top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Big Data – BigData 2019 [[electronic resource] ] : 8th International Congress, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25–30, 2019, Proceedings / / edited by Keke Chen, Sangeetha Seshadri, Liang-Jie Zhang
Big Data – BigData 2019 [[electronic resource] ] : 8th International Congress, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25–30, 2019, Proceedings / / edited by Keke Chen, Sangeetha Seshadri, Liang-Jie Zhang
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (IX, 137 p. 67 illus., 48 illus. in color.)
Disciplina 005.7
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Big data
Computers
Computer organization
Artificial intelligence
Data protection
Big Data
Information Systems and Communication Service
Computer Systems Organization and Communication Networks
Artificial Intelligence
Theory of Computation
Security
ISBN 3-030-23551-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Big Data Models and Algorithms -- Big Data Architectures -- Big Data Management -- Big Data Protection, Integrity and Privacy -- Security Applications of Big Data -- Big Data Search and Mining -- Big Data for Enterprise, Government and Society.
Record Nr. UNINA-9910337836803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Binary Code Fingerprinting for Cybersecurity [[electronic resource] ] : Application to Malicious Code Fingerprinting / / by Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna
Binary Code Fingerprinting for Cybersecurity [[electronic resource] ] : Application to Malicious Code Fingerprinting / / by Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna
Autore Alrabaee Saed
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XXI, 247 p. 77 illus., 31 illus. in color.)
Disciplina 005.8
Collana Advances in Information Security
Soggetto topico Data protection
Biometrics (Biology)
Computer crimes
Security
Biometrics
Cybercrime
ISBN 3-030-34238-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1 Introduction -- 2 Binary Analysis Overview -- 3 Compiler Provenance Attribution -- 4 Library Function Identification -- 5 Identifying Reused Functions in Binary Code -- 6 Function Fingerprinting -- 7 Free Open-Source Software Fingerprinting -- 8 Clone Detection -- 9 Authorship Attribution -- 10 Conclusion.
Record Nr. UNINA-9910380747403321
Alrabaee Saed  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Binary Code Fingerprinting for Cybersecurity [[electronic resource] ] : Application to Malicious Code Fingerprinting / / by Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna
Binary Code Fingerprinting for Cybersecurity [[electronic resource] ] : Application to Malicious Code Fingerprinting / / by Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna
Autore Alrabaee Saed
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XXI, 247 p. 77 illus., 31 illus. in color.)
Disciplina 005.8
Collana Advances in Information Security
Soggetto topico Data protection
Biometrics (Biology)
Computer crimes
Security
Biometrics
Cybercrime
ISBN 3-030-34238-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1 Introduction -- 2 Binary Analysis Overview -- 3 Compiler Provenance Attribution -- 4 Library Function Identification -- 5 Identifying Reused Functions in Binary Code -- 6 Function Fingerprinting -- 7 Free Open-Source Software Fingerprinting -- 8 Clone Detection -- 9 Authorship Attribution -- 10 Conclusion.
Record Nr. UNISA-996465453903316
Alrabaee Saed  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Blockchain Cybersecurity, Trust and Privacy [[electronic resource] /] / edited by Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza M. Parizi
Blockchain Cybersecurity, Trust and Privacy [[electronic resource] /] / edited by Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza M. Parizi
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (VI, 290 p. 111 illus., 93 illus. in color.)
Disciplina 005.824
Collana Advances in Information Security
Soggetto topico Data protection
Computers
Artificial intelligence
Computer communication systems
Security
Information Systems and Communication Service
Artificial Intelligence
Computer Communication Networks
ISBN 3-030-38181-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1- Blockchain in Cybersecurity Realm: An Overview -- Chapter 2- Capability-based Non-Fungible Tokens Approach for a Decentralized AAA Framework in IoT -- Chapter 3 - IoT Security, Privacy and Trust in Home-Sharing Economy via Blockchain -- Chapter 4 - Scrybe: A 2nd-Generation Blockchain Technology with Lightweight Mining for Secure Provenance and Related Applications -- Chapter 5 - Blockchain for Efficient Public Key Infrastructure and Fault-Tolerant Distributed Consensus -- Chapter 6 - Secure blockchain-based traffic load balancing using edge computing and reinforcement learning -- Chapter 7- Blockchain Applications in Power Systems: A Bibliometric Analysis -- Chapter 8 - A Systematic Literature Review of Integration of Blockchain and Artificial Intelligence -- Chapter 9 - The Future of Blockchain Technology in Healthcare Internet of Things Security -- Chapter 10 - Secure Healthcare Framework using Blockchain and Public Key Cryptography -- Chapter 11 - Public Blockchains Scalability: An Examination of Sharding and Segregated Witness -- Chapter 12 - Immutable and Secure IP Address Protection using Blockchain -- Chapter 13- On the Application of Financial Security Standards in Blockchain Platforms -- Chapter 14 - Blockchain-based Certification for Education, Employment, and Skill with Incentive Mechanism.
Record Nr. UNINA-9910410057403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Blockchain Cybersecurity, Trust and Privacy [[electronic resource] /] / edited by Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza M. Parizi
Blockchain Cybersecurity, Trust and Privacy [[electronic resource] /] / edited by Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza M. Parizi
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (VI, 290 p. 111 illus., 93 illus. in color.)
Disciplina 005.824
Collana Advances in Information Security
Soggetto topico Data protection
Computers
Artificial intelligence
Computer communication systems
Security
Information Systems and Communication Service
Artificial Intelligence
Computer Communication Networks
ISBN 3-030-38181-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1- Blockchain in Cybersecurity Realm: An Overview -- Chapter 2- Capability-based Non-Fungible Tokens Approach for a Decentralized AAA Framework in IoT -- Chapter 3 - IoT Security, Privacy and Trust in Home-Sharing Economy via Blockchain -- Chapter 4 - Scrybe: A 2nd-Generation Blockchain Technology with Lightweight Mining for Secure Provenance and Related Applications -- Chapter 5 - Blockchain for Efficient Public Key Infrastructure and Fault-Tolerant Distributed Consensus -- Chapter 6 - Secure blockchain-based traffic load balancing using edge computing and reinforcement learning -- Chapter 7- Blockchain Applications in Power Systems: A Bibliometric Analysis -- Chapter 8 - A Systematic Literature Review of Integration of Blockchain and Artificial Intelligence -- Chapter 9 - The Future of Blockchain Technology in Healthcare Internet of Things Security -- Chapter 10 - Secure Healthcare Framework using Blockchain and Public Key Cryptography -- Chapter 11 - Public Blockchains Scalability: An Examination of Sharding and Segregated Witness -- Chapter 12 - Immutable and Secure IP Address Protection using Blockchain -- Chapter 13- On the Application of Financial Security Standards in Blockchain Platforms -- Chapter 14 - Blockchain-based Certification for Education, Employment, and Skill with Incentive Mechanism.
Record Nr. UNISA-996465446403316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Blockchain Technology for Industry 4.0 [[electronic resource] ] : Secure, Decentralized, Distributed and Trusted Industry Environment / / edited by Rodrigo da Rosa Righi, Antonio Marcos Alberti, Madhusudan Singh
Blockchain Technology for Industry 4.0 [[electronic resource] ] : Secure, Decentralized, Distributed and Trusted Industry Environment / / edited by Rodrigo da Rosa Righi, Antonio Marcos Alberti, Madhusudan Singh
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (V, 164 p. 50 illus., 40 illus. in color.)
Disciplina 005.824
Collana Blockchain Technologies
Soggetto topico Computer engineering
Internet of things
Embedded computer systems
Data protection
Industrial engineering
Production engineering
Information technology
Business—Data processing
Electrical engineering
Big data
Cyber-physical systems, IoT
Security
Industrial and Production Engineering
IT in Business
Communications Engineering, Networks
Big Data
ISBN 981-15-1137-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. History of Industrial Revolutions: From Homo Sapiens Hunters to Bitcoin Hunters -- 2. Blockchain and Industry 4.0: Overview, Convergence, and Analysis -- 3. Blockchain Technology for Data Management in Industry 4.0 -- 4. Secure Smart Contract Generation based on Petri Nets -- 5. Blockchain for Machine to Machine Interaction in Industry 4.0 -- 6. Blockchain-based Crowdfunding -- 7. Engineering 4.0: Future with disruptive technologies -- 8. The Opportunities of Blockchain in Health 4.0.
Record Nr. UNINA-9910373897003321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Broadband Communications, Networks, and Systems [[electronic resource] ] : 9th International EAI Conference, Broadnets 2018, Faro, Portugal, September 19–20, 2018, Proceedings / / edited by Victor Sucasas, Georgios Mantas, Saud Althunibat
Broadband Communications, Networks, and Systems [[electronic resource] ] : 9th International EAI Conference, Broadnets 2018, Faro, Portugal, September 19–20, 2018, Proceedings / / edited by Victor Sucasas, Georgios Mantas, Saud Althunibat
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIII, 474 p. 243 illus., 198 illus. in color.)
Disciplina 362
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computer communication systems
Computers
Data structures (Computer science)
Data protection
Computer Communication Networks
Information Systems and Communication Service
Data Structures and Information Theory
Security
ISBN 3-030-05195-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Advanced Techniques for IoT and WSNs -- SDN and Network Virtualization -- Health and Telemedicine Mobile Applications -- Security and Privacy Preservation -- Communication Reliability and Protocols -- Spatial Modulation Techniques -- Hardware Implementation and Antenna Design.
Record Nr. UNINA-9910337848903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Bug Bounty Hunting for Web Security : find and exploit vulnerabilities in Web sites and Applications / / by Sanjib Sinha
Bug Bounty Hunting for Web Security : find and exploit vulnerabilities in Web sites and Applications / / by Sanjib Sinha
Autore Sinha Sanjib
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2019
Descrizione fisica 1 online resource (XVI, 225 p. 140 illus.)
Disciplina 005.8
Soggetto topico Data protection
Open source software
Computer programming
Management information systems
Security
Open Source
Enterprise Architecture
ISBN 1-4842-5391-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: Introduction to Hunting Bugs -- Chapter 2: Setting up Your Environment -- Chapter 3: How to inject Request Forgery -- Chapter 4: How to exploit through Cross Site Scripting (XSS) -- Chapter 5: Header Injection and URL Redirection -- Chapter 6: Malicious Files -- Chapter 7: Poisoning Sender Policy Framework (SPF) -- Chapter 8: Injecting Unintended XML -- Chapter 9: Finding Command Injection Vulnerabilities -- Chapter 10: Finding HTML and SQL Injection Vulnerabilities -- Appendix: Further Reading.
Record Nr. UNINA-9910357837203321
Sinha Sanjib  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Building a Comprehensive IT Security Program [[electronic resource] ] : Practical Guidelines and Best Practices / / by Jeremy Wittkop
Building a Comprehensive IT Security Program [[electronic resource] ] : Practical Guidelines and Best Practices / / by Jeremy Wittkop
Autore Wittkop Jeremy
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2016
Descrizione fisica 1 online resource (210 p.)
Disciplina 004
Soggetto topico Data protection
Computer security
Data structures (Computer science)
Security
Systems and Data Security
Data Structures and Information Theory
ISBN 1-4842-2053-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: The Problem We Are Facing -- Chapter 2 : Protecting Critical Assets -- Chapter 3: Monetizing Risk -- Chapter 4: Security Intelligence Model -- Chapter 5: Incident Response Planning -- Chapter 6: The People Problem -- Chapter 7: Assigning Accountability -- Chapter 8: Shifting the Paradigm -- Chapter 9: The Definition of Insanity -- Chapter 10: Déjà Vu -- Chapter 11: The Information Security Community -- Chapter 12: Partnering with Governments -- .
Record Nr. UNINA-9910254753003321
Wittkop Jeremy  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Building a HIPAA-Compliant Cybersecurity Program [[electronic resource] ] : Using NIST 800-30 and CSF to Secure Protected Health Information / / by Eric C. Thompson
Building a HIPAA-Compliant Cybersecurity Program [[electronic resource] ] : Using NIST 800-30 and CSF to Secure Protected Health Information / / by Eric C. Thompson
Autore Thompson Eric C
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2017
Descrizione fisica 1 online resource (XXII, 297 p. 67 illus., 29 illus. in color.)
Disciplina 610.289
Soggetto topico Data protection
Security
ISBN 1-4842-3060-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part I: Why Risk Assessment and Analysis -- Chapter 1: Not If, But When -- Chapter 2: Meeting Regulator Expectations -- Chapter 3: Selecting Security Measures -- Part II: Assessing and Analyzing Risk -- Chapter 4: Inventory Your ePHI -- Chapter 5: Who Wants Health Information -- Chapter 6: Weaknesses Waiting to Be Exploited -- Chapter 7: Is It Really This Bad? -- Chapter 8: Increasing Program Maturity -- Chapter 9: Targeted Non-technical Testing -- Chapter 10: Targeted Technical Testing -- Part III: Applying the Results to Everyday Needs -- Chapter 11: Refreshing the Risk Register -- Chapter 12: The Cybersecurity Roadmap -- Part IV: Continuous Improvement -- Chapter 13: Investing for Risk Reduction -- Chapter 14: Third Party-Risk: Beyond the BAA -- Chapter 15: Social Media, BYOD, IOT and Portability -- Chapter 16: Risk Treatment and Management -- Chapter 17: Customizing the Risk Analysis -- Chapter 18: Think Offensively -- Appendix A. NIST CSF Internal Controls -- Appendix B. NIST CSF to HIPAA Crosswalk -- Appendix C: Risk Analysis Templates.- .
Record Nr. UNINA-9910254851903321
Thompson Eric C  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui