Cyber spazio e intelligence economica : vademecum alle priorità contemporanee dell'intelligence italiana / Marco Arezzini, Laris Gaiser ; prefazione (a cura) di Umberto Gori ; postfazione (a cura) di Luciano Bozzo |
Autore | Arezzini, Marco |
Pubbl/distr/stampa | [S.l.], : Il Cerchio, 2019 |
Descrizione fisica | 127 p. : ill. ; 21 cm |
Disciplina | 327.1202854678 |
Altri autori (Persone) | Gaisler, Laris |
Collana | La bottega di Eraclito |
Soggetto non controllato |
Archivi di dati - Tutela
Sicurezza informatica - Italia - Ruolo [dei] Servizi segreti |
ISBN | 978-88-8474-559-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | ita |
Record Nr. | UNINA-9910519299903321 |
Arezzini, Marco
![]() |
||
[S.l.], : Il Cerchio, 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber war : la guerra prossima ventura / Aldo Giannuli, Alessandro Curioni |
Autore | Giannuli, Aldo |
Pubbl/distr/stampa | Milano ; Udine : Mimesis, 2019 |
Descrizione fisica | 111 p. ; 21 cm |
Disciplina | 327.1202854678 |
Altri autori (Persone) | Curioni, Alessandro <1967-> |
Collana | Mimesis. Eterotopie |
Soggetto non controllato |
Controspionaggio [e] Spionaggio - Impiego [di] Internet [e] Media sociali [e] Tecniche digitali
Cibernetica - Impiego bellico |
ISBN | 978-88-575-5631-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | ita |
Record Nr. | UNINA-9910366759803321 |
Giannuli, Aldo
![]() |
||
Milano ; Udine : Mimesis, 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Open Source Intelligence and Cyber Crime [[electronic resource] ] : Social Media Analytics / / edited by Mohammad A. Tayebi, Uwe Glässer, David B. Skillicorn |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (V, 251 p. 88 illus., 69 illus. in color.) |
Disciplina | 327.1202854678 |
Collana | Lecture Notes in Social Networks |
Soggetto topico |
Computer security
Computational intelligence Sociophysics Econophysics Computer crimes Data mining Machine learning Systems and Data Security Computational Intelligence Data-driven Science, Modeling and Theory Building Cybercrime Data Mining and Knowledge Discovery Machine Learning |
ISBN | 3-030-41251-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter1. Studying the Weaponization of Social Media: Case Studies of Anti-NATO Disinformation Campaigns -- Chapter2. Cognitively-Inspired Inference for Malware Task Indentation -- Chapter3. Beyond the ‘Silk Road’: Assessing Illicit Drug Marketplaces on the Public Web -- Chapter4. Protecting the Web from Misinformation -- Chapter5. Social Media for Mental Health: Data, Methods, and Findings -- Chapter6. Twitter Bots and the Swedish Election -- Chapter7. Automated Text Analysis for Intelligence Purposes: A Psychological Operations Case Study -- Chapter8. You are Known by Your Friends: Leveraging Network Metrics for Bot Detection in Twitter -- Chapter9. Inferring Systemic Nets with Applications to Islamist Forums. |
Record Nr. | UNISA-996465457503316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Open Source Intelligence and Cyber Crime : Social Media Analytics / / edited by Mohammad A. Tayebi, Uwe Glässer, David B. Skillicorn |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (V, 251 p. 88 illus., 69 illus. in color.) |
Disciplina | 327.1202854678 |
Collana | Lecture Notes in Social Networks |
Soggetto topico |
Computer security
Computational intelligence Sociophysics Econophysics Computer crimes Data mining Machine learning Systems and Data Security Computational Intelligence Data-driven Science, Modeling and Theory Building Cybercrime Data Mining and Knowledge Discovery Machine Learning |
ISBN | 3-030-41251-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter1. Studying the Weaponization of Social Media: Case Studies of Anti-NATO Disinformation Campaigns -- Chapter2. Cognitively-Inspired Inference for Malware Task Indentation -- Chapter3. Beyond the ‘Silk Road’: Assessing Illicit Drug Marketplaces on the Public Web -- Chapter4. Protecting the Web from Misinformation -- Chapter5. Social Media for Mental Health: Data, Methods, and Findings -- Chapter6. Twitter Bots and the Swedish Election -- Chapter7. Automated Text Analysis for Intelligence Purposes: A Psychological Operations Case Study -- Chapter8. You are Known by Your Friends: Leveraging Network Metrics for Bot Detection in Twitter -- Chapter9. Inferring Systemic Nets with Applications to Islamist Forums. |
Record Nr. | UNINA-9910413437003321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Open Source Intelligence Investigation : From Strategy to Implementation / / edited by Babak Akhgar, P. Saskia Bayerl, Fraser Sampson |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (302 pages) : illustrations (some color) |
Disciplina | 327.1202854678 |
Collana | Advanced Sciences and Technologies for Security Applications |
Soggetto topico |
Computer security
Data mining Computer crimes Application software International criminal law System safety Systems and Data Security Data Mining and Knowledge Discovery Cybercrime Computer Appl. in Social and Behavioral Sciences International Criminal Law Security Science and Technology |
ISBN | 3-319-47671-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part 1: Introduction -- OSINT as an integral part of the national security apparatus.- Open Source Intelligence and the protection of national security -- Police use of Open Source Intelligence: The longer arm of law -- OSINT as part of the strategic national security landscape -- Taking stock of subjective narratives around modern OSINT -- Part 2: Methods, Tools and Techniques.-Acquisition and preparation of data for OSINT investigations -- Analysis, interpretation and validation of open source data -- OSINT and the dark web -- Fusion of OSINT and non-OSINT data -- A framework for assessing OSINT tools.-Design considerations for OSINT tools and processes.- Part 3: Practical Application and Cases -- A new age of Open Source Investigation: International examples -- Use cases and best practices for LEAs -- OSINT in the context of cyber-security -- Combatting cybercrime and sexual exploitation of children: An open source toolkit.-Identifying illegal cartel activities using open source intelligence.- Part 4: Legal Considerations -- Legal considerations for using open source intelligence in the context of cybercrime and cyberterrorism -- Following the breadcrumbs: Using Open Source Intelligence as evidence in criminal proceedings. |
Record Nr. | UNINA-9910158705203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
The Tao of open source intelligence / / Stewart K. Bertram |
Autore | Bertram Stewart K. |
Edizione | [1st edition] |
Pubbl/distr/stampa | Cambridgeshire, England : , : IT Governance Publishing, , 2015 |
Descrizione fisica | 1 online resource (137 pages) |
Disciplina | 327.1202854678 |
Soggetto topico | Open source intelligence |
ISBN |
1-84928-730-9
1-84928-729-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction: "What Can Open Source Intelligence Do For Me -- The Surface Web -- Deep Web -- The Dark Web -- Internet Security for the Smart Investigator -- Conclusion -- Annex A: Tips for Building a Credible Sock Puppet. |
Record Nr. | UNINA-9910797338803321 |
Bertram Stewart K.
![]() |
||
Cambridgeshire, England : , : IT Governance Publishing, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
The Tao of open source intelligence / / Stewart K. Bertram |
Autore | Bertram Stewart K. |
Edizione | [1st edition] |
Pubbl/distr/stampa | Cambridgeshire, England : , : IT Governance Publishing, , 2015 |
Descrizione fisica | 1 online resource (137 pages) |
Disciplina | 327.1202854678 |
Soggetto topico | Open source intelligence |
ISBN |
1-84928-730-9
1-84928-729-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction: "What Can Open Source Intelligence Do For Me -- The Surface Web -- Deep Web -- The Dark Web -- Internet Security for the Smart Investigator -- Conclusion -- Annex A: Tips for Building a Credible Sock Puppet. |
Record Nr. | UNINA-9910816707503321 |
Bertram Stewart K.
![]() |
||
Cambridgeshire, England : , : IT Governance Publishing, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|