Anti-fragile ICT Systems [[electronic resource] /] / by Kjell Jørgen Hole |
Autore | Hole Kjell Jørgen |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Springer Nature, 2016 |
Descrizione fisica | 1 online resource (XVIII, 151 pages) ; : 44 illustrations, 22 illustrations in colour; digital, PDF file(s) |
Disciplina | 004.6 |
Collana | Simula SpringerBriefs on Computing |
Soggetto topico |
Computer organization
Computers Artificial intelligence Computer simulation Computer Systems Organization and Communication Networks Information Systems and Communication Service Artificial Intelligence Simulation and Modeling |
Soggetto non controllato |
Computer Systems Organization and Communication Networks
Information Systems and Communication Service Artificial Intelligence Simulation and Modeling Computer Engineering and Networks Database Management System Computer Science Anomaly detection Anti-fragility Cloud computing Complex adaptive systems DevOps (Development and Operation) Diversity Loose coupling Malware Malware detection Microservices Modules Monitoring Redundancy Risk analysis Software architecture Software design System dependencies Tight coupling Trust Weak links Computer networking & communications Computer modelling & simulation |
ISBN | 3-319-30070-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Preface -- Part I: The Concept of Anti-Fragility: 1 Introduction -- 2 Achieving Anti-Fragility -- 3 The Need to Build Trust -- 4 Principles Ensuring Anti-Fragility -- Part II: Anti-Fragility to Downtime: 5 Anti-Fragile Cloud Solutions -- 6 An Anti-Fragile e-Government System -- 7 Anti-Fragile Cloud-Based Telecom Systems -- Part III: Anti-Fragility to Malware: 8 Robustness to Malware Spreading -- 9 Robustness to Malware Reinfections -- 10 Anti-Fragility to Malware Spreading -- Part IV: Anomaly Detection: 11 The Cortical Learning Algorithm -- 12 Detecting Anomalies with the CLA -- Part V: Future Anti-Fragile Systems: 13 Summary and Future Work -- About the Author -- References -- Index. |
Record Nr. | UNINA-9910136809003321 |
Hole Kjell Jørgen | ||
Springer Nature, 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Establishing a computer security incident response capability (CSIRC) / John P. Wack |
Autore | Wack John P |
Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 1991 |
Descrizione fisica | 1 online resource |
Altri autori (Persone) | WackJohn P |
Collana | NIST special publication |
Soggetto non controllato |
Incident response
Information security Malware |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Establishing a computer security incident response capability |
Record Nr. | UNINA-9910711180803321 |
Wack John P | ||
Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 1991 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Guidance for securing Microsoft Windows XP for IT Professionals : a NIST security configuration checklist : recommendations of the National Institute of Standards and Technology / / Murugia Souppaya, Karen Kent, Paul M. Johnson |
Autore | Souppaya Murugiah |
Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2005 |
Descrizione fisica | 1 online resource |
Altri autori (Persone) |
JohnsonPaul M
ScarfoneKaren |
Collana | NIST special publication |
Soggetto non controllato |
Anti-virus
Authentication Computer security COTS Encryption Firewall Hardening IPsec Lockdown Malware Microsoft Operating system Security checklist Security configuration Security controls Security policy Security templates Spyware Threats W |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Guidance for securing Microsoft Windows XP for IT Professionals |
Record Nr. | UNINA-9910711179703321 |
Souppaya Murugiah | ||
Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Das materielle Computerstrafrecht / / Christian Bergauer |
Autore | Bergauer Christian |
Pubbl/distr/stampa | Jan Sramek Verlag, 2016 |
Descrizione fisica | 1 online resource (xxviii, 669 pages) : digital, PDF file(s) |
Disciplina | 345.0268 |
Collana |
Open Access e-Books
Knowledge Unlatched IT und Strafrecht |
Soggetto topico |
Computer crimes - Law and legislation - Austria
Denial of service attacks - Law and legislation - Austria Phishing - Law and legislation - Austria Cyberstalking - Law and legislation - Austria Hacking - Law and legislation - Austria Cyberterrorism - Law and legislation - Austria Malware (Computer software) - Law and legislation - Austria Internet pornography - Law and legislation - Austria Internet fraud - Law and legislation - Austria |
Soggetto non controllato |
Cybercrime
substantive criminal law malicious software denial of service-attacks hacking Cyber-bullying Computerkriminalität Computerstrafrecht Malware Datenbeschädigung Systemschädigungen Hacking Cyber-Mobbing Internet Tatbestand |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | ger |
Record Nr. | UNINA-9910137147003321 |
Bergauer Christian | ||
Jan Sramek Verlag, 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|