Critical Infrastructure Protection XIII [[electronic resource] ] : 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11–12, 2019, Revised Selected Papers / / edited by Jason Staggs, Sujeet Shenoi |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XVI, 328 p. 1 illus.) |
Disciplina | 005.8 |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Computer security
Data protection Computers Law and legislation Computer communication systems Software engineering Application software Systems and Data Security Security Legal Aspects of Computing Computer Communication Networks Software Engineering Information Systems Applications (incl. Internet) |
ISBN | 3-030-34647-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910357849303321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber Security Cryptography and Machine Learning [[electronic resource] ] : Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedings / / edited by Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XIII, 330 p. 141 illus., 76 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Computer networks - Security measures Data encryption (Computer science) Computers Law and legislation Computers and civilization Systems and Data Security Computer Communication Networks Mobile and Network Security Cryptology Legal Aspects of Computing Computers and Society |
ISBN | 3-030-20951-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996466330703316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cyber Security Cryptography and Machine Learning [[electronic resource] ] : Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedings / / edited by Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XIII, 330 p. 141 illus., 76 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Computer networks - Security measures Data encryption (Computer science) Computers Law and legislation Computers and civilization Systems and Data Security Computer Communication Networks Mobile and Network Security Cryptology Legal Aspects of Computing Computers and Society |
ISBN | 3-030-20951-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910337850903321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cybersecurity in France [[electronic resource] /] / by Philippe Baumard |
Autore | Baumard Philippe |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (IX, 106 p. 12 illus.) |
Disciplina | 343.0999 |
Collana | SpringerBriefs in Cybersecurity |
Soggetto topico |
Computers
Law and legislation Legal Aspects of Computing |
ISBN | 3-319-54308-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- A Brief History of Hacking and Cyberdefense -- The Determinants of a National Cyber-strategy -- National Cyberdoctrines: Forthcoming Strategic Shifts -- Conclusion. |
Record Nr. | UNINA-9910254822003321 |
Baumard Philippe
![]() |
||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cybersecurity in Israel [[electronic resource] /] / by Lior Tabansky, Isaac Ben Israel |
Autore | Tabansky Lior |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (84 p.) |
Disciplina | 005.8 |
Collana | SpringerBriefs in Cybersecurity |
Soggetto topico |
Computers
Law and legislation Political science Economic policy Computer security Legal Aspects of Computing Political Science R & D/Technology Policy Systems and Data Security |
ISBN | 3-319-18986-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Foreword -- List of Abbreviations -- Introduction -- Geopolitics and Israeli Strategy -- The National Innovation Ecosystem of Israel -- Mid 1990’s: The Prequel for National Cybersecurity Policy -- The Israeli National Cybersecurity Policy Focuses on Critical Infrastructure Protection (CIP) -- Seeking Cyberpower: The National Cyber Initiative, 2010 -- The National Cyber-Strategy of Israel and the INCB -- Towards Comprehensive National Cybersecurity -- Striking with Bits? The IDF and Cyber-Warfare -- Conclusion. |
Record Nr. | UNINA-9910299199903321 |
Tabansky Lior
![]() |
||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cybersecurity in Nigeria [[electronic resource] ] : A Case Study of Surveillance and Prevention of Digital Crime / / by Aamo Iorliam |
Autore | Iorliam Aamo |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (68 pages) |
Disciplina | 005.8 |
Collana | SpringerBriefs in Cybersecurity |
Soggetto topico |
Computer networks - Security measures
Computer crimes Africa—Economic conditions Computer communication systems Biometrics (Biology) Computers Law and legislation Mobile and Network Security Cybercrime African Economics Computer Communication Networks Biometrics Legal Aspects of Computing |
ISBN | 3-030-15210-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Natural Laws (Benford’s Law and Zipf’s Law) for Network Traffic Analysis -- Combination of Natural Laws (Benford’s Law and Zipf’s Law) for Fake News Detection -- Cybersecurity and Mobile Device Forensic -- Proposed Digital Surveillance Software. |
Record Nr. | UNINA-9910337578403321 |
Iorliam Aamo
![]() |
||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cybersecurity in Switzerland [[electronic resource] /] / by Myriam Dunn Cavelty |
Autore | Dunn Cavelty Myriam |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (81 p.) |
Disciplina | 005.82 |
Collana | SpringerBriefs in Cybersecurity |
Soggetto topico |
Computers
Law and legislation Public international law Criminology Computer security Legal Aspects of Computing Public International Law Criminology and Criminal Justice, general Systems and Data Security |
ISBN | 3-319-10620-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Foreword -- List of Abbreviations -- Introduction -- Global Cyber-security Policy Evolution -- Phase 1: The Four Pillar Model for Information Assurance (1997-2004) -- Phase 2: Reporting and Analysis Center for Information Assurance (MELANI) (2004-2010) -- Phase 3: Consolidation and Cyber-Risk Strategy (2011-2014) -- Conclusion. |
Record Nr. | UNINA-9910298983003321 |
Dunn Cavelty Myriam
![]() |
||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyberspace Safety and Security [[electronic resource] ] : 10th International Symposium, CSS 2018, Amalfi, Italy, October 29–31, 2018, Proceedings / / edited by Arcangelo Castiglione, Florin Pop, Massimo Ficco, Francesco Palmieri |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XI, 327 p. 121 illus.) |
Disciplina | 613.71 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computers and civilization Application software Artificial intelligence Data encryption (Computer science) Computers Law and legislation Systems and Data Security Computers and Society Information Systems Applications (incl. Internet) Artificial Intelligence Cryptology Legal Aspects of Computing |
ISBN | 3-030-01689-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cybersecurity -- Cryptography, data security, and biometric techniques -- Social security, ontologies, and smart applications. |
Record Nr. | UNINA-9910349398003321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyberspace Safety and Security [[electronic resource] ] : 10th International Symposium, CSS 2018, Amalfi, Italy, October 29–31, 2018, Proceedings / / edited by Arcangelo Castiglione, Florin Pop, Massimo Ficco, Francesco Palmieri |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XI, 327 p. 121 illus.) |
Disciplina | 613.71 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computers and civilization Application software Artificial intelligence Data encryption (Computer science) Computers Law and legislation Systems and Data Security Computers and Society Information Systems Applications (incl. Internet) Artificial Intelligence Cryptology Legal Aspects of Computing |
ISBN | 3-030-01689-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cybersecurity -- Cryptography, data security, and biometric techniques -- Social security, ontologies, and smart applications. |
Record Nr. | UNISA-996466461003316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Data and Applications Security and Privacy XXX [[electronic resource] ] : 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings / / edited by Silvio Ranise, Vipin Swarup |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XI, 365 p. 89 illus.) |
Disciplina | 025.04 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Information storage and retrieval
Computer security Data encryption (Computer science) Computers and civilization Computers Law and legislation Information Storage and Retrieval Systems and Data Security Cryptology Computers and Society Legal Aspects of Computing |
ISBN | 3-319-41483-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Mobile security and privacy -- Security and privacy in databases -- Access Control -- Protection and privacy of data and big data -- Security and privacy in social networks and collaborative systems -- Reasoning about security and its cost. |
Record Nr. | UNINA-9910484677003321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|