LEADER 00954nam0-2200289 --450 001 9910502199203321 005 20211102132655.0 010 $a978-88-343-3997-8 100 $a20211102d2020----kmuy0itay5050 ba 101 0 $aita$cita 102 $aIT 105 $aa 001yy 200 1 $a<>percorsi del moderno$esocietà, istituzioni, cattolicesimo in Europa tra età moderna ed età contemporanea$eraccolta di scritti$fMario Taccolini 210 $aMilano$cVita e pensiero$d2020 215 $aXIII, 356 p.$cill.$d22 cm 225 1 $aRicerche. Storia 300 $aGià pubblicati 610 0 $aChiesa cattolica$aRapporti [con la] Società$aEuropa$aSec. 19.-20. 676 $a261.8094$v23$zita 700 1$aTaccolini,$bMario$0139691 801 0$aIT$bUNINA$gREICAT$2UNIMARC 901 $aBK 912 $a9910502199203321 952 $aXIV M 420$b2480/2021$fFSPBC 959 $aFSPBC 996 $aPercorsi del moderno$91885519 997 $aUNINA LEADER 03168nam 2200529 450 001 9910698307703321 005 20230306202211.0 035 $a(CKB)2430000000036189 035 $a(NjHacI)992430000000036189 035 $a(OCoLC)234309734 035 $a(OCoLC)712605096 035 $a(EXLCZ)992430000000036189 100 $a20230306d2007 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aGuide to storage encryption technologies for end user devices (NIST special publication 800-111) $erecommendations of the National Institute of Standards and Technology /$fKaren Kent, Murugiah Souppaya, Matthew Sexton 205 $aDraft. 210 1$aGaithersburg, Md. :$cU.S. Dept. of Commerce,$d2007. 215 $a1 online resource (40 pages) $cillustrations 225 1 $aNIST special publication 300 $aTitle from title screen (viewed on July 16, 2008). 300 $a"August 2007." 320 $aIncludes bibliographical references. 330 $aMany threats against end user devices, such as desktop and laptop computers, smart phones, personal digital assistants, and removable media, could cause information stored on the devices to be accessed by unauthorized parties. To prevent such disclosures of information, the information needs to be secured. This publication explains the basics of storage encryption, which is the process of using encryption and authentication to restrict access to and use of stored information. The appropriate storage encryption solution for a particular situation depends primarily upon the type of storage, the amount of information that needs to be protected, the environments where the storage will be located, and the threats that need to be mitigated. This publication describes three types of solutions???full disk encryption, volume and virtual disk encryption, and file/folder encryption???and makes recommendations for implementing and using each type. This publication also includes several use case examples, which illustrate that there are multiple ways to meet most storage encryption needs. 410 0$aNIST special publication. 517 $aGuide to Storage Encryption Technologies for End User Devices 531 $aGUIDE TO STORAGE ENCRYPTION TECHNOLOGIES FOR END USER DEVICES (NIST SPECIAL PUBLICATION 800-111) 606 $aComputer networks$xSecurity measures$zUnited States 606 $aComputer security$xStandards 606 $aData encryption (Computer science) 615 0$aComputer networks$xSecurity measures 615 0$aComputer security$xStandards. 615 0$aData encryption (Computer science) 676 $a005.8 700 $aKent$b Karen$g(Karen Ann),$01352442 702 $aSouppaya$b Murugiah 702 $aSexton$b Matthew 712 02$aNational Institute of Standards and Technology (U.S.) 801 0$bNjHacI 801 1$bNjHacl 906 $aBOOK 912 $a9910698307703321 996 $aGuide to storage encryption technologies for end user devices (NIST special publication 800-111)$93176264 997 $aUNINA