00645nam0 2200217 450 00000973120180627125355.020080411d1960----km-y0itay50------baengUSa-------001-y<<The >>marine corrosion handbookT. Howard RogersNew York [etc.]McGraw-Hill Company of Canadac1960XXI, 297 p.ill.21 cm69120Rogers,T. Howard1732ITUNIPARTHENOPE20080411RICAUNIMARC000009731691/10016231PISTMarine corrosion handbook106898UNIPARTHENOPE00994nam a2200241 i 4500991002539779707536061014s2013 it a b 001 0 ita db14191234-39ule_instBibl. Dip.le Aggr. Matematica e Fisica - Sez. MatematicaengAMS 60J10AMS 60J27Falcicchia, Emilio479855Le catene di Markov. Tesi di laurea /laureando Emilio Falcicchia ; relatore Carlo SempiLecce :Università del Salento. Facoltà di Scienze MM. FF. NN. Corso di Laurea in Matematica,a.a. 2012-1333 p. ;30 cmMarkov processesSempi, Carlo.b1419123430-06-1410-06-14991002539779707536LE013 TES 2012/13 FAL112013000223957le013gE20.00-no 10000.i1562135230-06-14Catene di Markov. Tesi di laurea259043UNISALENTOle01310-06-14ma -itait 3001001cam a2200217 i 4500991001931329707536061103s2001 it 000 0 mul d8879610198b13449898-39ule_instDip.to Filologia Class. e Scienze FilosoficheitaIncontro di studiosi dell'antichità cristiana<29 :2000 :Roma>424335Pietro e Paolo :il loro rapporto con Roma nelle testimonianze antiche : XXIX Incontro di studiosi dell'antichità cristiana, Roma, 4-6 maggio 2000Roma :Institutum Patristicum Augustinianum,2001617 p. ;24 cmStudia ephemeridis Augustinianum ;74.b1344989802-04-1403-11-06991001931329707536LE007 220 PIE 01.0112007000112410le007LE007 2006 UgentipE62.00-l- 01010.i1433291711-12-06Pietro e Paolo1098817UNISALENTOle00703-11-06ma -mulit 0003890nam 22005775 450 991103504930332120251028120421.0979886881709010.1007/979-8-8688-1709-0(CKB)41826744400041(MiAaPQ)EBC32379812(Au-PeEL)EBL32379812(CaSebORM)9798868817090(DE-He213)979-8-8688-1709-0(EXLCZ)994182674440004120251028d2025 u| 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierAttack Vectors The History of Cybersecurity /by Morey Haber1st ed. 2025.Berkeley, CA :Apress :Imprint: Apress,2025.1 online resource (306 pages)Professional and Applied Computing Series9798868817083 Chapter 1: The History of Attack Vectors -- Chapter 2: Business Justification -- Chapter 3: Definitions -- Chapter 4: Malware -- Chapter 5: Exploits -- Chapter 6: Breaches -- Chapter 7: Regulations -- Chapter 8: People -- Chapter 9: Syndicates -- Chapter 10: Social Engineering -- Chapter 11: Solutions -- Chapter 12: The Human Threat -- Chapter 13: Lateral Movement -- Chapter 14: Return on Investment -- Chapter 15: It’s Not If, But When -- Chapter 16: Supply Chain Attacks -- Chapter 17: Been Hacked? -- Chapter 18: History Lesson -- Chapter 19: Conclusion.From early worms to AI powered deepfakes, Attack Vectors chronicles the relentless battle between hackers and defenders. This deep dive into cybersecurity’s evolution unpacks the rise of malware from the Morris Worm to Stuxnet and the cyber syndicates that turned hacking into a billion-dollar underground industry. It explores devastating exploits like CodeRed and HeartBleed, revealing how vulnerabilities become weapons. Meet the visionaries who built the internet’s defenses and the adversaries who found ways to break them. Governments, corporations, and rogue actors all play a role in this ongoing digital war, where data is power, and deception is an art. As cyber-attacks grow more sophisticated, understanding the past is crucial to securing the future. Attack Vectors is essential reading for anyone navigating today’s high-stakes cyber landscape to learn lessons from the past and how solutions today address the most attack vectors predicted in the future. You’ll Learn: Understand the history of cyber-security from the early 1950’s through today. Explore the history of terminology that defines the threat landscape. Examine the history of malware, exploits, breaches, syndicates, and people throughout the last 25 years. Learn how modern cyber-security solutions have been developed to address the evolution of attack vectors. Explore best practices for what to do after a breach and how to manage some of the biggest risks including human beings themselves. Who This Book Is For? New security management professionals, auditors, and information technology staff looking to understand the history of cyber-security.Professional and Applied Computing SeriesData protectionData protectionLaw and legislationComputersHistoryData and Information SecurityPrivacyHistory of ComputingData protection.Data protectionLaw and legislation.ComputersHistory.Data and Information Security.Privacy.History of Computing.005.8Haber Morey1854526MiAaPQMiAaPQMiAaPQBOOK9911035049303321Attack Vectors4451879UNINA