Artificial Intelligence and Its Contexts : Security, Business and Governance / Anna Visvizi, Marek Bodziany editors
| Artificial Intelligence and Its Contexts : Security, Business and Governance / Anna Visvizi, Marek Bodziany editors |
| Pubbl/distr/stampa | Cham, : Springer, 2021 |
| Descrizione fisica | viii, 240 p. : ill. ; 24 cm |
| Soggetto topico |
68Txx - Artificial intelligence [MSC 2020]
93-XX - Systems theory; control [MSC 2020] |
| Soggetto non controllato |
AI and Politics
Blockchain Cybersecurity Data-driven Decision-making Digital Governance Digital Sovereignty Modernization of State Management of the Digital Economy |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNICAMPANIA-VAN00282280 |
| Cham, : Springer, 2021 | ||
| Lo trovi qui: Univ. Vanvitelli | ||
| ||
Can. Trust. Will : Hiring for the Human Element in the New Age of Cybersecurity
| Can. Trust. Will : Hiring for the Human Element in the New Age of Cybersecurity |
| Autore | Garber Leeza |
| Edizione | [First edition.] |
| Pubbl/distr/stampa | New York : , : Business Expert Press, , 2021 |
| Descrizione fisica | 1 online resource (224 pages) |
| Disciplina | 005.80683 |
| Altri autori (Persone) | OlsonScott |
| Collana | Business law and corporate risk |
| Soggetto topico |
Computer security - Personnel management
Computer technicians - Selection and appointment |
| Soggetto non controllato |
Cybersecurity
Human resources Information technology Data breach Hiring C-Suite Onboarding Interview Career Behavioral interview Budget Budget process Security budget IT Talen acquisition |
| ISBN | 1-63742-168-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1. Identifying your cybersecurity hiring need -- Chapter 2. Can -- Trust -- Will -- Chapter 3. Finding the right candidates -- Chapter 4. The big mistake (and how to avoid it) -- Chapter 5. Hiring the right cybersecurity role behaviors -- Chapter 6. The interview -- Chapter 7. Onboarding cybersecurity hires (and building cybersecurity Into onboarding) -- Chapter 8. Concluding thoughts and tips for candidates -- Appendix A. Model behavioral question sets -- Appendix B. Additional behavioral question sets. |
| Record Nr. | UNINA-9910795545003321 |
Garber Leeza
|
||
| New York : , : Business Expert Press, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Can. Trust. Will : Hiring for the Human Element in the New Age of Cybersecurity
| Can. Trust. Will : Hiring for the Human Element in the New Age of Cybersecurity |
| Autore | Garber Leeza |
| Edizione | [First edition.] |
| Pubbl/distr/stampa | New York : , : Business Expert Press, , 2021 |
| Descrizione fisica | 1 online resource (224 pages) |
| Disciplina | 005.80683 |
| Altri autori (Persone) | OlsonScott |
| Collana | Business law and corporate risk |
| Soggetto topico |
Computer security - Personnel management
Computer technicians - Selection and appointment |
| Soggetto non controllato |
Cybersecurity
Human resources Information technology Data breach Hiring C-Suite Onboarding Interview Career Behavioral interview Budget Budget process Security budget IT Talen acquisition |
| ISBN | 1-63742-168-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1. Identifying your cybersecurity hiring need -- Chapter 2. Can -- Trust -- Will -- Chapter 3. Finding the right candidates -- Chapter 4. The big mistake (and how to avoid it) -- Chapter 5. Hiring the right cybersecurity role behaviors -- Chapter 6. The interview -- Chapter 7. Onboarding cybersecurity hires (and building cybersecurity Into onboarding) -- Chapter 8. Concluding thoughts and tips for candidates -- Appendix A. Model behavioral question sets -- Appendix B. Additional behavioral question sets. |
| Record Nr. | UNINA-9910813026903321 |
Garber Leeza
|
||
| New York : , : Business Expert Press, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Corporate espionage, geopolitics, and diplomacy issues in international business / / Bryan Christiansen and Fatmanur Kasarcı, editors
| Corporate espionage, geopolitics, and diplomacy issues in international business / / Bryan Christiansen and Fatmanur Kasarcı, editors |
| Pubbl/distr/stampa | Hershey, Pennsylvania : , : IGI Global, , 2017 |
| Descrizione fisica | PDFs (373 pages) : illustrations |
| Disciplina | 658.4/72 |
| Collana | Advances in Finance, Accounting, and Economics |
| Soggetto topico |
International business enterprises - Management
Business intelligence Geopolitics - Economic aspects International economic relations International trade |
| Soggetto non controllato |
Active pacifism
Branding Cybersecurity Disruptive technologies Entrepreneurship Intellectual capital |
| ISBN |
9781522510321
9781522510314 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Blurred lines between competitive intelligence and corporate espionage / Harish C. Chandan -- Abenomics and active pacifism: how Abe's age influenced the international business / Vittorio D'Aleo [and 5 others] -- Nationalism and patriotism in international business / Duane Windsor -- Cybersecurity concerns in international business / Joel F. Williquette -- How globalization sparked entrepreneurship in the developing world: the impact of formal economic and political linkages / Luis Alfonso Dau [and 3 others] -- The importance of entrepreneurship in global business / Kijpokin Kasemsap -- Problem solving using soft-math (SM) methodology / Allen McKenna, Georges Baume -- The secret to the success of K-pop: the benefits of well-balanced copyrights / Jimmyn Parc, Patrick Messerlin, Hwy-Chang Moon -- Competition for influence: the impact of the nuclear issue on international business in North Korea / Stephen Ranger -- Towards black box forensic cybercrime investigation model (BBFCIM): beyond the rule of thumb / Oyewole Simon Oginni -- Intellectual capital and business performance of pharmaceutical firms in Kenya / James Mark Ngari -- The geopolitics of immigrant labour: a climate of fear / Elizabeth Mary Christopher -- Sustainable supply chains and international soft landings: a case of wetland entrepreneurship / Ye-Sho Chen -- Are shocks to energy consumption per capita in Turkey permanent or temporary? / Yasar Serhat Yasgül, Burak Güris, Burcu Yavuz Tiftikçigil --
Competitiveness of Turkey in the sectoral transformation process: a comparative analysis with the BRIC countries / Sema Ay, Hilal Yildirir Keser -- Securitization and the economy of risks: decision-making in the Eurasian Union / Oxana Karnaukhova -- Characteristics and activities of the US Secret Service / Agnieszka Piekarz. |
| Record Nr. | UNINA-9910149369203321 |
| Hershey, Pennsylvania : , : IGI Global, , 2017 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cyber Security and Critical Infrastructures 2nd Volume
| Cyber Security and Critical Infrastructures 2nd Volume |
| Autore | Maglaras Leandros |
| Pubbl/distr/stampa | Basel, : MDPI - Multidisciplinary Digital Publishing Institute, 2022 |
| Descrizione fisica | 1 electronic resource (326 p.) |
| Soggetto topico |
Technology: general issues
History of engineering & technology |
| Soggetto non controllato |
Cybersecurity
critical Infrastructures privacy preservation |
| ISBN | 3-0365-5662-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910637791403321 |
Maglaras Leandros
|
||
| Basel, : MDPI - Multidisciplinary Digital Publishing Institute, 2022 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cybersecurity in context : Technology, policy, and law- / Chris Jay Hoofnagle, Golden G. Richard III
| Cybersecurity in context : Technology, policy, and law- / Chris Jay Hoofnagle, Golden G. Richard III |
| Autore | Hoofnagle, Chris Jay |
| Pubbl/distr/stampa | Hoboken, : Wiley, c2025 |
| Descrizione fisica | XXVII, 506 pag. : ill, ; 32 cm |
| Disciplina | 368.8 |
| Altri autori (Persone) | Golden, G. Richard III |
| Soggetto non controllato | Cybersecurity |
| ISBN | 9781394262441 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9911025878403321 |
Hoofnagle, Chris Jay
|
||
| Hoboken, : Wiley, c2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cybersecurity in Digital Transformation : Scope and Applications / Dietmar P.F. Möller
| Cybersecurity in Digital Transformation : Scope and Applications / Dietmar P.F. Möller |
| Autore | Möller, Dietmar P. F. |
| Pubbl/distr/stampa | Cham, : Springer, 2020 |
| Descrizione fisica | xix, 114 p. : ill. ; 24 cm |
| Soggetto topico |
68-XX - Computer science [MSC 2020]
94-XX - Information and communication theory, circuits [MSC 2020] |
| Soggetto non controllato |
Anomaly Detection
Attach Models and Scenarios Cyber Threat Intelligence Cybersecurity Cybersecurity Leadership Cybersecurity Ontology Deep Learning Digital Transformation Intrusion Detection and Intrusion Prevention Machine learning |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Titolo uniforme | |
| Record Nr. | UNICAMPANIA-VAN0248955 |
Möller, Dietmar P. F.
|
||
| Cham, : Springer, 2020 | ||
| Lo trovi qui: Univ. Vanvitelli | ||
| ||
Cybersecurity in Digital Transformation : Scope and Applications / Dietmar P.F. Möller
| Cybersecurity in Digital Transformation : Scope and Applications / Dietmar P.F. Möller |
| Autore | Möller, Dietmar P. F. |
| Pubbl/distr/stampa | Cham, : Springer, 2020 |
| Descrizione fisica | xix, 114 p. : ill. ; 24 cm |
| Soggetto topico |
68-XX - Computer science [MSC 2020]
94-XX - Information and communication theory, circuits [MSC 2020] |
| Soggetto non controllato |
Anomaly Detection
Attach Models and Scenarios Cyber Threat Intelligence Cybersecurity Cybersecurity Leadership Cybersecurity Ontology Deep Learning Digital Transformation Intrusion Detection and Intrusion Prevention Machine learning |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Titolo uniforme | |
| Record Nr. | UNICAMPANIA-VAN00248955 |
Möller, Dietmar P. F.
|
||
| Cham, : Springer, 2020 | ||
| Lo trovi qui: Univ. Vanvitelli | ||
| ||
Game Theory for Cyber Deception : From Theory to Applications / Jeffrey Pawlick, Quanyan Zhu
| Game Theory for Cyber Deception : From Theory to Applications / Jeffrey Pawlick, Quanyan Zhu |
| Autore | Pawlick, Jeffrey |
| Pubbl/distr/stampa | Cham, : Birkhäuser, : Springer, 2021 |
| Descrizione fisica | xiii, 190 p. : ill. ; 24 cm |
| Altri autori (Persone) | Zhu, Quanyan |
| Soggetto topico |
91-XX - Game theory, economics, finance, and other social and behavioral sciences [MSC 2020]
91A80 - Applications of game theory [MSC 2020] 91A10 - Noncooperative games [MSC 2020] 68M25 - Computer security [MSC 2020] 91A18 - Games in extensive form [MSC 2020] 91A65 - Hierarchical games (including Stackelberg games) [MSC 2020] 91A27 - Games with incomplete information, Bayesian games [MSC 2020] 91A28 - Signaling and communication in game theory [MSC 2020] 91A16 - Mean field games (aspects of game theory) [MSC 2020] |
| Soggetto non controllato |
Attacker engagement cybersecurity
Bayesian games Cyber deception Cybersecurity Defensive deception cyber Dos attack cybersecurity Game Theory Games of incomplete information Honey-X cybersecurity Internet of Things Large population games Nash games Obfuscation cybersecurity Stackelberg games Strategic trust cybersecurity Zero-sum matrix games |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNICAMPANIA-VAN0274386 |
Pawlick, Jeffrey
|
||
| Cham, : Birkhäuser, : Springer, 2021 | ||
| Lo trovi qui: Univ. Vanvitelli | ||
| ||
Game Theory for Cyber Deception : From Theory to Applications / Jeffrey Pawlick, Quanyan Zhu
| Game Theory for Cyber Deception : From Theory to Applications / Jeffrey Pawlick, Quanyan Zhu |
| Autore | Pawlick, Jeffrey |
| Pubbl/distr/stampa | Cham, : Birkhäuser, : Springer, 2021 |
| Descrizione fisica | xiii, 190 p. : ill. ; 24 cm |
| Altri autori (Persone) | Zhu, Quanyan |
| Soggetto topico |
68M25 - Computer security [MSC 2020]
91-XX - Game theory, economics, finance, and other social and behavioral sciences [MSC 2020] 91A10 - Noncooperative games [MSC 2020] 91A16 - Mean field games (aspects of game theory) [MSC 2020] 91A18 - Games in extensive form [MSC 2020] 91A27 - Games with incomplete information, Bayesian games [MSC 2020] 91A28 - Signaling and communication in game theory [MSC 2020] 91A65 - Hierarchical games (including Stackelberg games) [MSC 2020] 91A80 - Applications of game theory [MSC 2020] |
| Soggetto non controllato |
Attacker engagement cybersecurity
Bayesian games Cyber deception Cybersecurity Defensive deception cyber Dos attack cybersecurity Game Theory Games of incomplete information Honey-X cybersecurity Internet of Things Large population games Nash games Obfuscation cybersecurity Stackelberg games Strategic trust cybersecurity Zero-sum matrix games |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNICAMPANIA-VAN00274386 |
Pawlick, Jeffrey
|
||
| Cham, : Birkhäuser, : Springer, 2021 | ||
| Lo trovi qui: Univ. Vanvitelli | ||
| ||