Advancing Resilient Performance / / edited by Christopher P. Nemeth, Erik Hollnagel
| Advancing Resilient Performance / / edited by Christopher P. Nemeth, Erik Hollnagel |
| Edizione | [1st ed. 2022.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 |
| Descrizione fisica | 1 online resource (161 pages) |
| Disciplina | 658.155 |
| Collana | Engineering Series |
| Soggetto topico |
Security systems
Sustainability Mechatronics Electronic digital computers - Evaluation System theory Computer security Security Science and Technology System Performance and Evaluation Complex Systems Principles and Models of Security |
| ISBN | 3-030-74689-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | From Resilience Engineering to Resilient Performance -- Development of Resilience Engineering on Worksites -- Fatigue Risk Management System as a practical approach to improve resilience in 24/7 operations -- Using the Resilience Assessment Grid to Analyse and Improve Organisational Resilience of a Hospital Ward -- Learning from Everyday Work: Making organisations Safer by Supporting Staff in Sharing Lessons about Their Everyday Trade-offs and Adaptations -- Reflections on the Experience of Introducing a New Learning Tool in Hospital Settings -- Resilient Performance in Aviation -- Assessing the impacts of ship automation using the Functional Resonance Analysis Method -- A Methodological Framework for Assessing and Improving the Capacity to Respond to the Diversity of Situations that May Arise -- Addressing structural secrecy as a way of nurturing resilient performance -- The 2nd Step: Surprise Is Inevitable. Now What? -- Epilogue: Quo Vadis? |
| Record Nr. | UNINA-9910522945003321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The Art of Cyber Warfare : Strategic and Tactical Approaches for Attack and Defense in the Digital Age / / by Peter Kestner
| The Art of Cyber Warfare : Strategic and Tactical Approaches for Attack and Defense in the Digital Age / / by Peter Kestner |
| Autore | Kestner Peter |
| Edizione | [1st ed. 2024.] |
| Pubbl/distr/stampa | Wiesbaden : , : Springer Fachmedien Wiesbaden : , : Imprint : Springer, , 2024 |
| Descrizione fisica | 1 online resource (300 pages) |
| Disciplina | 005.8 |
| Collana | Computer Science Series |
| Soggetto topico |
Data protection
Computer crimes Computer security Data and Information Security Computer Crime Principles and Models of Security |
| ISBN | 3-658-43879-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Introduction: 1984 and the lessons of the past -- Lessons from the past -- Modern and hybrid warfare -- The art of cyber warfare -- Outlook: The future of cyber warfare. |
| Record Nr. | UNINA-9910855367803321 |
Kestner Peter
|
||
| Wiesbaden : , : Springer Fachmedien Wiesbaden : , : Imprint : Springer, , 2024 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Azure Security Handbook : A Comprehensive Guide for Defending Your Enterprise Environment / / by Karl Ots
| Azure Security Handbook : A Comprehensive Guide for Defending Your Enterprise Environment / / by Karl Ots |
| Autore | Ots Karl <1882-1961, > |
| Edizione | [1st ed. 2021.] |
| Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2021 |
| Descrizione fisica | 1 online resource (162 pages) |
| Disciplina | 005.8 |
| Soggetto topico |
Microsoft software
Microsoft .NET Framework Computer networks - Security measures Computer security Microsoft Mobile and Network Security Principles and Models of Security |
| ISBN |
9781484272923
1484272927 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1. Introduction to Cloud Security Architecture -- Chapter 2. Identity and Access Management -- Chapter 3. Logging and Monitoring -- Chapter 4. Network Security -- Chapter 5. Workload Protection- Data -- Chapter 6. Workload Protection- Platform-as-a-Service -- Chapter 7. Workload Protection- Containers -- Chapter 8. Workload Protection- IaaS. |
| Record Nr. | UNINA-9910494559303321 |
Ots Karl <1882-1961, >
|
||
| Berkeley, CA : , : Apress : , : Imprint : Apress, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Blockchain Scalability [[electronic resource] /] / edited by Wuhui Chen, Zibin Zheng, Huawei Huang
| Blockchain Scalability [[electronic resource] /] / edited by Wuhui Chen, Zibin Zheng, Huawei Huang |
| Autore | Zheng Zibin |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (243 pages) |
| Disciplina | 005.74 |
| Altri autori (Persone) |
ChenWuhui
HuangHuawei |
| Soggetto topico |
Blockchains (Databases)
Electronic digital computers - Evaluation Computer security Computer networks Blockchain System Performance and Evaluation Principles and Models of Security Computer Communication Networks |
| ISBN | 981-9910-59-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1. Blockchain Scalability Fundamentals -- Chapter 2. Overview to Blockchain Scalability Challenges and Solutions -- Chapter 3. On-Chain and Off-Chain Scalability Techniques -- Chapter 4. Layered Sharding on Open Blockchain -- Chapter 5. Sharding-Based Scalable Consortium Blockchain -- Chapter 6. State Sharding for Permissioned Blockchain -- Chapter 7. Elastic Resource Allocation in Sharding-Based Blockchains -- Chapter 8. Dynamic Sharding: A Trade-OFF Between Security and Scalability -- Chapter 9. A Scalable and Secure Framework for 5G Networks Applications. |
| Record Nr. | UNISA-996546845103316 |
Zheng Zibin
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Blockchain Scalability / / edited by Wuhui Chen, Zibin Zheng, Huawei Huang
| Blockchain Scalability / / edited by Wuhui Chen, Zibin Zheng, Huawei Huang |
| Autore | Zheng Zibin |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (243 pages) |
| Disciplina | 005.74 |
| Altri autori (Persone) |
ChenWuhui
HuangHuawei |
| Soggetto topico |
Blockchains (Databases)
Electronic digital computers - Evaluation Computer security Computer networks Blockchain System Performance and Evaluation Principles and Models of Security Computer Communication Networks |
| ISBN |
9789819910595
9819910595 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1. Blockchain Scalability Fundamentals -- Chapter 2. Overview to Blockchain Scalability Challenges and Solutions -- Chapter 3. On-Chain and Off-Chain Scalability Techniques -- Chapter 4. Layered Sharding on Open Blockchain -- Chapter 5. Sharding-Based Scalable Consortium Blockchain -- Chapter 6. State Sharding for Permissioned Blockchain -- Chapter 7. Elastic Resource Allocation in Sharding-Based Blockchains -- Chapter 8. Dynamic Sharding: A Trade-OFF Between Security and Scalability -- Chapter 9. A Scalable and Secure Framework for 5G Networks Applications. |
| Record Nr. | UNINA-9910734875903321 |
Zheng Zibin
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Bring Your Own Device Security Policy Compliance Framework / / by Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah, Tutut Herawan
| Bring Your Own Device Security Policy Compliance Framework / / by Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah, Tutut Herawan |
| Autore | Palanisamy Rathika |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (XXII, 196 p. 26 illus., 13 illus. in color.) |
| Disciplina | 620.00285 |
| Collana | Information Systems Engineering and Management |
| Soggetto topico |
Engineering - Data processing
Data protection Computer security Computer networks - Security measures Data Engineering Data and Information Security Security Services Principles and Models of Security Mobile and Network Security |
| ISBN | 3-031-86801-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Introduction -- Bring Your Own Device -- Theoretical Framework and Hypotheses Development -- Research Methodology -- Analysis, Results and Discussion -- Conclusion and Future Work. |
| Record Nr. | UNINA-9910991163803321 |
Palanisamy Rathika
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Computational Color Imaging : 8th International Workshop, CCIW 2024, Milan, Italy, September 25–27, 2024, Proceedings / / edited by Raimondo Schettini, Alain Trémeau, Shoji Tominaga, Simone Bianco, Marco Buzzelli
| Computational Color Imaging : 8th International Workshop, CCIW 2024, Milan, Italy, September 25–27, 2024, Proceedings / / edited by Raimondo Schettini, Alain Trémeau, Shoji Tominaga, Simone Bianco, Marco Buzzelli |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (XIX, 290 p. 132 illus., 107 illus. in color.) |
| Disciplina | 006.37 |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Computer vision
Computer security Artificial intelligence Signal processing Computer Vision Principles and Models of Security Artificial Intelligence Signal, Speech and Image Processing |
| ISBN |
9783031728457
3031728459 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | -- Color Theory and Spaces. -- Atomic color: from points to probability distributions. -- Extended Wien and Planck Loci. -- Uniform Color Space with Advanced Hue Linearity: PCS23-UCS. -- Color difference in context: an experiment. -- Image Enhancement and Retinex Theory. -- Exploiting Milano Retinex Contrast to Enhance Images with Strong Changes of Light Intensity. -- Intrinsic Image Decomposition based on Retinex Theory, Superpixel Segmentation and Scale-Space Computations. -- Hyperspectral and Spectral Imaging. -- VNIR and SWIR hyperspectral imaging for the study of Picasso paintings. -- Stabilization of the spectral power distribution of a tunable multichannel LED lighting system. -- Low light hyperspectral imaging using HDR methods. -- Spectral Imaging Methods for Estimating Fluorescence Emission Spectra from Plant Grains and Leaves. -- Stitching from spectral filter array video sequences. -- Printing and Machine Learning Applications. -- Dithering with Pascal Cellular Automata. -- From Gutenberg to Llamas: print optimization through first principles and AI. -- Instance-based CycleGAN for object segmentation with few annotations. -- ChromaPose: Robustness of 2D Pose Estimation Under Different Color Illuminations. -- Perceptual Quality, Medical Imaging, and Art Applications. -- Investigation of Image Features for Perceptually Equivalent Gloss Reproduction through Comparison of Real Objects and Images. -- Classification of lung nodules on CT via pseudo-colour images and deep features from pre-trained convolutional networks. -- Painter Verification Using Color Palettes: An Exploratory Study. -- Color Constancy. -- Illuminant Equivariant Networks for Computational Color Constancy. -- Revisiting Color Constancy Using CNNs: Including Recent Observations. -- Enforcing temporal consistency for color constancy in video sequences. |
| Record Nr. | UNINA-9910983379103321 |
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The coupling of safety and security : exploring interrelations in theory and practice / / edited by Corinne Bieder, Kenneth Pettersen Gould
| The coupling of safety and security : exploring interrelations in theory and practice / / edited by Corinne Bieder, Kenneth Pettersen Gould |
| Autore | Bieder Corinne |
| Pubbl/distr/stampa | Springer Nature, 2020 |
| Descrizione fisica | 1 online resource (viii, 113 pages) : illustrations; digital, PDF file(s) |
| Disciplina | 658.56 |
| Collana |
SpringerBriefs in Applied Sciences and Technology
SpringerBriefs in Safety Management |
| Soggetto topico |
Quality control
Reliability Industrial safety Computer security Public safety System safety Industrial organization Quality Control, Reliability, Safety and Risk Principles and Models of Security Crime Control and Security Security Science and Technology Industrial Organization |
| Soggetto non controllato |
Quality Control, Reliability, Safety and Risk
Principles and Models of Security Crime Control and Security Security Science and Technology Industrial Organization Industrial and Production Engineering Safety Management Security Management Safety and Security High Risk Organizations Risk Management Safety Security Efficiency Security Interfaces Open Access Reliability engineering Computer security Crime & criminology Security & fire alarm systems Economics of industrial organisation |
| ISBN | 3-030-47229-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | 1. Safety and Security: The Challenges of Bringing them Together -- 2. The Concepts of Risk, Safety and Security: A Fundamental Exploration and Understanding of Similarities and Differences -- 3. Safety and Security are Two Sides of the Same Coin -- 4. Safety vs Security in Aviation -- 6. Security and Safety Culture - Dual or Distinct Phenomena? |
| Record Nr. | UNINA-9910416527703321 |
Bieder Corinne
|
||
| Springer Nature, 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cyber Deception : Techniques, Strategies, and Human Aspects / / edited by Tiffany Bao, Milind Tambe, Cliff Wang
| Cyber Deception : Techniques, Strategies, and Human Aspects / / edited by Tiffany Bao, Milind Tambe, Cliff Wang |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (252 pages) |
| Disciplina | 005.8 |
| Collana | Advances in Information Security |
| Soggetto topico |
Data protection
User interfaces (Computer systems) Human-computer interaction Machine learning Computer security Data and Information Security User Interfaces and Human Computer Interaction Machine Learning Principles and Models of Security |
| ISBN |
9783031166136
3031166132 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | 1. Diversifying Deception: Game Theoretic Models for Two-Sided and Layered Deception -- 2. Human-Subject Experiments on Risk-based Cyber Camouflage Games -- 3. Adaptive Cyberdefense with Deception: A Human-AI Cognitive Approach -- 4. Cognitive Modeling for Personalized, Adaptive Signaling for Cyber Deception -- 5. Deceptive Signaling: Understanding Human Behavior against Signaling algorithms -- 6. Optimizing Honey Traffic Using Game Theory and Adversarial Learning -- 7. Mee: Adaptive Honeyfile System for Insider Attacker Detection -- 8. HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems -- 9. Using Amnesia to Detect Credential Database Breaches -- 10. Deceiving ML-Based Friend-or-Foe Identification for Executables. |
| Record Nr. | UNINA-9910682584603321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cyber Resilience System Engineering Empowered by Endogenous Security and Safety / / by Jiangxing Wu
| Cyber Resilience System Engineering Empowered by Endogenous Security and Safety / / by Jiangxing Wu |
| Autore | Wu Jiangxing |
| Edizione | [1st ed. 2024.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 |
| Descrizione fisica | 1 online resource (533 pages) |
| Disciplina | 004.22 |
| Soggetto topico |
Computer networks - Security measures
Computer security Cryptography Data encryption (Computer science) Mobile and Network Security Principles and Models of Security Cryptology |
| ISBN |
9789819701162
9819701163 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1. Cyberspace Endogenous Security and Safety Problems -- Chapter 2. Cyberspace Endogenous Security and Safety Defense Vision -- Chapter 3. The Principle and Structure of Cyberspace Endogenous Security and Safety -- Chapter 4. Introduction to Functional Safety and Cyber Resilience -- Chapter 5. The Framework of Cyber Resilience Engineering Empowered by Endogenous Security and Safety -- Chapter 6. Metrics and Assessment of ESS-Empowered Cyber Resilience -- Chapter 7. Engineering Applications in Typical Fields of ESS Empowerment -- Chapter 8. Exploration of Emerging Fields Empowered by Endogenous Security and Safety -- Appendix. |
| Record Nr. | UNINA-9910899890803321 |
Wu Jiangxing
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||