01533nam0 22003373i 450 SUN010401820151204011148.59688--0-4-527-27-70.0020151203d2004 |0itac50 baitaLATIT|||| |||||*Vita e morte di Ezzelino da RomanocronacaRolandinoa cura di Flavio FioreseMilano : Fondazione Lorenzo Valla : A. Mondadori, 2004LXX665 p. ; 21 cmTesto originale a fronte.001SUN00098842001 *Scrittori greci e latini210 [Roma]Fondazione Lorenzo Valla ; MilanoMondadori.SUN0104093Cronica in factis et circa facta Marchie Trivixane.MilanoSUNL000284Rolandino da PadovaSUNV081085401575Fiorese, FlavioSUNV081086340Fondazione Lorenzo VallaSUNV000044650MondadoriSUNV000115650RolandinoRolandino da PadovaSUNV081726Rolandinus PatavinusRolandino da PadovaSUNV081727ITSOL20181109RICASUN0104018UFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI LETTERE E BENI CULTURALI07 CONS Valla 1918 07 UBL305 UFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI LETTERE E BENI CULTURALIIT-CE0103UBL305CONS Valla 1918caVita e morte di Ezzelino da Romano1409882UNICAMPANIA02736nam 2200553 450 991016402860332120170821210828.01-284-03170-5(CKB)2560000000302890(SSID)ssj0001546230(PQKBManifestationID)16136668(PQKBTitleCode)TC0001546230(PQKBWorkID)14313767(PQKB)11075371(MiAaPQ)EBC4441214(CaSebORM)9781284031713(EXLCZ)99256000000030289020170403h20142014 uy 0engurcnu||||||||txtccrHacker techniques, tools, and incident handling /Sean-Philip OriyanoSecond edition.Burlington, Massachusetts :Jones & Bartlett Learning,2014.©20141 online resource (525 pages) illustrationsJones & Bartlett Learning Information Systems Security & Assurance SeriesBibliographic Level Mode of Issuance: Monograph1-284-03171-3 Includes bibliographical references and index.Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. The final section studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web. Written by a subject matter expert with numerous real-world examples, Hacker Techniques, Tools, and Incident Handling provides readers with a clear, comprehensive introduction to the many threats on our Internet environment and security and what can be done to combat them. Instructor Materials for Hacker Techniques, Tools, and Incident Handling include: PowerPoint Lecture Slides Exam Questions Case Scenarios/HandoutsJones & Bartlett Learning information systems security & assurance series.Computer securityComputer networksSecurity measuresHackersComputer security.Computer networksSecurity measures.Hackers.005.8Oriyano Sean-Philip951445MiAaPQMiAaPQMiAaPQBOOK9910164028603321Hacker techniques, tools, and incident handling2895582UNINA