LEADER 00949cam0 2200265 450 001 E600200068146 005 20101029080051.0 100 $a20101029d1948 |||||ita|0103 ba 101 $aeng 102 $aIT 200 1 $aPossessory remedies in Roman vulgar law$fErnst Levy 210 $aMilano$cVita e Pensiero$d1948 215 $ap. 109-143$d24 cm 300 $a(mm) 300 $aEstr. da: Scritti in onore di Contardo Ferrini pubblicati in occasione della sua beatificazione 700 1$aLevy$b, Ernst$3A600200055208$4070$0237513 801 0$aIT$bUNISOB$c20101029$gRICA 850 $aUNISOB 852 $aUNISOB$jFondo|Casavola|Opusc$m151586 912 $aE600200068146 940 $aM 102 Monografia moderna SBN 941 $aM 957 $b1165$gSi$d151586$hCasavola$rdono$1menle$2UNISOB$3UNISOB$420101029082351.0$520101029083005.0$6menle$aFondo|Casavola|Opusc 996 $aPossessory remedies in Roman vulgar law$91699841 997 $aUNISOB LEADER 00843nam a2200229 i 4500 001 991004333538407536 005 20240709100213.0 008 240709s1961 it r 001 f ita d 040 $aBibl. Dip.le Aggr. Scienze Umane e Sociali$bita$cSocioculturale Scs 041 0 $aita 082 04$a853.91$223 100 1 $aFratelli, Arnaldo$0468415 245 10$aDonne d'amore /$cArnaldo Fratelli 260 $a[S.l.] :$bBompiani,$c1961 300 $a531 p. ;$c21 cm 500 $aContiene: Capogiro, La donna segreta, Clara fra i lupi nelle edizioni originali rispettivamente del 1956, 1961 e 1961. 505 00$tCapogiro. -$g6. ed. -$g1956. -$g5-222 p. 505 00$tLa donna segreta. -$g1961. -$g231-308 p. 505 00$tClara fra i lupi. -$g1961. -$g313-531 p. 912 $a991004333538407536 996 $aDonne d'amore$94169995 997 $aUNISALENTO LEADER 08153oam 2200781 a 450 001 9910962521303321 005 20200520144314.0 010 $a9798400636509 010 $a9786610373864 010 $a9781280373862 010 $a1280373865 010 $a9780313016196 010 $a0313016194 024 7 $a10.5040/9798400636509 035 $a(CKB)111087026965102 035 $a(OCoLC)614602171 035 $a(CaPaEBR)ebrary10005662 035 $a(SSID)ssj0000134306 035 $a(PQKBManifestationID)11134111 035 $a(PQKBTitleCode)TC0000134306 035 $a(PQKBWorkID)10056441 035 $a(PQKB)11752631 035 $a(Au-PeEL)EBL3000517 035 $a(CaPaEBR)ebr10005662 035 $a(OCoLC)847167752 035 $a(MiAaPQ)EBC3000517 035 $a(OCoLC)1034908783 035 $a(DLC)BP9798400636509BC 035 $a(Perlego)4202649 035 $a(EXLCZ)99111087026965102 100 $a20010614e20012024 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCyber-threats, information warfare, and critical infrastructure protection $edefending the U.S. homeland /$fAnthony H. Cordesman with Justin G. Cordesman 205 $a1st ed. 210 1$aWestport, Conn. :$cPraeger,$d2001. 210 2$aLondon :$cBloomsbury Publishing,$d2024 215 $a1 online resource (192 p.) 300 $a"Published in cooperation with the Center for Strategic and International Studies, Washington, D.C." 311 08$a9780275974237 311 08$a0275974235 320 $aIncludes bibliographical references. 327 $aCover -- Cyber-threats, Information Warfare, and Critical Infrastructure Protection -- Contents -- Acknowledgments -- Chapter 1 The Changing Nature of Critical Infrastructure Protection -- THE PROBLEM OF EVOLVING TECHNOLOGY -- THE UNCERTAIN BALANCE OF RISKS AND NON-RISKS IN CYBER-ATTACKS -- The Disconnect between Cyber-defense and Cyber-offense -- The Lack of Credible Risk and Vulnerability Assessments -- GOVERNMENTAL AND PRIVATE SECTOR EFFORTS TO RESPOND -- Chapter 2 Threat Assessment -- THE PRESIDENT'S COMMISSION ON CRITICAL INFRASTRUCTURE PROTECTION CHARACTERIZATION OF THE THREAT -- THE NATIONAL INFRASTRUCTURE PROTECTION CENTER'S (NIPC) VIEW OF THE THREAT -- INTELLIGENCE COMMUNITY ASSESSMENTS OF THE THREAT -- CIA Testimony on the Threat -- National Intelligence Council's Estimate of the Threat -- Incidents of "Cyber-warfare": The Kosovo Crisis -- Serbia's Role in Information Warfare -- NATO's Role in Information Warfare -- Is Information Warfare and Retaliation Legal and Worth Its Costs? -- Lower-Level Incidents of "Cyber-warfare" -- Moonlight Maze -- Solar Sunrise -- Rome Labs Incident -- THE COMPUTER SECURITY INSTITUTE'S SURVEY OF THE THREAT -- COMPUTER EMERGENCY RESPONSE TEAM'S (CERT) ASSESSMENT OF THREAT -- CHALLENGES IN IMPROVING THE ASSESSMENT OF THE THREAT -- Chapter 3 Evolving U.S. Policy and Response -- THE BEGINNINGS: THE COMPUTER SECURITY ACT AND CLINGER-COHEN ACT -- THE FEDERAL GOVERNMENT REDEFINES CRITICAL INFRASTRUCTURE AND AGENCY RESPONSIBILITIES -- Executive Order 13010 -- The President's Commission on Critical Infrastructure Protection -- Presidential Decision Directive-63 (PDD-63) -- Lead Agencies for Sector Liaison -- Lead Agencies for Special Functions -- A New Structure for Interagency Coordination -- National Infrastructure Protection Center (NIPC) -- Information Sharing and Analysis Center (ISAC). 327 $aNational Infrastructure Assurance Council -- National Infrastructure Assurance Plan -- Studies and Research -- Cooperation with the Private and Civil Sectors -- Annual Report on Implementation -- NATIONAL PLAN FOR INFORMATION SYSTEMS PROTECTION -- National Plan for Information Systems Protection, Version One -- GAO Comments on the National Plan for Information Systems Protection -- Oplan 3600 -- THE SUCCESS OF THE FEDERAL GOVERNMENT EFFORT TO DATE -- Chapter 4 Analyzing Federal Critical Infrastructure Programs by Department and Agency -- THE NATIONAL PLAN FOR INFORMATION SYSTEMS ESTIMATE -- THE OMB ANALYSIS -- ANNUAL REPORT TO CONGRESS ON COMBATING TERRORISM -- Government-wide Spending on CIP -- EFFORTS BY FEDERAL AGENCIES -- Department of Agriculture -- Department of Commerce -- Critical Infrastructure Assurance Office -- Department of Energy -- Environmental Protection Agency and GAO Audits -- Health and Human Services -- Department of Interior -- Department of Justice -- NASA -- GAO Assessments of NASA Information Security -- NATIONAL SCIENCE FOUNDATION -- NATIONAL SECURITY COMMUNITY -- The Role of the Department of Defense -- Patterns of Attack and Response -- Major DoD Cyber-defense Programs -- GAO Critiques of DoD Efforts: The 1996 Study -- The GAO's 1999 Recommendations -- DoD Progress in Addressing Security Weaknesses -- Cyber and Information Warfare and the Role of the Intelligence Community -- Total Spending on National Security Activity -- Department of State -- Department of Transportation -- Department of Treasury -- Department of Veterans Affairs -- Chapter 5 Assessments of Effectiveness -- INDEPENDENT U.S. GOVERNMENT EFFORTS TO ASSESS RISK, COST, AND BENEFITS: GAO TESTIMONY OF OCTOBER 6, 1999 -- Management Recommendations Within Brock's Testimony. 327 $aINDEPENDENT U.S. GOVERNMENT EFFORTS TO ASSESS RISK, COST, AND BENEFITS: GAO TESTIMONY OF MARCH 29, 2000 -- Weaknesses in Controls -- Raise Awareness -- Implement Software Patches -- Routinely Use Automated Tools to Monitor Security -- Identify and Propagate Pockets of Excellence -- Focus on the Most Common Vulnerabilities First -- Enforce a Strong Management Approach -- PRELIMINARY ANALYSIS OF GAO FINDINGS -- OTHER EFFORTS TO ASSESS RISK, COST, AND BENEFITS -- TECHNICAL RISKS, TESTS, AND EVALUATIONS OF IW PROGRAMS -- Chapter 6 Role of State and Local Governments -- Chapter 7 Role of Private Industry -- Chapter 8 Lessons from Other Nations: International Vulnerability -- Chapter 9 Conclusions and Recommendations -- Notes -- About the Authors. 330 8 $aDuring the last two decades, the infrastructure of the U.S. economy has undergone a fundamental set of changes. It has steadily increased its reliance on its service sector and high-technology economy. The U.S. has come to depend on computers, electronic data storage and transfers, and highly integrated communications networks. The result is the rapid development of a new form of critical infrastructure--and one that is exceedingly vulnerable to a new family of threats, loosely grouped together as information warfare. This detailed volume examines these threats and the evolving U.S. policy response. After examining the dangers posed by information warfare and efforts at threat assessment, Cordesman considers the growing policy response on the part of various federal agencies, state and local governments, and the private sector. The changing nature of the threats is leading these actors to reassess the role they must play in critical infrastructure protection. Government at all levels, industry, and even friendly and neutral foreign governments are learning that an effective response requires coordination in deterrence, defense, and counterattack. 606 $aElectronic data processing$xSecurity measures$zUnited States 606 $aTelecommunication$xDefense measures$zUnited States 606 $aComputer networks$xSecurity measures$zUnited States 606 $aInformation warfare$zUnited States 615 0$aElectronic data processing$xSecurity measures 615 0$aTelecommunication$xDefense measures 615 0$aComputer networks$xSecurity measures 615 0$aInformation warfare 676 $a005.8 700 $aCordesman$b Anthony H$0567761 701 $aCordesman$b Justin G$01798490 712 02$aCenter for Strategic and International Studies (Washington, D.C.) 801 0$bDLC 801 1$bDLC 801 2$bDLC 906 $aBOOK 912 $a9910962521303321 996 $aCyber-threats, information warfare, and critical infrastructure protection$94341296 997 $aUNINA