Autonomous Cyber Deception [[electronic resource] ] : Reasoning, Adaptive Planning, and Evaluation of HoneyThings / / edited by Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XVI, 235 p. 79 illus., 65 illus. in color.) |
Disciplina | 005.8 |
Soggetto topico |
Data protection
Computer communication systems Artificial intelligence Application software Security Computer Communication Networks Artificial Intelligence Information Systems Applications (incl. Internet) |
ISBN | 3-030-02110-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1 Using Deep Learning to Generate Relational HoneyData -- 2 Towards Intelligent Cyber Deception Systems -- 3 Honeypot Deception Tactics -- 4 Modeling and Analysis of Deception Games based on Hypergame Theory -- 5 Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception -- 6 CONCEAL: A Strategy Composition for Resilient Cyber Deception - Framework, Metrics and Deployment -- 7 NetShifter - A Comprehensive Multi-Dimensional Network Obfuscation and Deception Solution -- 8 Deception-Enhanced Threat Sensing for Resilient Intrusion Detection -- 9 HONEYSCOPE: IoT Device Protection with Deceptive Network Views -- 10 gExtractor: Automated Extraction of Malware Deception Parameters for Autonomous Cyber Deception -- 11 Malware Deception with Automatic Analysis and Generation of HoneyResource. |
Record Nr. | UNINA-9910337568203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Baltic security and defence review |
Pubbl/distr/stampa | Tartu, Estonia, : Baltic Defence College, 2006-2014 |
Descrizione fisica | 1 online resource |
Soggetto topico |
Defensive (Military science)
Military readiness Baltic States Security Defence policy Military art and science North Atlantic Treaty Organization Collective security International relations |
Soggetto genere / forma | Periodicals. |
ISSN | 1736-3780 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Altri titoli varianti | Baltic security and defense review |
Record Nr. | UNISA-996207428203316 |
Tartu, Estonia, : Baltic Defence College, 2006-2014 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Baltic security and defence review |
Pubbl/distr/stampa | Tartu, Estonia, : Baltic Defence College, 2006-2014 |
Descrizione fisica | 1 online resource |
Soggetto topico |
Defensive (Military science)
Military readiness Baltic States Security Defence policy Military art and science North Atlantic Treaty Organization Collective security International relations |
Soggetto genere / forma | Periodicals. |
ISSN | 1736-3780 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Altri titoli varianti | Baltic security and defense review |
Record Nr. | UNINA-9910144514103321 |
Tartu, Estonia, : Baltic Defence College, 2006-2014 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Beginning Ethical Hacking with Kali Linux [[electronic resource] ] : Computational Techniques for Resolving Security Issues / / by Sanjib Sinha |
Autore | Sinha Sanjib |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2018 |
Descrizione fisica | 1 online resource (426 pages) |
Disciplina | 005.3 |
Soggetto topico |
Data protection
Open source software Computer programming Computer security Security Open Source Systems and Data Security |
ISBN | 1-4842-3891-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 01: Security Trends: Past and Present -- Chapter 02: Why VirtualBox is a Solution -- Chapter 03: Elementary Linux Commands -- Chapter 04: Know Your Network -- Chapter 05: How to Build a Kali Web Server -- Chapter 06: Kali Linux Inside-Out -- Chapter 07: Kali and Python -- Chapter 08: Information Gathering -- Chapter 09: SQL Mapping -- Chapter 10: Vulnerability Analysis -- Chapter 11: Information Assurance Model -- Chapter 12: Metaspoilt in Kali Linux -- Chapter 13: Hashes and Passwords -- Chapter 14: Classical and Modern encryption -- Chapter 15: Exploiting Remote Targets. |
Record Nr. | UNINA-9910300743403321 |
Sinha Sanjib
![]() |
||
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Beginning Ethical Hacking with Python [[electronic resource] /] / by Sanjib Sinha |
Autore | Sinha Sanjib |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2017 |
Descrizione fisica | 1 online resource (XIX, 201 p. 22 illus. in color.) |
Disciplina | 005.133 |
Soggetto topico |
Python (Computer program language)
Data protection Computer security Data encryption (Computer science) Python Security Systems and Data Security Cryptology |
ISBN | 1-4842-2541-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter - 1. Legal Side of Hacking -- Chapter - 2. Hacking Environment -- Chapter - 3. What Is VirtualBox? -- Chapter - 4. Install Kali Linux & Other OS in VB Chapter - 5. Linux Terminals and Basic Functionalities -- Chapter 6 – Role of Python in Ethical Hacking -- Chapter 7 - Python environment -- Chapter 8 – General Syntaxes -- Chapter 9 – Variables, Objects and Values.-l Chapter 10 - Conditionals Chapter 11 – How Loops Make Your Life Easier -- Chapter 12 - Regular Expressions Chapter 13 – Exceptions, Catching Errors -- Chapter 14 - Functions -- Chapter 15 - Classes -- Chapter 16 - String Methods -- Chapter 17 - File Input and Output -- Chapter 18 - Containers -- Chapter 19 – Database -- Chapter 20 - Module -- Chapter 21 – Debugging, UnitTest Module -- Chapter 22 - Socket and Networking Chapter 23 – Importing Nmap Module -- Chapter 24 – Building an Nmap Network Scanner Chapter 25 - Protect Your Anonymity on Internet -- Chapter 26 – Dark Web and Tor Chapter 27 - Proxy Chains -- Chapter 28 – VPN -- Chapter 29 - Mac Address. |
Record Nr. | UNINA-9910156184003321 |
Sinha Sanjib
![]() |
||
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Beginning Security with Microsoft Technologies [[electronic resource] ] : Protecting Office 365, Devices, and Data / / by Vasantha Lakshmi |
Autore | Lakshmi Vasantha |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2019 |
Descrizione fisica | 1 online resource (244 pages) : illustrations |
Disciplina | 004.165 |
Soggetto topico |
Microsoft software
Microsoft .NET Framework Data protection Microsoft and .NET Security |
ISBN | 1-4842-4853-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1: Current Security Outline -- Chapter 2: Securing Email and Office 365 -- Chapter 3: Device Level Security -- Chapter 4: Identity Protection -- Chapter 5: Data Protection. |
Record Nr. | UNINA-9910338229603321 |
Lakshmi Vasantha
![]() |
||
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Beschaffung unter Berücksichtigung der IT-Sicherheit [[electronic resource] ] : Wichtigkeit, Herausforderungen und Maßnahmen / / von Ernst Piller |
Autore | Piller Ernst |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Wiesbaden : , : Springer Fachmedien Wiesbaden : , : Imprint : Springer Vieweg, , 2017 |
Descrizione fisica | 1 online resource (XIII, 58 S. 4 Abb.) |
Disciplina | 005.8 |
Collana | essentials |
Soggetto topico |
Computer security
Data protection Computer hardware Open source software Computer programming Operating systems (Computers) Systems and Data Security Security Computer Hardware Open Source Operating Systems |
ISBN | 3-658-18599-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | ger |
Nota di contenuto | Risikoanalyse, Schutzbedarfsfeststellung und IT-Sicherheitsanforderungen -- Herkunft IT-sicherheitskritischer Komponenten, juristische Aspekte, IT-Sicherheitsgütezeichen -- Vorstellung einer unabhängigen Beschaffungsplattform. |
Record Nr. | UNINA-9910485033603321 |
Piller Ernst
![]() |
||
Wiesbaden : , : Springer Fachmedien Wiesbaden : , : Imprint : Springer Vieweg, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Big Data Privacy Preservation for Cyber-Physical Systems [[electronic resource] /] / by Miao Pan, Jingyi Wang, Sai Mounika Errapotu, Xinyue Zhang, Jiahao Ding, Zhu Han |
Autore | Pan Miao |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (81 pages) |
Disciplina | 005.8 |
Collana | SpringerBriefs in Electrical and Computer Engineering |
Soggetto topico |
Wireless communication systems
Mobile communication systems Data protection Electrical engineering Wireless and Mobile Communication Security Communications Engineering, Networks |
ISBN | 3-030-13370-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1 Cyber-Physical Systems -- Chapter 2 Preliminaries -- Chapter 3 Spectrum Trading with Secondary Users' Privacy Protection -- Chapter 4 Optimization for Utility Providers with Privacy Preservation of Users' Energy Profile -- Chapter 5 Caching with Users' Differential Privacy Preservation in Information-Centric Networks -- Chapter 6 Clock Auction Inspired Privacy Preservation in Colocation Data Centers. |
Record Nr. | UNINA-9910337632303321 |
Pan Miao
![]() |
||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation [[electronic resource] /] / by Sergei Petrenko |
Autore | Petrenko Sergei |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XXVII, 249 p. 93 illus.) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Data protection Big data Security, International Systems and Data Security Security Big Data/Analytics International Security Studies |
ISBN | 3-319-79036-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1 Cyberspace as a potential source of threats to critical infrastructure and information infrastructure of the country as a whole -- 2 Capacity limit of state and corporate centers for responding to computer security incidents, CERT / CSIRT -- 3 Creation of ultra-high productivity supercomputer technologies for monitoring the Russian Federation cyberspace. The problem of organizing exascale computing -- 4 Necessity and general opportunity to create a national cyber-attack early warning cognitive system -- Conclusion. |
Record Nr. | UNINA-9910299262703321 |
Petrenko Sergei
![]() |
||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Big Data – BigData 2019 [[electronic resource] ] : 8th International Congress, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25–30, 2019, Proceedings / / edited by Keke Chen, Sangeetha Seshadri, Liang-Jie Zhang |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (IX, 137 p. 67 illus., 48 illus. in color.) |
Disciplina | 005.7 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Big data
Computers Computer organization Artificial intelligence Data protection Big Data Information Systems and Communication Service Computer Systems Organization and Communication Networks Artificial Intelligence Theory of Computation Security |
ISBN | 3-030-23551-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Big Data Models and Algorithms -- Big Data Architectures -- Big Data Management -- Big Data Protection, Integrity and Privacy -- Security Applications of Big Data -- Big Data Search and Mining -- Big Data for Enterprise, Government and Society. |
Record Nr. | UNISA-996466324603316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|