B C, Before Computers : On Information Technology from Writing to the Age of Digital Data
| B C, Before Computers : On Information Technology from Writing to the Age of Digital Data |
| Autore | Robertson Stephen |
| Pubbl/distr/stampa | Open Book Publishers, 2020 |
| Descrizione fisica | 1 electronic resource (170 p.) |
| Soggetto topico |
Computing & information technology
Information theory Educational equipment & technology, computer-aided learning (CAL) Biography & True Stories Information technology: general issues |
| Soggetto non controllato |
history of computer developments
digital age computer information technology revolution data processing cryptography visual art music postal system |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | B C, Before Computers |
| Record Nr. | UNINA-9910688420203321 |
Robertson Stephen
|
||
| Open Book Publishers, 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cryptography and Its Applications in Information Security
| Cryptography and Its Applications in Information Security |
| Autore | Assad Safwan El |
| Pubbl/distr/stampa | Basel, : MDPI - Multidisciplinary Digital Publishing Institute, 2022 |
| Descrizione fisica | 1 online resource (202 p.) |
| Soggetto topico |
History of engineering & technology
Technology: general issues |
| Soggetto non controllato |
3D chebyshev
asymmetric asymmetric algorithm authorization model bit independence bit independence criterion blockchain chaos-based stream cipher communication complexity computationally biased coupled map lattice cryptography digital cash digital copyright management federated learning FPGA framework homomorphic encryption intermittent jumping intrusion detection systems limited computational power logistic machine learning multi-chaos museum n/a performance privacy privacy preserving public key exchange RC4 security skew-tent smart contract SPCNG stream cipher |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910566470303321 |
Assad Safwan El
|
||
| Basel, : MDPI - Multidisciplinary Digital Publishing Institute, 2022 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cyber Security : 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16-17, 2022, Revised Selected Papers
| Cyber Security : 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16-17, 2022, Revised Selected Papers |
| Autore | Lu Wei |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Singapore : , : Springer, , 2023 |
| Descrizione fisica | 1 electronic resource (239 p.) |
| Altri autori (Persone) |
ZhangYuqing
WenWeiping YanHanbing LiChao |
| Collana | Communications in Computer and Information Science |
| Soggetto topico |
Computer security
Computer networking & communications Artificial intelligence Legal aspects of IT Network security |
| Soggetto non controllato |
application service layer
artificial intelligence communication systems computer crime computer networks computer security computer systems cryptography cyber security data communication systems data security databases machine learning network protocols network security privacy signal processing telecommunication networks telecommunication systems |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996503561903316 |
Lu Wei
|
||
| Singapore : , : Springer, , 2023 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers
| Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers |
| Autore | Lu Wei |
| Pubbl/distr/stampa | Singapore, : Springer Nature, 2022 |
| Descrizione fisica | 1 online resource (234 pages) |
| Altri autori (Persone) |
ZhangYuqing
WenWeiping YanHanbing LiChao |
| Collana | Communications in Computer and Information Science |
| Soggetto topico |
Computer security
Computer networking & communications Coding theory & cryptology Network security Artificial intelligence Software Engineering |
| Soggetto non controllato |
artificial intelligence
authentication computer hardware computer networks computer security computer systems cryptography data communication systems data mining data security databases information retrieval network protocols network security privacy signal processing telecommunication networks telecommunication systems |
| ISBN | 981-16-9229-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996464545403316 |
Lu Wei
|
||
| Singapore, : Springer Nature, 2022 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Cyber Security [[electronic resource] ] : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / / edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou
| Cyber Security [[electronic resource] ] : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / / edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou |
| Autore | Lu Wei |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Springer Nature, 2020 |
| Descrizione fisica | 1 online resource (X, 235 p. 108 illus., 70 illus. in color.) |
| Disciplina | 005.8 |
| Collana | Communications in Computer and Information Science |
| Soggetto topico |
Computer security
Computer communication systems Application software Architecture, Computer Data encryption (Computer science) Computer networks - Security measures Systems and Data Security Computer Communication Networks Information Systems Applications (incl. Internet) Computer System Implementation Cryptology Mobile and Network Security |
| Soggetto non controllato |
Systems and Data Security
Computer Communication Networks Information Systems Applications (incl. Internet) Computer System Implementation Cryptology Mobile and Network Security Data and Information Security Computer and Information Systems Applications communication channels (information theory) communication systems computer crime computer hardware computer networks computer security computer systems cryptography data communication systems data security databases network protocols network security sensors signal processing telecommunication networks telecommunication systems telecommunication traffic wireless telecommunication systems Network hardware Information retrieval Internet searching Systems analysis & design Coding theory & cryptology Data encryption |
| ISBN | 981-334-922-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Access Control -- Cryptography -- Denial-of-Service Attacks -- Hardware Security Implementation -- Intrusion/Anomaly Detection and Malware Mitigation -- Social Network Security and Privacy.-Systems Security. |
| Record Nr. | UNISA-996465362903316 |
Lu Wei
|
||
| Springer Nature, 2020 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Cybersecurity of digital service chains : challenges, methodologies, and tools / / editors, Joanna Kołodziej, Matteo Repetto, Armend Duzha
| Cybersecurity of digital service chains : challenges, methodologies, and tools / / editors, Joanna Kołodziej, Matteo Repetto, Armend Duzha |
| Autore | Kołodziej Joanna |
| Pubbl/distr/stampa | Cham, : Springer International Publishing AG, 2022 |
| Descrizione fisica | 1 online resource (xi, 257 pages) : illustrations (chiefly color) |
| Altri autori (Persone) |
RepettoMatteo
DuzhaArmend |
| Collana | Lecture notes in computer science |
| Soggetto topico |
Business - Data processing - Security measures
Computer networks - Security measures |
| Soggetto non controllato |
cloud computing
computer crime computer networks computer security cryptography cyber security data communication systems data flow architectures data management systems data security electromagnetic interference and compatibility general programming languages health informatics intrusion detection network protocols network security network simulations sensors and actuators signal processing telecommunication traffic |
| ISBN | 3-031-04036-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | A Reference Architecture for Management of Security Operations in Digital Service Chains Efficient flow monitoring in digital services Intelligent Transportation Systems models, challenges, security aspects NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic Detecting unknown attacks through system behavior analysis Signature-based detection of botnet DDoS attacks Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation Blockchain-based task and information management in computational cloud systems |
| Record Nr. | UNISA-996472069303316 |
Kołodziej Joanna
|
||
| Cham, : Springer International Publishing AG, 2022 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Discrete Mathematics with Cryptographic Applications : A Self-Teaching Introduction
| Discrete Mathematics with Cryptographic Applications : A Self-Teaching Introduction |
| Autore | Kheyfits Alexander I |
| Pubbl/distr/stampa | Bloomfield : , : Mercury Learning & Information, , 2021 |
| Descrizione fisica | 1 online resource (382 pages) |
| Disciplina | 510 |
| Soggetto topico | COMPUTERS / Security / Cryptography |
| Soggetto non controllato |
computer science
cryptography discrete math finite mathematics |
| ISBN |
1-68392-761-3
1-68392-762-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Frontmatter -- Contents -- Preface -- Chapter 1: A Brief Survey of Elementary Functions -- Chapter 2: Propositional Algebra -- Chapter 3: Naïve and Formal (Axiomatic) Set Theory -- Chapter 4: Groups, Rings, and Fields -- Chapter 5: Predicates and Quantifiers—Algebraic Theory -- Chapter 6: Binary Relations and Relational Databases -- Chapter 7: Combinatorics -- Chapter 8: Elements of Number Theory -- Chapter 9: Boolean Functions -- Chapter 10: Hashing Functions and Cryptographic Maps -- Chapter 11: Generating Polynomials and Inversion Formulas -- Chapter 12: Systems of Representatives -- Chapter 13: Boolean Algebras -- Chapter 14: Combinatorial Circuits -- Chapter 15: Complete Systems of Boolean Functions and Bases -- Chapter 16: Introductory Graph Theory, Euler’s Formula, and Unbreakable Ciphers -- Chapter 17: Trees and Digraphs -- Chapter 18: Computations and Algorithms -- Chapter 19: Finite Automata -- Chapter 20: Introduction to Game Theory -- Chapter 21: Information Theory and Coding -- Chapter 22: Probability Theory with a Finite Sample Space and the Birthday Problem -- Chapter 23: Turing Machines, P and NP Classes, and Other Models of Computation -- Chapter 24: Answers and Solutions to Selected Exercises -- Bibliography -- Index |
| Altri titoli varianti | Discrete Mathematics with Cryptographic Applications |
| Record Nr. | UNINA-9910794790503321 |
Kheyfits Alexander I
|
||
| Bloomfield : , : Mercury Learning & Information, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Discrete Mathematics with Cryptographic Applications : A Self-Teaching Introduction
| Discrete Mathematics with Cryptographic Applications : A Self-Teaching Introduction |
| Autore | Kheyfits Alexander I |
| Pubbl/distr/stampa | Bloomfield : , : Mercury Learning & Information, , 2021 |
| Descrizione fisica | 1 online resource (382 pages) |
| Disciplina | 510 |
| Soggetto topico | COMPUTERS / Security / Cryptography |
| Soggetto non controllato |
computer science
cryptography discrete math finite mathematics |
| ISBN |
1-68392-761-3
1-68392-762-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Frontmatter -- Contents -- Preface -- Chapter 1: A Brief Survey of Elementary Functions -- Chapter 2: Propositional Algebra -- Chapter 3: Naïve and Formal (Axiomatic) Set Theory -- Chapter 4: Groups, Rings, and Fields -- Chapter 5: Predicates and Quantifiers—Algebraic Theory -- Chapter 6: Binary Relations and Relational Databases -- Chapter 7: Combinatorics -- Chapter 8: Elements of Number Theory -- Chapter 9: Boolean Functions -- Chapter 10: Hashing Functions and Cryptographic Maps -- Chapter 11: Generating Polynomials and Inversion Formulas -- Chapter 12: Systems of Representatives -- Chapter 13: Boolean Algebras -- Chapter 14: Combinatorial Circuits -- Chapter 15: Complete Systems of Boolean Functions and Bases -- Chapter 16: Introductory Graph Theory, Euler’s Formula, and Unbreakable Ciphers -- Chapter 17: Trees and Digraphs -- Chapter 18: Computations and Algorithms -- Chapter 19: Finite Automata -- Chapter 20: Introduction to Game Theory -- Chapter 21: Information Theory and Coding -- Chapter 22: Probability Theory with a Finite Sample Space and the Birthday Problem -- Chapter 23: Turing Machines, P and NP Classes, and Other Models of Computation -- Chapter 24: Answers and Solutions to Selected Exercises -- Bibliography -- Index |
| Altri titoli varianti | Discrete Mathematics with Cryptographic Applications |
| Record Nr. | UNINA-9910826507003321 |
Kheyfits Alexander I
|
||
| Bloomfield : , : Mercury Learning & Information, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Electronic Voting : 7th International Joint Conference, e-Vote-ID 2022, Bregenz, Austria, October 4-7, 2022, Proceedings
| Electronic Voting : 7th International Joint Conference, e-Vote-ID 2022, Bregenz, Austria, October 4-7, 2022, Proceedings |
| Autore | Krimmer Robert |
| Pubbl/distr/stampa | Cham, : Springer Nature, 2022 |
| Descrizione fisica | 1 online resource (197 pages) |
| Altri autori (Persone) |
VolkamerMelanie
Duenas-CidDavid RønnePeter GermannMicha |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Coding theory & cryptology
Information retrieval Artificial intelligence Network security Computer security Network hardware |
| Soggetto non controllato |
artificial intelligence
communication communication systems computer crime computer hardware computer networks computer science computer security computer systems computer vision cryptography data security engineering fuzzy sets internet network protocols network security privacy signal processing telecommunication systems |
| ISBN | 3-031-15911-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996490356403316 |
Krimmer Robert
|
||
| Cham, : Springer Nature, 2022 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Entropy in Image Analysis II
| Entropy in Image Analysis II |
| Autore | Sparavigna Amelia Carolina |
| Pubbl/distr/stampa | Basel, Switzerland, : MDPI - Multidisciplinary Digital Publishing Institute, 2020 |
| Descrizione fisica | 1 online resource (394 p.) |
| Soggetto topico | History of engineering and technology |
| Soggetto non controllato |
AMBTC
art history art statistics atmosphere background backscattered signals balance bit cube blind image quality assessment brain-computer interface (BCI) chaotic system chaotic systems chiaroscuro children chosen plaintext attack complexity compound chaotic system computer vision continuous wavelet transform (CWT) convolution neural network convolutional neural network convolutional neural network (CNN) crowd behavior analysis crowd motion detection cryptography data expansion data hiding declining quality deep neural network detectability dictionary-based coding diffusion direction entropy DNA coding DNA computing Duchenne muscular dystrophy electroencephalography (EEG) engine flame entropy feature distribution entropy feature fusion filtering Golomb-Rice codes human visual system hyperchaotic system image binarization image chaotic encryption image encryption image entropy image information entropy image preprocessing image processing image quality evaluation image retrieval image segmentation infrared radiation IoU Keras key space calculation key-point detection Latin cube local entropy filter lossless compression machine learning magnetic resonance images malaria infection medical color images medical image medical imaging Mordell elliptic curve motor imagery (MI) MXNet neural engineering neuroaesthetics node strength non-maximum suppression normalized entropy nuclear spin generator object detection optical character recognition pattern classification peak signal-to-noise ratio pixel value adjusting Pompe disease pooling method portrait paintings pseudo-random numbers Python quantitative muscle ultrasound quasi-resonant Rossby/drift wave triads renaissance repulsive force RGB RSNNS S-box saliency and distortion salient crowd motion detection security security analysis steganography stego image substitution box symmetry texture-feature parametric imaging thresholding ultrasound weld evaluation weld segmentation |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910557433403321 |
Sparavigna Amelia Carolina
|
||
| Basel, Switzerland, : MDPI - Multidisciplinary Digital Publishing Institute, 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||