top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
AI Applications in Cyber Security and Privacy of Communication Networks : Proceedings of 10th International Conference on Cyber Security, Privacy in Communication Networks (ICCS 2024)
AI Applications in Cyber Security and Privacy of Communication Networks : Proceedings of 10th International Conference on Cyber Security, Privacy in Communication Networks (ICCS 2024)
Autore Hewage Chaminda E. R
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2025
Descrizione fisica 1 online resource (182 pages)
Altri autori (Persone) ZafarMohammad Haseeb
KesswaniNishtha
Collana Lecture Notes in Networks and Systems Series
Soggetto topico COMPUTERS / Artificial Intelligence / General
COMPUTERS / Security / General
TECHNOLOGY & ENGINEERING / Engineering (General)
ISBN 981-9674-00-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9911022457603321
Hewage Chaminda E. R  
Singapore : , : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Automotive cybersecurity : an introduction to ISO/SAE 21434 / / by Dr. David Ward and Paul Wooderson
Automotive cybersecurity : an introduction to ISO/SAE 21434 / / by Dr. David Ward and Paul Wooderson
Autore Ward David D (Electronics engineer)
Edizione [1st ed.]
Pubbl/distr/stampa Warrendale, Pennsylvania : , : SAE International, , 2021
Descrizione fisica 1 online resource (1 PDF (xii, 93 pages)) : color illustrations
Disciplina 629.2826
Soggetto topico Automotive computers - Security measures
Computer security - Standards
COMPUTERS / Security / General
TECHNOLOGY & ENGINEERING / Automotive
TRANSPORTATION / Automotive / General
Computer security
Automotive technology and trades
Road and motor vehicles: general interest
ISBN 1-4686-0083-4
1-4686-0081-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Preface -- About the authors -- Chapter 1: Introduction to automotive cybersecurity -- Chapter 2: Cybersecurity for automotive cyber-physical systems -- Chapter 3: Establishing a cybersecurity process -- Chapter 4: Assurance and certification -- Chaper 5: Conclusions and going further -- References -- Index.
Record Nr. UNINA-9910795798803321
Ward David D (Electronics engineer)  
Warrendale, Pennsylvania : , : SAE International, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Automotive cybersecurity : an introduction to ISO/SAE 21434 / / by Dr. David Ward and Paul Wooderson
Automotive cybersecurity : an introduction to ISO/SAE 21434 / / by Dr. David Ward and Paul Wooderson
Autore Ward David D (Electronics engineer)
Edizione [1st ed.]
Pubbl/distr/stampa Warrendale, Pennsylvania : , : SAE International, , 2021
Descrizione fisica 1 online resource (1 PDF (xii, 93 pages)) : color illustrations
Disciplina 629.2826
Soggetto topico Automotive computers - Security measures
Computer security - Standards
COMPUTERS / Security / General
TECHNOLOGY & ENGINEERING / Automotive
TRANSPORTATION / Automotive / General
Computer security
Automotive technology and trades
Road and motor vehicles: general interest
ISBN 1-4686-0083-4
1-4686-0081-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Preface -- About the authors -- Chapter 1: Introduction to automotive cybersecurity -- Chapter 2: Cybersecurity for automotive cyber-physical systems -- Chapter 3: Establishing a cybersecurity process -- Chapter 4: Assurance and certification -- Chaper 5: Conclusions and going further -- References -- Index.
Record Nr. UNINA-9910826019903321
Ward David D (Electronics engineer)  
Warrendale, Pennsylvania : , : SAE International, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Blockchain - ICBC 2025 : 8th International Conference, Held As Part of the Services Conference Federation, SCF 2025, Hong Kong, China, September 27-30, 2025, Proceedings
Blockchain - ICBC 2025 : 8th International Conference, Held As Part of the Services Conference Federation, SCF 2025, Hong Kong, China, September 27-30, 2025, Proceedings
Autore Shyamasundar Rudrapatna K
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer, , 2025
Descrizione fisica 1 online resource (366 pages)
Altri autori (Persone) HuangHuawei
HeSonglin
FangJunbin
ZhangLiang-Jie
Collana Lecture Notes in Computer Science Series
Soggetto topico COMPUTERS / Hardware / General
COMPUTERS / Security / General
COMPUTERS / Software Development & Engineering / General
ISBN 9783032061768
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996678670503316
Shyamasundar Rudrapatna K  
Cham : , : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Defense in Depth : Modern Cybersecurity Strategies and Evolving Threats
Defense in Depth : Modern Cybersecurity Strategies and Evolving Threats
Autore Zangana Hewa Majeed
Edizione [1st ed.]
Pubbl/distr/stampa Newark : , : John Wiley & Sons, Incorporated, , 2025
Descrizione fisica 1 online resource (299 pages)
Disciplina 005.8
Soggetto topico COMPUTERS / Security / General
COMPUTERS / Security / Network Security
ISBN 1-394-34075-3
1-394-34074-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9911031579603321
Zangana Hewa Majeed  
Newark : , : John Wiley & Sons, Incorporated, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital Earth : Cyber Threats, Privacy and Ethics in an Age of Paranoia
Digital Earth : Cyber Threats, Privacy and Ethics in an Age of Paranoia
Autore Katz Sarah
Edizione [1st ed.]
Pubbl/distr/stampa Ely : , : IT Governance Ltd, , 2022
Descrizione fisica 1 online resource (108 pages)
Disciplina 005.8
Soggetto topico LAW / Computer & Internet
COMPUTERS / Security / General
LAW / Communications
LAW / Criminal Law / General
Soggetto non controllato Mathematics
ISBN 9781787783607
178778360X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Title -- Copyright -- About the author -- Acknowledgements -- Contents -- Introduction -- Chapter one: The spike in phishing amid the COVID-19 pandemic -- Key terms for this chapter -- Chaos theory in cyber threat mitigation -- The application of chaos theory to the assessment of phishing attacks -- Chapter two: A glance at the history of phishing mitigation practices -- The risk of phishing to federal health care agencies -- Applications of chaos theory in cyber threat mitigation, including phishing attacks -- Machine learning tools for phishing prevention -- Persuasive factors used in phishing attacks -- User awareness of email legitimacy verification techniques -- Chapter three: The hard truth - How little many users understand about identifying malicious emails -- Tackling email headers -- Next steps: Computer- assisted threat detection -- Chapter four: Disinformation versus misinformation in a post-COVID world -- Global information sharing -- Content moderators -- How to spot misinformation -- Managing content moderation: In theory and practice -- Next steps: Head above water in cyberspace -- Chapter five: Cyber terrorism and the firepower of social media -- Why convey a message to the masses? -- Making it look alluring -- Using social media to attract and recruit -- Next steps: Keep an eye on that friend request -- Chapter six: Drones - A search and rescue solution or the all-seeing eye in the sky? -- The technicalities of civilian privacy in UAV criminal investigation -- San Jose as a case study -- Those opposed -- Those in favor -- Calming the public outcry -- Balancing technological surveillance measures with public interest -- Next steps: Securing the wireless target -- Recent developments -- Chapter seven: Tying it all together -- Appendix A: Bibliography -- Further reading.
Record Nr. UNINA-9911009185503321
Katz Sarah  
Ely : , : IT Governance Ltd, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Ethical and Social Impacts of Information and Communication Technology : 22nd International Conference, ETHICOMP 2025, Lisbon, Portugal, September 17-19, 2025, Proceedings
Ethical and Social Impacts of Information and Communication Technology : 22nd International Conference, ETHICOMP 2025, Lisbon, Portugal, September 17-19, 2025, Proceedings
Autore Alvarez Isabel
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer, , 2025
Descrizione fisica 1 online resource (899 pages)
Disciplina 303.4833
Altri autori (Persone) Arias-OlivaMario
Horia DediuAdrian
SilvaNuno
Collana Lecture Notes in Computer Science Series
Soggetto topico COMPUTERS / Security / General
SOCIAL SCIENCE / Criminology
ISBN 3-032-01429-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996678677203316
Alvarez Isabel  
Cham : , : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Securing the Digital Frontier : Threats and Advanced Techniques in Security and Forensics
Securing the Digital Frontier : Threats and Advanced Techniques in Security and Forensics
Autore Sharma Kavita
Edizione [1st ed.]
Pubbl/distr/stampa Newark : , : John Wiley & Sons, Incorporated, , 2025
Descrizione fisica 1 online resource (417 pages)
Altri autori (Persone) SharmaVishnu
NandParma
SagarAnil Kumar
ShrivastavaGulshan
Soggetto topico COMPUTERS / Security / General
ISBN 9781394268917
1394268912
9781394268894
1394268890
9781394268900
1394268904
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9911019604103321
Sharma Kavita  
Newark : , : John Wiley & Sons, Incorporated, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui