LEADER 00775nam0-22002651i-450- 001 990003864540403321 035 $a000386454 035 $aFED01000386454 035 $a(Aleph)000386454FED01 035 $a000386454 100 $a19960715d2000----km-y0itay50------ba 101 0 $aITA 102 $aIT 200 1 $aEltsin$eDimissioni o licenziamento?$fdi Gian Paolo Caselli, Gabriele Pastrello 210 $d2000 225 1 $aMateriali di discussione$fDipartimento di economia politica. Università di Modena$v320 700 1$aCaselli,$bGian Paolo$0119821 701 1$aPastrello,$bGabriele$0128699 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990003864540403321 952 $aPaper$fSES 959 $aSES 996 $aEltsin$9514669 997 $aUNINA LEADER 01549nam--2200397---450- 001 990000897030203316 010 $a88-13-19402-1 035 $a0089703 035 $aUSA010089703 035 $a(ALEPH)000089703USA01 035 $a0089703 100 $a20020123d1995----km-y0itay0103----ba 101 $aita 102 $aIT 105 $a||||||||001yy 200 1 $aStrategie d'impresa$el'analisi dell'ambiente competitivo di concezione moderna$fAlfonso Siano 210 $aPadova$cCEDAM$d1995 215 $aX, 171 p.$d24 cm 225 $aCollana di studi di tecnica aziendale$fUniversità a degli studi di Roma "La Sapienza", Facoltà di economia e commercio, Istituto di economia e tecnica delle imprese industriali, commerciali e di pubblicà utilità$v23 410 $12001$aCollana di studi di tecnica aziendale$fUniversità a degli studi di Roma "La Sapienza", Facoltà di economia e commercio, Istituto di economia e tecnica delle imprese industriali, commerciali e di pubblicà utilità$v23 461 1$1001-------$12001 606 0 $aAziende$xGestione 606 0 $aAziende$xCompetitività 676 $a658.4 700 1$aSIANO,$bAlfonso$0145679 801 0$aIT$bsalbc$gISBD 912 $a990000897030203316 951 $aX 20 L 23$b8095 G$cX 20 L 959 $aBK 969 $aGIU 979 $aPATTY$b90$c20020123$lUSA01$h1218 979 $c20020403$lUSA01$h1733 979 $aPATRY$b90$c20040406$lUSA01$h1702 979 $aCHIARA$b90$c20141124$lUSA01$h1414 996 $aStrategie d'impresa$963394 997 $aUNISA LEADER 02978nam 2200613Ia 450 001 9910780012903321 005 20230120003754.0 010 $a1-281-03580-7 010 $a9786611035808 010 $a0-08-048829-3 010 $a1-59749-029-6 035 $a(CKB)111056487032394 035 $a(EBL)225321 035 $a(OCoLC)475932201 035 $a(SSID)ssj0000276735 035 $a(PQKBManifestationID)11228645 035 $a(PQKBTitleCode)TC0000276735 035 $a(PQKBWorkID)10232980 035 $a(PQKB)11419417 035 $a(Au-PeEL)EBL225321 035 $a(CaPaEBR)ebr10075669 035 $a(CaONFJC)MIL103580 035 $a(CaSebORM)9781931836203 035 $a(MiAaPQ)EBC225321 035 $a(EXLCZ)99111056487032394 100 $a20040112d2005 uh 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aAggressive network self-defense$b[electronic resource] /$fNeil R. Wyler 205 $a1st edition 210 $aRockland, MA $cSyngress Publishing$dc2005 215 $a1 online resource (417 p.) 300 $aDescription based upon print version of record. 311 $a1-931836-20-5 320 $aIncludes bibliographical references and index. 327 $aCover; Contents; Foreword; Fictionalized Cases of Network Strike-Back, Self-Defense, and Revenge; PDA Perils: Revenge from the Palm of Your Hand; The Case of a WLAN Attacker: In the Booth; MD5: Exploiting the Generous; A VPN Victim's Story: Jack's Smirking Revenge; Network Protection: Cyber-Attacks Meet Physical Response; Network Insecurity: Taking Patch Management to the Masses; The Fight for the Primulus Network: Yaseen vs Nathan; Undermining the Network: A Breach of Trust; ADAM: Active Defense Algorithm and Model; Defending Your Right to Defend; MD5 to Be Considered Harmful Someday 327 $aWhen the Tables Turn: Passive Strike-BackIndex; Related Titles 330 $aOver the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are extremely controversial, many security professionals are reaching into the dark side of their tool box to identify, target, and suppress their adversaries. This book will provide a detailed analysis of the most timely and dangerous attack vectors targeted at operating systems, applications, and critical infrastructure and the cutting-edge counter-measures used to nullify the actions of an attacking, crimin 606 $aComputer security 606 $aInternet$xSecurity measures 615 0$aComputer security. 615 0$aInternet$xSecurity measures. 676 $a005.8 700 $aWyler$b Neil R$01526289 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910780012903321 996 $aAggressive network self-defense$93768238 997 $aUNINA