Big Data – BigData 2019 [[electronic resource] ] : 8th International Congress, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25–30, 2019, Proceedings / / edited by Keke Chen, Sangeetha Seshadri, Liang-Jie Zhang |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (IX, 137 p. 67 illus., 48 illus. in color.) |
Disciplina | 005.7 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Big data
Computers Computer organization Artificial intelligence Data protection Big Data Information Systems and Communication Service Computer Systems Organization and Communication Networks Artificial Intelligence Theory of Computation Security |
ISBN | 3-030-23551-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Big Data Models and Algorithms -- Big Data Architectures -- Big Data Management -- Big Data Protection, Integrity and Privacy -- Security Applications of Big Data -- Big Data Search and Mining -- Big Data for Enterprise, Government and Society. |
Record Nr. | UNINA-9910337836803321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Binary Code Fingerprinting for Cybersecurity [[electronic resource] ] : Application to Malicious Code Fingerprinting / / by Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna |
Autore | Alrabaee Saed |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (XXI, 247 p. 77 illus., 31 illus. in color.) |
Disciplina | 005.8 |
Collana | Advances in Information Security |
Soggetto topico |
Data protection
Biometrics (Biology) Computer crimes Security Biometrics Cybercrime |
ISBN | 3-030-34238-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1 Introduction -- 2 Binary Analysis Overview -- 3 Compiler Provenance Attribution -- 4 Library Function Identification -- 5 Identifying Reused Functions in Binary Code -- 6 Function Fingerprinting -- 7 Free Open-Source Software Fingerprinting -- 8 Clone Detection -- 9 Authorship Attribution -- 10 Conclusion. |
Record Nr. | UNINA-9910380747403321 |
Alrabaee Saed | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Binary Code Fingerprinting for Cybersecurity [[electronic resource] ] : Application to Malicious Code Fingerprinting / / by Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna |
Autore | Alrabaee Saed |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (XXI, 247 p. 77 illus., 31 illus. in color.) |
Disciplina | 005.8 |
Collana | Advances in Information Security |
Soggetto topico |
Data protection
Biometrics (Biology) Computer crimes Security Biometrics Cybercrime |
ISBN | 3-030-34238-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1 Introduction -- 2 Binary Analysis Overview -- 3 Compiler Provenance Attribution -- 4 Library Function Identification -- 5 Identifying Reused Functions in Binary Code -- 6 Function Fingerprinting -- 7 Free Open-Source Software Fingerprinting -- 8 Clone Detection -- 9 Authorship Attribution -- 10 Conclusion. |
Record Nr. | UNISA-996465453903316 |
Alrabaee Saed | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Blockchain Cybersecurity, Trust and Privacy [[electronic resource] /] / edited by Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza M. Parizi |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (VI, 290 p. 111 illus., 93 illus. in color.) |
Disciplina | 005.824 |
Collana | Advances in Information Security |
Soggetto topico |
Data protection
Computers Artificial intelligence Computer communication systems Security Information Systems and Communication Service Artificial Intelligence Computer Communication Networks |
ISBN | 3-030-38181-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1- Blockchain in Cybersecurity Realm: An Overview -- Chapter 2- Capability-based Non-Fungible Tokens Approach for a Decentralized AAA Framework in IoT -- Chapter 3 - IoT Security, Privacy and Trust in Home-Sharing Economy via Blockchain -- Chapter 4 - Scrybe: A 2nd-Generation Blockchain Technology with Lightweight Mining for Secure Provenance and Related Applications -- Chapter 5 - Blockchain for Efficient Public Key Infrastructure and Fault-Tolerant Distributed Consensus -- Chapter 6 - Secure blockchain-based traffic load balancing using edge computing and reinforcement learning -- Chapter 7- Blockchain Applications in Power Systems: A Bibliometric Analysis -- Chapter 8 - A Systematic Literature Review of Integration of Blockchain and Artificial Intelligence -- Chapter 9 - The Future of Blockchain Technology in Healthcare Internet of Things Security -- Chapter 10 - Secure Healthcare Framework using Blockchain and Public Key Cryptography -- Chapter 11 - Public Blockchains Scalability: An Examination of Sharding and Segregated Witness -- Chapter 12 - Immutable and Secure IP Address Protection using Blockchain -- Chapter 13- On the Application of Financial Security Standards in Blockchain Platforms -- Chapter 14 - Blockchain-based Certification for Education, Employment, and Skill with Incentive Mechanism. |
Record Nr. | UNINA-9910410057403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Blockchain Cybersecurity, Trust and Privacy [[electronic resource] /] / edited by Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza M. Parizi |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (VI, 290 p. 111 illus., 93 illus. in color.) |
Disciplina | 005.824 |
Collana | Advances in Information Security |
Soggetto topico |
Data protection
Computers Artificial intelligence Computer communication systems Security Information Systems and Communication Service Artificial Intelligence Computer Communication Networks |
ISBN | 3-030-38181-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1- Blockchain in Cybersecurity Realm: An Overview -- Chapter 2- Capability-based Non-Fungible Tokens Approach for a Decentralized AAA Framework in IoT -- Chapter 3 - IoT Security, Privacy and Trust in Home-Sharing Economy via Blockchain -- Chapter 4 - Scrybe: A 2nd-Generation Blockchain Technology with Lightweight Mining for Secure Provenance and Related Applications -- Chapter 5 - Blockchain for Efficient Public Key Infrastructure and Fault-Tolerant Distributed Consensus -- Chapter 6 - Secure blockchain-based traffic load balancing using edge computing and reinforcement learning -- Chapter 7- Blockchain Applications in Power Systems: A Bibliometric Analysis -- Chapter 8 - A Systematic Literature Review of Integration of Blockchain and Artificial Intelligence -- Chapter 9 - The Future of Blockchain Technology in Healthcare Internet of Things Security -- Chapter 10 - Secure Healthcare Framework using Blockchain and Public Key Cryptography -- Chapter 11 - Public Blockchains Scalability: An Examination of Sharding and Segregated Witness -- Chapter 12 - Immutable and Secure IP Address Protection using Blockchain -- Chapter 13- On the Application of Financial Security Standards in Blockchain Platforms -- Chapter 14 - Blockchain-based Certification for Education, Employment, and Skill with Incentive Mechanism. |
Record Nr. | UNISA-996465446403316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Blockchain Technology for Industry 4.0 [[electronic resource] ] : Secure, Decentralized, Distributed and Trusted Industry Environment / / edited by Rodrigo da Rosa Righi, Antonio Marcos Alberti, Madhusudan Singh |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (V, 164 p. 50 illus., 40 illus. in color.) |
Disciplina | 005.824 |
Collana | Blockchain Technologies |
Soggetto topico |
Computer engineering
Internet of things Embedded computer systems Data protection Industrial engineering Production engineering Information technology Business—Data processing Electrical engineering Big data Cyber-physical systems, IoT Security Industrial and Production Engineering IT in Business Communications Engineering, Networks Big Data |
ISBN | 981-15-1137-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. History of Industrial Revolutions: From Homo Sapiens Hunters to Bitcoin Hunters -- 2. Blockchain and Industry 4.0: Overview, Convergence, and Analysis -- 3. Blockchain Technology for Data Management in Industry 4.0 -- 4. Secure Smart Contract Generation based on Petri Nets -- 5. Blockchain for Machine to Machine Interaction in Industry 4.0 -- 6. Blockchain-based Crowdfunding -- 7. Engineering 4.0: Future with disruptive technologies -- 8. The Opportunities of Blockchain in Health 4.0. |
Record Nr. | UNINA-9910373897003321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Broadband Communications, Networks, and Systems [[electronic resource] ] : 9th International EAI Conference, Broadnets 2018, Faro, Portugal, September 19–20, 2018, Proceedings / / edited by Victor Sucasas, Georgios Mantas, Saud Althunibat |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XIII, 474 p. 243 illus., 198 illus. in color.) |
Disciplina | 362 |
Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Soggetto topico |
Computer communication systems
Computers Data structures (Computer science) Data protection Computer Communication Networks Information Systems and Communication Service Data Structures and Information Theory Security |
ISBN | 3-030-05195-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Advanced Techniques for IoT and WSNs -- SDN and Network Virtualization -- Health and Telemedicine Mobile Applications -- Security and Privacy Preservation -- Communication Reliability and Protocols -- Spatial Modulation Techniques -- Hardware Implementation and Antenna Design. |
Record Nr. | UNINA-9910337848903321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Bug Bounty Hunting for Web Security : find and exploit vulnerabilities in Web sites and Applications / / by Sanjib Sinha |
Autore | Sinha Sanjib |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2019 |
Descrizione fisica | 1 online resource (XVI, 225 p. 140 illus.) |
Disciplina | 005.8 |
Soggetto topico |
Data protection
Open source software Computer programming Management information systems Security Open Source Enterprise Architecture |
ISBN | 1-4842-5391-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1: Introduction to Hunting Bugs -- Chapter 2: Setting up Your Environment -- Chapter 3: How to inject Request Forgery -- Chapter 4: How to exploit through Cross Site Scripting (XSS) -- Chapter 5: Header Injection and URL Redirection -- Chapter 6: Malicious Files -- Chapter 7: Poisoning Sender Policy Framework (SPF) -- Chapter 8: Injecting Unintended XML -- Chapter 9: Finding Command Injection Vulnerabilities -- Chapter 10: Finding HTML and SQL Injection Vulnerabilities -- Appendix: Further Reading. |
Record Nr. | UNINA-9910357837203321 |
Sinha Sanjib | ||
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Building a Comprehensive IT Security Program [[electronic resource] ] : Practical Guidelines and Best Practices / / by Jeremy Wittkop |
Autore | Wittkop Jeremy |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2016 |
Descrizione fisica | 1 online resource (210 p.) |
Disciplina | 004 |
Soggetto topico |
Data protection
Computer security Data structures (Computer science) Security Systems and Data Security Data Structures and Information Theory |
ISBN | 1-4842-2053-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1: The Problem We Are Facing -- Chapter 2 : Protecting Critical Assets -- Chapter 3: Monetizing Risk -- Chapter 4: Security Intelligence Model -- Chapter 5: Incident Response Planning -- Chapter 6: The People Problem -- Chapter 7: Assigning Accountability -- Chapter 8: Shifting the Paradigm -- Chapter 9: The Definition of Insanity -- Chapter 10: Déjà Vu -- Chapter 11: The Information Security Community -- Chapter 12: Partnering with Governments -- . |
Record Nr. | UNINA-9910254753003321 |
Wittkop Jeremy | ||
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Building a HIPAA-Compliant Cybersecurity Program [[electronic resource] ] : Using NIST 800-30 and CSF to Secure Protected Health Information / / by Eric C. Thompson |
Autore | Thompson Eric C |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2017 |
Descrizione fisica | 1 online resource (XXII, 297 p. 67 illus., 29 illus. in color.) |
Disciplina | 610.289 |
Soggetto topico |
Data protection
Security |
ISBN | 1-4842-3060-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part I: Why Risk Assessment and Analysis -- Chapter 1: Not If, But When -- Chapter 2: Meeting Regulator Expectations -- Chapter 3: Selecting Security Measures -- Part II: Assessing and Analyzing Risk -- Chapter 4: Inventory Your ePHI -- Chapter 5: Who Wants Health Information -- Chapter 6: Weaknesses Waiting to Be Exploited -- Chapter 7: Is It Really This Bad? -- Chapter 8: Increasing Program Maturity -- Chapter 9: Targeted Non-technical Testing -- Chapter 10: Targeted Technical Testing -- Part III: Applying the Results to Everyday Needs -- Chapter 11: Refreshing the Risk Register -- Chapter 12: The Cybersecurity Roadmap -- Part IV: Continuous Improvement -- Chapter 13: Investing for Risk Reduction -- Chapter 14: Third Party-Risk: Beyond the BAA -- Chapter 15: Social Media, BYOD, IOT and Portability -- Chapter 16: Risk Treatment and Management -- Chapter 17: Customizing the Risk Analysis -- Chapter 18: Think Offensively -- Appendix A. NIST CSF Internal Controls -- Appendix B. NIST CSF to HIPAA Crosswalk -- Appendix C: Risk Analysis Templates.- . |
Record Nr. | UNINA-9910254851903321 |
Thompson Eric C | ||
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|