top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
CODASPY '22 : proceedings of the Twelveth ACM Conference on Data and Application Security and Privacy : April 24-27, 2022, Baltimore, MD, USA / / Anupam Joshi [and three others], editors
CODASPY '22 : proceedings of the Twelveth ACM Conference on Data and Application Security and Privacy : April 24-27, 2022, Baltimore, MD, USA / / Anupam Joshi [and three others], editors
Pubbl/distr/stampa New York, NY : , : Association for Computing Machinery, , 2022
Descrizione fisica 1 online resource (392 pages) : illustrations
Disciplina 005.3
Collana ACM international conference proceedings series
Soggetto topico Application software - Security measures
Artificial intelligence - Security measures
Computer security
Data protection
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910566449803321
New York, NY : , : Association for Computing Machinery, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The Cybersecurity Trinity : Artificial Intelligence, Automation, and Active Cyber Defense / / by Donnie W. Wendt
The Cybersecurity Trinity : Artificial Intelligence, Automation, and Active Cyber Defense / / by Donnie W. Wendt
Autore Wendt Donnie W
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2024
Descrizione fisica 1 online resource (410 pages)
Disciplina 005.8
Soggetto topico Computer security
Artificial intelligence - Security measures
ISBN 9798868809477
9798868809460
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: AI is Everywhere -- Chapter 2: Overview of AI and ML -- Chapter 3: AI for Defense -- Chapter 4: ML in an Adversarial Environment -- Chapter 5: Combatting AI Threats -- Chapter 6: The Need for Speed – The Driving Forces of Security Automation -- Chapter 7: The OODA Loop -- Chapter 8: Common SOAR Use Cases -- Chapter 9: Strategies for Success (and Failure) -- Chapter 10: Active Cyber Defense -- Chapter 11: The OODA Loop Revisited -- Chapter 12: Deception -- Chapter 13: The Cybersecurity Trinity.
Record Nr. UNINA-9910917779503321
Wendt Donnie W  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Rise of the Machines : A Project Zero Trust Story
Rise of the Machines : A Project Zero Trust Story
Autore Finney George
Edizione [1st ed.]
Pubbl/distr/stampa Newark : , : John Wiley & Sons, Incorporated, , 2025
Descrizione fisica 1 online resource (195 pages)
Disciplina 005.8
Soggetto topico Computer security
Artificial intelligence - Security measures
Computer networks - Security measures
Machine learning - Security measures
Business enterprises - Computer networks - Security measures
ISBN 1-394-30372-6
1-394-35251-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foreword -- About the Authors -- Acknowledgments -- Introduction -- Chapter 1: AI-pocalypse Now -- Chapter 2: No Artificial Trusts Added -- Chapter 3: Generative AI -- Chapter 4: Arch-AI-tecting Controls -- Chapter 5: Trusty AI Sidekick -- Chapter 6: Smooth AI-operator -- Chapter 7: The Most Important Part of Zero Trust: People -- Chapter 8: AI-dentity Theft -- Chapter 9: Algorithms and Adversaries -- Chapter 10: The End of Trust -- Appendix A The Cast of Characters -- Appendix B Tabletop Exercise: Master Scenario Events List -- Glossary -- Endnotes -- Index.
Record Nr. UNINA-9911019818803321
Finney George  
Newark : , : John Wiley & Sons, Incorporated, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui