|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996384751803316 |
|
|
Autore |
Nicanor Lysimachus <1603-1641.> |
|
|
Titolo |
The epistle congratulatorie of Lysimachus Nicanor of the Societie of Jesu, to the Covenanters in Scotland [[electronic resource] ] : VVherin is paralleled our sweet harmony and correspondency in divers materiall points of doctrine and practice |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
[London, : printed by Robert Young and Richard Badger], Anno Domini M.DC.XL. [1640] |
|
|
|
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Soggetti |
|
Covenanters - Scotland |
Church and state - England |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Lysimachus Nicanor is a pseudonym of John Corbet. |
Title page in red and black. |
Printers' names from STC. |
Signatures: A-K⁴. |
P. 78 misnumbered 8. |
In this edition E3r line 2 has: Laws,. |
Reproduction of original in the Henry E. Huntington Library and Art Gallery. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910812555603321 |
|
|
Autore |
Ben Mahmoud Mohamed Slim |
|
|
Titolo |
Risk propagation assessment for network security : application to airport communication network design / / Mohamed Slim Ben Mahmoud, Nicolas Larrieu, Alain Pirovano |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Hoboken, N.J., : ISTE Ltd/John Wiley and Sons Inc, 2013 |
|
|
|
|
|
|
|
ISBN |
|
9781118579947 |
1118579941 |
9781118581018 |
1118581016 |
9781299475540 |
129947554X |
9781118578735 |
1118578732 |
|
|
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (139 p.) |
|
|
|
|
|
|
Collana |
|
Focus series in networks and telecommunications |
|
|
|
|
|
|
Altri autori (Persone) |
|
LarrieuNicolas |
PirovanoAlain |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer networks - Security measures - Design |
Aeronautics - Communication systems - Design and construction |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Title Page; Contents; LIST OF FIGURES; LIST OF TABLES; INTRODUCTION; PART 1. NETWORK SECURITY RISK ASSESSMENT; CHAPTER 1. INTRODUCTION TO INFORMATION SYSTEMSECURITY RISK MANAGEMENT PROCESS; 1.1. On the importance of network security for network designers; 1.2. On the impact of risk assessment in the decision-making process for network security designers; 1.3. Quantitative versus qualitative risk assessment approaches; 1.4. Network security risk propagation concept; 1.4.1. Impact of node correlation; 1.4.2. Network security risk transitivity |
1.4.3. Network security risk propagation illustrative caseCHAPTER 2. SECURITY RISK MANAGEMENTBACKGROUND; 2.1. Qualitative security risk management methods; 2.1.1. CRAMM; 2.1.2. OCTAVE; 2.1.3. |
|
|
|
|