| |
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA990008559220403321 |
|
|
Titolo |
I musei delle scienze agrarie : l'evoluzione delle Wunderkammern / a cura di Stefano Mazzoleni e Sabrina Pignattelli |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
XVIII, 250 p. : ill. ; 30 cm |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Locazione |
|
FARBC |
DMVBF |
FMVBC |
ILFGE |
FLFBC |
FFABC |
FAGBC |
DARST |
FINBC |
DAGEA |
GM1 |
DINEL |
|
|
|
|
|
|
|
|
Collocazione |
|
FONDO ROSSI 1905 |
500-52 |
Varia 11 |
B-It 0196 |
B-It 0196bis |
708 MAZ 1 |
80 XXVI 124 |
60 RSA 011 |
60 RSA 011 BIS |
SEZ.NA C 940 |
03.970 |
13 K 26 24 |
62 069 MUS |
GM1 W IV 31 |
03.1280 |
10 A I 377 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
2. |
Record Nr. |
UNINA9910164028603321 |
|
|
Autore |
Oriyano Sean-Philip |
|
|
Titolo |
Hacker techniques, tools, and incident handling / / Sean-Philip Oriyano |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Burlington, Massachusetts : , : Jones & Bartlett Learning, , 2014 |
|
©2014 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[Second edition.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (525 pages) : illustrations |
|
|
|
|
|
|
Collana |
|
Jones & Bartlett Learning Information Systems Security & Assurance Series |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer security |
Computer networks - Security measures |
Hackers |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Sommario/riassunto |
|
Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. The final section studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web. Written by a subject matter expert with numerous real-world examples, Hacker Techniques, Tools, and Incident Handling provides readers with a clear, comprehensive introduction to the many threats on our Internet environment and security and what can be done to combat them. Instructor Materials for Hacker Techniques, Tools, and Incident Handling include: PowerPoint Lecture Slides Exam Questions |
|
|
|
|
| |