Computer fraud & security |
Pubbl/distr/stampa | Oxford, Eng., : Elsevier Science Ltd., 1996-2019 |
Soggetto topico |
Computer crimes
Computers - Access control Criminalité informatique Ordinateurs - Accès - Contrôle |
Soggetto genere / forma | Periodicals. |
ISSN | 1873-7056 |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Altri titoli varianti | Computer fraud and security |
Record Nr. | UNINA-9910647801303321 |
Oxford, Eng., : Elsevier Science Ltd., 1996-2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer fraud and security bulletin |
Pubbl/distr/stampa | Amsterdam ; ; New York, : Elsevier Science, -2007 |
Soggetto topico |
Computer crimes
Computers - Access control |
Soggetto genere / forma | Periodicals. |
ISSN | 1878-3856 |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996201014003316 |
Amsterdam ; ; New York, : Elsevier Science, -2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Computer fraud and security bulletin |
Pubbl/distr/stampa | Amsterdam ; ; New York, : Elsevier Science, -2007 |
Soggetto topico |
Computer crimes
Computers - Access control |
Soggetto genere / forma | Periodicals. |
ISSN | 1878-3856 |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910333137203321 |
Amsterdam ; ; New York, : Elsevier Science, -2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer Matching Act, OMB and selected agencies need to ensure consistent implementation : report to congressional requesters |
Pubbl/distr/stampa | [Washington, D.C.] : , : United States Government Accountability Office, , 2014 |
Descrizione fisica | 1 online resource (iii, 50 pages) : color illustrations |
Soggetto topico |
Computers - Access control
Data protection - United States Privacy, Right of - United States Administrative agencies - United States - Data processing |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Computer Matching Act, OMB and selected agencies need to ensure consistent implementation |
Record Nr. | UNINA-9910702787203321 |
[Washington, D.C.] : , : United States Government Accountability Office, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer Security Applications Conference; Proceedings: Annual Computer Security Applications Conference (23d: 2007: Miami Beach, FL) |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE Computer Society Press, 2007 |
Descrizione fisica | 1 online resource (xvi, 516 pages) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Computers - Access control |
ISBN | 1-5090-8733-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996211052803316 |
[Place of publication not identified], : IEEE Computer Society Press, 2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Computer Security Applications Conference; Proceedings: Annual Computer Security Applications Conference (23d: 2007: Miami Beach, FL) |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE Computer Society Press, 2007 |
Descrizione fisica | 1 online resource (xvi, 516 pages) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Computers - Access control |
ISBN | 1-5090-8733-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910143001103321 |
[Place of publication not identified], : IEEE Computer Society Press, 2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Critical information infrastructures security : second international workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007 : revised papers / / Javier Lopez, Bernhard M. Hämmerli (eds.) |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, Germany ; ; New York, New York : , : Springer, , [2008] |
Descrizione fisica | 1 online resource (XI, 362 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computers - Access control
Computer security |
ISBN |
1-283-43791-0
9786613437914 3-540-89173-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Session 1: R&D Agenda -- Towards a European Research Agenda for CIIP: Results from the CI2RCO Project -- ICT Vulnerabilities of the Power Grid: Towards a Road Map for Future Research -- Session 2: Communication Risk and Assurance I -- An Analysis of Cyclical Interdependencies in Critical Infrastructures -- A Framework for 3D Geospatial Buffering of Events of Interest in Critical Infrastructures -- Designing Information System Risk Management Framework Based on the Past Major Failures in the Japanese Financial Industry -- Advanced Reaction Using Risk Assessment in Intrusion Detection Systems -- Session 3: Communication Risk and Assurance II -- Managing Critical Infrastructures through Virtual Network Communities -- The Structure of the Sense of Security, Anshin -- Securing Agents against Malicious Host in an Intrusion Detection System -- Session 4: Code of Practice and Metrics -- UML Diagrams Supporting Domain Specification Inside the CRUTIAL Project -- Expert System CRIPS: Support of Situation Assessment and Decision Making -- Using Dependent CORAS Diagrams to Analyse Mutual Dependency -- A Methodology to Estimate Input-Output Inoperability Model Parameters -- Session 5: Information Sharing and Exchange -- Efficient Access Control for Secure XML Query Processing in Data Streams -- An Approach to Trust Management Challenges for Critical Infrastructures -- Session 6: Continuity of Services and Resiliency -- Detecting DNS Amplification Attacks -- LoRDAS: A Low-Rate DoS Attack against Application Servers -- Intra Autonomous System Overlay Dedicated to Communication Resilience -- A Proposal for the Definition of Operational Plans to Provide Dependability and Security -- Session 7: SCADA and Embedded Security -- Application of Kohonen Maps to Improve Security Tests on Automation Devices -- Ideal Based Cyber Security Technical Metrics for Control Systems -- Designing Critical Infrastructure Cyber Security Segmentation Architecture by Balancing Security with Reliability and Availability -- Session 8: Threats and Attacks Modeling -- A General Model and Guidelines for Attack Manifestation Generation -- A Survey on Detection Techniques to Prevent Cross-Site Scripting Attacks on Current Web Applications -- Attack Modeling of SIP-Oriented SPIT -- A Malware Detector Placement Game for Intrusion Detection -- Session 9: Information Exchange and Modelling -- Modeling and Simulating Information Security Management -- Design of a Platform for Information Exchange on Protection of Critical Infrastructures -- Towards a Standardised Cross-Sector Information Exchange on Present Risk Factors. |
Record Nr. | UNINA-9910483114703321 |
Berlin, Germany ; ; New York, New York : , : Springer, , [2008] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Critical information infrastructures security : second international workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007 : revised papers / / Javier Lopez, Bernhard M. Hämmerli (eds.) |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, Germany ; ; New York, New York : , : Springer, , [2008] |
Descrizione fisica | 1 online resource (XI, 362 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computers - Access control
Computer security |
ISBN |
1-283-43791-0
9786613437914 3-540-89173-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Session 1: R&D Agenda -- Towards a European Research Agenda for CIIP: Results from the CI2RCO Project -- ICT Vulnerabilities of the Power Grid: Towards a Road Map for Future Research -- Session 2: Communication Risk and Assurance I -- An Analysis of Cyclical Interdependencies in Critical Infrastructures -- A Framework for 3D Geospatial Buffering of Events of Interest in Critical Infrastructures -- Designing Information System Risk Management Framework Based on the Past Major Failures in the Japanese Financial Industry -- Advanced Reaction Using Risk Assessment in Intrusion Detection Systems -- Session 3: Communication Risk and Assurance II -- Managing Critical Infrastructures through Virtual Network Communities -- The Structure of the Sense of Security, Anshin -- Securing Agents against Malicious Host in an Intrusion Detection System -- Session 4: Code of Practice and Metrics -- UML Diagrams Supporting Domain Specification Inside the CRUTIAL Project -- Expert System CRIPS: Support of Situation Assessment and Decision Making -- Using Dependent CORAS Diagrams to Analyse Mutual Dependency -- A Methodology to Estimate Input-Output Inoperability Model Parameters -- Session 5: Information Sharing and Exchange -- Efficient Access Control for Secure XML Query Processing in Data Streams -- An Approach to Trust Management Challenges for Critical Infrastructures -- Session 6: Continuity of Services and Resiliency -- Detecting DNS Amplification Attacks -- LoRDAS: A Low-Rate DoS Attack against Application Servers -- Intra Autonomous System Overlay Dedicated to Communication Resilience -- A Proposal for the Definition of Operational Plans to Provide Dependability and Security -- Session 7: SCADA and Embedded Security -- Application of Kohonen Maps to Improve Security Tests on Automation Devices -- Ideal Based Cyber Security Technical Metrics for Control Systems -- Designing Critical Infrastructure Cyber Security Segmentation Architecture by Balancing Security with Reliability and Availability -- Session 8: Threats and Attacks Modeling -- A General Model and Guidelines for Attack Manifestation Generation -- A Survey on Detection Techniques to Prevent Cross-Site Scripting Attacks on Current Web Applications -- Attack Modeling of SIP-Oriented SPIT -- A Malware Detector Placement Game for Intrusion Detection -- Session 9: Information Exchange and Modelling -- Modeling and Simulating Information Security Management -- Design of a Platform for Information Exchange on Protection of Critical Infrastructures -- Towards a Standardised Cross-Sector Information Exchange on Present Risk Factors. |
Record Nr. | UNISA-996465898503316 |
Berlin, Germany ; ; New York, New York : , : Springer, , [2008] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cryptography and communications : discrete structures, Boolean functions and sequences |
Pubbl/distr/stampa | Norwell, MA, : Springer, ©2009- |
Descrizione fisica | 1 online resource |
Disciplina | 001 |
Soggetto topico |
Computers - Access control
Cryptography |
Soggetto genere / forma | Periodicals. |
Soggetto non controllato | Computer Science |
ISSN | 1936-2455 |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Altri titoli varianti |
Cryptogr. Commun
CCDS |
Record Nr. | UNINA-9910249559703321 |
Norwell, MA, : Springer, ©2009- | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cryptography and communications : discrete structures, Boolean functions and sequences |
Pubbl/distr/stampa | Norwell, MA, : Springer, ©2009- |
Descrizione fisica | 1 online resource |
Disciplina | 001 |
Soggetto topico |
Computers - Access control
Cryptography |
Soggetto genere / forma | Periodicals. |
Soggetto non controllato | Computer Science |
ISSN | 1936-2455 |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Altri titoli varianti |
Cryptogr. Commun
CCDS |
Record Nr. | UNISA-996206056103316 |
Norwell, MA, : Springer, ©2009- | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|