01195nam0 22003131i 450 SUN000765320081014120000.088-13-21137-6IT99 707720020826d1998 |0itac50 baitaIT|||| |||||Guerre civili e terzi statiValentina GradoPadovaCedam1998XXII, 416 p.24 cm.001SUN00077742001 Diritto internazionale e ordine mondiale3210 PadovaCEDAM1995-.Diritto internazionaleFISUNC000114Forze armate multinazionaliFISUNC001813PadovaSUNL000007341.58421Grado, ValentinaSUNV006333133010CEDAMSUNV005537650ITSOL20181109RICASUN0007653UFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI GIURISPRUDENZA00 CONS XIII.Eec.3 00 20182 UFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI GIURISPRUDENZA20182CONS XIII.Eec.3paGuerre civili e terzi stati70018UNICAMPANIA01313nam2 2200253 i 450 SUN004044220141112113032.27220060202d1924 |0itac50 baitaIT|||| |||||7: Dei privilegi e delle cause di prelazione del credito in generaleper Emilio BianchiNapoli : Marghieri1907786 p. ; 25 cmSul front.: 2. impressione. - Fondo Raffaele Papa.001SUN00394712001 Il diritto civile italiano secondo la dottrina e la giurisprudenzaesposto da Abello Luigi ... [et al.]per cura di Pasquale Fiore[poi] continuato a cura del professor Biagio Brugi7205 Napoli : MarghieriTorino : Unione tipografico-editrice torinese210 v. ; 25 cm215 Il curatore varia nel corso della pubblicazione.NapoliSUNL000005Bianchi, EmilioSUNV0334829101MarghieriSUNV004062650ITSOL20191209RICASUN0040442UFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI GIURISPRUDENZA00CONS XV.Ee.70 00FP 27860 20060202 Dei privilegi e delle cause di prelazione del credito in generale225978UNICAMPANIA06209nam 22008173u 450 991078147850332120230124183437.01-283-17720-X97866131772091-118-11358-6(CKB)2550000000040607(EBL)693686(OCoLC)747412540(SSID)ssj0000541133(PQKBManifestationID)11391003(PQKBTitleCode)TC0000541133(PQKBWorkID)10498608(PQKB)10670831(WaSeSS)Ind00025751(MiAaPQ)EBC693686(EXLCZ)99255000000004060720130418d2011|||| u|| |engur|n|---|||||txtccrSecurity Administrator Street Smarts[electronic resource] A Real World Guide to CompTIA Security+ Skills3rd ed.Hoboken Wiley20111 online resource (625 p.)Street smarts seriesSybex serious skillsDescription based upon print version of record.1-118-06116-0 Includes index.CompTIA Discount Coupon; Security Administrator Street Smarts: A Real World Guide to CompTIA Security+TM Skills; Contents; Introduction; Phase 1: The Grunt Work of Security; Task 1.1: Performing an Initial Risk Assessment; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.2: Determining Which Security Policy Is Most Important; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.3: Establishing a User-Awareness Program; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.4: Reviewing a Physical-Security Checklist; Scenario; Scope of TaskProcedureCriteria for Completion; Task 1.5: Understanding the Value of Documents; Scenario; Scope of Task; Procedure; Criteria for Completion; Phase 2: Hardening Systems; Task 2.1: Managing Services; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.2: Managing Ports; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.3: Patching the Operating System; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.4: Security Templates; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.5: Securing Autoruns; Scenario; Scope of TaskProcedureCriteria for Completion; Task 2.6: Securing Hardware Devices; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.7: Virtualization; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.8: Locking the Computer Using an Idle Time-out; Scenario; Scope of Task; Procedure; Criteria for Completion; Phase 3: Malicious Software; Task 3.1: Installing, Updating, and Running Antivirus Software; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.2: Using a Rootkit Checker; Scenario; Scope of Task; Procedure; Criteria for CompletionTask 3.3: AdwareScenario; Scope of Task; Procedure; Criteria for Completion; Task 3.4: Using a Spyware Checker; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.5: Malicious Software Removal Tool; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.6: McAfee Site Advisor; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.7: ARP Poisoning with Cain & Abel; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.8: Attacking Authentication with Firesheep; Scenario; Scope of Task; Procedure; Criteria for CompletionPhase 4: Secure StorageTask 4.1: The Encrypting File System; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.2: EFS Data Recovery; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.3: Implementing Syskey; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.4: Converting FAT to NTFS; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.5: Implementing Disk Fault Tolerance with RAID; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.6: Backing Up Data; Scenario; Scope of Task; ProcedureCriteria for CompletionA step-by-step guide to the tasks involved in security administration If you aspire to a career in security administration, one of your greatest challenges will be gaining hands-on experience. This book takes you through the most common security admin tasks step by step, showing you the way around many of the roadblocks you can expect on the job. It offers a variety of scenarios in each phase of the security administrator's job, giving you the confidence of first-hand experience. In addition, this is an ideal complement to the brand-new, bestselling CompTIA Security+ Study Guide,Serious skills.Computer networks --Security measures --Examinations --Study guidesComputer security --Examinations --Study guidesElectronic data processing personnel --CertificationElectronic data processing personnelCertificationStudy guidesComputer securityExaminationsStudy guidesComputer networksExaminationsSecurity measuresEngineering & Applied SciencesHILCCComputer ScienceHILCCComputer networks --Security measures --Examinations --Study guides.Computer security --Examinations --Study guides.Electronic data processing personnel --Certification.Electronic data processing personnelCertificationComputer securityExaminationsComputer networksExaminationsSecurity measuresEngineering & Applied SciencesComputer Science005.8COM055000bisacshMiller David R1567425Gregg Michael884346AU-PeELAU-PeELAU-PeELBOOK9910781478503321Security Administrator Street Smarts3838844UNINA