01609nam2 22002773i 450 VAN0011966520240806100805.9320190124d1910 |0itac50 baitaIT|||| |||||<<Le razze umane viventiillustrazione popolare dei costumi, degli usi, delle feste, delle cerimonie, delle guerre, delle industrie dei popoli di tutto il mondo>> 1MilanoSocietà Editrice Libraria1910VVII, 479 p., [12] carte di tav.ill.30 cmBiblioteca LauriaIT-IT-CE0105 CONSBL.900M.7481/SLP001VAN001058782001 Le razze umane viventiillustrazione popolare dei costumi, degli usi, delle feste, delle cerimonie, delle guerre, delle industrie dei popoli di tutto il mondotraduzione dalla edizione inglese compilata da un gruppo di eminenti specialisti sotto la direzione di R. Lydekker[traduzione diretta da Aldobrandino Mochi]210 MilanoSocietà Editrice Libraria1910-1913215 2 volumi30 cm.1MilanoVANL000284LydekkerR.VANV082268MochiAldobrandinoVANV082269Società editrice libraria <editore>VANV110432650ITSOL20240906RICABIBLIOTECA DEL DIPARTIMENTO DI GIURISPRUDENZAIT-CE0105VAN00VAN00119665BIBLIOTECA DEL DIPARTIMENTO DI GIURISPRUDENZA00CONS BL.900M.748 1 00BL 18621 SLP 20190124 Biblioteca LauriaRazze umane viventi947491UNICAMPANIA06136nam 2200685 a 450 991101939630332120200520144314.0978661212250797812821225051282122509978047051699704705169929780470516980047051698410.1002/9780470516997(CKB)1000000000754324(EBL)427931(SSID)ssj0000354753(PQKBManifestationID)11259196(PQKBTitleCode)TC0000354753(PQKBWorkID)10316209(PQKB)11426659(MiAaPQ)EBC427931(CaBNVSL)mat08040201(IDAMS)0b00006485f0e719(IEEE)8040201(OCoLC)352829720(PPN)250961962(Perlego)2775182(EXLCZ)99100000000075432420081217d2009 uy 0engur|n|---|||||txtccrSIP security /Dorgham Sisalem ... [et al.]Chichester, West Sussex, U.K. ;Hoboken, N.J. Wiley20091 online resource (354 p.)Description based upon print version of record.9780470516362 0470516364 Includes bibliographical references (p. [317]-329) and index.Foreword -- About the Authors -- Acknowledgment -- 1 Introduction -- 2 Introduction to Cryptographic Mechanisms -- 2.1 Cryptographic Algorithms -- 2.2 Secure Channel Establishment -- 2.3 Authentication in 3GPP Networks -- 2.4 Security Mechanisms Threats and Vulnerabilities -- 3 Introduction to SIP -- 3.1 What is SIP, Why Should we Bother About it and What are Competing Technologies? -- 3.2 SIP: the Common Scenarios -- 3.3 Introduction to SIP Operation: the SIP Trapezoid -- 3.4 SIP Components -- 3.5 Addressing in SIP -- 3.6 SIP Message Elements -- 3.7 SIP Dialogs and Transactions -- 3.8 SIP Request Routing -- 3.9 Authentication, Authorization, Accounting -- 3.10 SIP and Middleboxes -- 3.11 Other Parts of the SIP Eco-system -- 3.12 SIP Protocol Design and Lessons Learned -- 4 Introduction to IMS -- 4.1 SIP in IMS -- 4.2 General Architecture -- 4.3 Session Control and Establishment in IMS -- 5 Secure Access and Interworking in IMS -- 5.1 Access Security in IMS -- 5.2 Network Security in IMS -- 6 User Identity in SIP -- 6.1 Identity Theft -- 6.2 Identity Authentication using S/MIME -- 6.3 Identity Authentication in Trusted Environments -- 6.4 Strong Authenticated Identity -- 6.5 Identity Theft Despite Strong Identity -- 6.6 User Privacy and Anonymity -- 6.7 Subscription Theft -- 6.8 Fraud and SIP -- 7 Media Security -- 7.1 The Real-time Transport Protocol -- 7.2 Secure RTP -- 7.3 Key Exchange -- 8 Denial-of-service Attacks on VoIP and IMS Services -- 8.1 Introduction -- 8.2 General Classification of Denial-of-service Attacks -- 8.3 Bandwidth Consumption and Denial-of-service Attacks on SIP Services -- 8.4 Bandwidth Depletion Attacks -- 8.5 Memory Depletion Attacks -- 8.6 CPU Depletion Attacks -- 8.7 Misuse Attacks -- 8.8 Distributed Denial-of-service Attacks -- 8.9 Unintentional Attacks -- 8.10 Address Resolution-related Attacks -- 8.11 Attacking the VoIP Subscriber Database -- 8.12 Denial-of-service Attacks in IMS Networks -- 8.13 DoS Detection and Protection Mechanisms.8.14 Detection of DoS Attacks -- 8.15 Reacting to DoS Attacks -- 8.16 Preventing DoS Attacks -- 8.17 DDoS Signature Specification -- 9 SPAM over IP Telephony -- 9.1 Introduction -- 9.2 Spam Over SIP: Types and Applicability -- 9.3 Why is SIP Good for Spam? -- 9.4 Legal Side of Unsolicited Communication -- 9.5 Fighting Unsolicited Communication -- 9.6 General Antispam Framework -- Bibliography -- Index.This book gives a detailed overview of SIP specific security issues and how to solve them While the standards and products for VoIP and SIP services have reached market maturity, security and regulatory aspects of such services are still being discussed. SIP itself specifies only a basic set of security mechanisms that cover a subset of possible security issues. In this book, the authors survey important aspects of securing SIP-based services. This encompasses a description of the problems themselves and the standards-based solutions for such problems. Where a standards-based solution has not been defined, the alternatives are discussed and the benefits and constraints of the different solutions are highlighted. SJP Security will be of interest of IT staff involved in deploying and developing VoIP, service users of SIP, network engineers, designers and managers. Advanced undergraduate and graduate students studying data/voice/multimedia communications as well as researchers in academia and industry will also find this book valuable. Key Features: . Will help the readers to understand the actual problems of using and developing VoIP services, and to distinguish between real problems and the general hype of VoIP security. Discusses key aspects of SIP security including authentication, integrity, confidentiality, non-repudiation and signalling. Assesses the real security issues facing users of SIP, and details the latest theoretical and practical solutions to SIP Security issues. Covers secure SIP access, inter-provider secure communication, media security, security of the IMS infrastructures as well as VoIP services vulnerabilities and countermeasures against Denial-of-Service attacks and VoIP spam.Session Initiation Protocol securityComputer networksSecurity measuresSession Initiation Protocol (Computer network protocol)Computer networksSecurity measures.Session Initiation Protocol (Computer network protocol)005.8Sisalem Dorgham1711068MiAaPQMiAaPQMiAaPQBOOK9911019396303321SIP security4102143UNINA02625oam 2200733I 450 991095963800332120251117065713.00-429-91313-30-429-89890-80-429-47413-X1-283-06808-797866130680881-84940-024-5(CKB)2670000000088702(EBL)690295(OCoLC)723945320(SSID)ssj0000634596(PQKBManifestationID)12264102(PQKBTitleCode)TC0000634596(PQKBWorkID)10643092(PQKB)10062105(MiAaPQ)EBC690295(Au-PeEL)EBL690295(CaPaEBR)ebr10497316(CaONFJC)MIL306808(OCoLC)728670088(OCoLC)1226773616(FINmELB)ELB140675(EXLCZ)99267000000008870220180611h20181984 uy 0engur|n|---|||||txtccrElements of psychoanalysis /by Wilfred R. Bion1st ed.London Karnac Books1984Boca Raton, FL :Routledge, an imprint of Taylor and Francis,[2018].©1984.1 online resource (118 p.)Maresfield libraryReprint. Originally published by W.H. Medical Books, 1963.0-367-32428-8 0-946439-06-0 Includes bibliographical references and index.Cover; CHAPTER ONE; CHAPTER TWO; CHAPTER THREE; CHAPTER FOUR; CHAPTER FIVE; CHAPTER SIX; CHAPTER SEVEN; CHAPTER EIGHT; CHAPTER NINE; CHAPTER TEN; CHAPTER ELEVEN; CHAPTER TWELVE; CHAPTER THIRTEEN; CHAPTER FOURTEEN; CHAPTER FIFTEEN; CHAPTER SIXTEEN; CHAPTER SEVENTEEN; CHAPTER EIGHTEEN; CHAPTER NINETEEN; CHAPTER TWENTY; INDEXElements is a discussion of categorising the ideational context and emotional experience that may occur in a psychoanalytic interview. The text aims to expand the reader's understanding of cognition and its clinical ramifications.Maresfield library.PsychoanalysisPsychotherapyPersonalityPsychoanalysis.Psychotherapy.Personality.131.34616.8917Bion Wilfred R.(Wilfred Ruprecht),1897-1979.,161171FlBoTFGFlBoTFGBOOK9910959638003321Elements of psychoanalysis4489841UNINA