. Considerations for Sourcing : 12th Global Sourcing Workshop 2018, La Thuile, Italy, February 21–24, 2018, Revised Selected Papers / / edited by Julia Kotlarsky, Ilan Oshri, Leslie Willcocks
Digital Services and Platforms. Considerations for Sourcing : 12th Global Sourcing Workshop 2018, La Thuile, Italy, February 21–24, 2018, Revised Selected Papers / / edited by Julia Kotlarsky, Ilan Oshri, Leslie Willcocks
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (VII, 187 p. 60 illus., 25 illus. in color.)
Disciplina 004.6
Collana Lecture Notes in Business Information Processing
Soggetto topico Electronic data processing - Management
Software engineering - Management
Computer industry
Technological innovations
Computers - Law and legislation
Information technology - Law and legislation
Industrial procurement
IT Operations
Software Management
The Computer Industry
Innovation and Technology Management
Legal Aspects of Computing
Procurement
ISBN 3-030-15850-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Partnering for Digital Innovation: a Competence-Based Study -- The Barriers to Innovation: An Examination of the Effect of “Keeping the Lights On” -- Exploring Determinants Influencing a Service-Oriented Enterprise Strategy: An Executive Management View -- Automation of Knowledge-Based Shared Services and Centers of Expertise -- Knowledge Boundary Spanning Mechanisms in a Shared Services Centre Context -- The Role of Willingness and Motivation in the Art of Start: a Case Study of IT SME Supplier Selection and Development -- Implementing and Contracting Agile and DevOps: a survey in the Netherlands -- Caring for Platform-Based Work -- Organizational Controls, Social Ties and Performance in Plural Sourcing.
Record Nr. UNINA-9910337568903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital Sovereignty in Cyber Security: New Challenges in Future Vision [[electronic resource] ] : First International Workshop, CyberSec4Europe 2022, Venice, Italy, April 17–21, 2022, Revised Selected Papers / / edited by Antonio Skarmeta, Daniele Canavese, Antonio Lioy, Sara Matheu
Digital Sovereignty in Cyber Security: New Challenges in Future Vision [[electronic resource] ] : First International Workshop, CyberSec4Europe 2022, Venice, Italy, April 17–21, 2022, Revised Selected Papers / / edited by Antonio Skarmeta, Daniele Canavese, Antonio Lioy, Sara Matheu
Autore Skarmeta Antonio
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (182 pages)
Disciplina 005.8
Altri autori (Persone) CanaveseDaniele
LioyAntonio
MatheuSara
Collana Communications in Computer and Information Science
Soggetto topico Data protection
Computers - Law and legislation
Information technology - Law and legislation
Computer crimes
Software engineering
Operating systems (Computers)
Data and Information Security
Legal Aspects of Computing
Computer Crime
Software Engineering
Operating Systems
ISBN 3-031-36096-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto S oftware Security -- Network Security and Privacy -- Cybersecurity and Society.
Record Nr. UNINA-9910731481503321
Skarmeta Antonio  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital Sovereignty in Cyber Security: New Challenges in Future Vision [[electronic resource] ] : First International Workshop, CyberSec4Europe 2022, Venice, Italy, April 17–21, 2022, Revised Selected Papers / / edited by Antonio Skarmeta, Daniele Canavese, Antonio Lioy, Sara Matheu
Digital Sovereignty in Cyber Security: New Challenges in Future Vision [[electronic resource] ] : First International Workshop, CyberSec4Europe 2022, Venice, Italy, April 17–21, 2022, Revised Selected Papers / / edited by Antonio Skarmeta, Daniele Canavese, Antonio Lioy, Sara Matheu
Autore Skarmeta Antonio
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (182 pages)
Disciplina 005.8
Altri autori (Persone) CanaveseDaniele
LioyAntonio
MatheuSara
Collana Communications in Computer and Information Science
Soggetto topico Data protection
Computers - Law and legislation
Information technology - Law and legislation
Computer crimes
Software engineering
Operating systems (Computers)
Data and Information Security
Legal Aspects of Computing
Computer Crime
Software Engineering
Operating Systems
ISBN 3-031-36096-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto S oftware Security -- Network Security and Privacy -- Cybersecurity and Society.
Record Nr. UNISA-996546821203316
Skarmeta Antonio  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui

Data di pubblicazione

Altro...