88 privacy breaches to beware of : practical data protection tips from real-life experiences / / Kevin Shepherdson, William Hioe & Lyn Boxall |
Autore | Shepherdson Kevin |
Pubbl/distr/stampa | New Industrial Road, Singapore : , : Marshall Cavendish Business, , 2016 |
Descrizione fisica | 1 online resource (433 pages) : illustrations |
Disciplina | 658.478 |
Soggetto topico |
Data protection
Business - Data processing - Security measures Computer security |
ISBN | 981-4751-72-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Eighty-eight privacy breaches to beware of |
Record Nr. | UNINA-9910794883803321 |
Shepherdson Kevin | ||
New Industrial Road, Singapore : , : Marshall Cavendish Business, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
88 privacy breaches to beware of : practical data protection tips from real-life experiences / / Kevin Shepherdson, William Hioe & Lyn Boxall |
Autore | Shepherdson Kevin |
Pubbl/distr/stampa | New Industrial Road, Singapore : , : Marshall Cavendish Business, , 2016 |
Descrizione fisica | 1 online resource (433 pages) : illustrations |
Disciplina | 658.478 |
Soggetto topico |
Data protection
Business - Data processing - Security measures Computer security |
ISBN | 981-4751-72-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Eighty-eight privacy breaches to beware of |
Record Nr. | UNINA-9910823326603321 |
Shepherdson Kevin | ||
New Industrial Road, Singapore : , : Marshall Cavendish Business, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
99 privacy breaches to beware of : practical data protection tips from real-life experiences / / Kevin Shepherdson, William Hioe & Lyn Boxall |
Autore | Shepherdson Kevin |
Pubbl/distr/stampa | Singapore : , : Marshall Cavendish Business, , 2018 |
Descrizione fisica | 1 online resource (427 pages) |
Disciplina | 005.8 |
Soggetto topico |
Data protection
Business - Data processing - Security measures Computer security |
ISBN | 981-4828-33-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910795324003321 |
Shepherdson Kevin | ||
Singapore : , : Marshall Cavendish Business, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
99 privacy breaches to beware of : practical data protection tips from real-life experiences / / Kevin Shepherdson, William Hioe & Lyn Boxall |
Autore | Shepherdson Kevin |
Pubbl/distr/stampa | Singapore : , : Marshall Cavendish Business, , 2018 |
Descrizione fisica | 1 online resource (427 pages) |
Disciplina | 005.8 |
Soggetto topico |
Data protection
Business - Data processing - Security measures Computer security |
ISBN | 981-4828-33-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910812812303321 |
Shepherdson Kevin | ||
Singapore : , : Marshall Cavendish Business, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Blockchain technology and innovations in business processes / / Srikanta Patnaik [and three others], editors |
Pubbl/distr/stampa | Singapore : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (xiv, 237 pages) : illustrations |
Disciplina | 005.74 |
Collana | Smart innovation, systems, and technologies |
Soggetto topico |
Blockchains (Databases)
Business - Data processing Business - Data processing - Security measures Cadena de blocs (Bases de dades) Negocis Seguretat informàtica Gestió de bases de dades |
Soggetto genere / forma | Llibres electrònics |
ISBN | 981-336-470-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Editorial -- Contents -- About the Editors -- 1 Introduction to Blockchain Evolution, Architecture and Application with Use Cases -- 1.1 Layman's Introduction to Blockchain -- 1.2 The Blockchain Technology -- 1.3 Types of Blockchain -- 1.4 Evolution of Blockchain -- 1.4.1 Blockchain 1.0: Programmable Money and Cryptocurrencies -- 1.4.2 Blockchain 2.0: Smart Contracts -- 1.4.3 Blockchain 3.0: Decentralised Web -- 1.5 Ledger System for Blockchain -- 1.5.1 Centralized Ledger Systems -- 1.5.2 Distributed Ledger Systems -- 1.6 Layers of Blockchain -- 1.6.1 Hardware or Infrastructure Layer -- 1.6.2 Data Layer -- 1.6.3 Network Layer -- 1.6.4 Consensus Layer -- 1.6.5 Application Layer -- 1.7 Use Cases and Applications of Blockchain -- 1.8 Development Tools for Blockchain -- 1.9 Summary -- References -- 2 Blockchain: A Technology in Search of Legitimacy -- 2.1 Introduction -- 2.2 Theoretical Background -- 2.3 Research Design and Methodology -- 2.4 Results -- 2.5 Discussion and Conclusion -- References -- 3 Using Blockchain in Intermittently Connected Network Environments -- 3.1 Introduction -- 3.2 Overview of Delay Tolerant Networks -- 3.2.1 Features -- 3.2.2 Architecture -- 3.2.3 Routing -- 3.2.4 Applications -- 3.3 Rudimentary Elements of Blockchain -- 3.3.1 Blocks -- 3.3.2 Transaction -- 3.3.3 Mining -- 3.3.4 Ethereum and Smart Contracts -- 3.4 Integration of Blockchain Technology with DTNs -- 3.4.1 System Components -- 3.4.2 Generation and Transmission of Shelter Needs -- 3.4.3 Need Validation and Creation of Local Blockchain -- 3.4.4 Block Conversion Through API -- 3.4.5 Mining Blocks and Deploying to Global Blockchain -- 3.5 Open Research Areas -- 3.6 Conclusion -- References -- 4 Slaying the Crypto Dragons: Towards a CryptoSure Trust Model for Crypto-economics -- 4.1 Introduction: Blockchain and the Right to Be Forgotten.
4.2 The New 'Crypto-economy'-A Fraudsters' Playground? -- 4.3 Blockchain: Sceptical ICT Professionalism and Legal Due Diligence -- 4.4 The Need for Trusted Third Parties and for Probative Electronic Evidence -- 4.5 Towards a CryptoSure Trust Model for Crypto-economics -- 4.6 Conclusions: Blockchain Versus Trust-The Expert Issues in Disputes Over Crypto Assets -- 5 Decentralized Governance for Smart Contract Platform Enabling Mobile Lite Wallets Using a Proof-of-Stake Consensus Algorithm -- 5.1 Introduction -- 5.2 Preliminaries for Qtum Decentralized Blockchain Governance -- 5.3 Qtum Basic Requirement Sets for Decentralized Governance -- 5.3.1 UTXO Versus Account Model -- 5.3.2 Consensus Management -- 5.3.3 Mutualized Proof-of-Stake -- 5.3.4 AAL and EVM Integration -- 5.4 Scalability Extension of the Virtual Machine Through Decentralized Governance -- 5.4.1 Qtum Transaction Processing Using Virtual Machine -- 5.4.2 Decentralised Governance Protocol -- 5.5 Qtum Account Abstraction Layer -- 5.6 Discussion of the Technical Governance Realization -- 5.6.1 Hard fork Update -- 5.6.2 Qtum X86 Virtual Machine -- 5.7 Conclusions -- References -- 6 Blockchain Technology: Security and Privacy Issues -- 6.1 Introduction -- 6.2 Distributed Ledger Technology -- 6.2.1 Blockchain Benefits -- 6.2.2 How Blockchain Works -- 6.2.3 Consensus Algorithms -- 6.3 Blockchain Pros and Cons -- 6.4 Applications of Blockchain -- 6.4.1 Blockchain 1.0 -- 6.4.2 Blockchain 2.0 -- 6.5 Blockchain Security Issues -- 6.5.1 Cryptojacking Attacks -- 6.5.2 51% Attack -- 6.5.3 Smart Contract Attacks -- 6.6 Discussion -- 6.6.1 Voting and Blockchain -- 6.6.2 Energy and Blockchain -- 6.6.3 Web 3.0 and Blockchain -- 6.7 Conclusions -- References -- 7 Personal Data Protection in Blockchain with Zero-Knowledge Proof -- 7.1 Introduction -- 7.2 Related Works -- 7.3 Background About Blockchain. 7.4 Personal Data Protection and Blockchain -- 7.5 Zero-Knowledge Proof on Blockchain -- 7.5.1 Zerocoin Protocol -- 7.5.2 Zerocash Protocol -- 7.5.3 Zcash and Zk-SNARK -- 7.6 Conclusion -- References -- 8 Design and Verification of Privacy Patterns for Business Process Models -- 8.1 Introduction -- 8.2 A Privacy-Aware System Using Blockchain -- 8.2.1 Scenario: A Cloud-Based Order System -- 8.3 GDPR Verification -- 8.3.1 Design Time Verification -- 8.3.2 Runtime Verification -- 8.4 Experimental Results -- 8.4.1 Evaluation of Design Time Verification -- 8.4.2 Evaluation of Runtime Verification -- 8.5 Conclusion -- References -- 9 Blockchain Technology in Energy Field: Opportunities and Challenges -- 9.1 Introduction -- 9.2 Blockchain Solutions for Energy Internet -- 9.3 Application Scenarios of Blockchain Technology in the Energy Industry -- 9.4 Challenges -- 9.5 Conclusions -- References -- 10 BlockChainTechnology for Energy Transition -- 10.1 Introduction -- 10.2 What Is the "Energy Transition"? -- 10.2.1 Business Models in the Energy Sector -- 10.2.2 New Business Models for Energy Transition -- 10.3 BlockChain and Smart Contracts in the Energy Sector -- 10.3.1 Types of Applications of BlockChain and Smart Contracts in the Energy Sector -- 10.3.2 New Business Models Enabled by BlockChain in the Energy Market -- 10.3.3 Risks and Issues Related to BlockChain and Smart Contracts -- 10.4 The Framework -- 10.4.1 The Business Model Canvas -- 10.4.2 The Use Case Selection -- 10.4.3 Impact Analysis of the Two Selected Use Cases -- 10.4.4 The Business Models for the Use Cases -- 10.4.5 Microgrid Business Model (Elaborated After the Workshop) -- 10.4.6 Discussion of the Results -- 10.5 Current Trends and Future Scenarios -- 10.5.1 P2P Distributed Energy Trading for Residential Microgrids. 10.5.2 Bridging Industrial and Residential Microgrids Through Electric Vehicles -- 10.6 Conclusions -- References -- 11 The Feasibility and Significance of Employing Blockchain-Based Identity Solutions in Health Care -- 11.1 Introduction -- 11.2 A Brief History of Identities in the Digital Age -- 11.2.1 Fully Centralized Identity Management -- 11.2.2 Federated Identity Management -- 11.2.3 User-Centric Identity Management -- 11.3 The Main Ideas Behind Decentralized Identity Management -- 11.3.1 Decentralized Identifier Based on Blockchain -- 11.3.2 Zero-Knowledge Proof -- 11.3.3 Decentralized Blockchains and the Internet -- 11.4 The Technical Architecture of Decentralized Identity Management -- 11.4.1 Architecture Overview -- 11.4.2 Blockchain-Based DID Service -- 11.4.3 Standardization of DIDs -- 11.4.4 Examples of DID Frameworks -- 11.5 The Potential of Applying Blockchain-Based DID Solutions in Health Care -- 11.5.1 Addressing the Patient Mismatching Problem -- 11.5.2 Facilitating Patient Recruitment in Clinical Research Using DID -- 11.5.3 The Safer Use of Medical Devices -- 11.5.4 Limitations Facing Current Blockchain-Based DID Solutions -- 11.6 Conclusion -- References -- 12 Toward eHealth with Blockchain: Success Factors for Crowdfunding with ICOs -- 12.1 Introduction -- 12.2 Theoretical Background -- 12.2.1 eHealth -- 12.2.2 Initial Coin Offerings (ICOs) and Blockchain -- 12.2.3 Signaling Theory -- 12.3 Research Method -- 12.3.1 Related Work -- 12.4 Research Hypotheses -- 12.4.1 Data and Variables -- 12.5 Results and Discussion -- 12.5.1 Descriptive Statistics of the ICO Data -- 12.5.2 Multivariate Analysis of the Factors Influencing the Success -- 12.6 Discussion -- 12.7 Conclusion -- References -- 13 Blockchain Track and Trace System (BTTS) for Pharmaceutical Supply Chain -- 13.1 Introduction -- 13.2 Related Works. 13.3 Overview of Bitcoin, Blockchain Platforms and Smart Contracts -- 13.4 The Proposal Model -- 13.4.1 Structure of Blockchain Track and Trace System (BTTS) -- 13.4.2 The Proposed Smart Contracts -- 13.5 Conclusion and Future Works -- References. |
Record Nr. | UNINA-9910484502403321 |
Singapore : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Business continuity and disaster recovery for infosec managers [electronic resource] / John W. Rittinghouse, James F. Ransome |
Autore | Rittinghouse, John W. |
Pubbl/distr/stampa | Amsterdam ; Boston : Elsevier Digital Press, c2005 |
Descrizione fisica | lxix, 338 p. : ill. ; 24 cm. |
Disciplina | 004/.0068/4 |
Altri autori (Persone) | Ransome, James F. |
Soggetto topico |
Business - Data processing - Security measures
Crisis management Computer networks - Security measures Information resources management |
Soggetto genere / forma | Electronic books. |
ISBN |
9781555583392
1555583393 |
Formato | Risorse elettroniche |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction - Business Security; Contingency and Continuity Planning; Assessing; Mitigation Strategies; Preparing for a Possible Emergency; Disaster Recovery; Business Recovery Phase; Testing, Auditing, and Training; Maintaining a Business Continuity Plan; General References; Index. |
Record Nr. | UNISALENTO-991003247899707536 |
Rittinghouse, John W. | ||
Amsterdam ; Boston : Elsevier Digital Press, c2005 | ||
Risorse elettroniche | ||
Lo trovi qui: Univ. del Salento | ||
|
Business continuity and disaster recovery planning for IT professionals / / Susan Snedaker, Chris Rima |
Autore | Snedaker Susan |
Edizione | [Second edition.] |
Pubbl/distr/stampa | Waltham, MA : , : Syngress, , [2014] |
Descrizione fisica | 1 online resource (602 p.) |
Disciplina | 658.4/78 |
Altri autori (Persone) | RimaChris |
Soggetto topico |
Business - Data processing - Security measures
Electronic data processing departments - Security measures Crisis management Computer networks - Security measures Management information systems - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN | 0-12-411451-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Machine generated contents note: Chapter 1: Business Continuity & Disaster Recovery Overview Chapter 2: Legal and Regulatory Environment Chapter 3: Project Initiation Chapter 4: Risk Assessment Chapter 5: Business Impact Assessment Chapter 6: Risk Mitigation Chapter 7: BC/DR Plan Development Chapter 8: Emergency Response and Recovery Chapter 9: Training, Testing & Auditing Results Chapter 10: BC/DR Plan Maintenance Case Study A: Utilities Case Study B: Healthcare Case Study C: Financial Case Study D: Small/Medium Business Glossary Checklists Resources. |
Record Nr. | UNINA-9910459144003321 |
Snedaker Susan | ||
Waltham, MA : , : Syngress, , [2014] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Business continuity and disaster recovery planning for IT professionals / / Susan Snedaker, Chris Rima |
Autore | Snedaker Susan |
Edizione | [Second edition.] |
Pubbl/distr/stampa | Waltham, MA : , : Syngress, , 2014 |
Descrizione fisica | 1 online resource (xxiii, 577 pages) : illustrations |
Disciplina | 658.4/78 |
Collana | Gale eBooks |
Soggetto topico |
Business - Data processing - Security measures
Electronic data processing departments - Security measures Crisis management Computer networks - Security measures Management information systems - Security measures |
ISBN | 0-12-411451-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Machine generated contents note: Chapter 1: Business Continuity & Disaster Recovery Overview Chapter 2: Legal and Regulatory Environment Chapter 3: Project Initiation Chapter 4: Risk Assessment Chapter 5: Business Impact Assessment Chapter 6: Risk Mitigation Chapter 7: BC/DR Plan Development Chapter 8: Emergency Response and Recovery Chapter 9: Training, Testing & Auditing Results Chapter 10: BC/DR Plan Maintenance Case Study A: Utilities Case Study B: Healthcare Case Study C: Financial Case Study D: Small/Medium Business Glossary Checklists Resources. |
Record Nr. | UNINA-9910792484303321 |
Snedaker Susan | ||
Waltham, MA : , : Syngress, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Business continuity and disaster recovery planning for IT professionals / / Susan Snedaker, Chris Rima |
Autore | Snedaker Susan |
Edizione | [Second edition.] |
Pubbl/distr/stampa | Waltham, MA : , : Syngress, , 2014 |
Descrizione fisica | 1 online resource (xxiii, 577 pages) : illustrations |
Disciplina | 658.4/78 |
Collana | Gale eBooks |
Soggetto topico |
Business - Data processing - Security measures
Electronic data processing departments - Security measures Crisis management Computer networks - Security measures Management information systems - Security measures |
ISBN | 0-12-411451-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Machine generated contents note: Chapter 1: Business Continuity & Disaster Recovery Overview Chapter 2: Legal and Regulatory Environment Chapter 3: Project Initiation Chapter 4: Risk Assessment Chapter 5: Business Impact Assessment Chapter 6: Risk Mitigation Chapter 7: BC/DR Plan Development Chapter 8: Emergency Response and Recovery Chapter 9: Training, Testing & Auditing Results Chapter 10: BC/DR Plan Maintenance Case Study A: Utilities Case Study B: Healthcare Case Study C: Financial Case Study D: Small/Medium Business Glossary Checklists Resources. |
Record Nr. | UNINA-9910815456903321 |
Snedaker Susan | ||
Waltham, MA : , : Syngress, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cybersecurity and decision makers : data security and digital trust / / Marie de Fréminville |
Autore | Fréminville Marie de |
Pubbl/distr/stampa | Hoboken, N.J. : , : ISTE Ltd / John Wiley and Sons Inc, , 2020 |
Descrizione fisica | 1 online resource (225 pages) : illustrations |
Disciplina | 495.932 |
Soggetto topico |
Business - Data processing - Security measures
Computer security - Management |
ISBN |
1-119-72037-0
1-119-72035-4 1-119-72036-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910555077203321 |
Fréminville Marie de | ||
Hoboken, N.J. : , : ISTE Ltd / John Wiley and Sons Inc, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|