top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Autonomous Cyber Deception [[electronic resource] ] : Reasoning, Adaptive Planning, and Evaluation of HoneyThings / / edited by Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang
Autonomous Cyber Deception [[electronic resource] ] : Reasoning, Adaptive Planning, and Evaluation of HoneyThings / / edited by Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XVI, 235 p. 79 illus., 65 illus. in color.)
Disciplina 005.8
Soggetto topico Data protection
Computer communication systems
Artificial intelligence
Application software
Security
Computer Communication Networks
Artificial Intelligence
Information Systems Applications (incl. Internet)
ISBN 3-030-02110-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1 Using Deep Learning to Generate Relational HoneyData -- 2 Towards Intelligent Cyber Deception Systems -- 3 Honeypot Deception Tactics -- 4 Modeling and Analysis of Deception Games based on Hypergame Theory -- 5 Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception -- 6 CONCEAL: A Strategy Composition for Resilient Cyber Deception - Framework, Metrics and Deployment -- 7 NetShifter - A Comprehensive Multi-Dimensional Network Obfuscation and Deception Solution -- 8 Deception-Enhanced Threat Sensing for Resilient Intrusion Detection -- 9 HONEYSCOPE: IoT Device Protection with Deceptive Network Views -- 10 gExtractor: Automated Extraction of Malware Deception Parameters for Autonomous Cyber Deception -- 11 Malware Deception with Automatic Analysis and Generation of HoneyResource.
Record Nr. UNINA-9910337568203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Baltic security and defence review
Baltic security and defence review
Pubbl/distr/stampa Tartu, Estonia, : Baltic Defence College, 2006-2014
Descrizione fisica 1 online resource
Soggetto topico Defensive (Military science)
Military readiness
Baltic States
Security
Defence policy
Military art and science
North Atlantic Treaty Organization
Collective security
International relations
Soggetto genere / forma Periodicals.
ISSN 1736-3780
Formato Materiale a stampa
Livello bibliografico Periodico
Lingua di pubblicazione eng
Altri titoli varianti Baltic security and defense review
Record Nr. UNISA-996207428203316
Tartu, Estonia, : Baltic Defence College, 2006-2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Baltic security and defence review
Baltic security and defence review
Pubbl/distr/stampa Tartu, Estonia, : Baltic Defence College, 2006-2014
Descrizione fisica 1 online resource
Soggetto topico Defensive (Military science)
Military readiness
Baltic States
Security
Defence policy
Military art and science
North Atlantic Treaty Organization
Collective security
International relations
Soggetto genere / forma Periodicals.
ISSN 1736-3780
Formato Materiale a stampa
Livello bibliografico Periodico
Lingua di pubblicazione eng
Altri titoli varianti Baltic security and defense review
Record Nr. UNINA-9910144514103321
Tartu, Estonia, : Baltic Defence College, 2006-2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Beginning Ethical Hacking with Kali Linux [[electronic resource] ] : Computational Techniques for Resolving Security Issues / / by Sanjib Sinha
Beginning Ethical Hacking with Kali Linux [[electronic resource] ] : Computational Techniques for Resolving Security Issues / / by Sanjib Sinha
Autore Sinha Sanjib
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2018
Descrizione fisica 1 online resource (426 pages)
Disciplina 005.3
Soggetto topico Data protection
Open source software
Computer programming
Computer security
Security
Open Source
Systems and Data Security
ISBN 1-4842-3891-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 01: Security Trends: Past and Present -- Chapter 02: Why VirtualBox is a Solution -- Chapter 03: Elementary Linux Commands -- Chapter 04: Know Your Network -- Chapter 05: How to Build a Kali Web Server -- Chapter 06: Kali Linux Inside-Out -- Chapter 07: Kali and Python -- Chapter 08: Information Gathering -- Chapter 09: SQL Mapping -- Chapter 10: Vulnerability Analysis -- Chapter 11: Information Assurance Model -- Chapter 12: Metaspoilt in Kali Linux -- Chapter 13: Hashes and Passwords -- Chapter 14: Classical and Modern encryption -- Chapter 15: Exploiting Remote Targets.
Record Nr. UNINA-9910300743403321
Sinha Sanjib  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Beginning Ethical Hacking with Python [[electronic resource] /] / by Sanjib Sinha
Beginning Ethical Hacking with Python [[electronic resource] /] / by Sanjib Sinha
Autore Sinha Sanjib
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2017
Descrizione fisica 1 online resource (XIX, 201 p. 22 illus. in color.)
Disciplina 005.133
Soggetto topico Python (Computer program language)
Data protection
Computer security
Data encryption (Computer science)
Python
Security
Systems and Data Security
Cryptology
ISBN 1-4842-2541-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter - 1. Legal Side of Hacking -- Chapter - 2. Hacking Environment -- Chapter - 3. What Is VirtualBox? -- Chapter - 4. Install Kali Linux & Other OS in VB Chapter - 5. Linux Terminals and Basic Functionalities -- Chapter 6 – Role of Python in Ethical Hacking -- Chapter 7 - Python environment -- Chapter 8 – General Syntaxes -- Chapter 9 – Variables, Objects and Values.-l Chapter 10 - Conditionals Chapter 11 – How Loops Make Your Life Easier -- Chapter 12 - Regular Expressions Chapter 13 – Exceptions, Catching Errors -- Chapter 14 - Functions -- Chapter 15 - Classes -- Chapter 16 - String Methods -- Chapter 17 - File Input and Output -- Chapter 18 - Containers -- Chapter 19 – Database -- Chapter 20 - Module -- Chapter 21 – Debugging, UnitTest Module -- Chapter 22 - Socket and Networking Chapter 23 – Importing Nmap Module -- Chapter 24 – Building an Nmap Network Scanner Chapter 25 - Protect Your Anonymity on Internet -- Chapter 26 – Dark Web and Tor Chapter 27 - Proxy Chains -- Chapter 28 – VPN -- Chapter 29 - Mac Address.
Record Nr. UNINA-9910156184003321
Sinha Sanjib  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Beginning Security with Microsoft Technologies [[electronic resource] ] : Protecting Office 365, Devices, and Data / / by Vasantha Lakshmi
Beginning Security with Microsoft Technologies [[electronic resource] ] : Protecting Office 365, Devices, and Data / / by Vasantha Lakshmi
Autore Lakshmi Vasantha
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2019
Descrizione fisica 1 online resource (244 pages) : illustrations
Disciplina 004.165
Soggetto topico Microsoft software
Microsoft .NET Framework
Data protection
Microsoft and .NET
Security
ISBN 1-4842-4853-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: Current Security Outline -- Chapter 2: Securing Email and Office 365 -- Chapter 3: Device Level Security -- Chapter 4: Identity Protection -- Chapter 5: Data Protection.
Record Nr. UNINA-9910338229603321
Lakshmi Vasantha  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Beschaffung unter Berücksichtigung der IT-Sicherheit [[electronic resource] ] : Wichtigkeit, Herausforderungen und Maßnahmen / / von Ernst Piller
Beschaffung unter Berücksichtigung der IT-Sicherheit [[electronic resource] ] : Wichtigkeit, Herausforderungen und Maßnahmen / / von Ernst Piller
Autore Piller Ernst
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Wiesbaden : , : Springer Fachmedien Wiesbaden : , : Imprint : Springer Vieweg, , 2017
Descrizione fisica 1 online resource (XIII, 58 S. 4 Abb.)
Disciplina 005.8
Collana essentials
Soggetto topico Computer security
Data protection
Computer hardware
Open source software
Computer programming
Operating systems (Computers)
Systems and Data Security
Security
Computer Hardware
Open Source
Operating Systems
ISBN 3-658-18599-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione ger
Nota di contenuto Risikoanalyse, Schutzbedarfsfeststellung und IT-Sicherheitsanforderungen -- Herkunft IT-sicherheitskritischer Komponenten, juristische Aspekte, IT-Sicherheitsgütezeichen -- Vorstellung einer unabhängigen Beschaffungsplattform.
Record Nr. UNINA-9910485033603321
Piller Ernst  
Wiesbaden : , : Springer Fachmedien Wiesbaden : , : Imprint : Springer Vieweg, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Big Data Privacy Preservation for Cyber-Physical Systems [[electronic resource] /] / by Miao Pan, Jingyi Wang, Sai Mounika Errapotu, Xinyue Zhang, Jiahao Ding, Zhu Han
Big Data Privacy Preservation for Cyber-Physical Systems [[electronic resource] /] / by Miao Pan, Jingyi Wang, Sai Mounika Errapotu, Xinyue Zhang, Jiahao Ding, Zhu Han
Autore Pan Miao
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (81 pages)
Disciplina 005.8
Collana SpringerBriefs in Electrical and Computer Engineering
Soggetto topico Wireless communication systems
Mobile communication systems
Data protection
Electrical engineering
Wireless and Mobile Communication
Security
Communications Engineering, Networks
ISBN 3-030-13370-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1 Cyber-Physical Systems -- Chapter 2 Preliminaries -- Chapter 3 Spectrum Trading with Secondary Users' Privacy Protection -- Chapter 4 Optimization for Utility Providers with Privacy Preservation of Users' Energy Profile -- Chapter 5 Caching with Users' Differential Privacy Preservation in Information-Centric Networks -- Chapter 6 Clock Auction Inspired Privacy Preservation in Colocation Data Centers.
Record Nr. UNINA-9910337632303321
Pan Miao  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation [[electronic resource] /] / by Sergei Petrenko
Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation [[electronic resource] /] / by Sergei Petrenko
Autore Petrenko Sergei
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XXVII, 249 p. 93 illus.)
Disciplina 005.8
Soggetto topico Computer security
Data protection
Big data
Security, International
Systems and Data Security
Security
Big Data/Analytics
International Security Studies
ISBN 3-319-79036-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1 Cyberspace as a potential source of threats to critical infrastructure and information infrastructure of the country as a whole -- 2 Capacity limit of state and corporate centers for responding to computer security incidents, CERT / CSIRT -- 3 Creation of ultra-high productivity supercomputer technologies for monitoring the Russian Federation cyberspace. The problem of organizing exascale computing -- 4 Necessity and general opportunity to create a national cyber-attack early warning cognitive system -- Conclusion.
Record Nr. UNINA-9910299262703321
Petrenko Sergei  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Big Data – BigData 2019 [[electronic resource] ] : 8th International Congress, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25–30, 2019, Proceedings / / edited by Keke Chen, Sangeetha Seshadri, Liang-Jie Zhang
Big Data – BigData 2019 [[electronic resource] ] : 8th International Congress, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25–30, 2019, Proceedings / / edited by Keke Chen, Sangeetha Seshadri, Liang-Jie Zhang
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (IX, 137 p. 67 illus., 48 illus. in color.)
Disciplina 005.7
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Big data
Computers
Computer organization
Artificial intelligence
Data protection
Big Data
Information Systems and Communication Service
Computer Systems Organization and Communication Networks
Artificial Intelligence
Theory of Computation
Security
ISBN 3-030-23551-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Big Data Models and Algorithms -- Big Data Architectures -- Big Data Management -- Big Data Protection, Integrity and Privacy -- Security Applications of Big Data -- Big Data Search and Mining -- Big Data for Enterprise, Government and Society.
Record Nr. UNISA-996466324603316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui