top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Critical Information Infrastructures Security [[electronic resource] ] : 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papers / / edited by Erich Rome, Marianthi Theocharidou, Stephen Wolthusen
Critical Information Infrastructures Security [[electronic resource] ] : 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papers / / edited by Erich Rome, Marianthi Theocharidou, Stephen Wolthusen
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XIII, 266 p. 74 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computers and civilization
Computer communication systems
Application software
Computer system failures
Management information systems
Computer science
Systems and Data Security
Computers and Society
Computer Communication Networks
Information Systems Applications (incl. Internet)
System Performance and Evaluation
Management of Computing and Information Systems
ISBN 3-319-33331-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Critical information infrastructure protection -- Critical infrastructure resilience assessment -- Emergency management: critical infrastructure preparedness -- Modelling, simulation and analysis approaches -- Electric grid protection and resilience -- CIPRNet young CRITIS award candidate papers.
Record Nr. UNISA-996465971003316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Critical Information Infrastructures Security : 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papers / / edited by Erich Rome, Marianthi Theocharidou, Stephen Wolthusen
Critical Information Infrastructures Security : 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papers / / edited by Erich Rome, Marianthi Theocharidou, Stephen Wolthusen
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XIII, 266 p. 74 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computers and civilization
Computer communication systems
Application software
Computer system failures
Management information systems
Computer science
Systems and Data Security
Computers and Society
Computer Communication Networks
Information Systems Applications (incl. Internet)
System Performance and Evaluation
Management of Computing and Information Systems
ISBN 3-319-33331-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Critical information infrastructure protection -- Critical infrastructure resilience assessment -- Emergency management: critical infrastructure preparedness -- Modelling, simulation and analysis approaches -- Electric grid protection and resilience -- CIPRNet young CRITIS award candidate papers.
Record Nr. UNINA-9910484378303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Critical Infrastructure Security and Resilience : Theories, Methods, Tools and Technologies / / edited by Dimitris Gritzalis, Marianthi Theocharidou, George Stergiopoulos
Critical Infrastructure Security and Resilience : Theories, Methods, Tools and Technologies / / edited by Dimitris Gritzalis, Marianthi Theocharidou, George Stergiopoulos
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (311 pages)
Disciplina 005.8
004
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Computer security
System safety
Data protection
Computer communication systems
Application software
Computer crimes
Systems and Data Security
Security Science and Technology
Security
Computer Communication Networks
Computer Appl. in Administrative Data Processing
Cybercrime
ISBN 3-030-00024-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Resilience Approach to Critical Information Infrastructures -- Methodologies and Strategies for Critical Infrastructure Protection -- Risk Analysis for Critical Infrastructure Protection -- On Risk-Based Analysis of the Vulnerability of Urban Infrastructure to the Consequences of Climate Change -- Identification of Vulnerabilities in Networked Systems -- Game-Theoretic Decision Making for the Resilience of Interdependent Infrastructures Exposed to Disruptions -- Smallest Pseudo Target Set Identification and Related Problems Using the Implicative Interdependency Model -- Leveraging Network Theory and Stress Tests to Assess Interdependencies in Critical Infrastructures -- Micro-Grid Control Security Analysis: Analysis of Current and Emerging Vulnerabilities -- Engineering Edge Security in Industrial Control Systems -- Secure Interconnection of IT-OT Networks in the Industry 4 -- Analysis and Triage of Advanced Hacking Groups Targeting Western Countries Critical National Infrastructure: APT28, Red October, and REGIN -- Aviation Cybersecurity and Cyber-Resilience: Assessing Risk in Air Traffic Management -- Open Source Intelligence for Energy Sector Cyberattacks -- A Target-Based Classification Method of Side Channel Attacks Towards Critical Infrastructure Protection.
Record Nr. UNINA-9910337575803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information security education : information security in action : 13th IFIP WG 11.8 World Conference, WISE 13, Maribor, Slovenia, September 21-23, 2020, Proceedings / / Lynette Drevin, Suné Von Solms, Marianthi Theocharidou, editors
Information security education : information security in action : 13th IFIP WG 11.8 World Conference, WISE 13, Maribor, Slovenia, September 21-23, 2020, Proceedings / / Lynette Drevin, Suné Von Solms, Marianthi Theocharidou, editors
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2020]
Descrizione fisica 1 online resource (X, 199 p. 10 illus.)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Computer security - Study and teaching
Internet - Security measures
ISBN 3-030-59291-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Teaching Methods and Tools -- Learning and Grading Cryptology via Automated Test Driven Software Development -- An Institutional Risk Reduction Model for Teaching Cybersecurity -- Education for the multifaith community of cybersecurity -- Quality Criteria for Cyber Security MOOCs -- An Analysis and Evaluation of Open-source CTF Platforms as Cybersecurity e-Learning Tools -- Cybersecurity Knowledge within the Organisation -- Designing Competency Models for Cybersecurity Professionals for the Banking Sector -- Exploring the Value of a Cyber Threat Intelligence Function in an Organization -- Automating the Communication of Cybersecurity Knowledge: Multi-Case Study -- Gaming for Cybersecurity Training -- A serious game-based peer-instruction digital forensics workshop -- Threat Poker: Gamication of Secure Agile -- Teaching of Detection and Forensics -- How to Teach the Undecidability of Malware Detection Problem and Halting Problem -- Enlivening Port Scanning Exercises with Capture the Flag and Deduction -- Encouraging Equivocal Forensic Analysis through the Use of Red Herrings.
Record Nr. UNISA-996465368003316
Cham, Switzerland : , : Springer, , [2020]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security Education Across the Curriculum : 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedings / / edited by Matt Bishop, Natalia Miloslavskaya, Marianthi Theocharidou
Information Security Education Across the Curriculum : 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedings / / edited by Matt Bishop, Natalia Miloslavskaya, Marianthi Theocharidou
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XII, 159 p. 44 illus.)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Education - Data processing
Data protection
Application software
Electronic data processing - Management
Educational technology
Teachers - Training of
Computers and Education
Data and Information Security
Computer and Information Systems Applications
IT Operations
Digital Education and Educational Technology
Teaching and Teacher Education
ISBN 3-319-18500-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Realism in Teaching Cyber security Research: The Agile Research Process -- Assurance Cases as a Didactic Tool for Information Security -- Cognitive Task Analysis Based Training for Cyber Situation Awareness -- A Cyber Security Multi Agency Collaboration for Rapid Response that Uses AGILE Methods on an Education Infrastructure -- Cyber security Through Secure Software Development -- Security Injections 2.0: Increasing Engagement and Faculty Adoption Using Enhanced Secure Coding Modules for Lower-Level Programming Courses -- The Use of Software Design Patterns to Teach Secure Software Design: An Integrated Approach -- Learn to Spot Phishing URLs with the Android No Phish App -- An Innovative Approach in Digital Forensic Education and Training -- On Experience of Using Distance Learning Technologies for Teaching Cryptology -- Reflections on the Ethical Content of the IT Honours Program Project Module -- Professional Competencies Level Assessment for Training of Masters in Information Security -- History of Cryptography in Syllabus on Information Security Training.
Record Nr. UNINA-9910299236503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security Education for a Global Digital Society : 10th IFIP WG 11.8 World Conference, WISE 10, Rome, Italy, May 29-31, 2017, Proceedings / / edited by Matt Bishop, Lynn Futcher, Natalia Miloslavskaya, Marianthi Theocharidou
Information Security Education for a Global Digital Society : 10th IFIP WG 11.8 World Conference, WISE 10, Rome, Italy, May 29-31, 2017, Proceedings / / edited by Matt Bishop, Lynn Futcher, Natalia Miloslavskaya, Marianthi Theocharidou
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XII, 169 p. 20 illus.)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Education - Data processing
Data protection
Educational technology
Social sciences - Data processing
Teachers - Training of
Computers and Education
Data and Information Security
Digital Education and Educational Technology
Computer Application in Social and Behavioral Sciences
Teaching and Teacher Education
ISBN 3-319-58553-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910254815303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security Education – Towards a Cybersecure Society : 11th IFIP WG 11.8 World Conference, WISE 11, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18–20, 2018, Proceedings / / edited by Lynette Drevin, Marianthi Theocharidou
Information Security Education – Towards a Cybersecure Society : 11th IFIP WG 11.8 World Conference, WISE 11, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18–20, 2018, Proceedings / / edited by Lynette Drevin, Marianthi Theocharidou
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (X, 147 p. 17 illus.)
Disciplina 374.26
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Education - Data processing
Software engineering
Data structures (Computer science)
Information theory
Application software
Computers and Education
Software Engineering
Data Structures and Information Theory
Computer and Information Systems Applications
ISBN 3-319-99734-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Short Workshop Descriptions -- SecTech Cybersecurity Curriculum Workshop -- Cyber Ranges and Cyber Challenges: Proposal to Form a New TC11.8 Work Group -- Contents -- Information Security Learning Techniques -- A Design for a Collaborative Make-the-Flag Exercise -- 1 Introduction -- 2 Background -- 3 The Make-the-Flag Exercise -- 3.1 Organizing the Contest -- 3.2 Preparing the Teams -- 3.3 Running the Exercise -- 3.4 Evaluating the Results -- 4 Variations on This Theme -- 5 Conclusion -- References -- ForenCity: A Playground for Self-Motivated Learning in Computer Forensics -- 1 Introduction -- 2 Designing an Effective Learning Tool -- 3 ForenCity Engine Design -- 3.1 Design Influence -- 3.2 Basic Gameplay Activity -- 4 ForenCity Engine Implementation -- 4.1 ForenCity Maker -- 4.2 Download Implementation -- 4.3 GPS Scene Requirement -- 4.4 QR Code Scene Requirement -- 4.5 Miscellaneous Functionality -- 5 Solving for a Kidnapping -- 6 Future Implementation -- 7 Conclusion -- References -- Developing Hands-On Laboratory Works for the "Information Security Incident Management" Discipline -- Abstract -- 1 Introduction -- 2 Related Work -- 3 General Description of the Labs Developed -- 4 Basic Principles of Performing the Labs -- 5 Regulatory Framework for the Labs -- 6 Students' Assignments and Labs' Scenario -- 7 Recommended Strategies for TDs's Analysis -- 8 Investigative Software -- 9 The Laboratory Testbed -- 10 Conclusion -- Acknowledgement -- References -- A Pilot Study in Cyber Security Education Using CyberAIMs: A Simulation-Based Experiment -- 1 Introduction -- 1.1 Learning Benefits -- 1.2 Outline of the Paper -- 2 Research Methodology -- 2.1 Research Questions -- 2.2 Research Methodology -- 3 CyberAIMs -- 4 Study Results -- 4.1 Pre-simulation Survey -- 4.2 Scenario Results -- 4.3 Post-simulation Survey.
5 Discussion and Conclusions -- 5.1 Additional Comments -- 5.2 Conclusions -- References -- Information Security Training and Awareness -- Towards Educational Guidelines for the Security Systems Engineer -- Abstract -- 1 Introduction -- 2 Overview of the Current Systems Engineering Landscape -- 3 Methodology -- 4 Analysis of Security Activities in the SDLC -- 4.1 Responsibilities of the Systems Engineer in the SDLC -- 4.2 Overview of the SDLC -- 4.3 Content Analysis of Security in Systems Engineering Processes -- 5 Analysis of Security Activities in the S-SDLC -- 5.1 Overview of the S-SDLC -- 5.2 Responsibilities of the Systems Engineer -- 5.3 Content Analysis of Security in S-SDLC -- 6 Discussion and Recommendations -- 7 Conclusion -- References -- The Feasibility of Raising Information Security Awareness in an Academic Environment Using SNA -- Abstract -- 1 Introduction -- 2 Background -- 2.1 Social Network Analysis -- 2.2 Network Formality -- 3 Method -- 3.1 Illustrative Examples -- 4 Discussion -- 5 Conclusion -- Factors Influencing Smartphone Application Downloads -- Abstract -- 1 Introduction -- 2 Smartphone Usage -- 3 Typical Factors Within Application Listings -- 4 Research Process -- 5 Results and Findings -- 5.1 General Factors -- 5.2 Security Factors -- 6 Towards an Educational Intervention -- 7 Conclusion -- Acknowledgements -- References -- Information Security Courses and Curricula -- A MOOC on Privacy by Design and the GDPR -- 1 Introduction -- 2 Designing the PbD Course -- 3 Modules, Content and Learning Outcomes -- 3.1 The Course Modules and Their Content -- 3.2 The Learning Outcomes -- 4 Teaching Methods and Course Deployment -- 4.1 Course Deployment -- 4.2 Enrollment and Participants -- 4.3 Examination -- 5 Related Work -- 6 Discussion -- 7 Conclusions -- References.
Forming the Abilities of Designing Information Security Maintenance Systems in the Implementation of Educational Programmes in Information Security -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Is Ensuring Process Model -- 4 Our Regulations for Forming the Abilities -- 5 Our Experience in Forming the Abilities -- 6 Conclusion -- Acknowledgement -- References -- Identifying the Cybersecurity Body of Knowledge for a Postgraduate Module in Systems Engineering -- Abstract -- 1 Introduction -- 2 Curriculum Development for the Cybersecurity Skills Gap -- 3 Methodology -- 4 Towards Determining the Structure/Context for a Cybersecurity Engineering Module -- 4.1 Overview of South African Postgraduate Engineering Degrees -- 4.2 Cybersecurity Curricular Guidelines -- 5 Cybersecurity Knowledge Through the Engineering Lens -- 6 Basic Outline of Cybersecurity Knowledge Areas for Postgraduate Engineering Studies -- 7 Conclusion -- References -- A National Certification Programme for Academic Degrees in Cyber Security -- Abstract -- 1 Introduction -- 2 Academic Degrees in Cyber Security -- 3 Establishing a Certification Programme -- 4 The Degree Certification Process and Uptake -- 5 Lessons Learned -- 6 Conclusions -- Acknowledgements -- References -- Author Index.
Record Nr. UNINA-9910299353803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security Education. Education in Proactive Information Security : 12th IFIP WG 11.8 World Conference, WISE 12, Lisbon, Portugal, June 25–27, 2019, Proceedings / / edited by Lynette Drevin, Marianthi Theocharidou
Information Security Education. Education in Proactive Information Security : 12th IFIP WG 11.8 World Conference, WISE 12, Lisbon, Portugal, June 25–27, 2019, Proceedings / / edited by Lynette Drevin, Marianthi Theocharidou
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (X, 171 p. 33 illus., 13 illus. in color.)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Education - Data processing
Computer engineering
Computer networks
Data protection
Social sciences - Data processing
User interfaces (Computer systems)
Human-computer interaction
Computers and Education
Computer Engineering and Networks
Data and Information Security
Computer Application in Social and Behavioral Sciences
User Interfaces and Human Computer Interaction
ISBN 3-030-23451-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910337842703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security Education. Information Security in Action : 13th IFIP WG 11.8 World Conference, WISE 13, Maribor, Slovenia, September 21–23, 2020, Proceedings / / edited by Lynette Drevin, Suné Von Solms, Marianthi Theocharidou
Information Security Education. Information Security in Action : 13th IFIP WG 11.8 World Conference, WISE 13, Maribor, Slovenia, September 21–23, 2020, Proceedings / / edited by Lynette Drevin, Suné Von Solms, Marianthi Theocharidou
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (X, 199 p. 10 illus.)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Education - Data processing
Data protection
Computer engineering
Computer networks
Social sciences - Data processing
Computers and Education
Data and Information Security
Computer Engineering and Networks
Computer Application in Social and Behavioral Sciences
ISBN 3-030-59291-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Teaching Methods and Tools -- Learning and Grading Cryptology via Automated Test Driven Software Development -- An Institutional Risk Reduction Model for Teaching Cybersecurity -- Education for the multifaith community of cybersecurity -- Quality Criteria for Cyber Security MOOCs -- An Analysis and Evaluation of Open-source CTF Platforms as Cybersecurity e-Learning Tools -- Cybersecurity Knowledge within the Organisation -- Designing Competency Models for Cybersecurity Professionals for the Banking Sector -- Exploring the Value of a Cyber Threat Intelligence Function in an Organization -- Automating the Communication of Cybersecurity Knowledge: Multi-Case Study -- Gaming for Cybersecurity Training -- A serious game-based peer-instruction digital forensics workshop -- Threat Poker: Gamication of Secure Agile -- Teaching of Detection and Forensics -- How to Teach the Undecidability of Malware Detection Problem and Halting Problem -- Enlivening Port Scanning Exercises with Capture the Flag and Deduction -- Encouraging Equivocal Forensic Analysis through the Use of Red Herrings.
Record Nr. UNINA-9910427685803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui