1.

Record Nr.

UNINA990001639130403321

Autore

Emerit, Michel

Titolo

Le developpement des Gasteracanthes (Araneida, Argiopidae)- Une contribution a l' etude de la morphologie de l' appendice araneidien / Michel Emerit

Pubbl/distr/stampa

Tervuren : Musee R. de l'Afrique Centrale, 1972

Descrizione fisica

103 p. ; 27 cm

Disciplina

595.44

Locazione

FAGBC

Collocazione

60 595.7 B 58

Lingua di pubblicazione

Francese

Formato

Materiale a stampa

Livello bibliografico

Monografia

2.

Record Nr.

UNINA9910453344503321

Autore

Mowbray Thomas J

Titolo

Cybersecurity : managing systems, conducting testing, and investigating intrusions / / Thomas J. Mowbray

Pubbl/distr/stampa

Hoboken, New Jersey : , : Wiley, , [2014]

©2014

ISBN

1-118-84965-5

1-118-69704-9

Edizione

[1st edition]

Descrizione fisica

1 online resource (362 p.)

Disciplina

004.56

Soggetti

Computer networks - Security measures

Internet - Security measures

Electronic books.

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes bibliographical references and index.



Nota di contenuto

Cover; About the Author; Acknowledgments; Contents; Introduction; Part I: Cyber Network; Chapter 1: Executive Summary; Why Start with Antipatterns?; Security Architecture; Antipattern: Signature-Based Malware Detection versus Polymorphic Threats; Refactored Solution: Reputational-, Behavioral-, and Entropy-Based Malware Detection; Antipattern: Document-Driven Certification and Accreditation; Antipattern: Proliferating IA Standards with No Proven Benefits; Antipattern: Policy-Driven Security Certifications Do Not Address the Threat; Refactored Solution: Security Training Roadmap; Summary

AssignmentsChapter 2: The Problems: Cyber Antipatterns; Antipatterns Concept; Forces in Cyber Antipatterns; Cyber Antipattern Templates; Cybersecurity Antipattern Catalog; Summary; Assignments; Chapter 3: Enterprise Security Using the Zachman Framework; What Is Architecture? Why Do We Need It?; Enterprises Are Complex and Changing; The Zachman Framework for Enterprise Architecture; Primitive Models versus Composite Models; How Does the Zachman Framework Help with Cybersecurity?; Everyone Has Their Own Specifications; The Goldmine Is in Row 2; Frameworks for Row 3

Architectural Problem Solving PatternsSummary; Assignments; Part II: Cyber Network Security Hands-On; Chapter 4: Network Administration for Security Professionals; Managing Administrator and Root Accounts; Installing Hardware; Re-Imaging Operating Systems; Burning and Copying CDs and DVDs; Installing System Protection / Anti-Malware; Setting Up Networks; Installing Applications and Archiving; Customizing System Management Controls and Settings; Managing Remote Login; Managing User Administration; Managing Services; Mounting Disks; Moving Data Between Systems on Networks

Converting Text Files Between OSesMaking Backup Disks; Formatting Disks; Configuring Firewalls; Converting and Migrating VMs; Additional Network Administration Knowledge; Summary; Assignments; Chapter 5: Customizing BackTrack; Creating and Running BackTrack Images; Customizing BackTrack with VM; Updating and Upgrading BackTrack and Pen Test Tools; Adding Windows to BackTrack with VMware; Licensing Challenges for Network Administrators; Summary; Assignments; Chapter 6: Protocol Analysis and; Networking Theory and Practice; Frequently Encountered Network Protocols; Network Programming: Bash

Network Programming: Windows Command-Line Interface (CLI)Python Programming: Accelerated Network Scanning; Summary; Assignments; Chapter 7: Reconnaissance, Vulnerability Assessment, and Cyber Testing; Types of Cybersecurity Evaluations; Understanding the Cybersecurity Testing Methodology; Summary; Assignments; Chapter 8: Penetration Testing; Forms of Cyber Attacks; Network Penetration; Commercial Pen Testing Tools; Using Netcat to Create Connections and Move Data and Binaries; Using Netcat to Create Relays and Pivots

Using SQL Injection and Cross-Site Techniques to Perform Web Application and Database Attacks

Sommario/riassunto

A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This essential book addresses cybersecurity strategies that include identity management, risk management, and incident management, and also serves as a detailed guide for anyone looking to enter the security profession. Doubling as the text for a cybersecurity course, it is



3.

Record Nr.

UNINA9910140119903321

Autore

Paul Bonnenfant (dir.)

Titolo

SANAA : architecture domestique et société / / coordonne par Paul Bonnefant

Pubbl/distr/stampa

CNRS Éditions, 2002

Paris, France : , : CNRS éditions, , 2002

©2002

ISBN

9782271078711 (PDF)

9782271050687 (paperback)

Descrizione fisica

1 online resource (644 pages) : illustrations

Collana

Connaissance du Monde Arabe

Disciplina

720.9533

Soggetti

Architecture - Yemen

Buildings - Yemen

San'a' (Yemen) Buildings, structures, etc

Lingua di pubblicazione

Francese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di bibliografia

Includes bibliographical references and index.

Sommario/riassunto

Des steppes aux remparts de la ville, des portes de la cité au marché - le lieu de l’ouverture au monde et de l’activité masculine - du marché au quartier où se tissent les relations de parenté et de voisinage, et enfin du quartier à la ruelle où se densifie la vie privée, l’étranger gravit les différents degrés de l’intimité urbaine. Une fois franchi le seuil de la maison, le parcours, à l’intérieur, prend le visage d’une montée initiatique, du bas vers le haut, de l’ombre vers la lumière, de la vie fondamentale, animale, sexuelle, digestive, à la vie intellectuelle, spirituelle et sociale.  Le passage de la « nature » à la « culture » culmine dans le mafrağ, pièce de réception située au faîte de la demeure, lieu majeur de la sociabilité et de l’urbanité. La maison yéménite s’exalte dans la verticalité et dans ses décors éblouissants. Les motifs floraux évoquent et appellent la fertilité des femmes et des champs, tandis que les serpents, les cornes, les polygones étoilés et les « sceaux de Salomon » conjurent les calamités naturelles et les mauvais esprits, écartent les envieux et protègent de l’opprobre.  Les paysages et la lumière qui les baigne, l’architecture et ses décors, les modes de



vie et les hommes qui peuplent cette ville se fondent en un creuset à très haute charge symbolique. Il en émerge un sentiment de profonde cohérence entre l’espace urbain et l’unité morale qu’il abrite, fondée sur l’honneur, la dignité et le nécessaire recours à Dieu, seule réelle protection de la demeure, terme vers Quit tout revient.