| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996384751803316 |
|
|
Autore |
Nicanor Lysimachus <1603-1641.> |
|
|
Titolo |
The epistle congratulatorie of Lysimachus Nicanor of the Societie of Jesu, to the Covenanters in Scotland [[electronic resource] ] : VVherin is paralleled our sweet harmony and correspondency in divers materiall points of doctrine and practice |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
[London, : printed by Robert Young and Richard Badger], Anno Domini M.DC.XL. [1640] |
|
|
|
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Soggetti |
|
Covenanters - Scotland |
Church and state - England |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Lysimachus Nicanor is a pseudonym of John Corbet. |
Title page in red and black. |
Printers' names from STC. |
Signatures: A-K⁴. |
P. 78 misnumbered 8. |
In this edition E3r line 2 has: Laws,. |
Reproduction of original in the Henry E. Huntington Library and Art Gallery. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNICASUFI0377096 |
|
|
Autore |
Terentius Afer, Publius |
|
|
Titolo |
Terence / edited and translated by John Barsby |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cambridge, Mass. ; London, : Harvard university press |
|
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Soggetti |
|
Terenzio Afro, Publio - Commedie - Traduzioni inglesi |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
3. |
Record Nr. |
UNINA9910812555603321 |
|
|
Autore |
Ben Mahmoud Mohamed Slim |
|
|
Titolo |
Risk propagation assessment for network security : application to airport communication network design / / Mohamed Slim Ben Mahmoud, Nicolas Larrieu, Alain Pirovano |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Hoboken, N.J., : ISTE Ltd/John Wiley and Sons Inc, 2013 |
|
|
|
|
|
|
|
ISBN |
|
9781118579947 |
1118579941 |
9781118581018 |
1118581016 |
9781299475540 |
129947554X |
9781118578735 |
1118578732 |
|
|
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (139 p.) |
|
|
|
|
|
|
Collana |
|
Focus series in networks and telecommunications |
|
|
|
|
|
|
Altri autori (Persone) |
|
LarrieuNicolas |
PirovanoAlain |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer networks - Security measures - Design |
Aeronautics - Communication systems - Design and construction |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
|
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Title Page; Contents; LIST OF FIGURES; LIST OF TABLES; INTRODUCTION; PART 1. NETWORK SECURITY RISK ASSESSMENT; CHAPTER 1. INTRODUCTION TO INFORMATION SYSTEMSECURITY RISK MANAGEMENT PROCESS; 1.1. On the importance of network security for network designers; 1.2. On the impact of risk assessment in the decision-making process for network security designers; 1.3. Quantitative versus qualitative risk assessment approaches; 1.4. Network security risk propagation concept; 1.4.1. Impact of node correlation; 1.4.2. Network security risk transitivity |
1.4.3. Network security risk propagation illustrative caseCHAPTER 2. SECURITY RISK MANAGEMENTBACKGROUND; 2.1. Qualitative security risk management methods; 2.1.1. CRAMM; 2.1.2. OCTAVE; 2.1.3. EBIOS; 2.1.4. MEHARI; 2.1.5. CORAS; 2.1.6. Discussion; 2.2. Quantitative security risk assessment approaches; 2.3. Toward a quantitative propagation-based risk assessment methodology; CHAPTER 3. A QUANTITATIVE NETWORK RISK ASSESSMENT METHODOLOGY BASED ON RISK PROPAGATION; 3.1. Quantifying methodology parameters; 3.1.1. Network risk decomposition; 3.1.2. Node value; 3.1.3. Enhanced node value |
3.1.4. Impact of threats3.1.5. Likelihood of threats; 3.2. Network security risk assessment process; 3.3. Conclusion; PART 2. APPLICATION TO AIRPORT COMMUNICATION NETWORK DESIGN; CHAPTER 4. THE AEROMACS COMMUNICATION SYSTEM IN THE SESAR PROJECT; 4.1. Overview of the European SESAR project; 4.2. Overview of aeronautical communications operating concept and requirements; 4.3. Introduction to the AeroMACS communication system; 4.3.1. AeroMACS protocol stack; 4.3.2. AeroMACS reference network architecture; 4.3.3. AeroMACS security considerations; 4.3.3.1. Analysis of AeroMACS securityweaknesses |
4.3.4. AeroMACS reference network topology4.3.4.1. Isolated AeroMACS network architecture; 4.3.4.2. End-to-end AeroMACS network architecture; CHAPTER 5. AERONAUTICAL NETWORK CASE STUDY; 5.1. Experimental parameters; 5.1.1. Testbed infrastructure; 5.1.2. Aeronautical node values instantiation; 5.1.3. Aeronautical services instantiation; 5.1.4. Isolated vs. end-to-end emulation scenarios; 5.2. AeroMACS case study: experimental results; 5.2.1. Main inputs for emulation scenarios; 5.2.2. Isolated AeroMACS scenario: preliminary results; 5.2.2.1. Individual risks; 5.2.2.2. Propagated risks |
5.2.2.3. Node and network risks5.2.3. Isolated AeroMACS scenario: EAP vs. RSA sub-scenario; 5.2.4. Preliminary AeroMACS security enhancement guidance; 5.2.5. AeroMACS implementation improvements: isolated scenario without operational server vulnerabilities; 5.2.5.1. Experimental inputs; 5.2.5.2. Network topology; 5.2.5.3. Vulnerability statistics; 5.2.5.4. Individual risk results; 5.2.5.5. Propagated risk results; 5.2.5.6. Network risk results; 5.2.6. AeroMACS topological improvements: isolated scenario with two ASN gateways; 5.2.6.1. Experimental inputs; 5.2.6.2. Network topology |
5.2.6.3. Vulnerability statistics |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
The focus of this book is risk assessment methodologies for network architecture design. The main goal is to present and illustrate an innovative risk propagation-based quantitative assessment tool. This original approach aims to help network designers and security administrators to design and build more robust and secure network topologies. As an implementation case study, the authors consider an |
|
|
|
|
|
|
|
|
|
|
aeronautical network based on AeroMACS (Aeronautical Mobile Airport Communications System) technology. AeroMACS has been identified as the wireless access network for airport surface communication |
|
|
|
|
|
| |