1.

Record Nr.

UNISA990003030850203316

Autore

BOURDIN, Dominique

Titolo

Cento anni di Psicoanalisi : da Freud ai giorni nostri / Dominique Bourdin ; con un'appendice di Sabina Lambertucci Mann

Pubbl/distr/stampa

[Bari] : Dedalo, [c2007]

Descrizione fisica

117 p. ; 22 cm

Collana

La scienza nuova ; 134

Disciplina

152

Soggetti

Psicologia - Storia

Collocazione

II.3. 3164

Lingua di pubblicazione

Italiano

Formato

Materiale a stampa

Livello bibliografico

Monografia

2.

Record Nr.

UNISA990003578340203316

Titolo

Hermeneutic philosophy and Plato : Gadamer's response to the Philebus / Christopher Gill, Francois Renaud (eds)

Pubbl/distr/stampa

Sankt Augustin : Akademia Verlag, 2010

ISBN

978-3-89665-507-3

Descrizione fisica

269 p. ; 22 cm

Collana

Studies in ancient philosophy ; 10

Disciplina

184

Collocazione

II.1.A. 1481

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia



3.

Record Nr.

UNINA9910781478503321

Autore

Miller David R

Titolo

Security Administrator Street Smarts [[electronic resource] ] : A Real World Guide to CompTIA Security+ Skills

Pubbl/distr/stampa

Hoboken, : Wiley, 2011

ISBN

1-283-17720-X

9786613177209

1-118-11358-6

Edizione

[3rd ed.]

Descrizione fisica

1 online resource (625 p.)

Collana

Street smarts series

Sybex serious skills

Classificazione

COM055000

Altri autori (Persone)

GreggMichael

Disciplina

005.8

Soggetti

Computer networks --Security measures --Examinations --Study guides

Computer security --Examinations --Study guides

Electronic data processing personnel --Certification

Electronic data processing personnel - Certification

Computer security - Examinations

Computer networks - Examinations - Security measures

Engineering & Applied Sciences

Computer Science

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes index.

Nota di contenuto

CompTIA Discount Coupon; Security Administrator Street Smarts: A Real World Guide to CompTIA Security+TM Skills; Contents; Introduction; Phase 1: The Grunt Work of Security; Task 1.1: Performing an Initial Risk Assessment; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.2: Determining Which Security Policy Is Most Important; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.3: Establishing a User-Awareness Program; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.4: Reviewing a Physical-Security Checklist; Scenario; Scope of Task

ProcedureCriteria for Completion; Task 1.5: Understanding the Value of Documents; Scenario; Scope of Task; Procedure; Criteria for Completion; Phase 2: Hardening Systems; Task 2.1: Managing Services;



Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.2: Managing Ports; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.3: Patching the Operating System; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.4: Security Templates; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.5: Securing Autoruns; Scenario; Scope of Task

ProcedureCriteria for Completion; Task 2.6: Securing Hardware Devices; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.7: Virtualization; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.8: Locking the Computer Using an Idle Time-out; Scenario; Scope of Task; Procedure; Criteria for Completion; Phase 3: Malicious Software; Task 3.1: Installing, Updating, and Running Antivirus Software; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.2: Using a Rootkit Checker; Scenario; Scope of Task; Procedure; Criteria for Completion

Task 3.3: AdwareScenario; Scope of Task; Procedure; Criteria for Completion; Task 3.4: Using a Spyware Checker; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.5: Malicious Software Removal Tool; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.6: McAfee Site Advisor; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.7: ARP Poisoning with Cain & Abel; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.8: Attacking Authentication with Firesheep; Scenario; Scope of Task; Procedure; Criteria for Completion

Phase 4: Secure StorageTask 4.1: The Encrypting File System; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.2: EFS Data Recovery; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.3: Implementing Syskey; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.4: Converting FAT to NTFS; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.5: Implementing Disk Fault Tolerance with RAID; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.6: Backing Up Data; Scenario; Scope of Task; Procedure

Criteria for Completion

Sommario/riassunto

A step-by-step guide to the tasks involved in security administration If you aspire to a career in security administration, one of your greatest challenges will be gaining hands-on experience. This book takes you through the most common security admin tasks step by step, showing you the way around many of the roadblocks you can expect on the job. It offers a variety of scenarios in each phase of the security administrator's job, giving you the confidence of first-hand experience. In addition, this is an ideal complement to the brand-new, bestselling CompTIA Security+ Study Guide,