LEADER 01134cam0-2200313---450- 001 990004080960403321 005 20160208115747.0 035 $a000408096 035 $aFED01000408096 035 $a(Aleph)000408096FED01 035 $a000408096 100 $a19990604d1975----km-y0itay50------ba 101 0 $ager 102 $aDE 105 $a--------001yy 200 1 $aRegionale und Überregionale norm im späten Mittelalter$eGraphematische und lexikalische Untersuchungen zu deutschen und niederländischen Schriftdialekten$fNorbert Richard Wolf 210 $aInnsburk$cInstituts fur deutsche Philologie ander Universitat Innsbruk$d1975 215 $a389 p.$d24 cm 225 1 $aInnsbrucker Beiträge zur Kulturwissenschaft$iGermanistische Reihe$v3 610 0 $aLingua tedesca$a1050-1500$aDialetti 676 $a437.01$v22$zita 700 1$aWolf,$bNorbert Richard$0157703 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990004080960403321 952 $a437.01 WOL 1$bDip.f.m.3028$fFLFBC 959 $aFLFBC 996 $aRegionale und Überregionale norm im späten Mittelalter$9479854 997 $aUNINA LEADER 01809cam0-2200541---450- 001 990000091480203316 005 20090807132718.0 010 $a88-387-1572-6 035 $a0009148 035 $aUSA010009148 035 $a(ALEPH)000009148USA01 035 $a0009148 100 $a20000914d1999----|||y0itay0103----ba 101 0 $aita 102 $aIT 105 $a||||||||001yy 200 $a<> atti amministrativi del comune$eguida ragionata alla redazione dopo il C.C.N.L. 1998/2001 e la Legge 3 agosto1999, n. 265 (Napolitano-Vigneri)$fTiziano Tessaro 205 $a2. ed 210 $aRimini$cMaggioli$dcopyr. 1999 215 $a925 p.$d24 cm 225 $aProgetto ente locale$v99 410 0$a12001$1001CFI0000149$12001$aProgetto ente locale$v99. 610 $aAtti amministrativi comunali 676 $a342.45066$v21$9PROCEDIMENTOAMMINISTRATIVO. ITALIA 700 1$aTESSARO,$bTiziano$0281888 801 $aIT$bSALBC$gISBD 912 $a990000091480203316 951 $aXXIV.3.L 251 (IG IV 1279)$b26233 G.$cXXIV.3.L 251 (IG IV)$d00005609 959 $aBK 979 $c20000914$lUSA01$h1742 979 $c20000919$lUSA01$h1048 979 $c20000919$lUSA01$h1521 979 $c20001019$lUSA01$h1056 979 $c20001019$lUSA01$h1454 979 $c20001019$lUSA01$h1501 979 $c20001019$lUSA01$h1539 979 $c20001024$lUSA01$h1515 979 $c20001027$lUSA01$h1519 979 $c20001027$lUSA01$h1524 979 $c20001110$lUSA01$h1710 979 $c20001124$lUSA01$h1208 979 $c20020403$lUSA01$h1616 979 $aPATRY$b90$c20040406$lUSA01$h1607 979 $aCHIARA$b90$c20081106$lUSA01$h1425 979 $aRSIAV4$b90$c20090807$lUSA01$h1327 996 $aAtti amministrativi del Comune$9673441 997 $aUNISA bas $agiu LEADER 05355nam 2200661 450 001 9910808998003321 005 20200520144314.0 010 $a1-119-04395-6 010 $a1-119-04394-8 010 $a1-119-04396-4 035 $a(CKB)2670000000569489 035 $a(EBL)1800888 035 $a(OCoLC)894170274 035 $a(SSID)ssj0001376285 035 $a(PQKBManifestationID)11761750 035 $a(PQKBTitleCode)TC0001376285 035 $a(PQKBWorkID)11361705 035 $a(PQKB)11355770 035 $a(Au-PeEL)EBL1800888 035 $a(CaPaEBR)ebr10945002 035 $a(CaONFJC)MIL647917 035 $a(MiAaPQ)EBC1800888 035 $a(PPN)189855797 035 $a(EXLCZ)992670000000569489 100 $a20141015h20142014 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aNetwork security /$fAndre? Perez 210 1$aLondon, [England] ;$aHoboken, New Jersey :$cISTE Limited :$cJohn Wiley & Sons,$d2014. 210 4$d©2014 215 $a1 online resource (310 p.) 300 $aDescription based upon print version of record. 311 $a1-322-16660-9 311 $a1-84821-758-7 320 $aIncludes bibliographical references and index. 327 $aCover Page; Half-Title Page; Title Page; Copyright Page; Contents; Preface; Abbreviations; 1: Introduction to Cryptography; 1.1. The encryption function; 1.1.1. 3DES algorithm; 1.1.2. AES algorithm; 1.1.3. RSA algorithm; 1.1.4. ECC algorithm; 1.2. Hash function; 1.2.1. MD5 algorithm; 1.2.2. SHA algorithm; 1.2.2.1. SHA-1 algorithm; 1.2.2.2. SHA-2 algorithm; 1.2.3. HMAC mechanism; 1.3. Key exchange; 1.3.1. Secret-key generation; 1.3.2. Public key distribution; 2: 802.1x Mechanism; 2.1. General introduction; 2.2. EAPOL protocol; 2.2.1. EAPOL-Start message; 2.2.2. EAPOL-Logoff message 327 $a2.2.3. EAPOL-Key message2.2.4. EAPOL-Encapsulated-ASF-Alert message; 2.2.5. EAPOL-MKA message; 2.2.6. EAPOL-Announcement message; 2.2.7. EAPOL-Announcement-Req message; 2.3. EAP protocol; 2.3.1. EAP-Method Identity; 2.3.2. EAP-Method Notification; 2.3.3. EAP-Method NAK; 2.4. RADIUS protocol; 2.4.1. RADIUS messages; 2.4.1.1. Access-Request message; 2.4.1.2. Access-Challenge message; 2.4.1.3. Access-Accept message; 2.4.1.4. Access-Reject message; 2.4.2. RADIUS attributes; 2.4.2.1. EAP-Message attribute; 2.4.2.2. Message-Authenticator attribute; 2.4.2.3. Password-Retry attribute 327 $a2.4.2.4. User-Name attribute2.4.2.5. User-Password attribute; 2.4.2.6. NAS-IP-Address attribute; 2.4.2.7. NAS-Port attribute; 2.4.2.8. Service-Type attribute; 2.4.2.9. Vendor-Specific attribute; 2.4.2.10. Session-Timeout attribute; 2.4.2.11. Idle-Timeout attribute; 2.4.2.12. Termination-Action attribute; 2.5. Authentication procedures; 2.5.1. EAP-MD5 procedure; 2.5.2. EAP-TLS procedure; 2.5.3. EAP-TTLS procedure; 3: WPA Mechanisms; 3.1. Introduction to Wi-Fi technology; 3.2. Security mechanisms; 3.3. Security policies; 3.4. Key management; 3.4.1. Key hierarchy; 3.4.2. EAPOL-key messages 327 $a3.4.3. Four-way handshake procedure3.4.4. Group key handshake procedure; 3.5. WEP protocol; 3.6. TKIP protocol; 3.7. CCMP protocol; 4: IPSec Mechanism; 4.1. Review of IP protocols; 4.1.1. IPv4 protocol; 4.1.2. IPv6 protocol; 4.2. IPSec architecture; 4.2.1. Security headers; 4.2.1.1. AH extension; 4.2.1.2. ESP extension; 4.2.1.3. Modes; 4.2.2. Security association; 4.2.3. PMTU processing; 4.3. IKEv2 protocol; 4.3.1. Message header; 4.3.2. Blocks; 4.3.2.1. SA block; 4.3.2.2. KE block; 4.3.2.3. IDi and IDr blocks; 4.3.2.4. CERT block; 4.3.2.5. CERTREQ block; 4.3.2.6. The AUTH block 327 $a4.3.2.7. Ni and Nr blocks4.3.2.8. N block; 4.3.2.9. D block; 4.3.2.10. V block; 4.3.2.11. TS block; 4.3.2.12. SK block; 4.3.2.13. CP block; 4.3.2.14. EAP block; 4.3.3. Procedure; 4.3.3.1. IKE_SA_INIT exchange; 4.3.3.2. IKE_AUTH exchange; 4.3.3.3. CREATE_CHILD_SA exchange; 5: SSL, TLS and DTLS Protocols; 5.1. Introduction; 5.2. SSL/TLS protocols; 5.2.1. Record header; 5.2.2. Change_cipher_spec message; 5.2.3. Alert message; 5.2.4. Handshake messages; 5.2.4.1. Hello_request message; 5.2.4.2. Client_hello message; 5.2.4.3. Hello_server message; 5.2.4.4. Certificate message 327 $a5.2.4.5. Server_key_exchange message 330 $a This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying 606 $aComputer networks$xSecurity measures 606 $aComputers$xSecurity 615 0$aComputer networks$xSecurity measures. 615 0$aComputers$xSecurity. 676 $a005.8 700 $aPerez$b Andre$0871906 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910808998003321 996 $aNetwork security$94116256 997 $aUNINA