top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
The 2018 Yearbook of the Digital Ethics Lab [[electronic resource] /] / edited by Carl Öhman, David Watson
The 2018 Yearbook of the Digital Ethics Lab [[electronic resource] /] / edited by Carl Öhman, David Watson
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (223 pages) : illustrations
Disciplina 174.96
Collana Digital Ethics Lab Yearbook
Soggetto topico Philosophy
Technology—Sociological aspects
Computer security
Ethics
Computer crimes
Philosophy of Technology
Science and Technology Studies
Privacy
Cybercrime
ISBN 3-030-17152-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction: Digital Ethics: Goals and Approach (Carl Öhman, David Watson, Mariarosaria Taddeo, Luciano Floridi) -- Chapter 1. Digital Ethics: Its Nature and Scope (Luciano Floridi, Corinne Cath, Mariarosaria Taddeo) -- Chapter 2. Do We Need a Critical Evaluation of the Role of Mathematics in Data Science? (Patrick Allo) -- Chapter 3. Using Data From Git and GitHub in Ethnographies of Software Development (Andrew Turner) -- Chapter 4. The Price of Discovery: A Model of Scientific Research Markets (David Watson) -- Chapter 5. Projecting AI-Crime: A Review of Plausible Threats (Thomas King) -- Chapter 6. The Challenges of Cyber Deterrence (Mariarosaria Taddeo) -- Chapter 7. Internet Governance and Human Rights: A Literature Review (Corinne Cath) -- Chapter 8. Privacy Risks and Responses in the Digital Age (Josh Cowls) -- Chapter 9. Digitalised Legal Information: Towards a New Publication Model (Václav Janeček) -- Chapter 10. From Bones to Bytes: A New Chapter in the History of Death (Carl Öhman) -- Chapter 11. The Green and the Blue — Naïve Ideas to Improve Politics in a Mature Information Society (Luciano FLoridi).
Record Nr. UNINA-9910349541003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Human Factors in Cybersecurity [[electronic resource] ] : Proceedings of the AHFE 2019 International Conference on Human Factors in Cybersecurity, July 24-28, 2019, Washington D.C., USA / / edited by Tareq Ahram, Waldemar Karwowski
Advances in Human Factors in Cybersecurity [[electronic resource] ] : Proceedings of the AHFE 2019 International Conference on Human Factors in Cybersecurity, July 24-28, 2019, Washington D.C., USA / / edited by Tareq Ahram, Waldemar Karwowski
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (146 pages)
Disciplina 005.8
Collana Advances in Intelligent Systems and Computing
Soggetto topico Computer engineering
Internet of things
Embedded computer systems
Computer security
User interfaces (Computer systems)
Management information systems
Computer crimes
Cyber-physical systems, IoT
Systems and Data Security
User Interfaces and Human Computer Interaction
Business IT Infrastructure
Cybercrime
ISBN 3-030-20488-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Attempting to Reduce Susceptibility to Fraudulent Computer Pop-Ups Using Malevolence Cue Identification Training -- Cyber Resilient Behavior: Integrating Human Behavioral Models and Resilience Engineering Capabilities into Cyber Security -- An International Extension of Sweeney’s Data Privacy Research -- The Human Factor in Managing the Security of Information -- Beyond Passwords: Enforcing Username Security as the First Line of Defense -- Social Engineering and the Value of Data: The Need of Specific Awareness Programs -- Human Centered Cyber Situation Awareness -- Over-the-Shoulder Attack Resistant Graphical Authentication Schemes Impact on Working Memory -- Comparative Evaluation of Security and Convenience Trade-Offs in Password Generation Aiding Systems.
Record Nr. UNINA-9910366608703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Human Factors in Cybersecurity [[electronic resource] ] : Proceedings of the AHFE 2018 International Conference on Human Factors in Cybersecurity, July 21-25, 2018, Loews Sapphire Falls Resort at Universal Studios, Orlando, Florida, USA / / edited by Tareq Z. Ahram, Denise Nicholson
Advances in Human Factors in Cybersecurity [[electronic resource] ] : Proceedings of the AHFE 2018 International Conference on Human Factors in Cybersecurity, July 21-25, 2018, Loews Sapphire Falls Resort at Universal Studios, Orlando, Florida, USA / / edited by Tareq Z. Ahram, Denise Nicholson
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (242 pages)
Disciplina 658.4038011
Collana Advances in Intelligent Systems and Computing
Soggetto topico Computational intelligence
Computer security
User interfaces (Computer systems)
Management information systems
Computer crimes
Computational Intelligence
Systems and Data Security
User Interfaces and Human Computer Interaction
Business IT Infrastructure
Cybercrime
ISBN 3-319-94782-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910484739903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Human Factors in Cybersecurity [[electronic resource] ] : Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17−21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USA / / edited by Denise Nicholson
Advances in Human Factors in Cybersecurity [[electronic resource] ] : Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17−21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USA / / edited by Denise Nicholson
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XI, 322 p. 91 illus.)
Disciplina 620.82
Collana Advances in Intelligent Systems and Computing
Soggetto topico Computational intelligence
Computer security
User interfaces (Computer systems)
Management information systems
Computer crimes
Computational Intelligence
Systems and Data Security
User Interfaces and Human Computer Interaction
Business IT Infrastructure
Cybercrime
ISBN 3-319-60585-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cybersecurity management through logging analytics -- Adaptive weak secrets for authenticated key exchange -- Internet of things and distributed denial of service mitigation -- Eye tracking graphical passwords -- Understanding and discovering SQL injection vulnerabilities -- Grid framework to address password memorability issues and offline password attacks -- Exploring 3D cybersecurity visualization with the Microsoft HoloLens -- Humans as the strong link in securing the total learning architecture -- Preserving dignity, maintaining security and acting ethically -- Human factors in information security culture: A literature review -- Do you really trust “privacy policy” or “terms of use” agreements without reading them? -- Users’ attitudes towards the “going dark” debate -- The use of cloud computing applications in education: Privacy and security concerns. .
Record Nr. UNINA-9910299908803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Anti-Money Laundering, Counter Financing Terrorism and Cybersecurity in the Banking Industry [[electronic resource] ] : A Comparative Study within the G-20 / / by Felix I. Lessambo
Anti-Money Laundering, Counter Financing Terrorism and Cybersecurity in the Banking Industry [[electronic resource] ] : A Comparative Study within the G-20 / / by Felix I. Lessambo
Autore Lessambo Felix I.
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Palgrave Macmillan, , 2023
Descrizione fisica 1 online resource (245 pages)
Disciplina 364.168
Collana Palgrave Macmillan Studies in Banking and Financial Institutions
Soggetto topico Financial services industry
Finance—Law and legislation
Computer crimes
Financial Services
Financial Law
Cybercrime
ISBN 9783031234842
9783031234835
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Money Laundering and Combating Finance Terrorism -- 2. The Cybersecurity Counteroffensive -- 3. Cybersecurity and International Organization -- 4. AML and Cybersecurity in Banking Industry: Challenges -- 5. AML/CFT and Cyber Security Laws in the United States -- 6. AML/CFT and Cyber Security Laws in the European Union -- 7. AML/CFT and Cybersecurity Laws in Germany -- AML/CFT and Cybersecurity Laws in France -- 9. AML/CFT and Cybersecurity Laws in Italy -- 10. AML/CFT and Cybersecurity Laws in Spain -- 11. AML/CFT and Cybersecurity Laws in Switzerland -- 12. AML/CFT and Cybersecurity Laws in China -- 13. AML/CFT and Cybersecurity Laws in Japan -- 14. AML/CFT and Cybersecurity Laws in India -- 15. AML/CFT and Cybersecurity Laws in South Korea -- 16. AML/CFT and Cybersecurity Laws in Indonesia -- 17. AML/CFT and Cybersecurity Law in the United Kingdom -- 18. AML/CFT and Cybersecurity Law in Canada -- 19. AML/CFT and Cybersecurity Laws in Australia -- 20. AML/CFT and Cybersecurity Laws in Russia -- 21. AML/CFT and Cybersecurity Laws in Turkey -- 22. AML/CFT and Cybersecurity Laws in Brazil -- 23. AML/CFT and Cybersecurity Laws in Mexico -- 24. AML/CFT and Cybersecurity Laws in Argentina -- 25. AML/CFT and Cybersecurity Laws in Saudi Arabia -- 26. AML/CFT and Cybersecurity Laws in South Africa -- 27. AML/CFT Compliance and Audit -- 28. International and Regional Cooperation. .
Record Nr. UNINA-9910647789003321
Lessambo Felix I.  
Cham : , : Springer Nature Switzerland : , : Imprint : Palgrave Macmillan, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Antisocial Media : Crime-watching in the Internet Age / / by Mark A. Wood
Antisocial Media : Crime-watching in the Internet Age / / by Mark A. Wood
Autore Wood Mark A
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2018
Descrizione fisica 1 online resource (XI, 238 pages: 4 illustrations, 2 illustrations in color.)
Disciplina 364
Collana Palgrave Studies in Crime, Media and Culture
Soggetto topico Computer crimes
Mass media and crime
Crime—Sociological aspects
Violence
Crime
Social media
Mass media
Communication
Cybercrime
Crime and the Media
Crime and Society
Violence and Crime
Social Media
Media Sociology
ISBN 3-319-63985-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Introduction -- 2. Breaking the First Two Rules of Fight Club -- 3. Unpacking a Punch -- 4. Feeding Violence? -- 5. The Digital Arena -- 6. Conclusion: Breaking Up and Breaking Down the Fight
Record Nr. UNINA-9910299862103321
Wood Mark A  
Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Applications for Artificial Intelligence and Digital Forensics in National Security [[electronic resource] /] / edited by Reza Montasari
Applications for Artificial Intelligence and Digital Forensics in National Security [[electronic resource] /] / edited by Reza Montasari
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (154 pages)
Disciplina 006.3
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Artificial intelligence
Data protection
Computer crimes
Security systems
Artificial Intelligence
Data and Information Security
Cybercrime
Security Science and Technology
ISBN 3-031-40118-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Counter Terrorism and Unmanned Aerial Vehicle (UAV) Forensics: Investigative Process Based on the Case Study of DJI Mavic 2 Zoom -- 2. The Use of Machine Learning and Digital Forensics to Detect and Investigate Terrorist Content Online -- 3. Cell Site Analysis and ANPR Mapping -- 4. AI-Based Internet of Things Forensics -- 5. Digital Investigation of Timing-Based Side-Channel Attacks against IoT Devices and Proposed Countermeasures -- 6. Predictive Modelling: Forestalling Cyberterrorism Using Machine Learning -- 7. Policing Cyberspace and Big Data Predictive Analytics -- 8. Criminal Intelligence, Crime Pattern Analysis and Operational Policing -- 9. Enterprise Geographic Information System and Digital Policing -- 10. The Use of Artificial Intelligence in Managing Big Data Analysis Demands.
Record Nr. UNISA-996550559203316
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Applications for Artificial Intelligence and Digital Forensics in National Security [[electronic resource] /] / edited by Reza Montasari
Applications for Artificial Intelligence and Digital Forensics in National Security [[electronic resource] /] / edited by Reza Montasari
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (154 pages)
Disciplina 006.3
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Artificial intelligence
Data protection
Computer crimes
Security systems
Artificial Intelligence
Data and Information Security
Cybercrime
Security Science and Technology
ISBN 3-031-40118-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Counter Terrorism and Unmanned Aerial Vehicle (UAV) Forensics: Investigative Process Based on the Case Study of DJI Mavic 2 Zoom -- 2. The Use of Machine Learning and Digital Forensics to Detect and Investigate Terrorist Content Online -- 3. Cell Site Analysis and ANPR Mapping -- 4. AI-Based Internet of Things Forensics -- 5. Digital Investigation of Timing-Based Side-Channel Attacks against IoT Devices and Proposed Countermeasures -- 6. Predictive Modelling: Forestalling Cyberterrorism Using Machine Learning -- 7. Policing Cyberspace and Big Data Predictive Analytics -- 8. Criminal Intelligence, Crime Pattern Analysis and Operational Policing -- 9. Enterprise Geographic Information System and Digital Policing -- 10. The Use of Artificial Intelligence in Managing Big Data Analysis Demands.
Record Nr. UNINA-9910746081903321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The Art of War for Computer Security [[electronic resource] /] / by Tom Madsen
The Art of War for Computer Security [[electronic resource] /] / by Tom Madsen
Autore Madsen Tom
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (X, 62 p. 2 illus. in color.)
Disciplina 005.8
Soggetto topico Data protection
Computer crimes
System safety
Security
Cybercrime
Security Science and Technology
ISBN 3-030-28569-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Who Was Sun Tzu? -- Estimates -- Waging War -- Offensive Strategy -- Dispositions -- Energy -- Weaknesses and Strengths -- The Nine Variables -- The Nine Varieties of Ground -- Attack by Fire -- Employment of Secret Agents -- The Final Word -- App. A, Center for Internet Security Critical Security Controls.
Record Nr. UNINA-9910349284503321
Madsen Tom  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Binary Code Fingerprinting for Cybersecurity [[electronic resource] ] : Application to Malicious Code Fingerprinting / / by Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna
Binary Code Fingerprinting for Cybersecurity [[electronic resource] ] : Application to Malicious Code Fingerprinting / / by Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna
Autore Alrabaee Saed
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XXI, 247 p. 77 illus., 31 illus. in color.)
Disciplina 005.8
Collana Advances in Information Security
Soggetto topico Data protection
Biometrics (Biology)
Computer crimes
Security
Biometrics
Cybercrime
ISBN 3-030-34238-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1 Introduction -- 2 Binary Analysis Overview -- 3 Compiler Provenance Attribution -- 4 Library Function Identification -- 5 Identifying Reused Functions in Binary Code -- 6 Function Fingerprinting -- 7 Free Open-Source Software Fingerprinting -- 8 Clone Detection -- 9 Authorship Attribution -- 10 Conclusion.
Record Nr. UNINA-9910380747403321
Alrabaee Saed  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui