1.

Record Nr.

UNINA990003050200403321

Autore

Brandolini, Andrea

Titolo

The distribution of personal income in post-war Italy : source description, data quality and the time pattern of income inequality / by Andrea Brandolini

Pubbl/distr/stampa

Roma : Banca d'Italia, 1999

Descrizione fisica

77 p. ; 30 cm

Collana

Temi di discussione del Servizio studi / Banca d'Italia ; 350

Locazione

SES

Collocazione

Doc/BdI/TI/99.350

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

2.

Record Nr.

UNINA990003243120403321

Titolo

XXIII INTERNATIONAL GEOGRAPHICAL CONGRESS : MOSCOW,1976

Pubbl/distr/stampa

Tonder : Laursen, 1976 volume cinque

Descrizione fisica

pp.88

Disciplina

010.001

Locazione

DECGE

Collocazione

010.001.XXIII.

Lingua di pubblicazione

Italiano

Formato

Materiale a stampa

Livello bibliografico

Monografia



3.

Record Nr.

UNISA990003577300203316

Autore

MESCHINI, Marco

Titolo

L'eretica : storia della crociata contro gli Albigesi / Marco Meschini

Pubbl/distr/stampa

Roma ; Bari : GLF editori Laterza, 2010

ISBN

978-88-420-9306-0

Descrizione fisica

375 p. ; 21 cm

Collana

I Robinson/Letture

Disciplina

272.3

Soggetti

Albigesi - Persecuzione - 1208-1229

Collocazione

II.2. 5728

Lingua di pubblicazione

Italiano

Formato

Materiale a stampa

Livello bibliografico

Monografia

4.

Record Nr.

UNINA9910798777903321

Autore

Cardwell Kevin

Titolo

Building virtual pentesting labs for advanced penetration testing : learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it / / Kevin Cardwell

Pubbl/distr/stampa

Birmingham, England ; ; Mumbai, India : , : Packt Publishing, , 2016

©2016

ISBN

1-78588-495-6

Edizione

[Second edition.]

Descrizione fisica

1 online resource (518 pages)

Collana

Community Experience Distilled

Disciplina

005.8

Soggetti

Computer security - Testing

Computer networks - Security measures

Computers - Access control

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Includes index.



Sommario/riassunto

Learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it About This Book Explore and build intricate architectures that allow you to emulate an enterprise network Test and enhance your security skills against complex and hardened virtual architecture Learn methods to bypass common enterprise defenses and leverage them to test the most secure environments. Who This Book Is For While the book targets advanced penetration testing, the process is systematic and as such will provide even beginners with a solid methodology and approach to testing. You are expected to have network and security knowledge. The book is intended for anyone who wants to build and enhance their existing professional security and penetration testing methods and skills. What You Will Learn Learning proven security testing and penetration testing techniques Building multi-layered complex architectures to test the latest network designs Applying a professional testing methodology Determining whether there are filters between you and the target and how to penetrate them Deploying and finding weaknesses in common firewall architectures. Learning advanced techniques to deploy against hardened environments Learning methods to circumvent endpoint protection controls In Detail Security flaws and new hacking techniques emerge overnight ? security professionals need to make sure they always have a way to keep . With this practical guide, learn how to build your own virtual pentesting lab environments to practice and develop your security skills. Create challenging environments to test your abilities, and overcome them with proven processes and methodologies used by global penetration testing teams. Get to grips with the techniques needed to build complete virtual machines perfect for pentest training. Construct and attack layered architectures, and plan specific attacks based on the platforms you're going up against. Find new vulnerabilities for different kinds of systems and networks, and what these mean for your clients. Driven by a proven penetration testing methodology that has trained thousands of testers, Building Virtual Labs for Advanced Penetration Testing, Second Edition will prepare you for participation in professional security teams. Style and approach The book is written in an easy-to-follow format that provides a step?by-step, process-centric approach. Additionally, there are numerous hands-on e...