| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA990006952230403321 |
|
|
Autore |
Fiorentino, Adriano |
|
|
Titolo |
Il Contratto di passaggio marittimo / Adriano Fiorentino |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Firenze : Casa Editrice del dott. Carlo Cya, 1940 |
|
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Collana |
|
Pubblicazioni della Facoltà di giurisprudenza della R. Università di Firenze ; 16 |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Locazione |
|
|
|
|
|
|
Collocazione |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
2. |
Record Nr. |
UNINA9910956999003321 |
|
|
Autore |
Rogers Russ |
|
|
Titolo |
Hacking a terror network : the silent threat of covert channels / / Russ Rogers, Matthew G. Devost, technical editor |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Rockland, MA, : Syngress, : Distributed by O'Reilly Media, c2005 |
|
|
|
|
|
|
|
ISBN |
|
9786611035792 |
9781281035790 |
1281035793 |
9780080488882 |
0080488889 |
9781597490160 |
1597490164 |
|
|
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (401 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Terrorism - Computer network resources |
Thrillers (Fiction) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di contenuto |
|
Cover; Contents; Foreword; Prologue; Chapter 1: The Mind of Terror; Chapter 2: Unseen Planning; Chapter 3: Making Friends; Chapter 4: One Step Closer; Chapter 5: Over the Line; Chapter 6: Images of Death; Chapter 7: The Real Assignment; Chapter 8: Creating the Code; Chapter 9: Over the Edge; Chapter 10: Biding Time; Chapter 11: Covert Channels; Chapter 12: Facing the Truth; Chapter 13: Taking Command; Chapter 14: Racing the Clock; Chapter 15: Losing Control; Chapter 16: Heightened Motivation; Chapter 17: Chasing Ghosts; Chapter 18: Taking Back Control; Chapter 19: Vengeance for Deceit |
Chapter 20: Eliminating False PositivesChapter 21: Gaining a Finger Hold; Chapter 22: Compressing Timelines; Chapter 23: A Plan Comes Together; Chapter 24: Turning Fiction into Reality; Glossary; Other books from Russ Rogers and Security Horizon, Inc.... |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic ""insider's look"" into technically sophisticated covert terrorist communications over the Internet. The accompanying CD-ROM allows readers to ""hack along"" with the story line, by viewing the same Web sites described in the book containing encrypted, covert communications.Hacking a Terror NETWORK addresses the technical possibilities of Covert Channels in combina |
|
|
|
|
|
|
|
| |