LEADER 01259cam0-22004331i-450- 001 990001167360403321 005 20060927094005.0 035 $a000116736 035 $aFED01000116736 035 $a(Aleph)000116736FED01 035 $a000116736 100 $a20001205g19591970km-y0itay50------ba 101 0 $aita 102 $aIT 105 $ay-------001yy 200 1 $aLezioni di geometria$fLuigi Campedelli 210 $aPadova$cCedam$d1959-1970 215 $a2 v. (XIV, 413; XVI, 433 p.)$d25 cm 327 0 $a1.: La geometria analitica e gli elementi della geometria proiettiva. - 1959$a2.2.: Le curve e le superficie. - 1970 610 0 $aGeometria 610 0 $aGeometria$aManuali 610 0 $aGeometria$aTeoria generale 676 $a516 700 1$aCampedelli,$bLuigi$04360 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990001167360403321 952 $aBF-51-0003(1$b5734$fMA1 952 $aBF-51-0003(2a$b17553$fMA1 952 $aBF-51-0003(2b$b17554$fMA1 952 $a21 A 13 40$fDINPU 952 $aMXXVI-A-55$b24723$fMAS 952 $aBF-51-0003(1b$b17557$fMA1 959 $aMA1 959 $aMAS 959 $aDINPU 962 $a51-01 996 $aLezioni di geometria$981122 997 $aUNINA LEADER 01288nam2-2200409---450 001 990001486760203316 005 20180628110527.0 035 $a000148676 035 $aUSA01000148676 035 $a(ALEPH)000148676USA01 035 $a000148676 100 $a20040309d1968----km-y0itay0103----ba 101 0 $aita 102 $aIT 105 $a||||||||001yy 200 1 $a<<17:>> <> viaggio elettorale$fFrancesco De Sanctis$ga cura di Nino Cortese 210 $aTorino$cEinaudi$d1968 215 $aXVIII, 612 p.$d22 cm 461 1$1001000213255$12001$aOpere di Francesco De Sanctis 700 1$aDE SANCTIS,$bFrancesco$f<1817-1883>$0293282 702 1$aCORTESE,$bNino 801 0$aIT$bsalbc$gISBD 912 $a990001486760203316 951 $aVI.3.A. 2964/17(V C 113/17)$b29177 L.M.$cV C 951 $aXV.9.M. 294 17$b1474 MAR$cXV.9.M.$d368621 959 $aBK 969 $aUMA 969 $aMAR 969 $aFVIG 979 $aSIAV1$b10$c20040309$lUSA01$h1009 979 $aPATRY$b90$c20040406$lUSA01$h1744 979 $aCOPAT3$b90$c20060301$lUSA01$h0956 979 $aIANNONE$b90$c20150325$lUSA01$h1043 979 $aIANNONE$b90$c20150326$lUSA01$h1004 979 $aIANNONE$b90$c20150416$lUSA01$h0947 996 $aViaggio elettorale$971362 997 $aUNISA LEADER 09415nam 2200457 450 001 9910506380403321 005 20220713132256.0 010 $a3-030-81412-2 035 $a(CKB)4950000000280150 035 $a(MiAaPQ)EBC6787329 035 $a(Au-PeEL)EBL6787329 035 $a(OCoLC)1280104693 035 $a(PPN)258302399 035 $a(EXLCZ)994950000000280150 100 $a20220713d2021 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 14$aThe CISO's transformation $esecurity leadership in a high threat landscape /$fRaj Badhwar 210 1$aCham, Switzerland :$cSpringer,$d[2021] 210 4$d©2021 215 $a1 online resource (180 pages) 311 $a3-030-81411-4 327 $aIntro -- Foreword -- Preface -- Acknowledgment -- Contents -- About the Author -- Abbreviations -- Part I: Effective CISO Leadership -- CISOs - Leading from the Front! -- 1 Introduction -- 2 Be the Security Evangelist -- 2.1 Take an Active Hand in Creating the Cybersecurity Policy and Standards -- 2.2 Lead Innovation and Next-Generation Security Technology Implementations -- 2.3 Secure Cloud Environments -- 2.4 Make the Case for Security to Both Technical and Business Audiences -- 2.5 Understand, Assess, and Quantify Cyber Risk -- 2.6 Lead Tactical vs. Strategic Implementations -- 2.7 Lead User Training and Communications -- 2.8 Be Prepared to React to Cyber-Attacks and Other Cyber-Induced Disruptions -- 2.9 Make the Case to the Board of Directors and Other Executives -- 2.10 Recruit and Retain -- 2.11 Attract Women and Other Minorities to the Cyber Security Profession -- 2.12 Win the Market Place -- 3 The CISO Take -- 4 Definitions -- References -- Further Read.ing -- More CISOs on Corporate Boards -- 1 Preface -- 2 Let's Define Cyber Threats and Cyber Risk First -- 3 Making the Case -- 4 The CISO Take -- 5 Definitions -- References -- Further Reading -- Cyber Program Turnaround by New CISO -- 1 The Human Element -- 2 Use of Security Frameworks -- 3 Adoption of a Cloud-Based Security Stack -- 4 Zero Trust -- 5 Seamless Biometric Authentication -- 6 Making Use of Threat Intelligence -- 7 Active Board-Level Participation -- 8 Effectiveness Testing -- 9 The CISO Take -- 10 Definitions -- References -- Further Reading -- CISOs - The Next Step! -- 1 Introduction -- 2 Current State for Most Hands-on CISOs -- 3 The Near-Future State -- 4 The Not-So-Distant Future State -- 4.1 Cybersecurity Product Development -- 4.2 Cybersecurity Services Development -- 4.3 Cyber Wellness -- 4.4 Cyber Insurance Certification and Attestation. 327 $a4.5 How Can This Be Delivered? -- 5 The CISO Take -- 6 Definitions -- References -- Further Reading -- CISO Maturity Model -- 1 Introduction -- 2 The Maturity Model -- 2.1 The Technical Track -- Level 1 (L1 CISO) -- Level 4 (L4 CISO) -- Level 5 (L5 CISO) -- 2.2 The Business Track -- Level 2 (L2 CISO) -- Level 3 (L3 CISO) -- Level 6 (Core CISO) -- 2.3 The Hybrid Track -- Level 7 (CSO) -- Level 8 (High-Impact CISO) -- Level 9 (Executive CISO) -- 3 The CISO Take -- 4 Definitions -- References -- Further Reading -- CISO Commentary on Some Emerging and Disruptive Technologies -- 1 Introduction -- 2 Security Commentary -- 3 The CISO Take -- 4 Definitions -- References -- Further Reading -- See Something, Do Something! -- 1 Genesis -- 2 See Something, Say Something -- 3 See Something, Do Something -- 3.1 Making the Case -- Removal of Conflict of Interest -- Empowerment and Enablement -- Separation of Roles and Responsibilities -- Training and Awareness -- 4 The CISO Take -- 5 Definitions -- References -- My Journey as a Writer -- 1 Introduction -- 2 Early Years -- 3 Technical Writing -- 4 The CISO Take -- Further Reading -- Defensive Measures in the Wake of the SolarWinds Fallout -- 1 Introduction -- 2 Generic Defensive Measures -- 2.1 Enable Improved DNS Alerting Using a DNS Sinkhole -- 2.2 Deploy Malware Kill Switch -- 2.3 Perform Monitoring and Alerting Enhancements -- 2.4 Detect Golden SAML Attacks -- 2.5 Reconsider the Usage of DOH -- 2.6 Better Manage Third-Party Risk -- 3 SolarWinds Specific Actions -- 4 The CISO Take -- 5 Definitions -- References -- Further Reading -- Part II: Cybersecurity Team Building -- Cyber Exceptionalism -- 1 Genesis -- 2 Introduction -- 3 What is Cyber Exceptionalism? -- 4 Who Can Be Cyber Exceptional? -- 5 How Can One Become Cyber-Exceptional? -- 6 My Cyber Journey -- 7 The CISO Take -- 8 Definitions -- References. 327 $aFurther Reading -- Special Needs, Disability, and Cybersecurity: Often, a Great Fit -- 1 Making the Case -- 2 The CISO Take -- 3 Definitions -- References -- Further Reading -- Bias-Free Lexicon -- 1 Introduction -- 2 Shoring Up Professionalism in the Workplace -- 3 What's the Impediment to Linguistic Reform? -- 3.1 Response to Impediments -- 4 Corrective Behaviors -- 5 The Next Step -- 6 The CISO Take -- 7 Definitions -- References -- Further Reading -- The Grass Is Not Always Greener on the Other Side -- 1 Introduction -- 2 Happiness and Job Satisfaction -- 3 Don't Burn Your Bridges -- 4 Get a Mentor -- 5 Other Implications -- 6 The CISO Take -- Further Reading -- Let Not Any Outage Go to Waste -- 1 Introduction -- 2 Making the Case -- 3 Change Management -- 4 Operational Ownership -- 5 The CISO Take -- 6 Definitions -- References -- Further Reading -- If You Can't Hire Them, Then Develop Them -- 1 Introduction -- 2 Develop the Talent -- 2.1 Technology Aptitude -- 2.2 Flexibility -- 2.3 Business Domain Awareness -- 2.4 Mission Focus -- 2.5 Systems Thinking -- 2.6 Problem Solving -- 2.7 Collaboration -- 2.8 Expand the Net -- 2.9 Trust -- 3 Retention -- 3.1 Entry-Level -- 3.2 Mid-Level -- 3.3 Senior and Executive Level -- 4 The CISO Take -- Definitions -- Further Reading -- Should You Accept Counteroffers? -- 1 Introduction -- 2 General Advice and Comments -- 3 Advice to Employees -- 4 Advice to Managers -- 5 The Cybersecurity Skew -- 6 My Own Experience -- 7 The CISO Take -- Further Reading -- Importance of 1:1 Conversations -- 1 Introduction -- 2 Guidance -- 2.1 What Is Going Well? -- 2.2 What Is Not Going So Well? -- 2.3 Ask for Feedback -- 2.4 Give Feedback -- 2.5 Talk About Opportunities -- 2.6 Talk About Career Growth -- 2.7 Talk About Individual Development -- 2.8 Brainstorm Ideas -- 2.9 Skip Level Meetings -- 3 The CISO Take. 327 $aFurther Reading -- The Cyber Hygiene Mantra -- 1 Introduction -- 2 Recommendation -- 2.1 Identify and Patch All High/Medium Risk Vulnerabilities -- 2.2 Reduce Threat Surface -- 2.3 Perform Identity and Access Management -- 2.4 Enable Asset Protection -- 2.5 Perform User Training and Awareness -- 2.6 Setup a Certification and Accreditation (C& -- A) Program -- 3 The CISO Take -- 4 Definitions -- References -- Further Reading -- Part III: Cybersecurity Prudence -- Cybersecurity Lessons from the Breach of Physical Security at US Capitol Building -- 1 Introduction -- 2 Best Practices -- 3 The CISO Take -- 4 Definitions -- References -- Further Reading -- Protect Society, the Commonwealth, and the Infrastructure - Post COVID-19 -- 1 Introduction -- 2 Technical Controls Required to Securely Work from Home, and Back -- 3 Number of Masks Required to Securely Go Back to Work -- 4 Virus Tracking (SARS-CoV-2) -- 5 The CISO Take -- 6 Definitions -- Further Reading -- Self-Service Recovery Options for Bricked Windows Devices -- 1 Introduction -- 2 Solutions -- 2.1 USB Boot Drive -- 2.2 Create a USB Recovery Drive, or Media (DVD or CD) -- 3 BSOD or Bricked? -- 3.1 USB Boot Drive -- 3.2 Recovery Drive -- 3.3 Prerequisites -- 4 Edge Cases -- 5 The CISO Take -- 6 Definitions -- References -- Further Reading -- Certification & -- Accreditation -- 1 Introduction -- 2 Making the Case -- 3 The Workflow Outline -- 3.1 Initiation Phase -- 3.2 Security Certification Phase -- 3.3 Security Accreditation Phase -- 3.4 Continuous Monitoring Phase -- 4 The CISO Take -- 5 Definitions -- References -- Further Reading -- Hack Back or Not? -- 1 Introduction -- 2 Genesis -- 3 What Is a Hack Back? -- 4 Security Issues and Impediments -- 4.1 Currency -- 4.2 Code Vulnerabilities -- 4.3 The Weak Link -- 4.4 Sophisticated Attackers -- 4.5 Lack of Defense Coordination. 327 $a4.6 Hacking Tools -- 5 Making the Case -- 5.1 Hacker Identities Are Unknown -- 5.2 It May Be Illegal -- 5.3 Open Cyber-Warfare -- 5.4 Friendly Fire -- 5.5 Asset Retrieval -- 6 The CISO Take -- 7 Definitions -- References -- Further Reading -- CISOs Need Liability Protection -- 1 Making the Case -- 2 Liability Insurance -- 2.1 Verify Your Coverage -- 3 Employment Contracts -- 4 State Laws -- 5 Company Bylaws -- 6 The CISO Take -- 7 Definitions -- References -- Further Reading -- Enable Secure Work-From-Home -- 1 Making the Case -- 2 The CISO Take -- References -- Further Reading -- Postlude - Paying It Forward -- Index. 606 $aComputer security$xManagement 615 0$aComputer security$xManagement. 676 $a005.8 700 $aBadhwar$b Raj$0849591 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910506380403321 996 $aThe CISO's Transformation$92569912 997 $aUNINA LEADER 00896nam0 2200265 450 001 9910804000803321 005 20240213123009.0 010 $a978-88-31221-96-2 100 $a20240213d2022----km y0itay50 ba 101 0 $aita 102 $aIT 105 $aa c 001yy 200 1 $aLo sviluppo dell'illuminazione nell'era delle transizioni$eatti del XX Congresso Nazionale AIDI$eNapoli 20-21 giugno 2022$fAIDI 210 $aMilano$cEditoriale Delfino$d2022 215 $a432 p.$cill.$d24 cm 610 0 $aIlluminazione$aimpiego [in] architettura 676 $a724.7$v23$zita 710 02$aAIDI$c$0422487 801 0$aIT$bUNINA$gREICAT$2UNIMARC 901 $aBK 912 $a9910804000803321 952 $aURB.LE B 3520$b54/2024$fFARBC 959 $aFARBC 996 $aLo sviluppo dell'illuminazione nell'era delle transizioni$93882561 997 $aUNINA