top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Attribute-Based Access Control
Attribute-Based Access Control
Autore Hu Vincent
Pubbl/distr/stampa Boston, Massachusetts : , : Artech House, , 2018
Descrizione fisica 1 online resource (285 pages)
Disciplina 005.8
Collana Artech House information security and privacy series
Soggetto topico Computer security
Computers - Access control
Computer networks - Access control
Soggetto genere / forma Electronic books.
ISBN 1-63081-496-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Attribute-Based Access Control; Contents; Preface; Acknowledgements; Intended Audience; 1 Introduction; 1.1 Overview; 1.2 Evolution and Brief History of Access Control; 1.2.1 Academic Contributions; 1.2.2 Military Concerns; 1.2.3 Bell and LaPadula Security Model; 1.2.5 Discontent; 1.2.6 Role-based Access Control; 1.2.7 Emergence of ABAC; References; 2 Access Control Models and Approaches; 2.1 Introduction; 2.2 Terminology; 2.3 Access Control Models and Policies; 2.4 Policy Enforcement; 2.5 Discretionary Access Control; 2.6 Mandatory Access Control Models; 2.6.1 Multilevel Security
2.6.2 Chinese Wall Policy and Model2.6.3 Role-Based Access Control; References; 3 Attribute Based Access Control; 3.1 Introduction; 3.2 ABAC Architectures and Functional Components; 3.3 Logical-Formula and Enumerated ABAC Policy Models; 3.4 ABAC Model-Applications Primatives; 3.5 Hierarchical Group and Attribute-Based Access Control; 3.6 Label-Based ABAC Model with Enumerated Authorization Policy; 3.7 Hybrid Designs Combining Attributes with Roles; 3.8 ABAC and RBAC Hybrid Models; 3.9 Complexities of RBAC Role Structures; 3.10 Complexities of ABAC Rule Sets; 3.11 Dynamic Roles
3.12 Role Centric Structure3.13 Attribute Centric Structure; 3.14 Conclusion; References; 4 ABAC Deployment Using XACML; 4.1 Introduction; 4.2 Business and Technical Drivers for XACML; 4.3 XACML Standard-Components and Their Interactions; 4.3.1 XACML Policy Language Model; 4.3.2 XACML Context (Request and Response); 4.3.3 XACML Framework (Data Flow Model); 4.4 ABAC Deployment Using XACML; 4.4.1 Access Policy Formulation and Encoding; 4.4.2 Request/Response Formulation; 4.4.3 Policy Evaluation and Access Decision; 4.5 Implementation of XACML Framework; 4.5.1 Attribute Support and Management
4.5.2 Delegation4.6 Review and Analysis; References; Appendix A; 5 Next Generation Access Control; 5.1 Introduction; 5.2 Policy and Attribute Elements; 5.3 Relations; 5.3.1 Assignments and Associations; 5.3.2 Prohibitions Denials; 5.3.3 Obligations; 5.4 NGAC Decision Function; 5.5 Delegation of Access Rights; 5.6 NGAC Administrative Commands and Routines; 5.7 Arbitrary Data Service Operations; 5.8 NGAC Functional Architecture; 5.8.1 Resource Access; 5.8.2 Administrative Access; 5.9 Conclusion; References; 6 ABAC Policy Verifications and Testing; 6.1 Introduction; 6.2 ABAC Policy Classes
6.2.1 Static Policy Class6.2.2 Dynamic Policy Class; 6.2.3 Historical Policy Class; 6.3 Access Control Safety and Faults; 6.4 Verification Approaches; 6.4.1 Model Verification; 6.4.2 Coverage and Confinements Semantic Faults; 6.4.3 Property Confinement Checking; 6.4.4 Implementation Test; 6.5 Implementation Considerations*; 6.6 Verification Tools; 6.6.1 Multiterminal Binary Decision Diagrams; 6.6.2 ACPT; 6.6.3 Formal Methods; 6.7 Conclusion; References; 7 Attribute Consideration; 7.1 Introduction; 7.2 ABAC Attributes; 7.3 Consideration Elements; 7.4 Preparation Consideration
Record Nr. UNINA-9910511368203321
Hu Vincent  
Boston, Massachusetts : , : Artech House, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Attribute-Based Access Control
Attribute-Based Access Control
Autore Hu Vincent
Pubbl/distr/stampa Boston, Massachusetts : , : Artech House, , 2018
Descrizione fisica 1 online resource (285 pages)
Disciplina 005.8
Collana Artech House information security and privacy series
Soggetto topico Computer security
Computers - Access control
Computer networks - Access control
ISBN 1-63081-496-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Attribute-Based Access Control; Contents; Preface; Acknowledgements; Intended Audience; 1 Introduction; 1.1 Overview; 1.2 Evolution and Brief History of Access Control; 1.2.1 Academic Contributions; 1.2.2 Military Concerns; 1.2.3 Bell and LaPadula Security Model; 1.2.5 Discontent; 1.2.6 Role-based Access Control; 1.2.7 Emergence of ABAC; References; 2 Access Control Models and Approaches; 2.1 Introduction; 2.2 Terminology; 2.3 Access Control Models and Policies; 2.4 Policy Enforcement; 2.5 Discretionary Access Control; 2.6 Mandatory Access Control Models; 2.6.1 Multilevel Security
2.6.2 Chinese Wall Policy and Model2.6.3 Role-Based Access Control; References; 3 Attribute Based Access Control; 3.1 Introduction; 3.2 ABAC Architectures and Functional Components; 3.3 Logical-Formula and Enumerated ABAC Policy Models; 3.4 ABAC Model-Applications Primatives; 3.5 Hierarchical Group and Attribute-Based Access Control; 3.6 Label-Based ABAC Model with Enumerated Authorization Policy; 3.7 Hybrid Designs Combining Attributes with Roles; 3.8 ABAC and RBAC Hybrid Models; 3.9 Complexities of RBAC Role Structures; 3.10 Complexities of ABAC Rule Sets; 3.11 Dynamic Roles
3.12 Role Centric Structure3.13 Attribute Centric Structure; 3.14 Conclusion; References; 4 ABAC Deployment Using XACML; 4.1 Introduction; 4.2 Business and Technical Drivers for XACML; 4.3 XACML Standard-Components and Their Interactions; 4.3.1 XACML Policy Language Model; 4.3.2 XACML Context (Request and Response); 4.3.3 XACML Framework (Data Flow Model); 4.4 ABAC Deployment Using XACML; 4.4.1 Access Policy Formulation and Encoding; 4.4.2 Request/Response Formulation; 4.4.3 Policy Evaluation and Access Decision; 4.5 Implementation of XACML Framework; 4.5.1 Attribute Support and Management
4.5.2 Delegation4.6 Review and Analysis; References; Appendix A; 5 Next Generation Access Control; 5.1 Introduction; 5.2 Policy and Attribute Elements; 5.3 Relations; 5.3.1 Assignments and Associations; 5.3.2 Prohibitions Denials; 5.3.3 Obligations; 5.4 NGAC Decision Function; 5.5 Delegation of Access Rights; 5.6 NGAC Administrative Commands and Routines; 5.7 Arbitrary Data Service Operations; 5.8 NGAC Functional Architecture; 5.8.1 Resource Access; 5.8.2 Administrative Access; 5.9 Conclusion; References; 6 ABAC Policy Verifications and Testing; 6.1 Introduction; 6.2 ABAC Policy Classes
6.2.1 Static Policy Class6.2.2 Dynamic Policy Class; 6.2.3 Historical Policy Class; 6.3 Access Control Safety and Faults; 6.4 Verification Approaches; 6.4.1 Model Verification; 6.4.2 Coverage and Confinements Semantic Faults; 6.4.3 Property Confinement Checking; 6.4.4 Implementation Test; 6.5 Implementation Considerations*; 6.6 Verification Tools; 6.6.1 Multiterminal Binary Decision Diagrams; 6.6.2 ACPT; 6.6.3 Formal Methods; 6.7 Conclusion; References; 7 Attribute Consideration; 7.1 Introduction; 7.2 ABAC Attributes; 7.3 Consideration Elements; 7.4 Preparation Consideration
Record Nr. UNINA-9910796811703321
Hu Vincent  
Boston, Massachusetts : , : Artech House, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Attribute-Based Access Control
Attribute-Based Access Control
Autore Hu Vincent
Pubbl/distr/stampa Boston, Massachusetts : , : Artech House, , 2018
Descrizione fisica 1 online resource (285 pages)
Disciplina 005.8
Collana Artech House information security and privacy series
Soggetto topico Computer security
Computers - Access control
Computer networks - Access control
ISBN 1-63081-496-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Attribute-Based Access Control; Contents; Preface; Acknowledgements; Intended Audience; 1 Introduction; 1.1 Overview; 1.2 Evolution and Brief History of Access Control; 1.2.1 Academic Contributions; 1.2.2 Military Concerns; 1.2.3 Bell and LaPadula Security Model; 1.2.5 Discontent; 1.2.6 Role-based Access Control; 1.2.7 Emergence of ABAC; References; 2 Access Control Models and Approaches; 2.1 Introduction; 2.2 Terminology; 2.3 Access Control Models and Policies; 2.4 Policy Enforcement; 2.5 Discretionary Access Control; 2.6 Mandatory Access Control Models; 2.6.1 Multilevel Security
2.6.2 Chinese Wall Policy and Model2.6.3 Role-Based Access Control; References; 3 Attribute Based Access Control; 3.1 Introduction; 3.2 ABAC Architectures and Functional Components; 3.3 Logical-Formula and Enumerated ABAC Policy Models; 3.4 ABAC Model-Applications Primatives; 3.5 Hierarchical Group and Attribute-Based Access Control; 3.6 Label-Based ABAC Model with Enumerated Authorization Policy; 3.7 Hybrid Designs Combining Attributes with Roles; 3.8 ABAC and RBAC Hybrid Models; 3.9 Complexities of RBAC Role Structures; 3.10 Complexities of ABAC Rule Sets; 3.11 Dynamic Roles
3.12 Role Centric Structure3.13 Attribute Centric Structure; 3.14 Conclusion; References; 4 ABAC Deployment Using XACML; 4.1 Introduction; 4.2 Business and Technical Drivers for XACML; 4.3 XACML Standard-Components and Their Interactions; 4.3.1 XACML Policy Language Model; 4.3.2 XACML Context (Request and Response); 4.3.3 XACML Framework (Data Flow Model); 4.4 ABAC Deployment Using XACML; 4.4.1 Access Policy Formulation and Encoding; 4.4.2 Request/Response Formulation; 4.4.3 Policy Evaluation and Access Decision; 4.5 Implementation of XACML Framework; 4.5.1 Attribute Support and Management
4.5.2 Delegation4.6 Review and Analysis; References; Appendix A; 5 Next Generation Access Control; 5.1 Introduction; 5.2 Policy and Attribute Elements; 5.3 Relations; 5.3.1 Assignments and Associations; 5.3.2 Prohibitions Denials; 5.3.3 Obligations; 5.4 NGAC Decision Function; 5.5 Delegation of Access Rights; 5.6 NGAC Administrative Commands and Routines; 5.7 Arbitrary Data Service Operations; 5.8 NGAC Functional Architecture; 5.8.1 Resource Access; 5.8.2 Administrative Access; 5.9 Conclusion; References; 6 ABAC Policy Verifications and Testing; 6.1 Introduction; 6.2 ABAC Policy Classes
6.2.1 Static Policy Class6.2.2 Dynamic Policy Class; 6.2.3 Historical Policy Class; 6.3 Access Control Safety and Faults; 6.4 Verification Approaches; 6.4.1 Model Verification; 6.4.2 Coverage and Confinements Semantic Faults; 6.4.3 Property Confinement Checking; 6.4.4 Implementation Test; 6.5 Implementation Considerations*; 6.6 Verification Tools; 6.6.1 Multiterminal Binary Decision Diagrams; 6.6.2 ACPT; 6.6.3 Formal Methods; 6.7 Conclusion; References; 7 Attribute Consideration; 7.1 Introduction; 7.2 ABAC Attributes; 7.3 Consideration Elements; 7.4 Preparation Consideration
Record Nr. UNINA-9910809941403321
Hu Vincent  
Boston, Massachusetts : , : Artech House, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
BackTrack 5 wireless penetration testing [[electronic resource] ] : beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 / / Vivek Ramachandran
BackTrack 5 wireless penetration testing [[electronic resource] ] : beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 / / Vivek Ramachandran
Autore Ramachandran Vivek
Pubbl/distr/stampa Birmingham [U.K.], : Packt Pub. Ltd., 2011
Descrizione fisica 1 online resource (220 p.)
Disciplina 005.8
Soggetto topico Computers - Access control
Penetration testing (Computer security)
Computer networks - Security measures - Testing
Soggetto genere / forma Electronic books.
ISBN 1-62198-900-3
1-283-30827-4
9786613308276
1-84951-559-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Author; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1:Wireless Lab Setup; Hardware requirements; Software requirements; Installing BackTrack; Time for action - installing BackTrack; Setting up the access point; Time for action - configuring the access point; Setting up the wireless card; Time for action - configuring your wireless card; Connecting to the access point; Time for action - configuring your wireless card; Summary; Chapter 2:WLAN and ItsInherent Insecurities; Revisiting WLAN frames
Time for action - creating a monitor mode interfaceTime for action - sniffing wireless packets; Time for action - viewing Management, Control, And Data frames; Time for action - sniffing data packets for our network; Time for action - packet injection; Important note on WLAN sniffing and injection; Time for action - experimenting with your Alfa card; Role of regulatory domains in wireless; Time for action - experimenting with your Alfa card; Summary; Chapter 3:Bypassing WLAN Authentication; Hidden SSIDs; Time for action - uncovering hidden SSIDs; MAC filters
Time for action - beating MAC filtersOpen Authentication; Time for action - bypassing Open Authentication; Shared Key Authentication; Time for action - bypassing Shared Authentication; Summary; Chapter 4:WLAN Encryption Flaws; WLAN encryption; WEP encryption; Time for action - cracking WEP; WPA/WPA2; Time for action - cracking WPA-PSK weak passphrase; Speeding up WPA/WPA2 PSK cracking; Time for action - speeding up the cracking process; Decrypting WEP and WPA packets; Time for action - decrypting WEP and WPA packets; Connecting to WEP and WPA networks
Time for action - connecting to a WEP networkTime for action - connecting to a WPA network; Summary; Chapter 5:Attacks on the WLANInfrastructure; Default accounts and credentials on the access point; Time for action - cracking default accounts on the access; points; Denial of service attacks; Time for action - De-Authentication DoS attack; Evil twin and access point MAC spoofing; Time for action - evil twin with MAC spoofing; Rogue access point; Time for action - Rogue access point; Summary; Chapter 6:Attacking the Client; Honeypot and Mis-Association attacks
Time for action - orchestrating a Mis-Association attackCaffe Latte attack; Time for action - conducting the Caffe Latte attack; De-Authentication and Dis-Association Attacks; Time for action - De-Authenticating the client; Hirte attack; Time for action - cracking WEP with the Hirte attack; AP-less WPA-Personal cracking; Time for action - AP-less WPA cracking; Summary; Chapter 7:Advanced WLAN Attacks; Man-in-the-Middle attack; Time for action - Man-in-the-Middle attack; Wireless Eavesdropping using MITM; Time for action - Wireless Eavesdropping; Session Hijacking over wireless
Time for action - Session hijacking over wireless
Record Nr. UNINA-9910457323203321
Ramachandran Vivek  
Birmingham [U.K.], : Packt Pub. Ltd., 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
BackTrack 5 wireless penetration testing [[electronic resource] ] : beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 / / Vivek Ramachandran
BackTrack 5 wireless penetration testing [[electronic resource] ] : beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 / / Vivek Ramachandran
Autore Ramachandran Vivek
Pubbl/distr/stampa Birmingham [U.K.], : Packt Pub. Ltd., 2011
Descrizione fisica 1 online resource (220 p.)
Disciplina 005.8
Soggetto topico Computers - Access control
Penetration testing (Computer security)
Computer networks - Security measures - Testing
ISBN 1-62198-900-3
1-283-30827-4
9786613308276
1-84951-559-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Author; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1:Wireless Lab Setup; Hardware requirements; Software requirements; Installing BackTrack; Time for action - installing BackTrack; Setting up the access point; Time for action - configuring the access point; Setting up the wireless card; Time for action - configuring your wireless card; Connecting to the access point; Time for action - configuring your wireless card; Summary; Chapter 2:WLAN and ItsInherent Insecurities; Revisiting WLAN frames
Time for action - creating a monitor mode interfaceTime for action - sniffing wireless packets; Time for action - viewing Management, Control, And Data frames; Time for action - sniffing data packets for our network; Time for action - packet injection; Important note on WLAN sniffing and injection; Time for action - experimenting with your Alfa card; Role of regulatory domains in wireless; Time for action - experimenting with your Alfa card; Summary; Chapter 3:Bypassing WLAN Authentication; Hidden SSIDs; Time for action - uncovering hidden SSIDs; MAC filters
Time for action - beating MAC filtersOpen Authentication; Time for action - bypassing Open Authentication; Shared Key Authentication; Time for action - bypassing Shared Authentication; Summary; Chapter 4:WLAN Encryption Flaws; WLAN encryption; WEP encryption; Time for action - cracking WEP; WPA/WPA2; Time for action - cracking WPA-PSK weak passphrase; Speeding up WPA/WPA2 PSK cracking; Time for action - speeding up the cracking process; Decrypting WEP and WPA packets; Time for action - decrypting WEP and WPA packets; Connecting to WEP and WPA networks
Time for action - connecting to a WEP networkTime for action - connecting to a WPA network; Summary; Chapter 5:Attacks on the WLANInfrastructure; Default accounts and credentials on the access point; Time for action - cracking default accounts on the access; points; Denial of service attacks; Time for action - De-Authentication DoS attack; Evil twin and access point MAC spoofing; Time for action - evil twin with MAC spoofing; Rogue access point; Time for action - Rogue access point; Summary; Chapter 6:Attacking the Client; Honeypot and Mis-Association attacks
Time for action - orchestrating a Mis-Association attackCaffe Latte attack; Time for action - conducting the Caffe Latte attack; De-Authentication and Dis-Association Attacks; Time for action - De-Authenticating the client; Hirte attack; Time for action - cracking WEP with the Hirte attack; AP-less WPA-Personal cracking; Time for action - AP-less WPA cracking; Summary; Chapter 7:Advanced WLAN Attacks; Man-in-the-Middle attack; Time for action - Man-in-the-Middle attack; Wireless Eavesdropping using MITM; Time for action - Wireless Eavesdropping; Session Hijacking over wireless
Time for action - Session hijacking over wireless
Record Nr. UNINA-9910781707903321
Ramachandran Vivek  
Birmingham [U.K.], : Packt Pub. Ltd., 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
BackTrack 5 wireless penetration testing [[electronic resource] ] : beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 / / Vivek Ramachandran
BackTrack 5 wireless penetration testing [[electronic resource] ] : beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 / / Vivek Ramachandran
Autore Ramachandran Vivek
Edizione [1st ed.]
Pubbl/distr/stampa Birmingham [U.K.], : Packt Pub. Ltd., 2011
Descrizione fisica 1 online resource (220 p.)
Disciplina 005.8
Soggetto topico Computers - Access control
Penetration testing (Computer security)
Computer networks - Security measures - Testing
ISBN 1-62198-900-3
1-283-30827-4
9786613308276
1-84951-559-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Author; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1:Wireless Lab Setup; Hardware requirements; Software requirements; Installing BackTrack; Time for action - installing BackTrack; Setting up the access point; Time for action - configuring the access point; Setting up the wireless card; Time for action - configuring your wireless card; Connecting to the access point; Time for action - configuring your wireless card; Summary; Chapter 2:WLAN and ItsInherent Insecurities; Revisiting WLAN frames
Time for action - creating a monitor mode interfaceTime for action - sniffing wireless packets; Time for action - viewing Management, Control, And Data frames; Time for action - sniffing data packets for our network; Time for action - packet injection; Important note on WLAN sniffing and injection; Time for action - experimenting with your Alfa card; Role of regulatory domains in wireless; Time for action - experimenting with your Alfa card; Summary; Chapter 3:Bypassing WLAN Authentication; Hidden SSIDs; Time for action - uncovering hidden SSIDs; MAC filters
Time for action - beating MAC filtersOpen Authentication; Time for action - bypassing Open Authentication; Shared Key Authentication; Time for action - bypassing Shared Authentication; Summary; Chapter 4:WLAN Encryption Flaws; WLAN encryption; WEP encryption; Time for action - cracking WEP; WPA/WPA2; Time for action - cracking WPA-PSK weak passphrase; Speeding up WPA/WPA2 PSK cracking; Time for action - speeding up the cracking process; Decrypting WEP and WPA packets; Time for action - decrypting WEP and WPA packets; Connecting to WEP and WPA networks
Time for action - connecting to a WEP networkTime for action - connecting to a WPA network; Summary; Chapter 5:Attacks on the WLANInfrastructure; Default accounts and credentials on the access point; Time for action - cracking default accounts on the access; points; Denial of service attacks; Time for action - De-Authentication DoS attack; Evil twin and access point MAC spoofing; Time for action - evil twin with MAC spoofing; Rogue access point; Time for action - Rogue access point; Summary; Chapter 6:Attacking the Client; Honeypot and Mis-Association attacks
Time for action - orchestrating a Mis-Association attackCaffe Latte attack; Time for action - conducting the Caffe Latte attack; De-Authentication and Dis-Association Attacks; Time for action - De-Authenticating the client; Hirte attack; Time for action - cracking WEP with the Hirte attack; AP-less WPA-Personal cracking; Time for action - AP-less WPA cracking; Summary; Chapter 7:Advanced WLAN Attacks; Man-in-the-Middle attack; Time for action - Man-in-the-Middle attack; Wireless Eavesdropping using MITM; Time for action - Wireless Eavesdropping; Session Hijacking over wireless
Time for action - Session hijacking over wireless
Record Nr. UNINA-9910811923003321
Ramachandran Vivek  
Birmingham [U.K.], : Packt Pub. Ltd., 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Botnets and hackers and spam (oh, my!) [[electronic resource]]
Botnets and hackers and spam (oh, my!) [[electronic resource]]
Pubbl/distr/stampa [Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Division of Consumer & Business Education, , [2007]
Descrizione fisica 2 unnumbered pages : digital, PDF file
Collana FTC consumer alert
Soggetto topico Computers - Access control
Hackers
Spam (Electronic mail)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Botnets and hackers and spam
Record Nr. UNINA-9910697519003321
[Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Division of Consumer & Business Education, , [2007]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Building Cyber Resilience Against Hybrid Threats / / edited by Mitko Bogdanoski
Building Cyber Resilience Against Hybrid Threats / / edited by Mitko Bogdanoski
Edizione [1st ed.]
Pubbl/distr/stampa Amsterdam : , : IOS Press, Incorporated, , 2022
Descrizione fisica 1 online resource (166 pages)
Collana NATO Science for Peace and Security Series - d: Information and Communication Security
Soggetto topico Computers - Access control
Access control
Computer security
ISBN 9781643682938
9781643682921
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Title Page -- Foreword -- About the Authors -- Acknowledgment -- Contents -- NATO Cyber Defence Policy and Hybrid Threats: The Way to Enhance Our Resilience -- EU-NATO Hybrid Warfare -- Understanding Hybrid Warfare in Cyberspace: Building Resiliance Through Understanding -- Applying Resilience to Hybrid Threats in Infrastructure, Digital, and Social Domains Using Multisectoral, Multidisciplinary, and Whole-of-Government Approach -- Public Opinion Influence Through Electronic Propaganda Activities -- Legal Perspectives of Hybrid Warfare Activities in Cyberspace -- Cyber Security Perspective of Top Future Technologies -- Use of Technological Advances Against Hybrid-Based Threats in SEE -- Deep Learning in Cyber Security -- Lattice-Based Cryptography: A Quantum Approach to Secure the IoT Technology -- Positioning Cyber Security Risk Management Within a Consolidated Security Platform -- Subject Index -- Author Index.
Record Nr. UNINA-9910795985203321
Amsterdam : , : IOS Press, Incorporated, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Building Cyber Resilience Against Hybrid Threats / / edited by Mitko Bogdanoski
Building Cyber Resilience Against Hybrid Threats / / edited by Mitko Bogdanoski
Edizione [1st ed.]
Pubbl/distr/stampa Amsterdam : , : IOS Press, Incorporated, , 2022
Descrizione fisica 1 online resource (166 pages)
Collana NATO Science for Peace and Security Series - d: Information and Communication Security
Soggetto topico Computers - Access control
Access control
Computer security
ISBN 9781643682938
9781643682921
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Title Page -- Foreword -- About the Authors -- Acknowledgment -- Contents -- NATO Cyber Defence Policy and Hybrid Threats: The Way to Enhance Our Resilience -- EU-NATO Hybrid Warfare -- Understanding Hybrid Warfare in Cyberspace: Building Resiliance Through Understanding -- Applying Resilience to Hybrid Threats in Infrastructure, Digital, and Social Domains Using Multisectoral, Multidisciplinary, and Whole-of-Government Approach -- Public Opinion Influence Through Electronic Propaganda Activities -- Legal Perspectives of Hybrid Warfare Activities in Cyberspace -- Cyber Security Perspective of Top Future Technologies -- Use of Technological Advances Against Hybrid-Based Threats in SEE -- Deep Learning in Cyber Security -- Lattice-Based Cryptography: A Quantum Approach to Secure the IoT Technology -- Positioning Cyber Security Risk Management Within a Consolidated Security Platform -- Subject Index -- Author Index.
Record Nr. UNINA-9910821278203321
Amsterdam : , : IOS Press, Incorporated, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Building virtual pentesting labs for advanced penetration testing : learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it / / Kevin Cardwell
Building virtual pentesting labs for advanced penetration testing : learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it / / Kevin Cardwell
Autore Cardwell Kevin
Edizione [Second edition.]
Pubbl/distr/stampa Birmingham, England ; ; Mumbai, India : , : Packt Publishing, , 2016
Descrizione fisica 1 online resource (518 pages)
Disciplina 005.8
Collana Community Experience Distilled
Soggetto topico Computer security - Testing
Computer networks - Security measures
Computers - Access control
ISBN 1-78588-495-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910798777903321
Cardwell Kevin  
Birmingham, England ; ; Mumbai, India : , : Packt Publishing, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui