Intelligence and Security Informatics [[electronic resource] ] : IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings / / edited by Paul Kantor, Gheorghe Muresan, Fred Roberts, Daniel Zeng, Frei-Yue Wang, Hsinchun Chen, Ralph Merkle |
Edizione | [1st ed. 2005.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 |
Descrizione fisica | 1 online resource (XVIII, 678 p.) |
Disciplina | 006.33 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Application software
Computer communication systems Information storage and retrieval Computers and civilization Computers Law and legislation Management information systems Computer science Information Systems Applications (incl. Internet) Computer Communication Networks Information Storage and Retrieval Computers and Society Legal Aspects of Computing Management of Computing and Information Systems |
Soggetto non controllato | ISI |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Long Papers -- Short Papers -- Extended Abstracts for Posters and Demos -- Infrastructure Protection and Emergency Response -- Surveillance, Border Protection, and Transportation Systems. |
Record Nr. | UNISA-996465968603316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Intelligence and Security Informatics [[electronic resource] ] : Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004, Proceedings / / edited by Hsinchun Chen, Reagan Moore, Daniel D. Zeng, John Leavitt |
Edizione | [1st ed. 2004.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 |
Descrizione fisica | 1 online resource (XVI, 544 p.) |
Disciplina | 006.3/3 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Artificial intelligence
Application software Information storage and retrieval Operating systems (Computers) Computers and civilization Computers Law and legislation Artificial Intelligence Information Systems Applications (incl. Internet) Information Storage and Retrieval Operating Systems Computers and Society Legal Aspects of Computing |
ISBN |
1-280-30775-7
9786610307753 3-540-25952-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Full Papers -- Aligning Simulation Models of Smallpox Outbreaks -- Data Analytics for Bioterrorism Surveillance -- West Nile Virus and Botulism Portal: A Case Study in Infectious Disease Informatics -- A Novel Policy and Information Flow Security Model for Active Network -- A Novel Autonomous Trust Management Model for Mobile Agents -- Privacy-Preserving Inter-database Operations -- Finding Unusual Correlation Using Matrix Decompositions -- Generating Concept Hierarchies from Text for Intelligence Analysis -- Interactive Query Languages for Intelligence Tasks -- Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism -- The Architecture of the Cornell Knowledge Broker -- Computer-Based Training for Deception Detection: What Users Want? -- Identifying Multi-ID Users in Open Forums -- Self-efficacy, Training Effectiveness, and Deception Detection: A Longitudinal Study of Lie Detection Training -- Composite Role-Based Monitoring (CRBM) for Countering Insider Threats -- Critical Infrastructure Integration Modeling and Simulation -- Mining Normal and Intrusive Activity Patterns for Computer Intrusion Detection -- The Optimal Deployment of Filters to Limit Forged Address Attacks in Communication Networks -- A Tool for Internet Chatroom Surveillance -- ChatTrack: Chat Room Topic Detection Using Classification -- SECRETS: A Secure Real-Time Multimedia Surveillance System -- Studying E-Mail Graphs for Intelligence Monitoring and Analysis in the Absence of Semantic Information -- THEMIS: Threat Evaluation Metamodel for Information Systems -- Balancing Security and Privacy in the 21 st Century -- IT Security Risk Management under Network Effects and Layered Protection Strategy -- Mind the Gap: The Growing Distance between Institutional and Technical Capabilities in Organizations Performing Critical Operations -- Analyzing and Visualizing Criminal Network Dynamics: A Case Study -- Discovering Hidden Groups in Communication Networks -- Generating Networks of Illegal Drug Users Using Large Samples of Partial Ego-Network Data -- Short Papers -- Using Speech Act Profiling for Deception Detection -- Testing Various Modes of Computer-Based Training for Deception Detection -- The Use of Data Mining Techniques in Operational Crime Fighting -- Spatial Forecast Methods for Terrorist Events in Urban Environments -- Web-Based Intelligence Notification System: Architecture and Design -- Cross-Lingual Semantics for Crime Analysis Using Associate Constraint Network -- Experimental Studies Using Median Polish Procedure to Reduce Alarm Rates in Data Cubes of Intrusion Data -- Information Sharing and Collaboration Policies within Government Agencies -- Intrusion-Tolerant Intrusion Detection System -- Optimal Redundancy Allocation for Disaster Recovery Planning in the Network Economy -- Semantic Analysis for Monitoring Insider Threats -- Towards a Social Network Approach for Monitoring Insider Threats to Information Security -- Extended Abstracts for Posters -- Policy-Based Information Sharing with Semantics -- Determining the Gender of the Unseen Name through Hyphenation -- A Framework for a Secure Federated Patient Healthcare System -- Vulnerability Analysis and Evaluation within an Intranet -- Security Informatics: A Paradigm Shift in Information Technology Education -- Research of Characteristics of Worm Traffic -- Panel Discussion Papers -- MIPT: Sharing Terrorism Information Resources -- Post-9/11 Evolution of Al Qaeda -- Utilizing the Social and Behavioral Sciences to Assess, Model, Forecast and Preemptively Respond to Terrorism. |
Record Nr. | UNISA-996466229103316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Intelligence and Security Informatics : Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004, Proceedings / / edited by Hsinchun Chen, Reagan Moore, Daniel D. Zeng, John Leavitt |
Edizione | [1st ed. 2004.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 |
Descrizione fisica | 1 online resource (XVI, 544 p.) |
Disciplina | 006.3/3 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Artificial intelligence
Application software Information storage and retrieval Operating systems (Computers) Computers and civilization Computers Law and legislation Artificial Intelligence Information Systems Applications (incl. Internet) Information Storage and Retrieval Operating Systems Computers and Society Legal Aspects of Computing |
ISBN |
1-280-30775-7
9786610307753 3-540-25952-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Full Papers -- Aligning Simulation Models of Smallpox Outbreaks -- Data Analytics for Bioterrorism Surveillance -- West Nile Virus and Botulism Portal: A Case Study in Infectious Disease Informatics -- A Novel Policy and Information Flow Security Model for Active Network -- A Novel Autonomous Trust Management Model for Mobile Agents -- Privacy-Preserving Inter-database Operations -- Finding Unusual Correlation Using Matrix Decompositions -- Generating Concept Hierarchies from Text for Intelligence Analysis -- Interactive Query Languages for Intelligence Tasks -- Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism -- The Architecture of the Cornell Knowledge Broker -- Computer-Based Training for Deception Detection: What Users Want? -- Identifying Multi-ID Users in Open Forums -- Self-efficacy, Training Effectiveness, and Deception Detection: A Longitudinal Study of Lie Detection Training -- Composite Role-Based Monitoring (CRBM) for Countering Insider Threats -- Critical Infrastructure Integration Modeling and Simulation -- Mining Normal and Intrusive Activity Patterns for Computer Intrusion Detection -- The Optimal Deployment of Filters to Limit Forged Address Attacks in Communication Networks -- A Tool for Internet Chatroom Surveillance -- ChatTrack: Chat Room Topic Detection Using Classification -- SECRETS: A Secure Real-Time Multimedia Surveillance System -- Studying E-Mail Graphs for Intelligence Monitoring and Analysis in the Absence of Semantic Information -- THEMIS: Threat Evaluation Metamodel for Information Systems -- Balancing Security and Privacy in the 21 st Century -- IT Security Risk Management under Network Effects and Layered Protection Strategy -- Mind the Gap: The Growing Distance between Institutional and Technical Capabilities in Organizations Performing Critical Operations -- Analyzing and Visualizing Criminal Network Dynamics: A Case Study -- Discovering Hidden Groups in Communication Networks -- Generating Networks of Illegal Drug Users Using Large Samples of Partial Ego-Network Data -- Short Papers -- Using Speech Act Profiling for Deception Detection -- Testing Various Modes of Computer-Based Training for Deception Detection -- The Use of Data Mining Techniques in Operational Crime Fighting -- Spatial Forecast Methods for Terrorist Events in Urban Environments -- Web-Based Intelligence Notification System: Architecture and Design -- Cross-Lingual Semantics for Crime Analysis Using Associate Constraint Network -- Experimental Studies Using Median Polish Procedure to Reduce Alarm Rates in Data Cubes of Intrusion Data -- Information Sharing and Collaboration Policies within Government Agencies -- Intrusion-Tolerant Intrusion Detection System -- Optimal Redundancy Allocation for Disaster Recovery Planning in the Network Economy -- Semantic Analysis for Monitoring Insider Threats -- Towards a Social Network Approach for Monitoring Insider Threats to Information Security -- Extended Abstracts for Posters -- Policy-Based Information Sharing with Semantics -- Determining the Gender of the Unseen Name through Hyphenation -- A Framework for a Secure Federated Patient Healthcare System -- Vulnerability Analysis and Evaluation within an Intranet -- Security Informatics: A Paradigm Shift in Information Technology Education -- Research of Characteristics of Worm Traffic -- Panel Discussion Papers -- MIPT: Sharing Terrorism Information Resources -- Post-9/11 Evolution of Al Qaeda -- Utilizing the Social and Behavioral Sciences to Assess, Model, Forecast and Preemptively Respond to Terrorism. |
Record Nr. | UNINA-9910144163703321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Internetrecht [[electronic resource] ] : Grundlagen - Streitfragen - Aktuelle Entwicklungen / / von Sven Hetmank |
Autore | Hetmank Sven |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Wiesbaden : , : Springer Fachmedien Wiesbaden : , : Imprint : Springer Vieweg, , 2016 |
Descrizione fisica | 1 online resource (214 p.) |
Disciplina | 340 |
Collana | Springer Lehrbuch Internetrecht |
Soggetto topico |
Mass media
Law Civil law Criminal law Computers Law and legislation IT Law, Media Law, Intellectual Property Civil Law Criminal Law and Criminal Procedure Law Legal Aspects of Computing |
ISBN | 3-658-08976-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | ger |
Nota di contenuto | Grundlagen -- Gerichtszuständigkeiten und Anwendbares Recht bei grenzüberschreitenden Rechtsverletzungen im Internet -- Domainrecht -- Marken- und namensrechtliche Ansprüche von und gegen Domaininhaber -- Wettbewerbsverstöße durch Registrierung und Verwendung von Domains -- Informationspflichten im Internet und Vertragsabschlüsse im Internet -- Werbung im Internet und Beeinflussung von Suchmaschinen -- Urheberrechtsverletzungen im Internet -- Datenschutz, Persönlichkeitsrecht und Jugendmedienschutz im Internet -- Verantwortlichkeit von Diensteanbietern für das Handeln Dritter im Internet und Haftung für Links, Frames und für den Missbrauch von Benutzerkonten oder des Internetanschlusses. |
Record Nr. | UNINA-9910484459303321 |
Hetmank Sven | ||
Wiesbaden : , : Springer Fachmedien Wiesbaden : , : Imprint : Springer Vieweg, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Internetrecht im E-Commerce [[electronic resource] /] / von Bert Eichhorn, Björn Heinze, Gerrit Tamm, Ralph Schuhmann |
Autore | Eichhorn Bert |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer Vieweg, , 2016 |
Descrizione fisica | 1 online resource (XVII, 216 S. 8 Abb.) |
Disciplina | 343.4309944 |
Collana | Xpert.press |
Soggetto topico |
E-commerce
Computers Law and legislation International law Trade Economics Management science e-Commerce/e-business Legal Aspects of Computing International Economic Law, Trade Law Economics, general |
ISBN | 3-662-45308-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | ger |
Nota di contenuto | Einführung -- Telemedien -- Datenschutzrecht -- Marken- und Namensrecht -- Urheberrecht und Persönlichkeitsrechte -- Wettbewerbsrecht -- Literaturverzeichnis -- Index. |
Record Nr. | UNINA-9910484995603321 |
Eichhorn Bert | ||
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer Vieweg, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Ireland : : Financial Sector Assessment Program: Technical Note-Update on the Assessment of Implementation of the IOSCO Objectives and Principles of Securities Regulation |
Pubbl/distr/stampa | Washington, D.C. : , : International Monetary Fund, , 2016 |
Descrizione fisica | 1 online resource (47 pages) : illustrations, tables |
Disciplina | 332.09417 |
Collana | IMF Staff Country Reports |
Soggetto topico |
Banks and banking, Central - Ireland
Securities - State supervision - Ireland Banks and Banking Finance: General Industries: Financial Services Investments: General Banks Depository Institutions Micro Finance Institutions Mortgages Pension Funds Non-bank Financial Institutions Financial Instruments Institutional Investors Financial Institutions and Services: Government Policy and Regulation General Financial Markets: General (includes Measurement and Data) Investment Capital Intangible Capital Capacity Banking Finance Investment & securities Macroeconomics Mutual funds Financial instruments Financial services Shadow banking Financial institutions Securities Private investment National accounts Banks and banking Financial services industry Nonbank financial institutions Law and legislation Saving and investment |
ISBN | 1-4755-4267-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910136699303321 |
Washington, D.C. : , : International Monetary Fund, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Ireland : : Financial Sector Assessment Program: Technical Note-Asset Management and Financial Stability |
Pubbl/distr/stampa | Washington, D.C. : , : International Monetary Fund, , 2016 |
Descrizione fisica | 1 online resource (27 pages) : illustrations, tables |
Disciplina | 332.10681 |
Collana | IMF Staff Country Reports |
Soggetto topico |
Asset-liability management - Ireland
Financial risk management - Ireland Banks and Banking Financial Risk Management Industries: Financial Services Investments: Bonds Investments: General International Financial Markets Banks Depository Institutions Micro Finance Institutions Mortgages Pension Funds Non-bank Financial Institutions Financial Instruments Institutional Investors General Financial Markets: General (includes Measurement and Data) Finance Banking Investment & securities Asset management Mutual funds Shadow banking Hedge funds Asset and liability management Financial institutions Bonds Securities Asset-liability management Banks and banking Nonbank financial institutions Law and legislation Financial services industry Financial instruments |
ISBN | 1-4755-4280-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910136698803321 |
Washington, D.C. : , : International Monetary Fund, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Is One Watchdog Better Than Three? International Experience with Integrated Financial Sector Supervision / / Martin Cihak, Richard Podpiera |
Autore | Cihak Martin |
Pubbl/distr/stampa | Washington, D.C. : , : International Monetary Fund, , 2006 |
Descrizione fisica | 1 online resource (32 p.) |
Altri autori (Persone) | PodpieraRichard |
Collana | IMF Working Papers |
Soggetto topico |
Banks and banking - State supervision
Financial services industry - Regulation - State supervision Banks and Banking Finance: General Industries: Financial Services Business and Financial General Financial Markets: Government Policy and Regulation Banks Depository Institutions Micro Finance Institutions Mortgages Financial Institutions and Services: Government Policy and Regulation Financial Institutions and Services: General Financial services law & regulation Banking Bank supervision Financial sector Basel Core Principles Financial regulation and supervision Banks and banking State supervision Financial services industry Law and legislation |
ISBN |
1-4623-4779-7
1-4527-4510-2 1-283-51553-9 1-4519-0853-9 9786613827982 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | ""Contents""; ""I. INTRODUCTION""; ""II. TRENDS IN INTEGRATED SUPERVISION""; ""III. REVIEW OF LITERATURE ON INTEGRATED FINANCIAL SUPERVISION""; ""IV. ANALYSIS OF INTERNATIONAL EXPERIENCE WITH INTEGRATED SUPERVISION""; ""V. CONCLUSIONS""; ""REFERENCES"" |
Record Nr. | UNINA-9910788405603321 |
Cihak Martin | ||
Washington, D.C. : , : International Monetary Fund, , 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Is One Watchdog Better Than Three? International Experience with Integrated Financial Sector Supervision / / Martin Cihak, Richard Podpiera |
Autore | Cihak Martin |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Washington, D.C. : , : International Monetary Fund, , 2006 |
Descrizione fisica | 1 online resource (32 p.) |
Altri autori (Persone) | PodpieraRichard |
Collana | IMF Working Papers |
Soggetto topico |
Banks and banking - State supervision
Financial services industry - Regulation - State supervision Banks and Banking Finance: General Industries: Financial Services Business and Financial General Financial Markets: Government Policy and Regulation Banks Depository Institutions Micro Finance Institutions Mortgages Financial Institutions and Services: Government Policy and Regulation Financial Institutions and Services: General Financial services law & regulation Banking Bank supervision Financial sector Basel Core Principles Financial regulation and supervision Banks and banking State supervision Financial services industry Law and legislation |
ISBN |
1-4623-4779-7
1-4527-4510-2 1-283-51553-9 1-4519-0853-9 9786613827982 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | ""Contents""; ""I. INTRODUCTION""; ""II. TRENDS IN INTEGRATED SUPERVISION""; ""III. REVIEW OF LITERATURE ON INTEGRATED FINANCIAL SUPERVISION""; ""IV. ANALYSIS OF INTERNATIONAL EXPERIENCE WITH INTEGRATED SUPERVISION""; ""V. CONCLUSIONS""; ""REFERENCES"" |
Record Nr. | UNINA-9910810751303321 |
Cihak Martin | ||
Washington, D.C. : , : International Monetary Fund, , 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
IT-GRC-Management – Governance, Risk und Compliance [[electronic resource] ] : Grundlagen und Anwendungen / / herausgegeben von Matthias Knoll, Susanne Strahringer |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Wiesbaden : , : Springer Fachmedien Wiesbaden : , : Imprint : Springer Vieweg, , 2017 |
Descrizione fisica | 1 online resource (XV, 234 S. 40 Abb., 22 Abb. in Farbe.) |
Disciplina | 005.74 |
Collana | Edition HMD |
Soggetto topico |
Management information systems
Computer science Data protection Computer security Computers Law and legislation Information technology Business—Data processing Management of Computing and Information Systems Security Systems and Data Security Legal Aspects of Computing IT in Business |
ISBN | 3-658-20059-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | ger |
Nota di contenuto | IT-GRC-Management und Digitalisierung -- Governance und Compliance im Detail -- Business-IT-Alignment -- Business-IT.-Integration -- Rahmenwerke und Vorgaben -- IT-Risikodifferenzierung -- Risiken der Industrie 4.0 -- Schatten-IT -- Digitalisierung in KMU -- Datenschutzanforderungen. |
Record Nr. | UNINA-9910481956303321 |
Wiesbaden : , : Springer Fachmedien Wiesbaden : , : Imprint : Springer Vieweg, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|