| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA990000862900203316 |
|
|
Autore |
CEI, Vincenzo |
|
|
Titolo |
Panico e fobie : le risposte a tutti i dubbi / Vittorio Cei |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Milano : F. Angeli, copyr. 2002 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
|
|
|
|
|
Collocazione |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
2. |
Record Nr. |
UNISALENTO991001998699707536 |
|
|
Autore |
Colombo, Ugo M. |
|
|
Titolo |
Gli anziani : rapporti sociali, lavoro, pensioni / Ugo M. Colombo |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNICASBVE0084348 |
|
|
Titolo |
Banche e risanamento delle imprese in crisi / a cura di Giancarlo Forestieri ; Alberto Berlinghieri ... \et al.! |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
4. |
Record Nr. |
UNINA9911019689703321 |
|
|
Autore |
Jacquenet Christian |
|
|
Titolo |
Service automation and dynamic provisioning techniques in IP/MPLS environments / / Christian Jacquenet, Gilles Bourdon and Mohamed Boucadair |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Chichester, England ; ; Hoboken, NJ, : J. Wiley & Sons, c2008 |
|
|
|
|
|
|
|
ISBN |
|
9786611318079 |
9781281318077 |
1281318078 |
9780470035146 |
0470035145 |
9780470035153 |
0470035153 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (348 p.) |
|
|
|
|
|
|
Collana |
|
Wiley series in communications networking & distributed systems |
|
|
|
|
|
|
Altri autori (Persone) |
|
BourdonGilles |
BoucadairMohamed |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
MPLS standard |
TCP/IP (Computer network protocol) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
1 Introduction -- PART I - ARCHITECTURES AND PROTOCOLS FOR SERVICE AUTOMATION AND APPLICATION EXAMPLES OF SERVICE AUTOMATION AND DYNAMIC RESOURCE PROVISIONING TECHNIQUES -- 2 What is a policy? -- 3 The Radius Protocol and its Extensions -- 4 The Diameter Protocol -- 5 The Common Open Policy Service (COPS) Protocol -- 6 NETCONF -- 7 Control and Provisioning of Wireless Access Points (CAPWAP) -- PART II - DYNAMIC RESOURCE PROVISIONING TECHNIQUES -- 8 Dynamic Enforcement of QoS Policies -- 9 Dynamic Enforcement of IP Traffic Engineering Policies in IP/MPLS -- Infrastructures -- 10 Automated Production of BGP/MPLS-Based VPN Networks -- 11 Dynamic Enforcement of Security Policies in IP/MPLS Environments -- 12 Future Challenges -- Appendices -- A XML Schema for NETCONF RPCS and Operations -- B XML Schema for NETCONF Notifications -- C Example of an IP Traffic Engineering Policy Information Base (IP TE PIB) -- D Example of an IP TE Accounting PIB -- E Description of Classes of an IP VPN Information Model -- Index |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Save time & resources with this comprehensive guide to automation configuration for the value-added IP services of the future. As the Internet becomes the medium of choice for value-added IP service offerings such as TV broadcasting, videoconferencing, and Voice over IP, the ability of automating configuration processes has become a key challenge for service providers. In fact, this feature has become crucial with the ever-growing level of expertise required to deploy such services and the scope of the techniques that need to be activated in order to provide such services with a guaranteed level of quality. Service Automation and Dynamic Provisioning Techniques in IP/MPLS Environments: *Discusses architectures and protocols for services information, covering the state-of-the-art in current implementations of Remote Authentication Dial-In User Service (RADIUS), Diameter, Common Open Policy Service (COPS), Simple Network Management Protocol (SNMP) and NETCONF *Explains various application examples, covering the dynamic enforcement of QoS, security, and IP Traffic Engineering policies. *Covers the automated production of MPLS-based VPNs. The authors offer an invaluable guide for IT facilitators, network managers, and researchers in industry and academia, as well as students studying advanced IP/MPLS networking communications courses. System designers and architects will also find this book helpful. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
5. |
Record Nr. |
UNINA9910965389703321 |
|
|
Titolo |
Information security management handbook / / edited by Harold F. Tipton, Micki Krause Nozaki |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Boca Raton : , : Auerbach Publications, , 2007- |
|
|
|
|
|
|
|
ISBN |
|
0-429-11284-X |
1-283-59665-2 |
9786613909107 |
1-4398-9315-2 |
|
|
|
|
|
|
|
|
Edizione |
[6th edition.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (495 p.) |
|
|
|
|
|
|
Collana |
|
Information security management handbook ; ; v. 6 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Computer security - Management |
Data protection |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
Nota di contenuto |
|
Front Cover; Contents; Introduction; Editors; Contributors; Chapter 1: What Business Associates Need to Know about Protected Health Information under HIPAA and HITECH; Chapter 2: E-Mail Security; Chapter 3: Appreciating Organizational Behavior and Institutions to Solidify Your Information Security Program; Chapter 4: The Information Security Auditors Have Arrived, Now What?; Chapter 5: Continuous Monitoring: Extremely Valuable to Deploy within Reason; Chapter 6: Social Networking; Chapter 7: Insider Threat Defense; Chapter 8: Risk Management in Public Key Certificate Applications |
Chapter 9: Server Virtualization: Information Security ConsiderationsChapter 10: Security Requirements Analysis; Chapter 11: CERT Resilience Management Model: An Overview; Chapter 12: Managing Bluetooth Security; Chapter 13: Slash and Burn: In Times of Recession, Do Not Let Emotions Drive Business Decisions; Chapter 15: Application Whitelisting; Chapter 16: Design of Information Security for Large System Development Projects; Chapter 17: Building Application Security Testing into the Software Development Life Cycle; Chapter 19: Format Preserving Encryption |
|
|
|
|
|
|
|
|
|
|
|
Chapter 20: Elliptic Curve CryptosystemsChapter 21: Pirating the Ultimate Killer App: Hacking Military Unmanned Aerial Vehicles; Chapter 22: Service-Oriented Architecture; Chapter 23: Cloud Security; Chapter 24: Enterprise Zones of Trust; Chapter 25: Complex Event Processing for Automated Security Event Analysis; Chapter 26: Records Management; Chapter 27: Data Backup Strategies: Traditional versus Cloud; Chapter 28: Managing Advanced Persistent Threats; Chapter 29: Virtualization Forensics; Information Security Management Handbook: Comprehensive Table of Contents; Back Cover |
|
|
|
|
|
|
Sommario/riassunto |
|
Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations. Reporting on the latest developments in information security and recent changes to the (ISC)2® CISSP Common Body of Knowledge (CBK®</SU |
|
|
|
|
|
|
|
| |