1.

Record Nr.

UNISANNIOBVEE016092

Autore

Leunclavius, Johannes <1533?-1593>

Titolo

Iuris Graeco-Romani tam canonici quam ciuilis tomi duo. Iohannis Leunclauii Amelburni, V. Cl. studio ex variis Europae Asiaeque bibliothecis eruti, Latineque redditi: nunc primum editi curâ Marquardi Freheri I. C. cum eiusdem auctario, chronologia iuris ab excessu Iustiniani ad amissam Constantinopolin, & praefatione. ..

Pubbl/distr/stampa

Francofurti : impensis heredum Petri Fischeri, 1596 ( (Hanouiae) : excudebat Guilielmus Antonius : impensis heredum Petri Fischeri, 1596

Descrizione fisica

2 v. (\48!, 563, \1!; \8!, 278, \2! p.) ; 2º

Collocazione

BNSALA FARN.14. E                   0007BNSALA FARN.14. E                   0007

BUA         039                     14

GEA         27                      0075

Lingua di pubblicazione

Greco antico

Latino

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Tit. del vol.2: Iuris Graeco-Romani tomus secundus, siue Ius ciuile Graecorum

Marca di Fischer (F01148) sui front. e in fine del vol. 2

Testo in greco e latino

Cors. ; gr. ; rom

Segn.: \ast!⁶a⁴b⁶c⁸A-2Z⁶3A⁴3B²; \ast!⁴a-y⁶z⁸

Iniziali e fregi xil

Front. del vol. 1 stampato in rosso e nero.



2.

Record Nr.

UNISALENTO991003255239707536

Titolo

Cyber adversary characterization [electronic resource] : auditing the hacker mind / Tom Parker ... [et al. ; foreword by Jeff Moss]

Pubbl/distr/stampa

Rockland, MA : Syngress, c2004

ISBN

9781931836111

1931836116

Descrizione fisica

xxxi, 324 p. : ill. ; 24 cm.

Altri autori (Persone)

Parker, Tom, 1982-author

Disciplina

005.8

Soggetti

Computer security

Computer networks - Security measures

Computerbeveiliging

Computercriminaliteit

Electronic books.

Lingua di pubblicazione

Inglese

Formato

Risorsa elettronica

Livello bibliografico

Monografia

Note generali

"Your window into the cyber enemy's mind"--Cover.

Includes index.

Sommario/riassunto

The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer systems. Some of these vulnerabilities are waiting to be exploited, while numerous others already have. Everyday that a vulnerability or threat goes unchecked greatly increases an attack and the damage it can cause. Who knows what the prospects for a cascade of failures across US infrastructures could lead to. What type of group or individual would exploit this vulnerability, and why would they do it? "Inside the Mind of a Criminal Hacker" sets the stage and cast of characters for examples and scenarios such as this, providing the security specialist a window into the enemys mind - necessary in order to develop a well configured defense. Written by leading security and counter-terrorism experts, whose experience include first-hand exposure in working with government branches & agencies (such as the



FBI, US Army, Department of Homeland Security), this book sets a standard for the fight against the cyber-terrorist. Proving, that at the heart of the very best defense is knowing and understanding your enemy. * This book will demonstrate the motives and motivations of criminal hackers through profiling attackers at post attack and forensic levels. * This book is essential to those who need to truly "know thy enemy" in order to prepare the best defense. * . The breadth of material in "Inside the Criminal Mind" will surprise every security specialist and cyber-terrorist buff of how much they do and (more importantly) don't know about the types of adversaries they stand to face.