top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Automotive cybersecurity : an introduction to ISO/SAE 21434 / / by Dr. David Ward and Paul Wooderson
Automotive cybersecurity : an introduction to ISO/SAE 21434 / / by Dr. David Ward and Paul Wooderson
Autore Ward David D (Electronics engineer)
Edizione [1st ed.]
Pubbl/distr/stampa Warrendale, Pennsylvania : , : SAE International, , 2021
Descrizione fisica 1 online resource (1 PDF (xii, 93 pages)) : color illustrations
Disciplina 629.2826
Soggetto topico Automotive computers - Security measures
Computer security - Standards
COMPUTERS / Security / General
TECHNOLOGY & ENGINEERING / Automotive
TRANSPORTATION / Automotive / General
Computer security
Automotive technology and trades
Road and motor vehicles: general interest
ISBN 1-4686-0083-4
1-4686-0081-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Preface -- About the authors -- Chapter 1: Introduction to automotive cybersecurity -- Chapter 2: Cybersecurity for automotive cyber-physical systems -- Chapter 3: Establishing a cybersecurity process -- Chapter 4: Assurance and certification -- Chaper 5: Conclusions and going further -- References -- Index.
Record Nr. UNINA-9910795798803321
Ward David D (Electronics engineer)  
Warrendale, Pennsylvania : , : SAE International, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Automotive cybersecurity : an introduction to ISO/SAE 21434 / / by Dr. David Ward and Paul Wooderson
Automotive cybersecurity : an introduction to ISO/SAE 21434 / / by Dr. David Ward and Paul Wooderson
Autore Ward David D (Electronics engineer)
Edizione [1st ed.]
Pubbl/distr/stampa Warrendale, Pennsylvania : , : SAE International, , 2021
Descrizione fisica 1 online resource (1 PDF (xii, 93 pages)) : color illustrations
Disciplina 629.2826
Soggetto topico Automotive computers - Security measures
Computer security - Standards
COMPUTERS / Security / General
TECHNOLOGY & ENGINEERING / Automotive
TRANSPORTATION / Automotive / General
Computer security
Automotive technology and trades
Road and motor vehicles: general interest
ISBN 1-4686-0083-4
1-4686-0081-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Preface -- About the authors -- Chapter 1: Introduction to automotive cybersecurity -- Chapter 2: Cybersecurity for automotive cyber-physical systems -- Chapter 3: Establishing a cybersecurity process -- Chapter 4: Assurance and certification -- Chaper 5: Conclusions and going further -- References -- Index.
Record Nr. UNINA-9910826019903321
Ward David D (Electronics engineer)  
Warrendale, Pennsylvania : , : SAE International, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital Earth : Cyber Threats, Privacy and Ethics in an Age of Paranoia
Digital Earth : Cyber Threats, Privacy and Ethics in an Age of Paranoia
Autore Katz Sarah
Edizione [1st ed.]
Pubbl/distr/stampa Ely : , : IT Governance Ltd, , 2022
Descrizione fisica 1 online resource (108 pages)
Disciplina 005.8
Soggetto topico LAW / Computer & Internet
COMPUTERS / Security / General
LAW / Communications
LAW / Criminal Law / General
Soggetto non controllato Mathematics
ISBN 9781787783607
178778360X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Title -- Copyright -- About the author -- Acknowledgements -- Contents -- Introduction -- Chapter one: The spike in phishing amid the COVID-19 pandemic -- Key terms for this chapter -- Chaos theory in cyber threat mitigation -- The application of chaos theory to the assessment of phishing attacks -- Chapter two: A glance at the history of phishing mitigation practices -- The risk of phishing to federal health care agencies -- Applications of chaos theory in cyber threat mitigation, including phishing attacks -- Machine learning tools for phishing prevention -- Persuasive factors used in phishing attacks -- User awareness of email legitimacy verification techniques -- Chapter three: The hard truth - How little many users understand about identifying malicious emails -- Tackling email headers -- Next steps: Computer- assisted threat detection -- Chapter four: Disinformation versus misinformation in a post-COVID world -- Global information sharing -- Content moderators -- How to spot misinformation -- Managing content moderation: In theory and practice -- Next steps: Head above water in cyberspace -- Chapter five: Cyber terrorism and the firepower of social media -- Why convey a message to the masses? -- Making it look alluring -- Using social media to attract and recruit -- Next steps: Keep an eye on that friend request -- Chapter six: Drones - A search and rescue solution or the all-seeing eye in the sky? -- The technicalities of civilian privacy in UAV criminal investigation -- San Jose as a case study -- Those opposed -- Those in favor -- Calming the public outcry -- Balancing technological surveillance measures with public interest -- Next steps: Securing the wireless target -- Recent developments -- Chapter seven: Tying it all together -- Appendix A: Bibliography -- Further reading.
Record Nr. UNINA-9911009185503321
Katz Sarah  
Ely : , : IT Governance Ltd, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui