top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
88 privacy breaches to beware of : practical data protection tips from real-life experiences / / Kevin Shepherdson, William Hioe & Lyn Boxall
88 privacy breaches to beware of : practical data protection tips from real-life experiences / / Kevin Shepherdson, William Hioe & Lyn Boxall
Autore Shepherdson Kevin
Pubbl/distr/stampa New Industrial Road, Singapore : , : Marshall Cavendish Business, , 2016
Descrizione fisica 1 online resource (433 pages) : illustrations
Disciplina 658.478
Soggetto topico Data protection
Business - Data processing - Security measures
Computer security
ISBN 981-4751-72-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Eighty-eight privacy breaches to beware of
Record Nr. UNINA-9910794883803321
Shepherdson Kevin  
New Industrial Road, Singapore : , : Marshall Cavendish Business, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
88 privacy breaches to beware of : practical data protection tips from real-life experiences / / Kevin Shepherdson, William Hioe & Lyn Boxall
88 privacy breaches to beware of : practical data protection tips from real-life experiences / / Kevin Shepherdson, William Hioe & Lyn Boxall
Autore Shepherdson Kevin
Pubbl/distr/stampa New Industrial Road, Singapore : , : Marshall Cavendish Business, , 2016
Descrizione fisica 1 online resource (433 pages) : illustrations
Disciplina 658.478
Soggetto topico Data protection
Business - Data processing - Security measures
Computer security
ISBN 981-4751-72-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Eighty-eight privacy breaches to beware of
Record Nr. UNINA-9910823326603321
Shepherdson Kevin  
New Industrial Road, Singapore : , : Marshall Cavendish Business, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
99 privacy breaches to beware of : practical data protection tips from real-life experiences / / Kevin Shepherdson, William Hioe & Lyn Boxall
99 privacy breaches to beware of : practical data protection tips from real-life experiences / / Kevin Shepherdson, William Hioe & Lyn Boxall
Autore Shepherdson Kevin
Pubbl/distr/stampa Singapore : , : Marshall Cavendish Business, , 2018
Descrizione fisica 1 online resource (427 pages)
Disciplina 005.8
Soggetto topico Data protection
Business - Data processing - Security measures
Computer security
ISBN 981-4828-33-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910795324003321
Shepherdson Kevin  
Singapore : , : Marshall Cavendish Business, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
99 privacy breaches to beware of : practical data protection tips from real-life experiences / / Kevin Shepherdson, William Hioe & Lyn Boxall
99 privacy breaches to beware of : practical data protection tips from real-life experiences / / Kevin Shepherdson, William Hioe & Lyn Boxall
Autore Shepherdson Kevin
Pubbl/distr/stampa Singapore : , : Marshall Cavendish Business, , 2018
Descrizione fisica 1 online resource (427 pages)
Disciplina 005.8
Soggetto topico Data protection
Business - Data processing - Security measures
Computer security
ISBN 981-4828-33-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910812812303321
Shepherdson Kevin  
Singapore : , : Marshall Cavendish Business, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Blockchain technology and innovations in business processes / / Srikanta Patnaik [and three others], editors
Blockchain technology and innovations in business processes / / Srikanta Patnaik [and three others], editors
Pubbl/distr/stampa Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (xiv, 237 pages) : illustrations
Disciplina 005.74
Collana Smart innovation, systems, and technologies
Soggetto topico Blockchains (Databases)
Business - Data processing
Business - Data processing - Security measures
Cadena de blocs (Bases de dades)
Negocis
Seguretat informàtica
Gestió de bases de dades
Soggetto genere / forma Llibres electrònics
ISBN 981-336-470-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Editorial -- Contents -- About the Editors -- 1 Introduction to Blockchain Evolution, Architecture and Application with Use Cases -- 1.1 Layman's Introduction to Blockchain -- 1.2 The Blockchain Technology -- 1.3 Types of Blockchain -- 1.4 Evolution of Blockchain -- 1.4.1 Blockchain 1.0: Programmable Money and Cryptocurrencies -- 1.4.2 Blockchain 2.0: Smart Contracts -- 1.4.3 Blockchain 3.0: Decentralised Web -- 1.5 Ledger System for Blockchain -- 1.5.1 Centralized Ledger Systems -- 1.5.2 Distributed Ledger Systems -- 1.6 Layers of Blockchain -- 1.6.1 Hardware or Infrastructure Layer -- 1.6.2 Data Layer -- 1.6.3 Network Layer -- 1.6.4 Consensus Layer -- 1.6.5 Application Layer -- 1.7 Use Cases and Applications of Blockchain -- 1.8 Development Tools for Blockchain -- 1.9 Summary -- References -- 2 Blockchain: A Technology in Search of Legitimacy -- 2.1 Introduction -- 2.2 Theoretical Background -- 2.3 Research Design and Methodology -- 2.4 Results -- 2.5 Discussion and Conclusion -- References -- 3 Using Blockchain in Intermittently Connected Network Environments -- 3.1 Introduction -- 3.2 Overview of Delay Tolerant Networks -- 3.2.1 Features -- 3.2.2 Architecture -- 3.2.3 Routing -- 3.2.4 Applications -- 3.3 Rudimentary Elements of Blockchain -- 3.3.1 Blocks -- 3.3.2 Transaction -- 3.3.3 Mining -- 3.3.4 Ethereum and Smart Contracts -- 3.4 Integration of Blockchain Technology with DTNs -- 3.4.1 System Components -- 3.4.2 Generation and Transmission of Shelter Needs -- 3.4.3 Need Validation and Creation of Local Blockchain -- 3.4.4 Block Conversion Through API -- 3.4.5 Mining Blocks and Deploying to Global Blockchain -- 3.5 Open Research Areas -- 3.6 Conclusion -- References -- 4 Slaying the Crypto Dragons: Towards a CryptoSure Trust Model for Crypto-economics -- 4.1 Introduction: Blockchain and the Right to Be Forgotten.
4.2 The New 'Crypto-economy'-A Fraudsters' Playground? -- 4.3 Blockchain: Sceptical ICT Professionalism and Legal Due Diligence -- 4.4 The Need for Trusted Third Parties and for Probative Electronic Evidence -- 4.5 Towards a CryptoSure Trust Model for Crypto-economics -- 4.6 Conclusions: Blockchain Versus Trust-The Expert Issues in Disputes Over Crypto Assets -- 5 Decentralized Governance for Smart Contract Platform Enabling Mobile Lite Wallets Using a Proof-of-Stake Consensus Algorithm -- 5.1 Introduction -- 5.2 Preliminaries for Qtum Decentralized Blockchain Governance -- 5.3 Qtum Basic Requirement Sets for Decentralized Governance -- 5.3.1 UTXO Versus Account Model -- 5.3.2 Consensus Management -- 5.3.3 Mutualized Proof-of-Stake -- 5.3.4 AAL and EVM Integration -- 5.4 Scalability Extension of the Virtual Machine Through Decentralized Governance -- 5.4.1 Qtum Transaction Processing Using Virtual Machine -- 5.4.2 Decentralised Governance Protocol -- 5.5 Qtum Account Abstraction Layer -- 5.6 Discussion of the Technical Governance Realization -- 5.6.1 Hard fork Update -- 5.6.2 Qtum X86 Virtual Machine -- 5.7 Conclusions -- References -- 6 Blockchain Technology: Security and Privacy Issues -- 6.1 Introduction -- 6.2 Distributed Ledger Technology -- 6.2.1 Blockchain Benefits -- 6.2.2 How Blockchain Works -- 6.2.3 Consensus Algorithms -- 6.3 Blockchain Pros and Cons -- 6.4 Applications of Blockchain -- 6.4.1 Blockchain 1.0 -- 6.4.2 Blockchain 2.0 -- 6.5 Blockchain Security Issues -- 6.5.1 Cryptojacking Attacks -- 6.5.2 51% Attack -- 6.5.3 Smart Contract Attacks -- 6.6 Discussion -- 6.6.1 Voting and Blockchain -- 6.6.2 Energy and Blockchain -- 6.6.3 Web 3.0 and Blockchain -- 6.7 Conclusions -- References -- 7 Personal Data Protection in Blockchain with Zero-Knowledge Proof -- 7.1 Introduction -- 7.2 Related Works -- 7.3 Background About Blockchain.
7.4 Personal Data Protection and Blockchain -- 7.5 Zero-Knowledge Proof on Blockchain -- 7.5.1 Zerocoin Protocol -- 7.5.2 Zerocash Protocol -- 7.5.3 Zcash and Zk-SNARK -- 7.6 Conclusion -- References -- 8 Design and Verification of Privacy Patterns for Business Process Models -- 8.1 Introduction -- 8.2 A Privacy-Aware System Using Blockchain -- 8.2.1 Scenario: A Cloud-Based Order System -- 8.3 GDPR Verification -- 8.3.1 Design Time Verification -- 8.3.2 Runtime Verification -- 8.4 Experimental Results -- 8.4.1 Evaluation of Design Time Verification -- 8.4.2 Evaluation of Runtime Verification -- 8.5 Conclusion -- References -- 9 Blockchain Technology in Energy Field: Opportunities and Challenges -- 9.1 Introduction -- 9.2 Blockchain Solutions for Energy Internet -- 9.3 Application Scenarios of Blockchain Technology in the Energy Industry -- 9.4 Challenges -- 9.5 Conclusions -- References -- 10 BlockChainTechnology for Energy Transition -- 10.1 Introduction -- 10.2 What Is the "Energy Transition"? -- 10.2.1 Business Models in the Energy Sector -- 10.2.2 New Business Models for Energy Transition -- 10.3 BlockChain and Smart Contracts in the Energy Sector -- 10.3.1 Types of Applications of BlockChain and Smart Contracts in the Energy Sector -- 10.3.2 New Business Models Enabled by BlockChain in the Energy Market -- 10.3.3 Risks and Issues Related to BlockChain and Smart Contracts -- 10.4 The Framework -- 10.4.1 The Business Model Canvas -- 10.4.2 The Use Case Selection -- 10.4.3 Impact Analysis of the Two Selected Use Cases -- 10.4.4 The Business Models for the Use Cases -- 10.4.5 Microgrid Business Model (Elaborated After the Workshop) -- 10.4.6 Discussion of the Results -- 10.5 Current Trends and Future Scenarios -- 10.5.1 P2P Distributed Energy Trading for Residential Microgrids.
10.5.2 Bridging Industrial and Residential Microgrids Through Electric Vehicles -- 10.6 Conclusions -- References -- 11 The Feasibility and Significance of Employing Blockchain-Based Identity Solutions in Health Care -- 11.1 Introduction -- 11.2 A Brief History of Identities in the Digital Age -- 11.2.1 Fully Centralized Identity Management -- 11.2.2 Federated Identity Management -- 11.2.3 User-Centric Identity Management -- 11.3 The Main Ideas Behind Decentralized Identity Management -- 11.3.1 Decentralized Identifier Based on Blockchain -- 11.3.2 Zero-Knowledge Proof -- 11.3.3 Decentralized Blockchains and the Internet -- 11.4 The Technical Architecture of Decentralized Identity Management -- 11.4.1 Architecture Overview -- 11.4.2 Blockchain-Based DID Service -- 11.4.3 Standardization of DIDs -- 11.4.4 Examples of DID Frameworks -- 11.5 The Potential of Applying Blockchain-Based DID Solutions in Health Care -- 11.5.1 Addressing the Patient Mismatching Problem -- 11.5.2 Facilitating Patient Recruitment in Clinical Research Using DID -- 11.5.3 The Safer Use of Medical Devices -- 11.5.4 Limitations Facing Current Blockchain-Based DID Solutions -- 11.6 Conclusion -- References -- 12 Toward eHealth with Blockchain: Success Factors for Crowdfunding with ICOs -- 12.1 Introduction -- 12.2 Theoretical Background -- 12.2.1 eHealth -- 12.2.2 Initial Coin Offerings (ICOs) and Blockchain -- 12.2.3 Signaling Theory -- 12.3 Research Method -- 12.3.1 Related Work -- 12.4 Research Hypotheses -- 12.4.1 Data and Variables -- 12.5 Results and Discussion -- 12.5.1 Descriptive Statistics of the ICO Data -- 12.5.2 Multivariate Analysis of the Factors Influencing the Success -- 12.6 Discussion -- 12.7 Conclusion -- References -- 13 Blockchain Track and Trace System (BTTS) for Pharmaceutical Supply Chain -- 13.1 Introduction -- 13.2 Related Works.
13.3 Overview of Bitcoin, Blockchain Platforms and Smart Contracts -- 13.4 The Proposal Model -- 13.4.1 Structure of Blockchain Track and Trace System (BTTS) -- 13.4.2 The Proposed Smart Contracts -- 13.5 Conclusion and Future Works -- References.
Record Nr. UNINA-9910484502403321
Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Business continuity and disaster recovery for infosec managers [electronic resource] / John W. Rittinghouse, James F. Ransome
Business continuity and disaster recovery for infosec managers [electronic resource] / John W. Rittinghouse, James F. Ransome
Autore Rittinghouse, John W.
Pubbl/distr/stampa Amsterdam ; Boston : Elsevier Digital Press, c2005
Descrizione fisica lxix, 338 p. : ill. ; 24 cm.
Disciplina 004/.0068/4
Altri autori (Persone) Ransome, James F.
Soggetto topico Business - Data processing - Security measures
Crisis management
Computer networks - Security measures
Information resources management
Soggetto genere / forma Electronic books.
ISBN 9781555583392
1555583393
Formato Risorse elettroniche
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction - Business Security; Contingency and Continuity Planning; Assessing; Mitigation Strategies; Preparing for a Possible Emergency; Disaster Recovery; Business Recovery Phase; Testing, Auditing, and Training; Maintaining a Business Continuity Plan; General References; Index.
Record Nr. UNISALENTO-991003247899707536
Rittinghouse, John W.  
Amsterdam ; Boston : Elsevier Digital Press, c2005
Risorse elettroniche
Lo trovi qui: Univ. del Salento
Opac: Controlla la disponibilità qui
Business continuity and disaster recovery planning for IT professionals / / Susan Snedaker, Chris Rima
Business continuity and disaster recovery planning for IT professionals / / Susan Snedaker, Chris Rima
Autore Snedaker Susan
Edizione [Second edition.]
Pubbl/distr/stampa Waltham, MA : , : Syngress, , [2014]
Descrizione fisica 1 online resource (602 p.)
Disciplina 658.4/78
Altri autori (Persone) RimaChris
Soggetto topico Business - Data processing - Security measures
Electronic data processing departments - Security measures
Crisis management
Computer networks - Security measures
Management information systems - Security measures
Soggetto genere / forma Electronic books.
ISBN 0-12-411451-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Machine generated contents note: Chapter 1: Business Continuity & Disaster Recovery Overview Chapter 2: Legal and Regulatory Environment Chapter 3: Project Initiation Chapter 4: Risk Assessment Chapter 5: Business Impact Assessment Chapter 6: Risk Mitigation Chapter 7: BC/DR Plan Development Chapter 8: Emergency Response and Recovery Chapter 9: Training, Testing & Auditing Results Chapter 10: BC/DR Plan Maintenance Case Study A: Utilities Case Study B: Healthcare Case Study C: Financial Case Study D: Small/Medium Business Glossary Checklists Resources.
Record Nr. UNINA-9910459144003321
Snedaker Susan  
Waltham, MA : , : Syngress, , [2014]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Business continuity and disaster recovery planning for IT professionals / / Susan Snedaker, Chris Rima
Business continuity and disaster recovery planning for IT professionals / / Susan Snedaker, Chris Rima
Autore Snedaker Susan
Edizione [Second edition.]
Pubbl/distr/stampa Waltham, MA : , : Syngress, , 2014
Descrizione fisica 1 online resource (xxiii, 577 pages) : illustrations
Disciplina 658.4/78
Collana Gale eBooks
Soggetto topico Business - Data processing - Security measures
Electronic data processing departments - Security measures
Crisis management
Computer networks - Security measures
Management information systems - Security measures
ISBN 0-12-411451-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Machine generated contents note: Chapter 1: Business Continuity & Disaster Recovery Overview Chapter 2: Legal and Regulatory Environment Chapter 3: Project Initiation Chapter 4: Risk Assessment Chapter 5: Business Impact Assessment Chapter 6: Risk Mitigation Chapter 7: BC/DR Plan Development Chapter 8: Emergency Response and Recovery Chapter 9: Training, Testing & Auditing Results Chapter 10: BC/DR Plan Maintenance Case Study A: Utilities Case Study B: Healthcare Case Study C: Financial Case Study D: Small/Medium Business Glossary Checklists Resources.
Record Nr. UNINA-9910792484303321
Snedaker Susan  
Waltham, MA : , : Syngress, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Business continuity and disaster recovery planning for IT professionals / / Susan Snedaker, Chris Rima
Business continuity and disaster recovery planning for IT professionals / / Susan Snedaker, Chris Rima
Autore Snedaker Susan
Edizione [Second edition.]
Pubbl/distr/stampa Waltham, MA : , : Syngress, , 2014
Descrizione fisica 1 online resource (xxiii, 577 pages) : illustrations
Disciplina 658.4/78
Collana Gale eBooks
Soggetto topico Business - Data processing - Security measures
Electronic data processing departments - Security measures
Crisis management
Computer networks - Security measures
Management information systems - Security measures
ISBN 0-12-411451-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Machine generated contents note: Chapter 1: Business Continuity & Disaster Recovery Overview Chapter 2: Legal and Regulatory Environment Chapter 3: Project Initiation Chapter 4: Risk Assessment Chapter 5: Business Impact Assessment Chapter 6: Risk Mitigation Chapter 7: BC/DR Plan Development Chapter 8: Emergency Response and Recovery Chapter 9: Training, Testing & Auditing Results Chapter 10: BC/DR Plan Maintenance Case Study A: Utilities Case Study B: Healthcare Case Study C: Financial Case Study D: Small/Medium Business Glossary Checklists Resources.
Record Nr. UNINA-9910815456903321
Snedaker Susan  
Waltham, MA : , : Syngress, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity and decision makers : data security and digital trust / / Marie de Fréminville
Cybersecurity and decision makers : data security and digital trust / / Marie de Fréminville
Autore Fréminville Marie de
Pubbl/distr/stampa Hoboken, N.J. : , : ISTE Ltd / John Wiley and Sons Inc, , 2020
Descrizione fisica 1 online resource (225 pages) : illustrations
Disciplina 495.932
Soggetto topico Business - Data processing - Security measures
Computer security - Management
ISBN 1-119-72037-0
1-119-72035-4
1-119-72036-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910555077203321
Fréminville Marie de  
Hoboken, N.J. : , : ISTE Ltd / John Wiley and Sons Inc, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui