CODASPY '22 : proceedings of the Twelveth ACM Conference on Data and Application Security and Privacy : April 24-27, 2022, Baltimore, MD, USA / / Anupam Joshi [and three others], editors
| CODASPY '22 : proceedings of the Twelveth ACM Conference on Data and Application Security and Privacy : April 24-27, 2022, Baltimore, MD, USA / / Anupam Joshi [and three others], editors |
| Pubbl/distr/stampa | New York, NY : , : Association for Computing Machinery, , 2022 |
| Descrizione fisica | 1 online resource (392 pages) : illustrations |
| Disciplina | 005.3 |
| Collana | ACM international conference proceedings series |
| Soggetto topico |
Application software - Security measures
Artificial intelligence - Security measures Computer security Data protection |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910566449803321 |
| New York, NY : , : Association for Computing Machinery, , 2022 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The Cybersecurity Trinity : Artificial Intelligence, Automation, and Active Cyber Defense / / by Donnie W. Wendt
| The Cybersecurity Trinity : Artificial Intelligence, Automation, and Active Cyber Defense / / by Donnie W. Wendt |
| Autore | Wendt Donnie W |
| Edizione | [1st ed. 2024.] |
| Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2024 |
| Descrizione fisica | 1 online resource (410 pages) |
| Disciplina | 005.8 |
| Soggetto topico |
Computer security
Artificial intelligence - Security measures |
| ISBN |
9798868809477
9798868809460 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1: AI is Everywhere -- Chapter 2: Overview of AI and ML -- Chapter 3: AI for Defense -- Chapter 4: ML in an Adversarial Environment -- Chapter 5: Combatting AI Threats -- Chapter 6: The Need for Speed – The Driving Forces of Security Automation -- Chapter 7: The OODA Loop -- Chapter 8: Common SOAR Use Cases -- Chapter 9: Strategies for Success (and Failure) -- Chapter 10: Active Cyber Defense -- Chapter 11: The OODA Loop Revisited -- Chapter 12: Deception -- Chapter 13: The Cybersecurity Trinity. |
| Record Nr. | UNINA-9910917779503321 |
Wendt Donnie W
|
||
| Berkeley, CA : , : Apress : , : Imprint : Apress, , 2024 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Rise of the Machines : A Project Zero Trust Story
| Rise of the Machines : A Project Zero Trust Story |
| Autore | Finney George |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Newark : , : John Wiley & Sons, Incorporated, , 2025 |
| Descrizione fisica | 1 online resource (195 pages) |
| Disciplina | 005.8 |
| Soggetto topico |
Computer security
Artificial intelligence - Security measures Computer networks - Security measures Machine learning - Security measures Business enterprises - Computer networks - Security measures |
| ISBN |
1-394-30372-6
1-394-35251-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Foreword -- About the Authors -- Acknowledgments -- Introduction -- Chapter 1: AI-pocalypse Now -- Chapter 2: No Artificial Trusts Added -- Chapter 3: Generative AI -- Chapter 4: Arch-AI-tecting Controls -- Chapter 5: Trusty AI Sidekick -- Chapter 6: Smooth AI-operator -- Chapter 7: The Most Important Part of Zero Trust: People -- Chapter 8: AI-dentity Theft -- Chapter 9: Algorithms and Adversaries -- Chapter 10: The End of Trust -- Appendix A The Cast of Characters -- Appendix B Tabletop Exercise: Master Scenario Events List -- Glossary -- Endnotes -- Index. |
| Record Nr. | UNINA-9911019818803321 |
Finney George
|
||
| Newark : , : John Wiley & Sons, Incorporated, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||