| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA990004701170403321 |
|
|
Autore |
Homerus <8. sec. a. C.> |
|
|
Titolo |
Dieghesis / Omero ; a cura di Marcello Gigante e Fabio Bonino |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Collana |
|
Iresione ; 1 : collana di antologie di autori antichi diretta da Marcello Gigante |
|
|
|
|
|
|
|
|
Locazione |
|
|
|
|
|
|
Collocazione |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
2. |
Record Nr. |
UNINA9910789376003321 |
|
|
Autore |
Prasad Anand |
|
|
Titolo |
Security in next generation mobile networks : SAE/LTE and WiMAX / / Anand R. Prasad and Seung-Woo Seo |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Gistrup, Denmark : , : River Publishers, , [2011] |
|
©2011 |
|
|
|
|
|
|
|
|
|
ISBN |
|
1-00-333939-5 |
1-000-79538-1 |
1-003-33939-5 |
1-000-79269-2 |
87-92982-86-7 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (242 p.) |
|
|
|
|
|
|
Collana |
|
River Publishers Series in Standardisation ; ; Volume 4 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
IEEE 802.16 (Standard) |
Long-Term Evolution (Telecommunications) |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references at the end of each chapters and index. |
|
|
|
|
|
|
|
|
Nota di contenuto |
|
""Cover""; ""Contents""; ""Dedication""; ""About the Authors""; ""Preface""; ""1 Introduction""; ""1.1 NGMN""; ""1.1.1 Overview""; ""1.1.2 Security Requirements""; ""1.2 Book Overview""; ""References""; ""2 Security Overview""; ""2.1 Objectives of Information Security""; ""2.1.1 Confidentiality""; ""2.1.2 Integrity""; ""2.1.3 Availability""; ""2.2 Types of Security Attacks""; ""2.2.1 Types of Attacks on Networks""; ""2.2.2 Security on Networks""; ""2.3 Basic Security Functions""; ""2.3.1 Authentication and Authorization""; ""2.3.2 Message Encryption""; ""2.3.3 Digital Signature"" |
""2.3.4 Nonrepudiation""""2.3.5 Privacy Guarantee""; ""2.4 Cryptographic Primitives""; ""2.4.1 Symmetric-Key Cryptography Algorithm""; ""2.4.2 Hash Function and MAC""; ""2.4.3 Public-Key Cryptography Algorithm""; ""2.4.4 Random Number Generator""; ""2.4.5 Key Management""; ""2.4.6 Cryptographic Protocol""; ""2.4.7 Comments""; ""2.5 Extensible Authentication Protocol""; ""2.5.1 General EAP Architecture""; ""2.5.2 EAP Authentication Methods""; ""2.6 AAA Protocols""; ""2.6.1 RADIUS""; ""2.6.2 Diameter""; ""2.7 Conclusion""; ""References""; ""3 Standardization""; ""3.1 3GPP"" |
""3.1.1 Organization""""3.1.2 Standardization Process""; ""3.1.3 Evolution: 3GPP Network and Security""; ""3.2 IEEE 802.16 and WiMAX""; ""3.2.1 IEEE 802.16 Standards""; ""3.2.2 WiMAX Forum®""; ""3.2.3 WiMAX Technology Evolution""; ""3.2.4 Security Overview in WiMAX""; ""References""; ""4 System Architecture and Long-Term Evolution Security""; ""4.1 Chapter Overview""; ""4.2 EPS System Overview""; ""4.2.1 Network Elements and Security Functions""; ""4.2.2 Protocol Layers and Security Functions""; ""4.3 Network Attachment""; ""4.4 Tracking Area""; ""4.5 Mobility"" |
""4.6 Idle State Signaling Reduction""""4.7 EPS Identities""; ""4.8 Security Requirements""; ""4.9 Basic Points""; ""4.9.1 Key Hierarchy and Key Lifetime""; ""4.9.2 Security Contexts""; ""4.9.3 NAS Counts and Handling""; ""4.9.4 Cryptographic Algorithms and Usage Overview""; ""4.10 Authentication and Key Agreement (AKA)""; ""4.10.1 Basic Requirements""; ""4.10.2 Authentication Decision and Context Retrieval""; ""4.10.3 Authentication Procedure""; ""4.11 Algorithm Negotiation and Security Activation""; ""4.11.1 Algorithm Negotiation Requirements""; ""4.11.2 Non-access Stratum"" |
""4.11.3 Access Stratum""""4.12 Key Handling at State Change""; ""4.13 Handover Key Handling""; ""4.14 Key Change On-The-Fly""; ""4.15 Connection Reestablishment: Token""; ""4.16 Local Authentication""; ""4.17 Inter-System Mobility""; ""4.17.1 Idle-Mode Mobility""; ""4.17.2 Handover""; ""4.18 Voice Call Continuity""; ""4.19 Emergency Call Security""; ""Bibliography""; ""5 Security in IEEE 802.16e/WiMAX""; ""5.1 Overview""; ""5.1.1 WiMAX Protocol Stack""; ""5.1.2 Architecture of WiMAX Security Sublayer""; ""5.2 Privacy Key Management""; ""5.2.1 Security Associations""; ""5.2.2 PKMv1"" |
""5.2.3 PKMv2"" |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book provides a fresh look at those security aspects, with main focus on the latest security developments of 3GPP SAE/LTE and WiMAX. SAE/LTE is also known as Evolved Packet System (EPS). |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910810236303321 |
|
|
Autore |
Braut-Hegghammer Målfrid |
|
|
Titolo |
Unclear physics : why Iraq and Libya failed to build nuclear weapons / / Malfrid Braut-Hegghammer |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Ithaca, New York ; ; London, [England] : , : Cornell University Press, , 2016 |
|
©2016 |
|
|
|
|
|
|
|
|
|
ISBN |
|
1-5017-0645-4 |
1-5017-0590-3 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (289 p.) |
|
|
|
|
|
|
Collana |
|
Cornell Studies in Security Affairs |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Nuclear weapons - Political aspects - Iraq |
Nuclear weapons - Political aspects - Libya |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Frontmatter -- Contents -- Illustrations -- Acknowledgments -- Introduction -- Part I. Iraq -- 1. Iraq Explores the Atom, 1956-1973 -- 2. Ambiguity and Ambition, 1973-1981 -- 3. Saddam's Nuclear Weapons Program, 1981-1987 -- 4. Crises and a Crash Program, 1988-1991 -- Part II. Libya -- 5. Searching for Uranium in Libya, 1951-1973 -- 6. Cultural Revolution and Nuclear Power, 1973-1981 -- 7. Nuclear Weapons Remain Elusive, 1982-1989 -- 8. Sanctions, Centrifuges, and Exit, 1989-2003 -- Conclusion -- Notes -- Index |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Many authoritarian leaders want nuclear weapons, but few manage to acquire them. Autocrats seeking nuclear weapons fail in different ways and to varying degrees-Iraq almost managed it; Libya did not come close. In Unclear Physics, Malfrid Braut-Hegghammer compares the two failed nuclear weapons programs, showing that state capacity played a crucial role in the trajectory and outcomes of both projects. Braut-Hegghammer draws on a rich set of new primary sources, collected during years of research in archives, fieldwork across the Middle East, and interviews with scientists and decision makers from both states. She gained access to documents and individuals that no other researcher has been able to consult. Her book tells the story of the Iraqi and Libyan programs from their origins in the late 1950s and 1960s |
|
|
|
|
|
|
|
|
|
|
until their dismantling.This book reveals contemporary perspectives from scientists and regime officials on the opportunities and challenges facing each project. Many of the findings challenge the conventional wisdom about clandestine weapons programs in closed authoritarian states and their prospects of success or failure. Braut-Hegghammer suggests that scholars and analysts ought to pay closer attention to how state capacity affects nuclear weapons programs in other authoritarian regimes, both in terms of questioning the actual control these leaders have over their nuclear weapons programs and the capability of their scientists to solve complex technical challenges. |
|
|
|
|
|
| |