top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
The A-Z guide to food as medicine / / Diane Kraft
The A-Z guide to food as medicine / / Diane Kraft
Autore Kraft Diane <1963->
Edizione [Second edition.]
Pubbl/distr/stampa Boca Raton : , : CRC Press LLC, , 2019
Descrizione fisica 1 online resource (438 pages)
Disciplina 613.2
Soggetto topico Functional Food
Nutritive Value
Phytotherapy
human nutrition
processed food product
health care
public health
nutrition
nutritional disease
ISBN 0-429-48628-6
0-429-94251-6
9781138598546
9780429942518
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Table of ContentsForewordPrefaceAcknowledgmentsAuthorChapter AChapter B Chapter C Chapter DChapter EChapter F Chapter GChapter HChapter IChapter JChapter K Chapter LChapter MChapter N Chapter OChapter P Chapter QChapter RChapter SChapter T Chapter UChapter VChapter WChapter X Chapter YChapter ZAppendix 1: Major Phytochemical Groups and Specific Phytochemicals Addressed in The A-Z Guide to Food as Medicine, 2nd edAppendix 2: Reference Daily Intakes Used to Calculate % DVs in The A-Z Guide to Food as Medicine, 2nd edAppendix 3: Definitions of Drug Terms Used in The A-Z Guide to Food as Medicine, 2nd edIndex.
Record Nr. UNINA-9910793309403321
Kraft Diane <1963->  
Boca Raton : , : CRC Press LLC, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Addressing Global Challenges - Exploring Socio-Cultural Dynamics and Sustainable Solutions in a Changing World : Proceedings of International Symposium on Humanities and Social Sciences (ISHSS 2023, August 11-13, 2023, Macau, China)
Addressing Global Challenges - Exploring Socio-Cultural Dynamics and Sustainable Solutions in a Changing World : Proceedings of International Symposium on Humanities and Social Sciences (ISHSS 2023, August 11-13, 2023, Macau, China)
Autore Martial Eloundou-Enyegue Parfait
Edizione [1st ed.]
Pubbl/distr/stampa Milton : , : CRC Press LLC, , 2024
Descrizione fisica 1 online resource (963 pages)
Disciplina 153.9
Altri autori (Persone) M. Eloundou-EnyegueParfait
Soggetto topico Intellect
International relations
Sustainable development
ISBN 1-04-010833-4
1-03-267604-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Title Page -- Copyright -- Table of Contents -- Preface -- Committee -- International relations and diplomacy -- North Korea's denuclearization: Obstacles and prospects from multinational aspect -- 1 Introduction -- 2 Us Aspect of Denuclearization -- 2.1 US effort for denuclearization: negotiations and sanctions -- 2.2 Why the US exaggerates the DPRK& -- x00027 -- s nuclear issue? -- 3 China's Attitude Toward Denuclearization and the Reasons -- 4 South Korea's Aspect of Denuclearization -- 4.1 South Korean government& -- x00027 -- s actions - negotiations -- 4.2 South Korea& -- x00027 -- s sanctions against North Korea -- 4.3 Reasons why South Korea takes sanctions instead of maintaining negotiations -- 5 North Korea's Aspect of Denuclearization: Obstacles and Prospects -- 6 Discussion of International Sanctions, Other Countries and Institutes -- 7 Conclusion -- Author Contribution -- References -- The image of the "other" in popular culture and diplomatic relations between China and Japan-Japanese anime and Chinese television drama as examples -- 1 Introduction -- 2 Extremely One-Sided Symbolic Opposite Images before the 1980s -- 2.1 China& -- x00027 -- s demonization and clowning of Japan -- 2.2 Japan& -- x00027 -- s "orientalism" shaping of China -- 3 Objective and Friendly Images from the 1990s to the Early 21st Century -- 3.1 China& -- x00027 -- s authenticity, advanced shaping of Japan -- 3.2 Japan& -- x00027 -- s diverse and dynamic shaping of China -- 4 Diverse Images after Heightened Conflict since the 2008 Global Financial Crisis -- 4.1 China& -- x00027 -- s mixed attitudes towards Japan with dominance of negative elements -- 4.2 Japan& -- x00027 -- s portrait of China as a "powerful but failed" imaginary enemy -- 5 Conclusion -- References.
Analysis of China-Laos relations-from the perspective of U.S.-China strategic competition, ASEAN and Laos -- 1 Introduction -- 2 The International Situation and ASEAN in its Context -- 2.1 U.S. "Indo-Pacific strategy" to strengthen the U.S. presence in the Indo-Pacific region -- 2.2 China& -- x00027 -- s periphery policy -- 2.3 ASEAN& -- x00027 -- s attitude under the U.S.-China strategic competition -- 2.3.1 Generally neutral attitudes -- 2.3.2 Seriously divided internally -- 2.4 China-ASEAN cooperation with third-party competition -- 3 Analysis of China-Laos Relations -- 3.1 The practice of friendly relations between China and Laos -- 3.2 Reasons for the developing of Sino-Laos relations -- 4 Future Development of China-Laos Relations from the Perspective of Laos -- 4.1 Relatively weak comprehensive national power -- 4.2 Poor conditions for external economic development -- 5 Conclusion -- References -- How consensus building affects U.S. foreign policy toward East Asia: The U.S. under the Trump Era and the Biden Era as examples -- 1 Introduction -- 2 Overview of U.S. Foreign Policy and its Values Diplomacy -- 3 U.S. Identity Shaping in East Asia -- 4 Constructivist Analysis of U.S. Diplomacy -- 4.1 Subjective identity shaping -- 4.2 Expectations for the countries in the region -- 4.3 Interaction of structures and actors -- 5 Constructivist Analysis of U.S. Diplomacy -- 6 Conclusion -- References -- From the perspective of cross-border data flow challenges and countermeasures of China's joining CPTPP -- 1 Introduction -- 2 Provisions on Cross-border Data Flow in CPTPP -- 2.1 The high standards and compatibility of personal information protection -- 2.2 The freedom and inclusiveness of cross-border data flow -- 3 The Legal Regulation of Cross-border Data Flow in China -- 3.1 Legal regulation of outbound data.
3.2 Legal regulation of outbound data -- 4 China& -- x00027 -- s Difficulties in Connecting with CPTPP in Terms of Cross-border Data Flow -- 4.1 Domestic legislation: the system is harsh and difficult to connect with the public -- 4.1.1 The system is too strict -- 4.1.2 It is difficult to connect public policies -- 4.2 Extraterritorial law enforcement: paying too much attention to "defense" -- 4.2.1 Blank extraterritorial jurisdiction -- 4.2.2 Pay too much attention to "defense" in data retrieval -- 4.3 Judicial procedure: the application of law is "mechanical" -- 4.3.1 The trial mode is too traditional -- 4.3.2 Lack of international cooperation and protection mechanisms outside the territory -- 5 Suggestions on The Cross-border Flow of CPTPP Data in China& -- x00027 -- s Domestic Law -- 5.1 Optimizing the legislative system -- 5.1.1 Renew the concept, giving consideration to national information security, personal privacy protection and freedom of data flow -- 5.1.2 Define the safety assessment standards -- 5.2 Improve the extraterritorial law enforcement rules -- 5.2.1 Providing extraterritorial jurisdiction according to the grade type of data -- 5.2.2 Appropriately expand judicial jurisdiction and refine the legal procedures for cross-border data retrieval -- 5.3 Improve the judicial protection mechanism -- 5.3.1 Optimize the court handling mechanism -- 5.3.2 Take an active part in the governance of global cross-border data -- 6 Conclusion -- Author Contribution -- References -- Relations between China and Thailand after the establishment of the People's Republic of China -- 1 Introduction -- 2 Sino-Thai Relations in the 1950s-1970s -- 2.1 Overview of relations between China and Thailand in the 1950s and 1970s -- 2.2 Reasons for antagonistic and hostile relations- from the perspective of China and Thailand.
2.3 Influence of extraterritorial powers and international environment -- 2.4 Limited contacts -- 3 Establishment of Diplomatic Relations between China and Thailand -- 3.1 The transformation and concreate practice at the early stage of the establishment of diplomatic relations -- 3.1.1 Political exchanges between China and Thailand -- 3.1.2 Economic cooperation and trade between China and Thailand -- 3.2 Impact of the changes in the international situation -- 3.2.1 The Sino-Soviet split and the wave of establishing diplomatic relations -- 3.2.2 The non-aligned movement and the rise of third world countries -- 3.2.3 Geopolitics of the Indo-China peninsula -- 3.2.4 Impact of changes in the international situation on Thailand -- 3.3 The wave of establishing diplomatic relations in China -- 4 Conclusion -- Author Contribution -- References -- Collaborative security model in East Asia: Possibilities and challenges -- 1 Introduction -- 2 Background of Chinese Collaborative Security Model -- 3 Possibilities of Chinese Collaborative Security in East Asia -- 3.1 The rise of China and its influence on collaborative security -- 3.2 China& -- x00027 -- s adherence to the principle of equality -- 4 Challenges of Chinese Collaborative Security in East Asia -- 4.1 China-US competition -- 4.2 Historical entanglement -- 4.3 Territorial disputes -- 4.4 Lack of cooperating motivation in other East Asian countries -- 4.5 Lack of dialogue and cooperation mechanism -- 5 Conclusion -- Author Contribution -- References -- Vietnam's construction of historical memory of China and its impact on bilateral relations -- 1 Introduction -- 2 Confucianism, War and Tribute Relations -- 3 Vietnamese Reinterpretation of Sino-Vietnamese History during the French Colonization -- 4 Changing Views on Vietnam& -- x00027 -- s History of China during the Cold War -- 5 Conclusion.
References -- A study on phonetic transfer from the view of loanwords and its influence on cross-cultural communication -- 1 Introduction -- 2 Method -- 3 Result and Discussion -- 3.1 Perception of beginners -- 3.2 L1 transfer for beginners -- 3.3 L1 transfer for beginners -- 3.4 Influence on cross-cultural communication -- 3.5 Implications for EFL pedagogies -- 4 Conclusion -- References -- Faith at the forefront: An analysis of the contributions and dilemmas of faith-based organizations to global governance and human rights issues -- 1 Introduction -- 2 Participation and Functions of FBOs in Global Governance -- 2.1 Religion as moral authority -- 2.2 Promote global governance -- 2.3 Raising public awareness -- 3 Challenges in the Global Environmental Governance and Human Rights Discourse -- 3.1 Tensions between the religious and secular worlds -- 3.2 Conflict between human rights concepts and religious beliefs -- 3.3 Political and economic challenges and external pressures -- 4 Recommendations on How to Work Effectively with FBOs -- 5 Conclusion -- References -- Tying the knot: A comparative study of marriage ceremonies among emigrant and native Korean minority -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Results and Discussions -- 5 Assumptions Compared and Limitations -- 6 Conclusion -- References -- Peer pressure and behavior: The relation, moderators and precaution -- 1 Introduction -- 2 The Relation Between Peer Pressure and Behavior -- 2.1 Negative influence -- 2.2 Positive influence -- 3 The Moderating Factors Between Peer Pressure and Behavior -- 3.1 Gender -- 3.2 Parental influence -- 3.3 Psychological cues -- 4 Suggestions for Precaution of Bad Behavior -- 4.1 Starting from the root: Change social expectation to behavior -- 4.2 Improving from the surface: Change group behavior norm -- 5 Conclusion -- References.
Analysis of solutions for second-generation Chinese immigrants in the United States.
Record Nr. UNINA-9910866391303321
Martial Eloundou-Enyegue Parfait  
Milton : , : CRC Press LLC, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Carbon Management Technologies . Volume 1 Carbon Removal, Renewable and Nuclear Energy / / editor, Subhas K Sikdar, Frank Princiotta
Advances in Carbon Management Technologies . Volume 1 Carbon Removal, Renewable and Nuclear Energy / / editor, Subhas K Sikdar, Frank Princiotta
Edizione [1st ed.]
Pubbl/distr/stampa Boca Raton, FL, : CRC Press LLC, 2020
Descrizione fisica 1 online resource (477 pages)
Disciplina 628.532
Altri autori (Persone) SikdarSubhas K
PrinciottaFrank T
Soggetto topico Carbon dioxide mitigation - Technological innovations
Clean energy - Technological innovations
ISBN 9781523144044
1523144041
9780429513329
0429513321
9780429516757
0429516754
9780429243608
042924360X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto volume 1. Carbon removal, renewable and nuclear energy --
Record Nr. UNINA-9910831846203321
Boca Raton, FL, : CRC Press LLC, 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Age-period-cohort analysis : new models, methods, and empirical applications / / Yang Yang and Kenneth C. Land
Age-period-cohort analysis : new models, methods, and empirical applications / / Yang Yang and Kenneth C. Land
Autore Yang Yang <1975->
Edizione [1st edition]
Pubbl/distr/stampa 2016
Descrizione fisica 1 online resource (339 p.)
Disciplina 001.42/2
001.422
Collana Chapman & Hall/CRC interdisciplinary statistics series
Soggetto topico Cohort analysis
Age groups - Statistical methods
ISBN 9781000218732
1000218732
9780429096204
0429096208
9781466507531
1466507535
Classificazione FAM039000MAT029000SOC026000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Introduction -- 2. Why cohort analysis? -- 3. APC analysis of data from three common research designs -- 4. Formalities of the age-period-cohort analysis conundrum and a generalized linear mixed models (GLMM) framework -- 5. APC accounting/multiple classification model, part I : model identification and estimation using the intrinsic estimator -- 6. APC accounting/multiple classification model, part II : empirical applications -- 7. Mixed effects models : hierarchical APC-cross-classified random effects models (HAPC-CCREM), part I : the basics -- 8. Mixed effects models : hierarchical APC-cross-classified random effects models (HAPC-CCREM), part II : advanced analyses -- 9. Mixed effects models : hierarchical APC-growth curve analysis of prospective cohort data -- 10. Directions for future research and conclusion.
Record Nr. UNINA-9910765992203321
Yang Yang <1975->  
2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Artificial Intelligence and Machine Learning for Business for Non-Engineers [[electronic resource]]
Artificial Intelligence and Machine Learning for Business for Non-Engineers [[electronic resource]]
Autore Jones Stephan
Pubbl/distr/stampa Milton, : CRC Press LLC, 2019
Descrizione fisica 1 online resource (165 pages)
Disciplina 006.3
Altri autori (Persone) GroomFrank M
Collana Technology for Non-Engineers
Soggetto topico Artificial intelligence
ISBN 1-000-73399-8
1-000-73365-3
0-367-82165-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910793820903321
Jones Stephan  
Milton, : CRC Press LLC, 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Bacterial nanocellulose : a sophisticated multifunctional material / / edited by Miguel Gama, Paul Gatenholm, Dieter Klemm
Bacterial nanocellulose : a sophisticated multifunctional material / / edited by Miguel Gama, Paul Gatenholm, Dieter Klemm
Autore Gama Miguel
Edizione [1st ed.]
Pubbl/distr/stampa 2016
Descrizione fisica 1 online resource (275 p.)
Disciplina 579.3/17
579.317
660.6
Collana Perspectives in nanotechnology
Soggetto topico Bacteria
Cellulose - Chemistry
ISBN 9781000218664
100021866X
9780429109430
0429109431
9781439869925
1439869928
Classificazione MED009000SCI003000SCI006000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Biosynthesis of bacterial cellulose / Inder M. Saxena and R. Malcolm Brown, Jr. -- 2. Effect of cultivation conditions on the structure and morphological properties of BNC biomaterials with a focus on vascular grafts / Paul Gatenholm. [et al.] -- 3. Large-scale production of BNC : state and challenges / Dana Kralisch and Nadine Hessler -- 4. Tough bacterial nanocellulose hydrogels based on the double-network technique / Anamul Haque, Takayuki Kurokawa, and Jian Ping Gong -- 5. Bacterial cellulose surface modifications / Joao P. Silva, Fabia K. Andrade, and Francisco Miguel Gama -- 6. Nematic ordered cellulose templates / Tetsuo Kondo -- 7. Applications and products : Nata de Coco / Muenduen Phisalaphong and Nadda Chiaoprakobkij -- 8. Wound dressings and cosmetic materials from bacterial nanocellulose / Stanislaw Bielecki. [et al.] -- 9. Bacterial nanocellulose hydrogels designed as bioartificial medical implants / Dieter Klemm. [et al.] -- 10. Bacterial nanocellulose biomaterials with controlled architecture for tissue engineering scaffolds and customizable implants / Paul Gatenholm. [et al.] -- 11. Biomimetic mineralization of apatite on bacterial cellulose / Thi Thi Nge and Junji Sugiyam -- 12. Bacterial nanocellulose as a structured platform for conductive biopolymers / Fernando Dourado. [et al.].
Record Nr. UNINA-9910416126903321
Gama Miguel  
2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Big Data Analytics and Computing for Digital Forensic Investigations [[electronic resource]]
Big Data Analytics and Computing for Digital Forensic Investigations [[electronic resource]]
Pubbl/distr/stampa Milton, : CRC Press LLC, 2020
Descrizione fisica 1 online resource (235 pages) : illustrations
Disciplina 363.25968
Altri autori (Persone) SatpathySuneeta
MohantySachi Nandan
Soggetto topico Computer crimes - Investigation
ISBN 1-00-302474-2
1-000-04503-X
1-000-04505-6
1-003-02474-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910794188703321
Milton, : CRC Press LLC, 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Big Data Analytics and Computing for Digital Forensic Investigations
Big Data Analytics and Computing for Digital Forensic Investigations
Edizione [1st ed.]
Pubbl/distr/stampa Milton, : CRC Press LLC, 2020
Descrizione fisica 1 online resource (235 pages) : illustrations
Disciplina 363.25968
005.7
Altri autori (Persone) SatpathySuneeta
MohantySachi Nandan
Soggetto topico Computer crimes - Investigation
ISBN 1-00-302474-2
1-000-04503-X
1-000-04505-6
1-003-02474-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Preface -- Acknowledgments -- Editors -- Contributors -- Chapter 1 Introduction to Digital Forensics -- 1.1 Digital Forensics Overview -- 1.1.1 Definitions of Digital Forensics -- 1.1.2 The 3A's of Digital Forensics Methodology -- 1.1.3 The History of Digital Forensics -- 1.1.4 The Objectives of Digital Forensics -- 1.2 Digital Evidence -- 1.2.1 Active Data -- 1.2.2 Archival Data -- 1.2.3 Latent Data -- 1.2.4 Residual Data -- 1.3 Branches of Digital Forensics -- 1.3.1 Computer Forensics -- 1.3.2 Network Forensics -- 1.3.3 Software Forensics -- 1.3.4 Mobile Forensics -- 1.3.5 Memory Forensics -- 1.3.6 Malware Forensics -- 1.3.7 Database Forensics -- 1.3.8 Social Network Forensics -- 1.3.9 Anti-Forensics -- 1.3.10 Cloud Forensics -- 1.3.11 Bit Coin Forensics -- 1.3.12 Big Data Forensics -- 1.4 Phases of Forensic Investigation Process -- 1.4.1 Readiness -- 1.4.2 Identification -- 1.4.3 Collection -- 1.4.4 Analysis -- 1.4.5 Presentation -- 1.4.5.1 Chain of Custody -- 1.5 Conclusion -- References -- Chapter 2 Digital Forensics and Digital Investigation to Form a Suspension Bridge Flanked by Law Enforcement, Prosecution, and Examination of Computer Frauds and Cybercrime -- 2.1 Forensic Science and Digital Forensics -- 2.2 Digital Forensics -- 2.2.1 Digital Evidence -- 2.3 Segments of Digital Forensics -- 2.3.1 Preparation -- 2.3.1.1 An Investigative Plan -- 2.3.1.2 Training and Testing -- 2.3.1.3 Equipment -- 2.4 Compilation -- 2.4.1 Evidence Search and Collection -- 2.4.2 Data Recovery -- 2.4.3 Assessment -- 2.4.4 Post-Assessment -- 2.5 Stepladder of Digital Forensic Investigation Model -- 2.5.1 Recognition of Sources of Digital Evidence -- 2.5.2 Conservation of Evidentiary Digital Data -- 2.5.3 Mining of Evidentiary Data from Digital Media Sources.
2.5.4 Recording of Digital Evidence in Form of Report -- 2.6 Disciplines of Digital Forensics -- 2.6.1 Computer Forensics -- 2.6.2 Network Forensics -- 2.6.3 Software Forensics -- 2.7 Digital Crime Investigative Tools and Its Overview -- 2.7.1 EnCase Toolkit -- 2.7.2 Forensic Toolkit -- 2.7.3 SafeBack Toolkit -- 2.7.4 Storage Media Archival Recovery Toolkit -- 2.8 Taxonomy of Digital Crime Investigative Tools -- 2.8.1 Functionalities of Digital Investigative Tool Can Be Grouped under -- 2.8.1.1 Replica of the Hard Drive -- 2.8.1.2 Investigational Analysis -- 2.8.1.3 Presentation -- 2.8.1.4 Documentary Reporting -- 2.9 Boundaries and Commendations of Digital Crime Investigative Tools -- 2.10 Conclusion -- References -- Chapter 3 Big Data Challenges and Hype Digital Forensic: A Review in Health Care Management -- 3.1 Introduction -- 3.2 Big Data for Health Care -- 3.3 Big Data for Health Care Strategy Making -- 3.3.1 Pattern Developments -- 3.3.2 Evaluation and Interpretation -- 3.3.3 Result and Usage -- 3.4 Opportunity Generation and Big Data in Health Care Sector -- 3.4.1 Value Creation -- 3.5 Big Data and Health Care Sector Is Meeting Number of Challenges -- 3.5.1 Volume -- 3.5.2 Variety -- 3.5.3 Velocity and Variety -- 3.5.4 Data Findings -- 3.5.5 Privacy -- 3.6 Digitalized Big Data and Health Care Issues -- 3.6.1 Effective Communication Safely Data Storage -- 3.6.2 Availability of Data for General People -- 3.6.3 Logical Data -- 3.6.4 Effective Communication of Health Care Data -- 3.6.5 Data Capturing -- 3.6.5.1 Alignment of Data Sources -- 3.6.5.2 Algorithm of Data for Suitable Analysis -- 3.6.6 Understanding the Output and Accessibility towards the End Users -- 3.6.6.1 Privacy and Secrecy -- 3.6.6.2 Governance and Ethical Standards -- 3.6.6.3 Proper Audit -- 3.7 Precautionary Attempt for Future Big Data Health Care -- 3.7.1 Data Secrecy.
3.7.2 Web-Based Health Care -- 3.7.3 Genetically and Chronic Disease -- 3.8 Forensic Science and Big Data -- 3.9 Types of Digital Forensics -- 3.9.1 Digital Image Forensics -- 3.9.2 Drawn Data for the Starting of a Process -- 3.9.3 Big Data Analysis -- 3.9.3.1 Definition -- 3.9.3.2 Interpretation -- 3.9.3.3 Big Data Framework -- 3.9.3.4 Forensic Tool Requirement for the Huge Data in Health Care -- 3.10 Digital Forensics Analysis Tools -- 3.10.1 AIR (Automated Image and Rest Store) -- 3.10.2 Autopsy -- 3.10.3 Window Forensic Tool Chart -- 3.10.4 Digital Evidence and Forensic Tool Kit -- 3.10.5 EnCase -- 3.10.6 Mail Examiner -- 3.10.7 FTK -- 3.10.8 Bulk Extractors -- 3.10.9 Pre-Discover Forensic -- 3.10.10 CAINE -- 3.10.11 Xplico -- 3.10.12 X-Ways Forensic -- 3.10.13 Bulk Extractor -- 3.10.14 Digital Forensics Framework -- 3.10.15 Oxygen Forensics -- 3.10.16 Internet Evidence Finder -- 3.11 Some Other Instruments for Big Data Challenge -- 3.11.1 MapReduce Technique -- 3.11.2 Decision Tree -- 3.11.3 Neural Networks -- 3.12 Conclusion -- References -- Chapter 4 Hadoop Internals and Big Data Evidence -- 4.1 Hadoop Internals -- 4.2 The Hadoop Architectures -- 4.2.1 The Components of Hadoop -- 4.3 The Hadoop Distributed File System -- 4.4 Data Analysis Tools -- 4.4.1 Hive -- 4.4.2 HBase -- 4.4.3 Pig -- 4.4.4 Scoop -- 4.4.5 Flume -- 4.5 Locating Sources of Evidence -- 4.5.1 The Data Collection -- 4.5.2 Structured and Unstructured Data -- 4.5.3 Data Collection Types -- 4.6 The Chain of Custody Documentation -- 4.7 Conclusion -- Bibliography -- Chapter 5 Security and Privacy in Big Data Access Controls -- 5.1 Introduction -- 5.1.1 Big Data Is Not Big? -- 5.2 Big Data Challenges to Information Security and Privacy -- 5.3 Addressing Big Data Security and Privacy Challenges: A Proposal -- 5.4 Data Integrity Is Not Data Security! -- 5.4.1 What Vs Why?.
5.4.2 Data Integrity: Process Vs State -- 5.4.3 Integrity Types -- 5.4.3.1 Physical Integrity -- 5.4.3.2 Logical Integrity -- 5.4.3.3 Entity Integrity -- 5.4.3.4 Referential Integrity -- 5.4.3.5 Domain Integrity -- 5.4.3.6 User-Defined Integrity -- 5.5 Infiltration Activities: Fraud Detection with Predictive Analytics -- 5.6 Case Study I: In a Secure Social Application -- 5.6.1 Overall System Architecture -- 5.6.2 Registration on the Platform -- 5.6.3 Sharing Content on the Platform -- 5.6.4 Accessing Content on the Platform -- 5.7 Case Study II -- 5.7.1 An Intelligent Intrusion Detection/Prevention System on a Software-Defined Network -- 5.7.2 The Code Reveals -- 5.7.3 Evaluation -- 5.8 Big Data Security: Future Directions -- 5.9 Final Recommendations -- References -- Chapter 6 Data Science and Big Data Analytics -- 6.1 Objective -- 6.2 Introduction -- 6.2.1 What Is Big Data? -- 6.2.2 What Is Data Science? -- 6.2.3 What Is Data Analytics? -- 6.2.3.1 Descriptive Analytics -- 6.2.3.2 Diagnostic Analytics -- 6.2.3.3 Predictive Analytics -- 6.2.3.4 Prescriptive Analytics -- 6.2.4 Data Analytics Process -- 6.2.4.1 Business Understanding -- 6.2.4.2 Data Exploration -- 6.2.4.3 Preprocessing -- 6.2.4.4 Modeling -- 6.2.4.5 Data Visualization -- 6.3 Techniques for Data Analytics -- 6.3.1 Techniques in Preprocessing Stage -- 6.3.1.1 Data Cleaning -- 6.3.1.2 Data Transformation -- 6.3.1.3 Dimensionality Reduction -- 6.3.2 Techniques in Modeling Stage -- 6.3.2.1 Regression -- 6.3.2.2 Classification -- 6.3.2.3 Clustering -- 6.3.2.4 Association Rules -- 6.3.2.5 Ensemble Learning -- 6.3.2.6 Deep Learning -- 6.3.2.7 Reinforcement Learning -- 6.3.2.8 Text Analysis -- 6.3.2.9 Cross-Validation -- 6.4 Big Data Processing Models and Frameworks -- 6.4.1 Map Reduce -- 6.4.2 Apache Frameworks -- 6.5 Summary -- References.
Chapter 7 Awareness of Problems and Defies with Big Data Involved in Network Security Management with Revised Data Fusion-Based Digital Investigation Model -- 7.1 Introduction -- 7.2 Big Data -- 7.2.1 Variety -- 7.2.2 Volume -- 7.2.3 Velocity -- 7.2.4 Veracity -- 7.2.5 Value -- 7.3 Big Data and Digital Forensics -- 7.4 Digital Forensic Investigation and Its Associated Problem Statements -- 7.5 Relevance of Data Fusion Application in Big Data Digital Forensics and Its Investigation -- 7.6 Data Fusion -- 7.6.1 The JDL Practical Data Fusion Procedural Model -- 7.7 Revised Data Fusion-Based Digital Investigation Model for Digital Forensic and Network Threat Management -- 7.7.1 Data Collection and Preprocessing -- 7.7.2 Look-Up Table -- 7.7.3 Low-Level Fusion -- 7.7.4 Data Estimation Phase -- 7.7.5 High-Level Fusion -- 7.7.6 Decision-Level Fusion -- 7.7.7 Forensic Logbook -- 7.7.8 User Interface -- 7.8 Practicability and Likelihood of Digital Investigation Model -- 7.9 Conclusion and Future Work -- References -- Chapter 8 Phishing Prevention Guidelines -- 8.1 Phishing -- 8.1.1 Why Phishing Works -- 8.1.2 Phishing in Enterprise -- 8.2 Phishing Prevention Guidelines -- 8.2.1 Cyber Awareness and Hygiene -- 8.2.2 Phishing Prevention on Ground Level -- 8.2.3 Phishing Precautionary Measures at Enterprise Environs -- 8.2.4 Sturdy and Meticulous Web Development Is Recommended -- 8.2.5 Suggestive Measures for other Cybercrime -- 8.3 Implementation of Phishing Prevention Guidelines -- 8.4 Validation of Phishing Prevention Guidelines -- 8.5 Summary -- References -- Chapter 9 Big Data Digital Forensic and Cybersecurity -- 9.1 Introduction -- 9.2 Computer Frauds and Cybercrime -- 9.2.1 Tools Used in Cybercrime -- 9.2.2 Cybercrime Statistics for 2018-2019 -- 9.3 Taxonomy -- 9.4 Information Warfare -- 9.4.1 The Basic Strategies in Information Warfare.
9.4.2 Various Forms of Information Warfare.
Record Nr. UNINA-9910975182203321
Milton, : CRC Press LLC, 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Intensive Methods in Statistics [[electronic resource]]
Computer Intensive Methods in Statistics [[electronic resource]]
Autore Zwanzig Silvelyn
Pubbl/distr/stampa Boca Raton, : CRC Press LLC, 2019
Descrizione fisica 1 online resource (227 pages)
Disciplina 519.502855369
Altri autori (Persone) MahjaniBehrang
Soggetto topico Statistics - Data processing
ISBN 0-429-51437-9
0-429-51094-2
0-429-20232-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Half Title; Title Page; Copyright Page; Contents; Preface; Introduction; 1. Random Variable Generation; 1.1 Basic Methods; 1.1.1 Congruential Generators; 1.1.2 The KISS Generator; 1.1.3 Beyond Uniform Distributions; 1.2 Transformation Methods; 1.3 Accept-Reject Methods; 1.3.1 Envelope Accept-Reject Methods; 1.4 Problems; 2. Monte Carlo Methods; 2.1 Independent Monte Carlo Methods; 2.1.1 Importance Sampling; 2.1.2 The Rule of Thumb for Importance Sampling; 2.2 Markov Chain Monte Carlo; 2.2.1 Metropolis-Hastings Algorithm; 2.2.2 Special MCMC Algorithms; 2.2.3 Adaptive MCMC
2.2.4 Perfect Simulation2.2.5 The Gibbs Sampler; 2.3 Approximate Bayesian Computation Methods; 2.4 Problems; 3. Bootstrap; 3.1 General Principle; 3.1.1 Unified Bootstrap Framework; 3.1.2 Bootstrap and Monte Carlo; 3.1.3 Conditional and Unconditional Distribution; 3.2 Basic Bootstrap; 3.2.1 Plug-in Principle; 3.2.2 Why is Bootstrap Good?; 3.2.3 Example where Bootstrap Fails; 3.3 Bootstrap Confidence Sets; 3.3.1 The Pivotal Method; 3.3.2 Bootstrap Pivotal Methods; 3.3.2.1 Percentile Bootstrap Confidence Interval; 3.3.2.2 Basic Bootstrap Confidence Interval
3.3.2.3 Studentized Bootstrap Confidence Interval3.3.3 Transformed Bootstrap Confidence Intervals; 3.3.4 Prepivoting Confidence Set; 3.3.5 BCa-Confidence Interval; 3.4 Bootstrap Hypothesis Tests; 3.4.1 Parametric Bootstrap Hypothesis Test; 3.4.2 Nonparametric Bootstrap Hypothesis Test; 3.4.3 Advanced Bootstrap Hypothesis Tests; 3.5 Bootstrap in Regression; 3.5.1 Model-Based Bootstrap; 3.5.2 Parametric Bootstrap Regression; 3.5.3 Casewise Bootstrap in Correlation Model; 3.6 Bootstrap for Time Series; 3.7 Problems; 4. Simulation-Based Methods; 4.1 EM Algorithm; 4.2 SIMEX; 4.3 Variable Selection
4.3.1 F-Backward and F-Forward Procedures4.3.2 FSR-Forward Procedure; 4.3.3 SimSel; 4.4 Problems; 5. Density Estimation; 5.1 Background; 5.2 Histogram; 5.3 Kernel Density Estimator; 5.3.1 Statistical Properties; 5.3.2 Bandwidth Selection in Practice; 5.4 Nearest Neighbor Estimator; 5.5 Orthogonal Series Estimator; 5.6 Minimax Convergence Rate; 5.7 Problems; 6. Nonparametric Regression; 6.1 Background; 6.2 Kernel Regression Smoothing; 6.3 Local Regression; 6.4 Classes of Restricted Estimators; 6.4.1 Ridge Regression; 6.4.2 Lasso; 6.5 Spline Estimators; 6.5.1 Base Splines
6.5.2 Smoothing Splines6.6 Wavelet Estimators; 6.6.1 Wavelet Base; 6.6.2 Wavelet Smoothing; 6.7 Choosing the Smoothing Parameter; 6.8 Bootstrap in Regression; 6.9 Problems; References; Index
Record Nr. UNINA-9910793824803321
Zwanzig Silvelyn  
Boca Raton, : CRC Press LLC, 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
A Cost Based Approach to Project Management : Planning and Controlling Construction Project Costs
A Cost Based Approach to Project Management : Planning and Controlling Construction Project Costs
Autore Hanioglu Mehmet Nihat
Pubbl/distr/stampa Aix-en-Provence, : Presses universitaires de Provence, 2017
Descrizione fisica 1 online resource (211 pages)
Collana Sociétés contemporaines
Soggetto topico International relations
Soggetto non controllato Europe
frontière
immigration
géopolitique
mémoires
Grèce
finance publique
balkans, Méditerranée
ISBN 979-1-03-657700-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910502597703321
Hanioglu Mehmet Nihat  
Aix-en-Provence, : Presses universitaires de Provence, 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui