LEADER 03945nam 2200625 450 001 9910465055703321 005 20200520144314.0 010 $a90-04-25718-7 024 7 $a10.1163/9789004257184 035 $a(CKB)3710000000078115 035 $a(EBL)1579892 035 $a(OCoLC)865657131 035 $a(SSID)ssj0001080508 035 $a(PQKBManifestationID)11568347 035 $a(PQKBTitleCode)TC0001080508 035 $a(PQKBWorkID)11069675 035 $a(PQKB)11649774 035 $a(MiAaPQ)EBC1579892 035 $a(nllekb)BRILL9789004257184 035 $a(PPN)178907324 035 $a(Au-PeEL)EBL1579892 035 $a(CaPaEBR)ebr10819087 035 $a(CaONFJC)MIL551099 035 $a(EXLCZ)993710000000078115 100 $a20140103d2013 uy 0 101 0 $aspa 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aGeweld in de West $eeen militaire geschiedenis van de Nederlandse Atlantische wereld, 1600-1800 /$fonder redactie van Victor Enthoven, Henk den Heijer, Han Jordaan 210 1$aLeiden, Netherlands :$cBrill,$d2013. 210 4$d©2013 215 $a1 online resource (364 p.) 225 0 $aCaribbean series,$x0921-9781 ;$vVolume 33 300 $aDescription based upon print version of record. 311 $a90-04-24626-6 320 $aIncludes bibliographical references and index. 327 $tPreliminary Material -- $tInleiding /$rVictor Enthoven , Henk den Heijer and Han Jordaan -- $t1. De Nederlandse Atlantische wereld in militaire context, 1585-1800 /$rVictor Enthoven , Henk den Heijer and Han Jordaan -- $t2. Wapenvolk in een wingewest: de slavenkolonie Suriname, 1667-1799 /$rJean Jacques Vrij -- $t3. Krijgsvolk in Elmina: Asafo, garnizoen en Tapoeyerkwartier, 1700-1815 /$rNatalie Everts -- $t4. De vrijen en de Curaçaose defensie, 1791-1800 /$rHan Jordaan -- $t5. De binnenlandse oorlogen in Suriname in de achttiende eeuw /$rWim Hoogbergen -- $t6. ?Wij beleeven hier droevige tyden? /$rMarjoleine Kars -- $t7. Het ?groot desseyn? en de aanval op Elmina in 1625 /$rHenk den Heijer -- $t8. ?Sijt ghekommandeert te zeijlen na de Kust van Ghenee? /$rAdri P. van Vliet -- $t9. Nederlands-Braziliaans militair inlichtingenwerk van de West-Indische Compagnie, 1629-1654 /$rBenjamin N. Teensma -- $t10. Marteling, muiterij en beeldenstorm /$rWim Klooster -- $tOver de auteurs /$rVictor Enthoven , Henk den Heijer and Han Jordaan -- $tRegister van persoons-, scheeps- en geografische namen /$rVictor Enthoven , Henk den Heijer and Han Jordaan. 330 $aIn Geweld in de West bieden tien auteurs onder redactie van Victor Enthoven, Henk den Heijer en Han Jordaan een overzicht van het Nederlandse militaire optreden in het Atlantische gebied tussen 1600 en 1800. De verovering van Indiaanse gebieden, de strijd tussen rivaliserende Europese machten en de gewelddadige slavenhandel zijn diep verankerd in de Atlantische geschiedenis. Ook Nederland heeft daaraan zijn steentje bijgedragen, maar daar is weinig over bekend. In dit boek worden diverse aspecten van die militaire aanwezigheid belicht. Zo wordt de inzet van niet-Nederlandse strijdkrachten overzee beschreven en wordt ingegaan op gewelddadige excessen die zich hebben afgespeeld. De thema?s militaire organisaties, militaire expedities en militaire cultuur vormen het hart van deze Atlantische studie. 410 0$aCaribbean Series$v33. 607 $aAmerica$xHistory, Military 607 $aAmerica$xColonization$xHistory 607 $aNetherlands$xColonies$zAmerica$xHistory 607 $aNetherlands$xHistory, Military$y17th century 607 $aNetherlands$xHistory, Military$y18th century 608 $aElectronic books. 676 $a305.80097 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910465055703321 996 $aGeweld in de West$92210199 997 $aUNINA LEADER 05629nam 2200781 a 450 001 9910815238203321 005 20240313143318.0 010 $a9781118577882 010 $a1118577884 010 $a9781118577981 010 $a1118577981 010 $a9781118577813 010 $a1118577817 010 $a9781299186675 010 $a129918667X 035 $a(CKB)2550000001005868 035 $a(EBL)1124007 035 $a(OCoLC)828299039 035 $a(SSID)ssj0000855368 035 $a(PQKBManifestationID)11478847 035 $a(PQKBTitleCode)TC0000855368 035 $a(PQKBWorkID)10929828 035 $a(PQKB)11143089 035 $a(MiAaPQ)EBC1124007 035 $a(Au-PeEL)EBL1124007 035 $a(CaPaEBR)ebr10658477 035 $a(CaONFJC)MIL449917 035 $a(OCoLC)812570967 035 $a(FINmELB)ELB178790 035 $a(Perlego)1000478 035 $a(EXLCZ)992550000001005868 100 $a20121012d2013 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aMobile access safety $ebeyond BYOD /$fDominique Assing, Ste?phane Cale? 205 $a1st ed. 210 $aHoboken, N.J. $cISTE Ltd./John Wiley and Sons Inc.$d2013 215 $a1 online resource (248 p.) 225 0$aNetworks and telecommunications series 300 $aDescription based upon print version of record. 311 08$a9781848214354 311 08$a1848214359 320 $aIncludes bibliographical references and index. 327 $aTitle Page; Contents; Introduction; Chapter1. An Ordinary Day in the Life of Mr. Rowley, or the Dangers of Virtualization and Mobility; 1.1. A busy day; 1.2. The ups and downs of the day; 1.3. What actually happened?; Chapter 2. Threats and Attacks; 2.1. Reconnaissance phase; 2.1.1. Passive mode information gathering techniques; 2.1.2. Active mode information gathering techniques; 2.2. Identity/authentication attack; 2.2.1. ARP spoofing; 2.2.2. IP spoofing; 2.2.3. Connection hijacking; 2.2.4. Man in the middle; 2.2.5. DNS spoofing; 2.2.6. Replay attack; 2.2.7. Rebound intrusion 327 $a2.2.8. Password hacking2.2.9. The insecurity of SSL/TLS; 2.3. Confidentiality attack; 2.3.1. Espionage software; 2.3.2. Trojans; 2.3.3. Sniffing; 2.3.4. Cracking encrypted data; 2.4. Availability attack; 2.4.1. ICMP Flood; 2.4.2. SYN Flood; 2.4.3. Smurfing; 2.4.4. Log Flood; 2.4.5. Worms; 2.5. Attack on software integrity; 2.6. BYOD: mixed-genre threats and attacks; 2.7. Interception of GSM/GPRS/EDGE communications; Chapter 3. Technological Countermeasures; 3.1. Prevention; 3.1.1. Protection of mobile equipment; 3.1.2. Data protection; 3.2. Detection; 3.2.1. Systems of intrusion detection 327 $a3.2.2. Honeypot3.2.3. Management and supervision tools; 3.3. Reaction; 3.3.1. Firewall; 3.3.2. Reverse proxy; 3.3.3. Antivirus software; 3.3.4. Antivirus software: an essential building block but in need of completion; 3.4. Organizing the information system's security; 3.4.1. What is security organization?; 3.4.2. Quality of security, or the attraction of ISMS; Chapter 4. Technological Countermeasures for Remote Access; 4.1. Remote connection solutions; 4.1.1. Historic solutions; 4.1.2. Desktop sharing solutions; 4.1.3. Publication on the Internet 327 $a4.1.4. Virtual Private Network (VPN) solutions4.2. Control of remote access; 4.2.1. Identification and authentication; 4.2.2. Unique authentication; 4.3. Architecture of remote access solutions; 4.3.1. Securing the infrastructure; 4.3.2. Load balancing/redundancy; 4.4. Control of conformity of the VPN infrastructure; 4.5. Control of network admission; 4.5.1. Control of network access; 4.5.2. ESCV (Endpoint Security Compliancy Verification); 4.5.3. Mobile NAC29; Chapter 5. What Should Have Been Done to Make Sure Mr Rowley's Day Really Was Ordinary; 5.1. The attack at Mr Rowley's house 327 $a5.1.1. Securing Mr Rowley's PC5.1.2. Securing the organizational level; 5.1.3. Detection at the organizational level; 5.1.4. A little bit of prevention; 5.2. The attack at the airport VIP lounge while on the move; 5.3. The attack at the cafe?; 5.4. The attack in the airport VIP lounge during Mr Rowley's return journey; 5.5. The loss of a smartphone and access to confidential data; 5.6. Summary of the different security solutions that should have been implemented; Conclusion; APPENDICES; Appendix 1; Appendix 2; Bibliography; Index 330 $a Over recent years, the amount of mobile equipment that needs to be connected to corporate networks remotely (smartphones, laptops, etc.) has increased rapidly. Innovative development perspectives and new tendencies such as BYOD (bring your own device) are exposing business information systems more than ever to various compromising threats. The safety control of remote access has become a strategic issue for all companies. This book reviews all the threats weighing on these remote access points, as well as the existing standards and specific countermeasures to protect companies, from both th 410 0$aISTE 606 $aComputer networks$xRemote access 606 $aComputer networks$xSecurity measures 615 0$aComputer networks$xRemote access. 615 0$aComputer networks$xSecurity measures. 676 $a005.8 676 $a621.384 700 $aAssing$b Dominique$01717582 701 $aCale?$b Ste?phane$01717583 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910815238203321 996 $aMobile access safety$94113935 997 $aUNINA LEADER 00964nam0 22002531i 450 001 UON00411415 005 20231205104742.320 100 $a20121008d1927 |0itac50 ba 101 $afre 102 $aFR 105 $a|||| ||||| 200 1 $aˆLes ‰colonies françaises$el'Indochine$fP. Desfeuilles 210 $aParis$cEditions Pierre Roger$d1927 215 $a96 p.$d 19 cm. 606 $aFrancia$x Politica coloniale$3UONC082435$2FI 620 $aFR$dParis$3UONL002984 700 1$aDESFEUILLES$bP.$3UONV209883$0708864 712 $aEditions Pierre Roger$3UONV279569$4650 801 $aIT$bSOL$c20260123$gRICA 899 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO E ARCHIVIO STORICO$2UONSI 912 $aUON00411415 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO E ARCHIVIO STORICO$dSI EUR D D 0109 $eSI MR 8460/1 5 0109 996 $aColonies françaises$91341101 997 $aUNIOR