The biology and identification of the coccidia (apicomplexa) of marsupials of the world / / Donald Duszynski ; acquisition editor Linda Versteeg ; designer Mark Rogers |
Autore | Duszynski Donald |
Pubbl/distr/stampa | Amsterdam, [Netherlands] : , : Academic Press, , 2016 |
Descrizione fisica | 1 online resource (0 p.) |
Disciplina | 593.19 |
Soggetto topico |
Coccidia
Marsupials - Diseases Marsupials - Parasites Coccidiosis in animals |
ISBN | 0-12-802712-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910797689103321 |
Duszynski Donald | ||
Amsterdam, [Netherlands] : , : Academic Press, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The biology and identification of the coccidia (apicomplexa) of marsupials of the world / / Donald Duszynski ; acquisition editor Linda Versteeg ; designer Mark Rogers |
Autore | Duszynski Donald |
Pubbl/distr/stampa | Amsterdam, [Netherlands] : , : Academic Press, , 2016 |
Descrizione fisica | 1 online resource (0 p.) |
Disciplina | 593.19 |
Soggetto topico |
Coccidia
Marsupials - Diseases Marsupials - Parasites Coccidiosis in animals |
ISBN | 0-12-802712-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910824735303321 |
Duszynski Donald | ||
Amsterdam, [Netherlands] : , : Academic Press, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Business continuity from preparedness to recovery : a standards-based approach / / Eugene Tucker ; designer, Mark Rogers |
Autore | Tucker Eugene |
Pubbl/distr/stampa | Oxford, [England] ; ; Waltham, Massachusetts : , : Butterworth-Heinemann, , 2015 |
Descrizione fisica | 1 online resource (325 p.) |
Disciplina | 658.4012 |
Soggetto topico |
Business planning
Assistance in emergencies - Planning Emergency management |
ISBN | 0-12-420090-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Business Continuity from Preparedness to Recovery: A Standards-Based Approach; Copyright; Contents; Preface; Acknowledgments; Digital Assets; FOR THE INSTRUCTOR; Introduction; BUSINESS CONTINUITY PROGRAM DEVELOPMENT; PLANNING ACCORDING TO THE STANDARDS; CERTIFICATION PROCESS; CHOOSING THE CORRECT STANDARD; THE HOW AND WHAT OF THE STANDARDS; REFERENCES; CHAPTER 1 - BUSINESS CONTINUITY-A DEFINITION AND A BRIEF HISTORY; 1.1 INTRODUCTION; 1.2 HISTORY; 1.3 MANY DEFINITIONS; 1.4 REVIEW; BIBLIOGRAPHY; CHAPTER 2 - UNDERSTANDING THE STANDARDS; 2.1 INTRODUCTION; 2.2 PROCESS APPROACH
2.3 PLAN, DO, CHECK, ACT2.4 ORGANIZATION OF STANDARDS; 2.5 REVIEW; BIBLIOGRAPHY; CHAPTER 3 - BUILDING A BUSINESS CONTINUITY CAPABILITY; 3.1 INTRODUCTION; 3.2 LEADERSHIP; 3.3 BUSINESS CONTINUITY MANAGER; 3.4 SCOPE OF THE BCMS; 3.5 POLICY; 3.6 BUSINESS CONTINUITY OBJECTIVES AND PROJECT PLANNING; 3.7 COMPETENCE AND AWARENESS; 3.8 DOCUMENT CONTROL; 3.9 STEERING COMMITTEE; 3.10 REVIEW; BIBLIOGRAPHY; CHAPTER 4 - EMERGENCY MANAGEMENT-PREPAREDNESS AND RESPONSE; 4.1 INTRODUCTION; 4.2 PREPAREDNESS; 4.3 RESPONSE; 4.4 REVIEW; CHAPTER 5 - BUSINESS IMPACT ANALYSIS; 5.1 INTRODUCTION 5.2 BUSINESS IMPACT ANALYSIS PROCESS5.3 REANALYSIS; 5.4 CONFIDENTIALITY; 5.5 REVIEW; CHAPTER 6 - RISK ASSESSMENT; 6.1 INTRODUCTION; 6.2 UNDERSTANDING RISK; 6.3 RISK ASSESSMENT; 6.4 RISK TREATMENT; 6.5 RISK ASSESSMENT REPORT; 6.6 REVIEW; BIBLIOGRAPHY; CHAPTER 7 - MITIGATION AND BUSINESS CONTINUITY STRATEGY; 7.1 INTRODUCTION; 7.2 MITIGATION; 7.3 BUSINESS CONTINUITY STRATEGY; 7.4 REVIEW; BIBLIOGRAPHY; CHAPTER 8 - BUSINESS CONTINUITY PLANS AND PROCEDURES; 8.1 INTRODUCTION; 8.2 FUNDAMENTAL ATTRIBUTES OF THE PLAN; 8.3 PLAN ORGANIZATION AND STRUCTURE; 8.4 TEAM PLANS; 8.5 PUTTING THE PLAN TOGETHER 8.6 REVIEWCHAPTER 9 - ORIENTATION, EXERCISING, AND TESTING; 9.1 INTRODUCTION; 9.2 TYPES OF EXERCISES; 9.3 SCHEDULING EXERCISES; 9.4 ORIENTATION; 9.5 EXERCISE PROGRAM; 9.6 EXERCISE DESIGN; 9.7 REVIEW; BIBLIOGRAPHY; CHAPTER 10 - CONTINUOUS IMPROVEMENT; 10.1 INTRODUCTION; 10.2 PROGRAM MAINTENANCE; 10.3 PERFORMANCE EVALUATION AND METRICS; 10.4 EVALUATIONS AND INTERNAL AUDIT; 10.5 MANAGEMENT REVIEW; 10.6 NONCONFORMITY AND CORRECTIVE ACTION; 10.7 EXAMPLE OF AN RACI CHART; 10.8 REVIEW; BIBLIOGRAPHY; Appendix A: Sample Competencies Suggested for Business Continuity Manager Appendix B: Required Documents under ISO 22301Appendix C: Emergency Plan Table of Contents; Appendix D: Sample Business Analysis Impact Questions; GENERAL QUESTIONS (ASKED OF ALL FUNCTIONAL LEADERS); FUNCTIONAL SPECIFIC QUESTIONS; Appendix E: Sample Continuity Team Resource Tool Kit; INSTRUCTIONS; TEAM INFORMATION; TEAM EMPLOYEES; VENDOR/SUPPLIER CONTACT LIST; EQUIPMENT REQUIREMENTS; FORMS AND SUPPLIES; SOFTWARE REQUIREMENTS; VITAL RECORDS; TEAM TASK INSTRUCTIONS; Appendix F: Websites That Contain Hazard Information; EARTHQUAKE AND LIQUEFACTION HAZARDS; FLOODING AND DAM INUNDATION; LANDSLIDES SEVERE WEATHER |
Record Nr. | UNINA-9910788046203321 |
Tucker Eugene | ||
Oxford, [England] ; ; Waltham, Massachusetts : , : Butterworth-Heinemann, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Business continuity from preparedness to recovery : a standards-based approach / / Eugene Tucker ; designer, Mark Rogers |
Autore | Tucker Eugene |
Pubbl/distr/stampa | Oxford, [England] ; ; Waltham, Massachusetts : , : Butterworth-Heinemann, , 2015 |
Descrizione fisica | 1 online resource (325 p.) |
Disciplina | 658.4012 |
Soggetto topico |
Business planning
Assistance in emergencies - Planning Emergency management |
ISBN | 0-12-420090-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Business Continuity from Preparedness to Recovery: A Standards-Based Approach; Copyright; Contents; Preface; Acknowledgments; Digital Assets; FOR THE INSTRUCTOR; Introduction; BUSINESS CONTINUITY PROGRAM DEVELOPMENT; PLANNING ACCORDING TO THE STANDARDS; CERTIFICATION PROCESS; CHOOSING THE CORRECT STANDARD; THE HOW AND WHAT OF THE STANDARDS; REFERENCES; CHAPTER 1 - BUSINESS CONTINUITY-A DEFINITION AND A BRIEF HISTORY; 1.1 INTRODUCTION; 1.2 HISTORY; 1.3 MANY DEFINITIONS; 1.4 REVIEW; BIBLIOGRAPHY; CHAPTER 2 - UNDERSTANDING THE STANDARDS; 2.1 INTRODUCTION; 2.2 PROCESS APPROACH
2.3 PLAN, DO, CHECK, ACT2.4 ORGANIZATION OF STANDARDS; 2.5 REVIEW; BIBLIOGRAPHY; CHAPTER 3 - BUILDING A BUSINESS CONTINUITY CAPABILITY; 3.1 INTRODUCTION; 3.2 LEADERSHIP; 3.3 BUSINESS CONTINUITY MANAGER; 3.4 SCOPE OF THE BCMS; 3.5 POLICY; 3.6 BUSINESS CONTINUITY OBJECTIVES AND PROJECT PLANNING; 3.7 COMPETENCE AND AWARENESS; 3.8 DOCUMENT CONTROL; 3.9 STEERING COMMITTEE; 3.10 REVIEW; BIBLIOGRAPHY; CHAPTER 4 - EMERGENCY MANAGEMENT-PREPAREDNESS AND RESPONSE; 4.1 INTRODUCTION; 4.2 PREPAREDNESS; 4.3 RESPONSE; 4.4 REVIEW; CHAPTER 5 - BUSINESS IMPACT ANALYSIS; 5.1 INTRODUCTION 5.2 BUSINESS IMPACT ANALYSIS PROCESS5.3 REANALYSIS; 5.4 CONFIDENTIALITY; 5.5 REVIEW; CHAPTER 6 - RISK ASSESSMENT; 6.1 INTRODUCTION; 6.2 UNDERSTANDING RISK; 6.3 RISK ASSESSMENT; 6.4 RISK TREATMENT; 6.5 RISK ASSESSMENT REPORT; 6.6 REVIEW; BIBLIOGRAPHY; CHAPTER 7 - MITIGATION AND BUSINESS CONTINUITY STRATEGY; 7.1 INTRODUCTION; 7.2 MITIGATION; 7.3 BUSINESS CONTINUITY STRATEGY; 7.4 REVIEW; BIBLIOGRAPHY; CHAPTER 8 - BUSINESS CONTINUITY PLANS AND PROCEDURES; 8.1 INTRODUCTION; 8.2 FUNDAMENTAL ATTRIBUTES OF THE PLAN; 8.3 PLAN ORGANIZATION AND STRUCTURE; 8.4 TEAM PLANS; 8.5 PUTTING THE PLAN TOGETHER 8.6 REVIEWCHAPTER 9 - ORIENTATION, EXERCISING, AND TESTING; 9.1 INTRODUCTION; 9.2 TYPES OF EXERCISES; 9.3 SCHEDULING EXERCISES; 9.4 ORIENTATION; 9.5 EXERCISE PROGRAM; 9.6 EXERCISE DESIGN; 9.7 REVIEW; BIBLIOGRAPHY; CHAPTER 10 - CONTINUOUS IMPROVEMENT; 10.1 INTRODUCTION; 10.2 PROGRAM MAINTENANCE; 10.3 PERFORMANCE EVALUATION AND METRICS; 10.4 EVALUATIONS AND INTERNAL AUDIT; 10.5 MANAGEMENT REVIEW; 10.6 NONCONFORMITY AND CORRECTIVE ACTION; 10.7 EXAMPLE OF AN RACI CHART; 10.8 REVIEW; BIBLIOGRAPHY; Appendix A: Sample Competencies Suggested for Business Continuity Manager Appendix B: Required Documents under ISO 22301Appendix C: Emergency Plan Table of Contents; Appendix D: Sample Business Analysis Impact Questions; GENERAL QUESTIONS (ASKED OF ALL FUNCTIONAL LEADERS); FUNCTIONAL SPECIFIC QUESTIONS; Appendix E: Sample Continuity Team Resource Tool Kit; INSTRUCTIONS; TEAM INFORMATION; TEAM EMPLOYEES; VENDOR/SUPPLIER CONTACT LIST; EQUIPMENT REQUIREMENTS; FORMS AND SUPPLIES; SOFTWARE REQUIREMENTS; VITAL RECORDS; TEAM TASK INSTRUCTIONS; Appendix F: Websites That Contain Hazard Information; EARTHQUAKE AND LIQUEFACTION HAZARDS; FLOODING AND DAM INUNDATION; LANDSLIDES SEVERE WEATHER |
Record Nr. | UNINA-9910817854603321 |
Tucker Eugene | ||
Oxford, [England] ; ; Waltham, Massachusetts : , : Butterworth-Heinemann, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Corporate security management : challenges, risks, and strategies / / Marko Cabric ; designer, Mark Rogers |
Autore | Cabric Marko |
Pubbl/distr/stampa | Amsterdam, [Netherlands] : , : Butterworth-Heinemann, , 2015 |
Descrizione fisica | 1 online resource (243 p.) |
Disciplina | 658.47 |
Soggetto topico | Corporations - Security measures - Management |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
""Front Cover""; ""Corporate Security Management""; ""Copyright""; ""Dedication""; ""Contents""; ""About the Author""; ""Introduction""; ""Section 1 - What: Define""; ""Chapter 1 - About Security""; ""SECURITY AND ITS ESSENCE""; ""BASIC PRINCIPLES OF SECURITY""; ""GLOSSARY OF CORPORATE SECURITY TERMS AND ABBREVIATIONS""; ""Chapter 2 - Corporations and the Place of Corporate Security""; ""CORPORATIONS""; ""KEY CORPORATE PARTNERS OF SECURITY""; ""ABOUT CORPORATE SECURITY: THE PROFESSION AND ITS CHALLENGES""; ""GLOSSARY OF CORPORATE TERMS AND ABBREVIATIONS""; ""Section 2 - Who: Arrange""
""Chapter 3 - The People""""CHIEF SECURITY OFFICER COMPETENCES""; ""SECURITY TEAM""; ""PRIVATE SECURITY INDUSTRY""; ""PEOPLE MANAGEMENT AND LEADERSHIP""; ""REFERENCE""; ""Section 3 - How: Organize""; ""Chapter 4 - Managing a Security Organization""; ""SECURITY MODELS ACCORDING TO INDUSTRY""; ""SECURITY MANAGEMENT STYLES""; ""KEY SUCCESS FACTORS IN MANAGING SECURITY PROCESSES""; ""CORPORATE SECURITY SETUP""; ""Chapter 5 - Incorporating Security Elements""; ""INFORMATION AND INTELLIGENCE""; ""SECURITY GOVERNANCE""; ""PEOPLE""; ""PHYSICAL ELEMENTS""; ""TECHNOLOGY (ELECTRONIC SYSTEMS)"" ""COMMUNICATION""""CONTROL""; ""Section 4 - Why: Understand""; ""Chapter 6 - Internal Risks""; ""OVERVIEW OF INTERNAL RISKS""; ""REPUTATIONAL RISKS""; ""EMBEZZLEMENT, THEFT, AND FRAUD""; ""ACTS OF PROTEST""; ""SEXUAL HARASSMENT AND MOBBING""; ""SUBSTANCE ABUSE AND GAMBLING""; ""INADEQUATE SECURITY RESILIENCE""; ""REFERENCES""; ""Chapter 7 - External Risks""; ""OVERVIEW OF EXTERNAL RISKS""; ""GLOBAL ISSUES VERSUS CORPORATE SECURITY""; ""CRIME""; ""CYBERCRIME AND HIGH-TECH CRIMES""; ""EXTERNAL FRAUDS""; ""CORPORATE EXPOSURE TO TERRORISM""; ""NATURAL FACTORS""; ""SPECIFIC RISKS TO PEOPLE"" ""DATA LEAKAGE""""EMERGENCY SITUATIONS""; ""REFERENCES""; ""Section 5 - Where: Allocate""; ""Chapter 8 - Physical Security""; ""FACILITY SECURITY""; ""SECURITY OF EVENTS""; ""Chapter 9 - Product""; ""SUPPLY CHAIN""; ""RETAIL LOSS PREVENTION""; ""REFERENCES""; ""Chapter 10 - Human Capital""; ""HUMAN RESOURCES""; ""SECURITY OF CORPORATE TRAVELERS AND EXPATRIATES""; ""REFERENCES""; ""Chapter 11 - Confidentiality, Integrity, and Availability""; ""CONFIDENTIALITY: BASIC INFORMATION SECURITY PRINCIPLES""; ""INTEGRITY: COMBATING FRAUD""; ""INTERNAL INVESTIGATIONS"" ""AVAILABILITY: BCM AND DISASTER RECOVERY""""Section 6 - When: Measure""; ""Chapter 12 - Analysis, Assessments, Planning, Control, and Administration""; ""THREAT ANALYSIS""; ""VULNERABILITY ASSESSMENT""; ""SECURITY PLANNING""; ""SECURITY METRICS/KPI""; ""TRAININGS AND EXERCISES""; ""Index"" |
Record Nr. | UNINA-9910797186703321 |
Cabric Marko | ||
Amsterdam, [Netherlands] : , : Butterworth-Heinemann, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Corporate security management : challenges, risks, and strategies / / Marko Cabric ; designer, Mark Rogers |
Autore | Cabric Marko |
Pubbl/distr/stampa | Amsterdam, [Netherlands] : , : Butterworth-Heinemann, , 2015 |
Descrizione fisica | 1 online resource (243 p.) |
Disciplina | 658.47 |
Soggetto topico | Corporations - Security measures - Management |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
""Front Cover""; ""Corporate Security Management""; ""Copyright""; ""Dedication""; ""Contents""; ""About the Author""; ""Introduction""; ""Section 1 - What: Define""; ""Chapter 1 - About Security""; ""SECURITY AND ITS ESSENCE""; ""BASIC PRINCIPLES OF SECURITY""; ""GLOSSARY OF CORPORATE SECURITY TERMS AND ABBREVIATIONS""; ""Chapter 2 - Corporations and the Place of Corporate Security""; ""CORPORATIONS""; ""KEY CORPORATE PARTNERS OF SECURITY""; ""ABOUT CORPORATE SECURITY: THE PROFESSION AND ITS CHALLENGES""; ""GLOSSARY OF CORPORATE TERMS AND ABBREVIATIONS""; ""Section 2 - Who: Arrange""
""Chapter 3 - The People""""CHIEF SECURITY OFFICER COMPETENCES""; ""SECURITY TEAM""; ""PRIVATE SECURITY INDUSTRY""; ""PEOPLE MANAGEMENT AND LEADERSHIP""; ""REFERENCE""; ""Section 3 - How: Organize""; ""Chapter 4 - Managing a Security Organization""; ""SECURITY MODELS ACCORDING TO INDUSTRY""; ""SECURITY MANAGEMENT STYLES""; ""KEY SUCCESS FACTORS IN MANAGING SECURITY PROCESSES""; ""CORPORATE SECURITY SETUP""; ""Chapter 5 - Incorporating Security Elements""; ""INFORMATION AND INTELLIGENCE""; ""SECURITY GOVERNANCE""; ""PEOPLE""; ""PHYSICAL ELEMENTS""; ""TECHNOLOGY (ELECTRONIC SYSTEMS)"" ""COMMUNICATION""""CONTROL""; ""Section 4 - Why: Understand""; ""Chapter 6 - Internal Risks""; ""OVERVIEW OF INTERNAL RISKS""; ""REPUTATIONAL RISKS""; ""EMBEZZLEMENT, THEFT, AND FRAUD""; ""ACTS OF PROTEST""; ""SEXUAL HARASSMENT AND MOBBING""; ""SUBSTANCE ABUSE AND GAMBLING""; ""INADEQUATE SECURITY RESILIENCE""; ""REFERENCES""; ""Chapter 7 - External Risks""; ""OVERVIEW OF EXTERNAL RISKS""; ""GLOBAL ISSUES VERSUS CORPORATE SECURITY""; ""CRIME""; ""CYBERCRIME AND HIGH-TECH CRIMES""; ""EXTERNAL FRAUDS""; ""CORPORATE EXPOSURE TO TERRORISM""; ""NATURAL FACTORS""; ""SPECIFIC RISKS TO PEOPLE"" ""DATA LEAKAGE""""EMERGENCY SITUATIONS""; ""REFERENCES""; ""Section 5 - Where: Allocate""; ""Chapter 8 - Physical Security""; ""FACILITY SECURITY""; ""SECURITY OF EVENTS""; ""Chapter 9 - Product""; ""SUPPLY CHAIN""; ""RETAIL LOSS PREVENTION""; ""REFERENCES""; ""Chapter 10 - Human Capital""; ""HUMAN RESOURCES""; ""SECURITY OF CORPORATE TRAVELERS AND EXPATRIATES""; ""REFERENCES""; ""Chapter 11 - Confidentiality, Integrity, and Availability""; ""CONFIDENTIALITY: BASIC INFORMATION SECURITY PRINCIPLES""; ""INTEGRITY: COMBATING FRAUD""; ""INTERNAL INVESTIGATIONS"" ""AVAILABILITY: BCM AND DISASTER RECOVERY""""Section 6 - When: Measure""; ""Chapter 12 - Analysis, Assessments, Planning, Control, and Administration""; ""THREAT ANALYSIS""; ""VULNERABILITY ASSESSMENT""; ""SECURITY PLANNING""; ""SECURITY METRICS/KPI""; ""TRAININGS AND EXERCISES""; ""Index"" |
Record Nr. | UNINA-9910810014403321 |
Cabric Marko | ||
Amsterdam, [Netherlands] : , : Butterworth-Heinemann, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber crime and cyber terrorism investigator's handbook / / edited by Babak Akhgar, Andrew Staniforth, Francesca Bosco ; acquiring editor, Steve Elliot ; editorial project manager, Benjamin Rearick ; project manager, Priya Kumaraguruparan ; designer, Mark Rogers |
Autore | Akhgar Babak |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Syngress, an imprint of Elsevier, , [2014] |
Descrizione fisica | 1 online resource (xxiii, 282 pages) : illustrations |
Disciplina | 363.25/968 |
Collana | Special needs offenders closeup |
Soggetto topico |
Computer crimes - Investigation
Cyberterrorism - Investigation |
ISBN | 0-12-800811-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Cyber Crime and Cyber Terrorism Investigator's Handbook; Copyright; Acknowledgments; Endorsements; Contents; Contributors; Author Biography; Foreword; Preface; Chapter 1: Cyberspace: The new frontier for policing? ; The Shape of the Challenge; The Size of the Challenge; The Response; Conclusion; References; Chapter 2: Definitions of Cyber Terrorism; Introduction; The Confusion About Cyber Terrorism; Cyber Terrorism Definition; Has Cyber Terrorism ever Occurred?; Conclusions; References; Chapter 3: New and emerging threats of cyber crime and terrorism; Introduction
Some Historic MilestonesCyber security lessons not learned from previous ICT innovation cycles; Organizational aspects not learned from previous ICT innovation cycles; Emerging threats; Conclusions; References; Chapter 4: Police investigation processes: practical tools and techniques for tackling cyber crimes ; Introduction; Investigative Decision Making; Investigative Problem Solving; Developing Investigative Hypothesis; Investigative Innovation; Investigators Contact Management; Investigating Crime and Terror; Conclusion; References Chapter 5: Cyber-specifications: capturing user requirements for cyber-security investigationsIntroduction; User Requirements and the Need for a User-Centered Approach?; Balancing Technological and Human Capabilities; Conducting User Requirements Elicitation; Capturing and Communicating User Requirements; Conclusion; Acknowledgment; References; Chapter 6: High-tech investigations of cyber crime; Introduction; High-Tech Investigations and Forensics; Core Concepts of High-Tech Investigations; Digital Landscapes; The "Crime Scene"; Live and Online Data Capture; Offline (Dead) Data Capture Verification of the DataReviewing the Requirements; Starting the Analysis; Signature Analysis; Filtering Evidence; Keyword Searching; Core Evidence; Windows LNK Files; Windows Prefetch Files; Windows Event Logs; Windows Registry; Restore Points; Case Study; Summary; References; Chapter 7: Seizing, imaging, and analyzing digital evidence: step-by-step guidelines ; Introduction; Establishing Crime; Collecting Evidence for a Search Warrant; Reported by a Third Party; Identification of a Suspects Internet Protocol Address; IP Spoofing; Anonymizing Proxy Relay Services Intrusion Detection Systems, Network Traffic and Firewall LogsInterviews with Suspects; Analysis of Suspects Media; Doxing; Collecting Evidence; Seizing Equipment; Search for Written Passwords; Forensic Acquisition; Ram; Image; Forensic Analysis; Anti-forensics; RAM Analysis; Data Carving and Magic Values; Media Storage Forensics; The Structure and Format of a Hard Drive; Partitions; Master Boot Record; The VBR and BIOS parameter block; File System; File Table; Searching for Evidence; Keyword and Phrases Search; Recovering Deleted Information; Recovering Deleted Files and Folders Recovering Deleted Partitions |
Record Nr. | UNINA-9910665418903321 |
Akhgar Babak | ||
Waltham, Massachusetts : , : Syngress, an imprint of Elsevier, , [2014] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber crime and cyber terrorism investigator's handbook / / edited by Babak Akhgar, Andrew Staniforth, Francesca Bosco ; acquiring editor, Steve Elliot ; editorial project manager, Benjamin Rearick ; project manager, Priya Kumaraguruparan ; designer, Mark Rogers |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Syngress, an imprint of Elsevier, , [2014] |
Descrizione fisica | 1 online resource (xxiii, 282 pages) : illustrations |
Disciplina | 363.25/968 |
Soggetto topico |
Computer crimes - Investigation
Cyberterrorism - Investigation |
Soggetto genere / forma | Electronic books. |
ISBN | 0-12-800811-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Cyber Crime and Cyber Terrorism Investigator's Handbook; Copyright; Acknowledgments; Endorsements; Contents; Contributors; Author Biography; Foreword; Preface; Chapter 1: Cyberspace: The new frontier for policing? ; The Shape of the Challenge; The Size of the Challenge; The Response; Conclusion; References; Chapter 2: Definitions of Cyber Terrorism; Introduction; The Confusion About Cyber Terrorism; Cyber Terrorism Definition; Has Cyber Terrorism ever Occurred?; Conclusions; References; Chapter 3: New and emerging threats of cyber crime and terrorism; Introduction
Some Historic MilestonesCyber security lessons not learned from previous ICT innovation cycles; Organizational aspects not learned from previous ICT innovation cycles; Emerging threats; Conclusions; References; Chapter 4: Police investigation processes: practical tools and techniques for tackling cyber crimes ; Introduction; Investigative Decision Making; Investigative Problem Solving; Developing Investigative Hypothesis; Investigative Innovation; Investigators Contact Management; Investigating Crime and Terror; Conclusion; References Chapter 5: Cyber-specifications: capturing user requirements for cyber-security investigationsIntroduction; User Requirements and the Need for a User-Centered Approach?; Balancing Technological and Human Capabilities; Conducting User Requirements Elicitation; Capturing and Communicating User Requirements; Conclusion; Acknowledgment; References; Chapter 6: High-tech investigations of cyber crime; Introduction; High-Tech Investigations and Forensics; Core Concepts of High-Tech Investigations; Digital Landscapes; The "Crime Scene"; Live and Online Data Capture; Offline (Dead) Data Capture Verification of the DataReviewing the Requirements; Starting the Analysis; Signature Analysis; Filtering Evidence; Keyword Searching; Core Evidence; Windows LNK Files; Windows Prefetch Files; Windows Event Logs; Windows Registry; Restore Points; Case Study; Summary; References; Chapter 7: Seizing, imaging, and analyzing digital evidence: step-by-step guidelines ; Introduction; Establishing Crime; Collecting Evidence for a Search Warrant; Reported by a Third Party; Identification of a Suspects Internet Protocol Address; IP Spoofing; Anonymizing Proxy Relay Services Intrusion Detection Systems, Network Traffic and Firewall LogsInterviews with Suspects; Analysis of Suspects Media; Doxing; Collecting Evidence; Seizing Equipment; Search for Written Passwords; Forensic Acquisition; Ram; Image; Forensic Analysis; Anti-forensics; RAM Analysis; Data Carving and Magic Values; Media Storage Forensics; The Structure and Format of a Hard Drive; Partitions; Master Boot Record; The VBR and BIOS parameter block; File System; File Table; Searching for Evidence; Keyword and Phrases Search; Recovering Deleted Information; Recovering Deleted Files and Folders Recovering Deleted Partitions |
Record Nr. | UNINA-9910458578403321 |
Waltham, Massachusetts : , : Syngress, an imprint of Elsevier, , [2014] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Data architecture : a primer for the data scientist : big data, data warehouse and data vault / / W. H. Inmon, Dan Linstedt ; Steven Elliot, executive editor ; Mark Rogers, designer |
Autore | Inmon W. H. |
Edizione | [1st edition] |
Pubbl/distr/stampa | Amsterdam, Netherlands : , : Morgan Kaufmann, , 2015 |
Descrizione fisica | 1 online resource (378 p.) |
Disciplina | 005.745 |
Soggetto topico |
Data warehousing
Big data |
ISBN | 0-12-802091-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright; Dedication; Contents; Preface; About the authors; 1.1 - Corporate data; The Totality of Data Across the Corporation; Dividing Unstructured Data; Business Relevancy; Big Data; The Great Divide; The Continental Divide; The Complete Picture; 1.2 - The data infrastructure; Two Types of Repetitive Data; Repetitive Structured Data; Repetitive Big Data; The Two Infrastructures; What's being Optimized?; Comparing the Two Infrastructures; 1.3 - The "great divide"; Classifying Corporate Data; The "Great Divide"; Repetitive Unstructured Data; Nonrepetitive Unstructured Data
Different Worlds1.4 - Demographics of corporate data; 1.5 - Corporate data analysis; 1.6 - The life cycle of data - understanding data over time; 1.7 - A brief history of data; Paper Tape and Punch Cards; Magnetic Tapes; Disk Storage; Database Management System; Coupled Processors; Online Transaction Processing; Data Warehouse; Parallel Data Management; Data Vault; Big Data; The Great Divide; 2.1 - A brief history of big data; An Analogy - Taking the High Ground; Taking the High Ground; Standardization with the 360; Online Transaction Processing Enter Teradata and Massively Parallel ProcessingThen Came Hadoop and Big Data; IBM and Hadoop; Holding the High Ground; 2.2 - What is big data?; Another Definition; Large Volumes; Inexpensive Storage; The Roman Census Approach; Unstructured Data; Data in Big Data; Context in Repetitive Data; Nonrepetitive Data; Context in Nonrepetitive Data; 2.3 - Parallel processing; 2.4 - Unstructured data; Textual Information Everywhere; Decisions Based on Structured Data; The Business Value Proposition; Repetitive and Nonrepetitive Unstructured Information; Ease of Analysis; Contextualization Some Approaches to ContextualizationMapReduce; Manual Analysis; 2.5 - Contextualizing repetitive unstructured data; Parsing Repetitive Unstructured Data; Recasting the Output Data; 2.6 - Textual disambiguation; From Narrative into an Analytical Database; Input into Textual Disambiguation; Mapping; Input/Output; Document Fracturing/Named Value Processing; Preprocessing a Document; Emails - A Special Case; Spreadsheets; Report Decompilation; 2.7 - Taxonomies; Data Models and Taxonomies; Applicability of Taxonomies; What is a Taxonomy?; Taxonomies in Multiple Languages Dynamics of Taxonomies and Textual DisambiguationTaxonomies and Textual Disambiguation - Separate Technologies; Different Types of Taxonomies; Taxonomies - Maintenance Over Time; 3.1 - A brief history of data warehouse; Early Applications; Online Applications; Extract Programs; 4GL Technology; Personal Computers; Spreadsheets; Integrity of Data; Spider-Web Systems; The Maintenance Backlog; The Data Warehouse; To an Architected Environment; To the CIF; DW 2.0; 3.2 - Integrated corporate data; Many Applications; Looking Across the Corporation; More Than One Analyst; ETL Technology The Challenges of Integration |
Record Nr. | UNINA-9910787905603321 |
Inmon W. H. | ||
Amsterdam, Netherlands : , : Morgan Kaufmann, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Data architecture : a primer for the data scientist : big data, data warehouse and data vault / / W. H. Inmon, Dan Linstedt ; Steven Elliot, executive editor ; Mark Rogers, designer |
Autore | Inmon W. H. |
Edizione | [1st edition] |
Pubbl/distr/stampa | Amsterdam, Netherlands : , : Morgan Kaufmann, , 2015 |
Descrizione fisica | 1 online resource (378 p.) |
Disciplina | 005.745 |
Soggetto topico |
Data warehousing
Big data |
ISBN | 0-12-802091-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright; Dedication; Contents; Preface; About the authors; 1.1 - Corporate data; The Totality of Data Across the Corporation; Dividing Unstructured Data; Business Relevancy; Big Data; The Great Divide; The Continental Divide; The Complete Picture; 1.2 - The data infrastructure; Two Types of Repetitive Data; Repetitive Structured Data; Repetitive Big Data; The Two Infrastructures; What's being Optimized?; Comparing the Two Infrastructures; 1.3 - The "great divide"; Classifying Corporate Data; The "Great Divide"; Repetitive Unstructured Data; Nonrepetitive Unstructured Data
Different Worlds1.4 - Demographics of corporate data; 1.5 - Corporate data analysis; 1.6 - The life cycle of data - understanding data over time; 1.7 - A brief history of data; Paper Tape and Punch Cards; Magnetic Tapes; Disk Storage; Database Management System; Coupled Processors; Online Transaction Processing; Data Warehouse; Parallel Data Management; Data Vault; Big Data; The Great Divide; 2.1 - A brief history of big data; An Analogy - Taking the High Ground; Taking the High Ground; Standardization with the 360; Online Transaction Processing Enter Teradata and Massively Parallel ProcessingThen Came Hadoop and Big Data; IBM and Hadoop; Holding the High Ground; 2.2 - What is big data?; Another Definition; Large Volumes; Inexpensive Storage; The Roman Census Approach; Unstructured Data; Data in Big Data; Context in Repetitive Data; Nonrepetitive Data; Context in Nonrepetitive Data; 2.3 - Parallel processing; 2.4 - Unstructured data; Textual Information Everywhere; Decisions Based on Structured Data; The Business Value Proposition; Repetitive and Nonrepetitive Unstructured Information; Ease of Analysis; Contextualization Some Approaches to ContextualizationMapReduce; Manual Analysis; 2.5 - Contextualizing repetitive unstructured data; Parsing Repetitive Unstructured Data; Recasting the Output Data; 2.6 - Textual disambiguation; From Narrative into an Analytical Database; Input into Textual Disambiguation; Mapping; Input/Output; Document Fracturing/Named Value Processing; Preprocessing a Document; Emails - A Special Case; Spreadsheets; Report Decompilation; 2.7 - Taxonomies; Data Models and Taxonomies; Applicability of Taxonomies; What is a Taxonomy?; Taxonomies in Multiple Languages Dynamics of Taxonomies and Textual DisambiguationTaxonomies and Textual Disambiguation - Separate Technologies; Different Types of Taxonomies; Taxonomies - Maintenance Over Time; 3.1 - A brief history of data warehouse; Early Applications; Online Applications; Extract Programs; 4GL Technology; Personal Computers; Spreadsheets; Integrity of Data; Spider-Web Systems; The Maintenance Backlog; The Data Warehouse; To an Architected Environment; To the CIF; DW 2.0; 3.2 - Integrated corporate data; Many Applications; Looking Across the Corporation; More Than One Analyst; ETL Technology The Challenges of Integration |
Record Nr. | UNINA-9910816227103321 |
Inmon W. H. | ||
Amsterdam, Netherlands : , : Morgan Kaufmann, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|