top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Safeguarding Critical E-Documents [[electronic resource] ] : Implementing a Program for Securing Confidential Information Assets
Safeguarding Critical E-Documents [[electronic resource] ] : Implementing a Program for Securing Confidential Information Assets
Autore Smallwood Robert F. <1959->
Pubbl/distr/stampa New York, : Wiley, 2012
Descrizione fisica 1 online resource (285 p.)
Disciplina 005.8
658.472
Soggetto topico BUSINESS & ECONOMICS / Information Management
Computer security
Cyberspace - Security measures
Cyberspace -- Security measures
Database security
Electronic records
Computer security - Security measures
Cyberspace
ISBN 1-119-20490-9
1-280-79277-9
9786613703163
1-118-28687-1
Classificazione BUS083000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Safeguarding Critical E-Documents; Contents; Foreword; Preface; Acknowledgments; PART I THE PROBLEM AND BASIC TOOLS; CHAPTER 1 The Problem: Securing Confidential Electronic Documents; WikiLeaks: A Wake-Up Call; U.S. Government Attempts to Protect Intellectual Property; Threats Persist across the Pond: U.K. Companies on Guard; Increase in Corporate and Industrial Espionage; Risks of Medical Identity Theft; Why Don't Organizations Safeguard Their Information Assets?; The Blame Game: Where Does Fault Lie When Information Is Leaked?; Consequences of Not Employing E-Document Security; Notes
CHAPTER 2 Information Governance: The Crucial First Step First, Better Policies; Then, Better Technology for Better Enforcement; Defining Information Governance; Accountability Is Key; Why IG Is Good Business; Impact of a Successful IG Program; Critical Factors in an IG Program; Who Should Determine IG Policies?; Notes; PART II Information Platform Risks and Countermeasures; CHAPTER 3 Managing E-Documents and Records; Enterprise Content Management; Document Management Principles; The Goal: Document Lifecycle Security; Electronic Document Management Systems; Records Management Principles
Electronic Records Management Notes; CHAPTER 4 Information Governance and Security for E-mail Messages; Employees Regularly Expose Organizations to E-mail Risk; E-mail Policies Should Be Realistic and Technology Agnostic; Is E-mail Encryption the Answer?; Common E-mail Security Mistakes; E-mail Security Myths; E-record Retention: Fundamentally a Legal Issue; Preserve E-mail Integrity and Admissibility with Automatic Archiving; E-mail Archiving Rationale: Compliance, Legal, and Business Reasons; Don't Confuse E-mail Archiving with Backup; No Personal Archiving in the Workplace
Are All E-mails Records?Destructive Retention of E-mail; Notes; CHAPTER 5 Information Governance and Security for Instant Messaging; Instant Messaging Security Threats; Stealing Information through Hijacking and Impersonation; Denial-of-Service Attacks Freeze Access; Network Sniffers and Unauthorized Disclosure of Information Assets; Best Practices for Business IM Use; Technology to Monitor IM; Tips for Safer IM; Notes; CHAPTER 6 Information Governance and Security for Social Media; Types of Social Media in Web 2.0; Social Media in the Enterprise
Key Ways Social Media Is Different from E-mail and Instant Messaging Biggest Security Threats of Social Media; Legal Risks of Social Media Posts; Tools to Archive Facebook and Twitter; IG Considerations for Social Media; Notes; CHAPTER 7 Information Governance and Security for Mobile Devices; Current Trends in Mobile Computing; Security Risks of Mobile Computing; Securing Mobile Data; IG for Mobile Computing; Building Security into Mobile Applications; Real Threats Are Poorly Understood; Innovation versus Security: Choices and Trade-Offs; Best Practices to Secure Mobile Applications; Notes
CHAPTER 8 Information Governance and Security for Cloud Computing Use
Record Nr. UNINA-9910141258503321
Smallwood Robert F. <1959->  
New York, : Wiley, 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security in cyberspace : select assessments and policy considerations / / Martin E. Owens and Deborah R. Simpson, editors
Security in cyberspace : select assessments and policy considerations / / Martin E. Owens and Deborah R. Simpson, editors
Pubbl/distr/stampa Hauppauge, New York : , : Nova Science Publishers, , [2012]
Descrizione fisica 1 online resource (193 pages)
Disciplina 005.8
Collana Internet policies and issues
Soggetto topico Computer networks - Security measures
Cyberspace - Security measures
ISBN 1-62257-365-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910148723203321
Hauppauge, New York : , : Nova Science Publishers, , [2012]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Software update as a mechanism for resilience and security : proceedings of a workshop / / Anne Frances Johnson and Lynette I. Millett, rapporteurs
Software update as a mechanism for resilience and security : proceedings of a workshop / / Anne Frances Johnson and Lynette I. Millett, rapporteurs
Pubbl/distr/stampa Washington, District of Columbia : , : The National Academies Press, , 2017
Descrizione fisica 1 online resource (83 pages)
Disciplina 629.4
Collana Forum on Cyber Resilience Workshop Series
Soggetto topico Cyberspace
Cyberspace - Security measures
Soggetto genere / forma Electronic books.
ISBN 0-309-46289-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910480209503321
Washington, District of Columbia : , : The National Academies Press, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Software update as a mechanism for resilience and security : proceedings of a workshop / / Anne Frances Johnson and Lynette I. Millett, rapporteurs
Software update as a mechanism for resilience and security : proceedings of a workshop / / Anne Frances Johnson and Lynette I. Millett, rapporteurs
Pubbl/distr/stampa Washington, District of Columbia : , : The National Academies Press, , 2017
Descrizione fisica 1 online resource (83 pages)
Disciplina 629.4
Collana Forum on Cyber Resilience Workshop Series
Soggetto topico Cyberspace
Cyberspace - Security measures
ISBN 0-309-46291-6
0-309-46289-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Workshop introduction -- Policy considerations : the intersection of public values and private infrastructure -- Technical considerations for secure software updates -- Microsoft's approach to software updates -- Update issues for open-source software -- Cisco's approach to software updates -- Ensuring robust firmware updates -- Updates in the consumer electronics industry -- Software updates in automotive electronic control units -- The NIST perspective on software updates -- Protecting consumers from software update risks -- Discussion -- Afterword.
Record Nr. UNINA-9910795588103321
Washington, District of Columbia : , : The National Academies Press, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Software update as a mechanism for resilience and security : proceedings of a workshop / / Anne Frances Johnson and Lynette I. Millett, rapporteurs
Software update as a mechanism for resilience and security : proceedings of a workshop / / Anne Frances Johnson and Lynette I. Millett, rapporteurs
Pubbl/distr/stampa Washington, District of Columbia : , : The National Academies Press, , 2017
Descrizione fisica 1 online resource (83 pages)
Disciplina 629.4
Collana Forum on Cyber Resilience Workshop Series
Soggetto topico Cyberspace
Cyberspace - Security measures
ISBN 0-309-46291-6
0-309-46289-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Workshop introduction -- Policy considerations : the intersection of public values and private infrastructure -- Technical considerations for secure software updates -- Microsoft's approach to software updates -- Update issues for open-source software -- Cisco's approach to software updates -- Ensuring robust firmware updates -- Updates in the consumer electronics industry -- Software updates in automotive electronic control units -- The NIST perspective on software updates -- Protecting consumers from software update risks -- Discussion -- Afterword.
Record Nr. UNINA-9910816082003321
Washington, District of Columbia : , : The National Academies Press, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Strategies for resolving the cyber attribution challenge / / Panayotis A. Yannakogeorgos
Strategies for resolving the cyber attribution challenge / / Panayotis A. Yannakogeorgos
Autore Yannakogeorgos Panayotis A.
Pubbl/distr/stampa Maxwell Air Force Base, Alabama : , : Air University Press, Air Force Research Institute, , [2013]
Descrizione fisica 1 online resource (xix, 85 pages) : illustrations
Collana Air Force Research Institute perspectives on cyber power
Air Force Research Institute papers
Soggetto topico Information warfare
Cyberterrorism - Prevention
Cyberspace - Security measures
Computer security - Government policy - United States
Computer crimes - Prevention - Government policy
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- The cyber environment -- American sponsorship of embryonic global norms -- A framework for development, diplomacy, and defense -- Conclusion.
Record Nr. UNINA-9910708145403321
Yannakogeorgos Panayotis A.  
Maxwell Air Force Base, Alabama : , : Air University Press, Air Force Research Institute, , [2013]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Threat mitigation and detection of cyber warfare and terrorism activities / / Maximiliano E. Korstanje, University of Palermo, Argentina, [editor]
Threat mitigation and detection of cyber warfare and terrorism activities / / Maximiliano E. Korstanje, University of Palermo, Argentina, [editor]
Autore Korstanje Maximiliano E.
Pubbl/distr/stampa Hershey, Pennsylvania : , : Information Science Reference, and imprint of IGI Global, , [2017]
Descrizione fisica 1 online resource (xx, 314 pages) : illustrations (some color), maps
Disciplina 363.325
Collana Advances in Library and Information Science (ALIS) Book Series
Soggetto topico Information warfare - Prevention
Cyberspace - Security measures
Cyberterrorism - Prevention
Computer crimes - Prevention
Internet - Political aspects
Soggetto non controllato Big data analysis
Digital protests
E-participation
Online blogging
Online political behavior
Parameter tampering
Surveillance and control
ISBN 9781522519393
9781522519386
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A simple solution to prevent parameter tampering in web applications / Oguzhan Menemencioglu, Ilhami Muharrem Orak -- Cyber security centres for threat detection and mitigation / Marthie Grobler, Pierre Jacobs, Brett van Niekerk -- Methods and tools of big data analysis for terroristic behavior study and threat identification: illegal armed groups during the conflict in Donbas region (east Ukraine) in period 2014-2015 / Yuriy V. Kostyuchenko, Maxim Yuschenko -- Analysis of cyber-attacks against the transportation sector / Brett van Niekerk -- English speaking countries and the culture of fear: understanding technology and terrorism / Maximiliano Emanuel Korstanje -- Trolls just want to have fun: electronic aggression within the context of e-participation and other online political behaviour in the United Kingdom / Shefali Virkar -- The risk, the real, and the impossibility of life: examining the matrix / Maximiliano Emanuel Korstanje -- OSNs as cyberterrorist weapons against the general public / Nicholas Ayres, Leandros Maglaras, Helge Janicke -- The fight for cyber Thoreau: distinguishing virtual disobedience from digital destruction / Matthew D. Crosston -- Twitter use in student protests: the case of South Africa's #FeesMustFall campaign / Trishana Ramluckan, Sayed Enayat Sayed Ally, Brett van Niekerk -- The roots of terror: the lesser evil doctrine under criticism / Maximiliano Emanuel Korstanje.
Record Nr. UNINA-9910154926003321
Korstanje Maximiliano E.  
Hershey, Pennsylvania : , : Information Science Reference, and imprint of IGI Global, , [2017]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Three discussions of Russian concepts : 1. Russian information weapons; 2. Baltic defenses (Estonia, Latvia, Lithuania) against Russian propaganda; and 3. Russia's development of non-lethal weapons / / author: Timothy Thomas
Three discussions of Russian concepts : 1. Russian information weapons; 2. Baltic defenses (Estonia, Latvia, Lithuania) against Russian propaganda; and 3. Russia's development of non-lethal weapons / / author: Timothy Thomas
Autore Thomas Timothy L.
Pubbl/distr/stampa McLean, VA : , : The MITRE Corporation, , 2020
Descrizione fisica 1 online resource (74 pages)
Soggetto topico Information warfare - Russia (Federation)
Propaganda - Russia (Federation)
Cyberspace - Security measures
Nonlethal weapons - Russia (Federation)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Three discussions of Russian concepts
Record Nr. UNINA-9910715941103321
Thomas Timothy L.  
McLean, VA : , : The MITRE Corporation, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Three faces of the cyber dragon : cyber peace activist, spook, attacker / / Timothy L. Thomas
Three faces of the cyber dragon : cyber peace activist, spook, attacker / / Timothy L. Thomas
Autore Thomas Timothy L.
Pubbl/distr/stampa Fort Leavenworth, KS : , : Foreign Military Studies Office, , 2012
Descrizione fisica 1 online resource (263 unnumbered pages) : color illustrations
Soggetto topico Information warfare - China
Cyberspace - Security measures
Information warfare
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Three faces of the cyber dragon
Record Nr. UNINA-9910709858303321
Thomas Timothy L.  
Fort Leavenworth, KS : , : Foreign Military Studies Office, , 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Various measures : markup before the Committee on Foreign Affairs, House of Representatives, One Hundred Fifteenth Congress, first session on, H. R. 1164, H.R. 1415, H.R. 2712, H.R. 3542, H.R. 3776, H.Res. 336, H.Res. 401, H.Res. 407 and H.Con. Res. 90, November 15, 2017
Various measures : markup before the Committee on Foreign Affairs, House of Representatives, One Hundred Fifteenth Congress, first session on, H. R. 1164, H.R. 1415, H.R. 2712, H.R. 3542, H.R. 3776, H.Res. 336, H.Res. 401, H.Res. 407 and H.Con. Res. 90, November 15, 2017
Pubbl/distr/stampa Washington : , : U.S. Government Publishing Office, , 2017
Descrizione fisica 1 online resource (iv, 210 pages)
Soggetto topico Virus diseases - Law and legislation - United States
Cyberterrorism - Prevention
Cyberspace - Security measures
Computer security - Government policy - United States
Rohingya (Burmese people)
Soggetto genere / forma Legislative hearings.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Various measures
Record Nr. UNINA-9910706778503321
Washington : , : U.S. Government Publishing Office, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui