LEADER 01054nam0 2200265 i 450 001 VAN0072965 005 20230720102149.308 010 $a978-88-7078-982-9 100 $a20091201d2005 |0itac50 ba 101 $aita 102 $aIT 105 $a|||| ||||| 200 1 $aFare formazione$ei fondamenti della formazione e i nuovi traguardi$fGian Piero Quaglino 210 $aMilano$cCortina$dc2005 215 $axiii, 246 p.$cill.$d22 cm. 410 1$1001VAN0046710$12001 $aIndividuo gruppo organizzazione. Theatrum$1210 $aMilano$cRaffaello Cortina. 620 $dMilano$3VANL000284 700 1$aQuaglino$bGian Piero$3VANV013731$0115557 712 $aRaffaello Cortina $3VANV202735$4650 801 $aIT$bSOL$c20230721$gRICA 899 $aBIBLIOTECA DEL DIPARTIMENTO DI PSICOLOGIA$1IT-CE0119$2VAN16 912 $aVAN0072965 950 $aBIBLIOTECA DEL DIPARTIMENTO DI PSICOLOGIA$d16CONS 3398 $e16VS 3798 20091201 996 $aFare formazione$9629976 997 $aUNICAMPANIA LEADER 01017nam0-22003131i-450 001 990000094600403321 005 20250321164455.0 035 $a000009460 035 $aFED01000009460 035 $a(Aleph)000009460FED01 100 $a20011111d1913----km-y0itay50------ba 101 0 $aita 102 $aIT 105 $ay-------001yy 200 1 $aSuperficie territoriale e superficie agraria e forestale dei comuni del regno d'Italia al 1. gennaio 1913 210 $aRoma$cG. Bertero e C.$d1913 215 $aVIII, 325 p.$d27 cm 610 0 $aAgricoltura$aStatistica$a1913 676 $a630.021 28 710 02$aItalia.$bUfficio di statistica agraria$0331918 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990000094600403321 952 $a13 N 06 16$b1084$fFINBC 952 $aA BOT 758$b03/2366/25$fFAGBC 959 $aFINBC 959 $aFAGBC 996 $aSuperficie territoriale e superficie agraria e forestale dei comuni del regno d'Italia al 1. gennaio 1913$9109026 997 $aUNINA LEADER 04283nam 22006135 450 001 9910254984103321 005 20251116161828.0 010 $a3-319-41187-X 024 7 $a10.1007/978-3-319-41187-3 035 $a(CKB)3710000000873014 035 $a(DE-He213)978-3-319-41187-3 035 $a(MiAaPQ)EBC5577829 035 $a(PPN)195513584 035 $a(EXLCZ)993710000000873014 100 $a20160923d2016 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aIntroduction to Cyberdeception /$fby Neil C. Rowe, Julian Rrushi 205 $a1st ed. 2016. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2016. 215 $a1 online resource (XIV, 334 p. 61 illus., 49 illus. in color.) 311 08$a3-319-41185-3 320 $aIncludes bibliographical references. 327 $aIntroduction -- Psychology of Deception -- Professional Deception -- Deception Methods for Defense -- Deception Methods for Offense -- Delays -- Fakes -- Defensive Camouflage -- False Excuses -- Defensive Social Engineering -- Measuring Deception -- Planning Cyberspace Deception -- Software Engineering of Deceptive Software and Systems -- Decoy I/O Devices -- Deception for the Electrical Power Industry -- Law and Ethics for Software Deception. . 330 $aThis book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception, this book focuses on methods rather than detection. It treats cyberdeception techniques that are current, novel, and practical, and that go well beyond traditional honeypots. It contains features friendly for classroom use: (1) minimal use of programming details and mathematics, (2) modular chapters that can be covered in many orders, (3) exercises with each chapter, and (4) an extensive reference list. Cyberattacks have grown serious enough that understanding and using deception is essential to safe operation in cyberspace. The deception techniques covered are impersonation, delays, fakes, camouflage, false excuses, and social engineering. Special attention is devoted to cyberdeception in industrial control systems and within operating systems. This material is supported by a detailed discussion of how to plan deceptions and calculate their detectability and effectiveness. Some of the chapters provide further technical details of specific deception techniques and their application. Cyberdeception can be conducted ethically and efficiently when necessary by following a few basic principles. This book is intended for advanced undergraduate students and graduate students, as well as computer professionals learning on their own. It will be especially useful for anyone who helps run important and essential computer systems such as critical-infrastructure and military systems. . 606 $aComputer security 606 $aComputer networks 606 $aApplication software 606 $aData encryption (Computer science) 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 615 0$aComputer security. 615 0$aComputer networks. 615 0$aApplication software. 615 0$aData encryption (Computer science) 615 14$aSystems and Data Security. 615 24$aComputer Communication Networks. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aCryptology. 676 $a005.8 700 $aRowe$b Neil C.$4aut$4http://id.loc.gov/vocabulary/relators/aut$0753105 702 $aRrushi$b Julian$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910254984103321 996 $aIntroduction to Cyberdeception$92184077 997 $aUNINA