LEADER 00775nam0-2200265 --450 001 9910757900103321 005 20240124090807.0 100 $a20231123d1989----kmuy0itay5050 ba 101 $aita 102 $aIT 105 $a 001yy 200 1 $aBibliografia degli scritti di e su Felice Battaglia$fFranco Polato 205 $a2. ed 210 $aBologna$cCLUEB$d1989 215 $a283 p.$d22 cm 225 1 $aFilosofia teoretica e filosofia pratica. Testi e studi$v3 676 $a016.195$v12 700 1$aPolato,$bFranco$0455325 801 0$aIT$bUNINA$gREICAT$2UNIMARC 901 $aBK 912 $a9910757900103321 952 $aDFT M10 POLF 01$fFLFBC 959 $aFLFBC 996 $aBibliografia degli scritti di e su Felice Battaglia$93596428 997 $aUNINA LEADER 05044nam 2200637 450 001 9910818299503321 005 20230803220827.0 010 $a1-118-65168-5 010 $a1-118-65173-1 035 $a(CKB)2550000001189686 035 $a(EBL)1598809 035 $a(SSID)ssj0001155393 035 $a(PQKBManifestationID)11624526 035 $a(PQKBTitleCode)TC0001155393 035 $a(PQKBWorkID)11178460 035 $a(PQKB)11122655 035 $a(MiAaPQ)EBC1598809 035 $a(Au-PeEL)EBL1598809 035 $a(CaPaEBR)ebr10829812 035 $a(CaONFJC)MIL568611 035 $a(OCoLC)868965198 035 $a(EXLCZ)992550000001189686 100 $a20140209h20142014 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aCyber security /$fedited by John G. Voeller 210 1$aHoboken, New Jersey :$cJohn Wiley & Sons,$d2014. 210 4$d©2014 215 $a1 online resource (126 p.) 300 $aDescription based upon print version of record. 311 $a1-118-65164-2 311 $a1-306-37360-3 320 $aIncludes bibliographical references and index. 327 $aCover; Title Page; Contents; Preface; Chapter 1 Cyber Security Metrics and Measure; 1.1 Introduction; 1.2 Contrasting Metrics and Measures; 1.3 Selecting Measures to Support Metrics; 1.4 Problems with the Accuracy of Measures; 1.5 Problems with the Selection of Measures; 1.6 Problems with the Use of Measures; 1.7 Common Vulnerability Scoring System (CVSS); 1.8 Research Directions; References; Further Reading; Chapter 2 Multilevel Security; 2.1 Introduction; 2.2 Background; 2.3 Multilevel Security Policies; 2.3.1 Confinement; 2.3.2 Supporting Policies; 2.3.3 Trusted Subjects 327 $a2.4 Enforcement of Multilevel Security Policies2.4.1 Design Approaches; 2.4.2 Threats to MLS Systems; 2.4.3 Assurance; 2.4.4 Secure MLS System Development; 2.4.5 Covert Channels; 2.4.6 Object Reuse Considerations; 2.4.7 Target Environment; 2.4.8 Cascade Problem; 2.5 Platforms and Architectures for Multilevel Security; 2.5.1 Use of Applications in MLS Systems; 2.6 Conclusion; References; Chapter 3 Trusted Platforms: The Root of Security; 3.1 Introduction; 3.2 The State of Trusted Computing; 3.2.1 Why Hardware Security?; 3.2.2 Essentials of Trusted Computing; 3.2.3 Extension to Storage 327 $a3.2.4 Biometric Devices as Physical Interface3.2.5 Usage Model; 3.3 International Scope; 3.3.1 Integration; 3.3.2 Trusted Software; 3.3.3 Networking Trusted Platforms; 3.4 Expanding the Ring of Trust; 3.5 Remaining Challenges; References; Further Reading; Chapter 4 Cyber Security Technology Usability and Management; 4.1 Introduction; 4.2 Usability and Security: Current Research; 4.2.1 Improving Existing Security Technologies; 4.3 Systems Management; 4.4 Web Security and Phishing; 4.4.1 Designing New Technologies with Usability in Mind; 4.4.2 Design Guidelines for Building Better Systems 327 $a4.5 Open Challenges and Take-Aways4.6 Conclusions; References; Further Reading; Chapter 5 Security of Distributed, Ubiquitous, and Embedded Computing Platforms; 5.1 Introduction; 5.2 Scientific Overview; 5.2.1 Security Properties; 5.2.2 Constraints on the Design Space; 5.2.3 Solution Approaches; 5.2.4 Physical Layer; 5.2.5 Networking Layers; 5.2.6 Middleware and Applications; 5.3 Global Research and Funding; 5.4 Critical Needs Analysis; 5.5 Research Directions; References; Further Reading; Chapter 6 Advanced Attacker Detection and Understanding with Emerging Honeynet Technologies 327 $a6.1 Honeypot Essentials6.2 Honeypot Risk; Legal and Ethical Issues; 6.3 Honeynet Technologies; 6.3.1 Generation III Honeynet; 6.3.2 Global Distributed Honeynet (GDH); 6.3.3 Honeyclients; 6.3.4 Low-Interaction Malware Collectors; References; Chapter 7 Security of Web Application and Services and Service-Oriented Architectures; 7.1 Introduction; 7.2 SOA Security Challenges; 7.3 Secure Web Services for SOA; 7.3.1 Transport-Based Security; 7.3.2 Message-Based Security; 7.4 Web Service Security Directions; 7.4.1 Federation; 7.4.2 Identity; 7.5 Summary; References 327 $aChapter 8 Industrial Process Control System Security 330 $a Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed. 606 $aComputer networks$xSecurity measures 606 $aCyberspace$xSecurity measures 615 0$aComputer networks$xSecurity measures. 615 0$aCyberspace$xSecurity measures. 676 $a005.8 701 $aVoeller$b John G$0864507 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910818299503321 996 $aCyber security$94096310 997 $aUNINA LEADER 01740nam0 22003373i 450 001 MIL0838955 005 20240906063048.0 010 $a9788821743795 100 $a20140325d2013 ||||0itac50 ba 101 | $aita 102 $ait 181 1$6z01$ai $bxxxe 182 1$6z01$an 200 1 $aDal bilancio d'esercizio al reddito d'impresa$eaggiornato con Legge di stabilità 2013, D.L. sviluppo, liberalizzazioni e semplificazioni, novità interpretative ACE, perdite su crediti, riporto delle perdite, termini di pagamento e interessi di mora, sanatoria irregolarità formali, nuove agevolazioni IRAP, costi da reato, beni concessi ai soci, costi autovetture e leasing$fGuido Vasapolli, Andrea Vasapolli 205 $a20. ed 210 $a[Milanofiori, Assago]$cIPSOA, Gruppo Wolters Kluwer$d2013 215 $aLIX, 3008 p.$d25 cm. 225 | $aContabilità e bilancio 410 0$1001CFI0003560$12001 $aContabilità e bilancio 606 $aAziende$xContabilità$2FIR$3NAPC002098$9I 606 $aBilancio$xLegislazione$2FIR$3NAPC069441$9I 676 $a346.4506648$9DIRITTO DELLE SOCIETA. CONTABILITA. ITALIA$v21 700 1$aVasapolli$b, Guido$3CFIV127834$0411589 701 1$aVasapolli$b, Andrea$3CFIV127836$0411590 801 3$aIT$bIT-NA0079$c20140325 850 $aIT-BN0095 912 $aMIL0838955 950 0$aBiblioteca Centralizzata di Ateneo$d 01LTCAL (S) 3 B 340$e 01S 0090033405 N 1 v.$fZ $h20140325$i20140325$d 01LTCAL (S) 3 B 341$e 01S 0090033415 N (bis 1 v. (2. copia)$fD $h20140325$i20140325 977 $a 01 996 $aDal bilancio d'esercizio al reddito d'impresa$9936190 997 $aUNISANNIO