top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Cyber deception : techniques, strategies, and human aspects / / Tiffany Bao, Milind Tambe, Cliff Wang, editors
Cyber deception : techniques, strategies, and human aspects / / Tiffany Bao, Milind Tambe, Cliff Wang, editors
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2023]
Descrizione fisica 1 online resource (252 pages)
Disciplina 005.8
Collana Advances in information security
Soggetto topico Computer networks - Security measures
Cyberspace - Security measures
ISBN 3-031-16613-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Diversifying Deception: Game Theoretic Models for Two-Sided and Layered Deception -- 2. Human-Subject Experiments on Risk-based Cyber Camouflage Games -- 3. Adaptive Cyberdefense with Deception: A Human-AI Cognitive Approach -- 4. Cognitive Modeling for Personalized, Adaptive Signaling for Cyber Deception -- 5. Deceptive Signaling: Understanding Human Behavior against Signaling algorithms -- 6. Optimizing Honey Traffic Using Game Theory and Adversarial Learning -- 7. Mee: Adaptive Honeyfile System for Insider Attacker Detection -- 8. HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems -- 9. Using Amnesia to Detect Credential Database Breaches -- 10. Deceiving ML-Based Friend-or-Foe Identification for Executables.
Record Nr. UNISA-996547953403316
Cham, Switzerland : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
The cyber risk handbook : creating and measuring effective cybersecurity capabilities / / Domenic Antonucci
The cyber risk handbook : creating and measuring effective cybersecurity capabilities / / Domenic Antonucci
Autore Antonucci Domenic
Edizione [1st edition]
Pubbl/distr/stampa Hoboken, New Jersey : , : Wiley, , 2017
Descrizione fisica 1 online resource (451 pages)
Disciplina 364.168
Collana Wiley Finance
THEi Wiley ebooks
Soggetto topico Computer crimes
Cyberspace - Security measures
ISBN 1-119-30972-7
1-119-30895-X
1-119-30974-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Board cyber risk oversight -- Principles behind cyber risk management -- Cybersecurity policies and procedures -- Cyber strategic performance management -- Standards and frameworks for cybersecurity -- Identifying, analyzing, and evaluating cyber risks -- Treating cyber risks -- Treating cyber risks using process capabilities -- Treating cyber risks - using insurance and finance -- Monitoring and review using key risk indicators (KRIs) -- Cybersecurity incident and crisis management -- Business continuity management and cybersecurity -- External context and supply chain -- Internal organization context -- Culture and human factors -- Legal and compliance -- Assurance and cyber risk management -- Information asset management for cyber -- Physical security -- Cybersecurity for operations and communications -- Access control -- Cybersecurity systems: acquisition, development, and maintenance -- People risk management in the digital age -- Cyber competencies and the cybersecurity officer --Human resources security -- Epilogue.
Record Nr. UNINA-9910270881303321
Antonucci Domenic  
Hoboken, New Jersey : , : Wiley, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The cyber risk handbook : creating and measuring effective cybersecurity capabilities / / Domenic Antonucci
The cyber risk handbook : creating and measuring effective cybersecurity capabilities / / Domenic Antonucci
Autore Antonucci Domenic
Edizione [1st edition]
Pubbl/distr/stampa Hoboken, New Jersey : , : Wiley, , 2017
Descrizione fisica 1 online resource (451 pages)
Disciplina 364.168
Collana Wiley Finance
THEi Wiley ebooks
Soggetto topico Computer crimes
Cyberspace - Security measures
ISBN 1-119-30972-7
1-119-30895-X
1-119-30974-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Board cyber risk oversight -- Principles behind cyber risk management -- Cybersecurity policies and procedures -- Cyber strategic performance management -- Standards and frameworks for cybersecurity -- Identifying, analyzing, and evaluating cyber risks -- Treating cyber risks -- Treating cyber risks using process capabilities -- Treating cyber risks - using insurance and finance -- Monitoring and review using key risk indicators (KRIs) -- Cybersecurity incident and crisis management -- Business continuity management and cybersecurity -- External context and supply chain -- Internal organization context -- Culture and human factors -- Legal and compliance -- Assurance and cyber risk management -- Information asset management for cyber -- Physical security -- Cybersecurity for operations and communications -- Access control -- Cybersecurity systems: acquisition, development, and maintenance -- People risk management in the digital age -- Cyber competencies and the cybersecurity officer --Human resources security -- Epilogue.
Record Nr. UNINA-9910821464903321
Antonucci Domenic  
Hoboken, New Jersey : , : Wiley, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber security / / edited by John G. Voeller
Cyber security / / edited by John G. Voeller
Pubbl/distr/stampa Hoboken, New Jersey : , : John Wiley & Sons, , 2014
Descrizione fisica 1 online resource (126 p.)
Disciplina 005.8
Altri autori (Persone) VoellerJohn G
Soggetto topico Computer networks - Security measures
Cyberspace - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-118-65168-5
1-118-65173-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Contents; Preface; Chapter 1 Cyber Security Metrics and Measure; 1.1 Introduction; 1.2 Contrasting Metrics and Measures; 1.3 Selecting Measures to Support Metrics; 1.4 Problems with the Accuracy of Measures; 1.5 Problems with the Selection of Measures; 1.6 Problems with the Use of Measures; 1.7 Common Vulnerability Scoring System (CVSS); 1.8 Research Directions; References; Further Reading; Chapter 2 Multilevel Security; 2.1 Introduction; 2.2 Background; 2.3 Multilevel Security Policies; 2.3.1 Confinement; 2.3.2 Supporting Policies; 2.3.3 Trusted Subjects
2.4 Enforcement of Multilevel Security Policies2.4.1 Design Approaches; 2.4.2 Threats to MLS Systems; 2.4.3 Assurance; 2.4.4 Secure MLS System Development; 2.4.5 Covert Channels; 2.4.6 Object Reuse Considerations; 2.4.7 Target Environment; 2.4.8 Cascade Problem; 2.5 Platforms and Architectures for Multilevel Security; 2.5.1 Use of Applications in MLS Systems; 2.6 Conclusion; References; Chapter 3 Trusted Platforms: The Root of Security; 3.1 Introduction; 3.2 The State of Trusted Computing; 3.2.1 Why Hardware Security?; 3.2.2 Essentials of Trusted Computing; 3.2.3 Extension to Storage
3.2.4 Biometric Devices as Physical Interface3.2.5 Usage Model; 3.3 International Scope; 3.3.1 Integration; 3.3.2 Trusted Software; 3.3.3 Networking Trusted Platforms; 3.4 Expanding the Ring of Trust; 3.5 Remaining Challenges; References; Further Reading; Chapter 4 Cyber Security Technology Usability and Management; 4.1 Introduction; 4.2 Usability and Security: Current Research; 4.2.1 Improving Existing Security Technologies; 4.3 Systems Management; 4.4 Web Security and Phishing; 4.4.1 Designing New Technologies with Usability in Mind; 4.4.2 Design Guidelines for Building Better Systems
4.5 Open Challenges and Take-Aways4.6 Conclusions; References; Further Reading; Chapter 5 Security of Distributed, Ubiquitous, and Embedded Computing Platforms; 5.1 Introduction; 5.2 Scientific Overview; 5.2.1 Security Properties; 5.2.2 Constraints on the Design Space; 5.2.3 Solution Approaches; 5.2.4 Physical Layer; 5.2.5 Networking Layers; 5.2.6 Middleware and Applications; 5.3 Global Research and Funding; 5.4 Critical Needs Analysis; 5.5 Research Directions; References; Further Reading; Chapter 6 Advanced Attacker Detection and Understanding with Emerging Honeynet Technologies
6.1 Honeypot Essentials6.2 Honeypot Risk; Legal and Ethical Issues; 6.3 Honeynet Technologies; 6.3.1 Generation III Honeynet; 6.3.2 Global Distributed Honeynet (GDH); 6.3.3 Honeyclients; 6.3.4 Low-Interaction Malware Collectors; References; Chapter 7 Security of Web Application and Services and Service-Oriented Architectures; 7.1 Introduction; 7.2 SOA Security Challenges; 7.3 Secure Web Services for SOA; 7.3.1 Transport-Based Security; 7.3.2 Message-Based Security; 7.4 Web Service Security Directions; 7.4.1 Federation; 7.4.2 Identity; 7.5 Summary; References
Chapter 8 Industrial Process Control System Security
Record Nr. UNINA-9910453408603321
Hoboken, New Jersey : , : John Wiley & Sons, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber security / / edited by John G. Voeller
Cyber security / / edited by John G. Voeller
Pubbl/distr/stampa Hoboken, New Jersey : , : John Wiley & Sons, , 2014
Descrizione fisica 1 online resource (126 p.)
Disciplina 005.8
Altri autori (Persone) VoellerJohn G
Soggetto topico Computer networks - Security measures
Cyberspace - Security measures
ISBN 1-118-65168-5
1-118-65173-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Contents; Preface; Chapter 1 Cyber Security Metrics and Measure; 1.1 Introduction; 1.2 Contrasting Metrics and Measures; 1.3 Selecting Measures to Support Metrics; 1.4 Problems with the Accuracy of Measures; 1.5 Problems with the Selection of Measures; 1.6 Problems with the Use of Measures; 1.7 Common Vulnerability Scoring System (CVSS); 1.8 Research Directions; References; Further Reading; Chapter 2 Multilevel Security; 2.1 Introduction; 2.2 Background; 2.3 Multilevel Security Policies; 2.3.1 Confinement; 2.3.2 Supporting Policies; 2.3.3 Trusted Subjects
2.4 Enforcement of Multilevel Security Policies2.4.1 Design Approaches; 2.4.2 Threats to MLS Systems; 2.4.3 Assurance; 2.4.4 Secure MLS System Development; 2.4.5 Covert Channels; 2.4.6 Object Reuse Considerations; 2.4.7 Target Environment; 2.4.8 Cascade Problem; 2.5 Platforms and Architectures for Multilevel Security; 2.5.1 Use of Applications in MLS Systems; 2.6 Conclusion; References; Chapter 3 Trusted Platforms: The Root of Security; 3.1 Introduction; 3.2 The State of Trusted Computing; 3.2.1 Why Hardware Security?; 3.2.2 Essentials of Trusted Computing; 3.2.3 Extension to Storage
3.2.4 Biometric Devices as Physical Interface3.2.5 Usage Model; 3.3 International Scope; 3.3.1 Integration; 3.3.2 Trusted Software; 3.3.3 Networking Trusted Platforms; 3.4 Expanding the Ring of Trust; 3.5 Remaining Challenges; References; Further Reading; Chapter 4 Cyber Security Technology Usability and Management; 4.1 Introduction; 4.2 Usability and Security: Current Research; 4.2.1 Improving Existing Security Technologies; 4.3 Systems Management; 4.4 Web Security and Phishing; 4.4.1 Designing New Technologies with Usability in Mind; 4.4.2 Design Guidelines for Building Better Systems
4.5 Open Challenges and Take-Aways4.6 Conclusions; References; Further Reading; Chapter 5 Security of Distributed, Ubiquitous, and Embedded Computing Platforms; 5.1 Introduction; 5.2 Scientific Overview; 5.2.1 Security Properties; 5.2.2 Constraints on the Design Space; 5.2.3 Solution Approaches; 5.2.4 Physical Layer; 5.2.5 Networking Layers; 5.2.6 Middleware and Applications; 5.3 Global Research and Funding; 5.4 Critical Needs Analysis; 5.5 Research Directions; References; Further Reading; Chapter 6 Advanced Attacker Detection and Understanding with Emerging Honeynet Technologies
6.1 Honeypot Essentials6.2 Honeypot Risk; Legal and Ethical Issues; 6.3 Honeynet Technologies; 6.3.1 Generation III Honeynet; 6.3.2 Global Distributed Honeynet (GDH); 6.3.3 Honeyclients; 6.3.4 Low-Interaction Malware Collectors; References; Chapter 7 Security of Web Application and Services and Service-Oriented Architectures; 7.1 Introduction; 7.2 SOA Security Challenges; 7.3 Secure Web Services for SOA; 7.3.1 Transport-Based Security; 7.3.2 Message-Based Security; 7.4 Web Service Security Directions; 7.4.1 Federation; 7.4.2 Identity; 7.5 Summary; References
Chapter 8 Industrial Process Control System Security
Record Nr. UNINA-9910791090303321
Hoboken, New Jersey : , : John Wiley & Sons, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber security / / edited by John G. Voeller
Cyber security / / edited by John G. Voeller
Pubbl/distr/stampa Hoboken, New Jersey : , : John Wiley & Sons, , 2014
Descrizione fisica 1 online resource (126 p.)
Disciplina 005.8
Altri autori (Persone) VoellerJohn G
Soggetto topico Computer networks - Security measures
Cyberspace - Security measures
ISBN 1-118-65168-5
1-118-65173-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Contents; Preface; Chapter 1 Cyber Security Metrics and Measure; 1.1 Introduction; 1.2 Contrasting Metrics and Measures; 1.3 Selecting Measures to Support Metrics; 1.4 Problems with the Accuracy of Measures; 1.5 Problems with the Selection of Measures; 1.6 Problems with the Use of Measures; 1.7 Common Vulnerability Scoring System (CVSS); 1.8 Research Directions; References; Further Reading; Chapter 2 Multilevel Security; 2.1 Introduction; 2.2 Background; 2.3 Multilevel Security Policies; 2.3.1 Confinement; 2.3.2 Supporting Policies; 2.3.3 Trusted Subjects
2.4 Enforcement of Multilevel Security Policies2.4.1 Design Approaches; 2.4.2 Threats to MLS Systems; 2.4.3 Assurance; 2.4.4 Secure MLS System Development; 2.4.5 Covert Channels; 2.4.6 Object Reuse Considerations; 2.4.7 Target Environment; 2.4.8 Cascade Problem; 2.5 Platforms and Architectures for Multilevel Security; 2.5.1 Use of Applications in MLS Systems; 2.6 Conclusion; References; Chapter 3 Trusted Platforms: The Root of Security; 3.1 Introduction; 3.2 The State of Trusted Computing; 3.2.1 Why Hardware Security?; 3.2.2 Essentials of Trusted Computing; 3.2.3 Extension to Storage
3.2.4 Biometric Devices as Physical Interface3.2.5 Usage Model; 3.3 International Scope; 3.3.1 Integration; 3.3.2 Trusted Software; 3.3.3 Networking Trusted Platforms; 3.4 Expanding the Ring of Trust; 3.5 Remaining Challenges; References; Further Reading; Chapter 4 Cyber Security Technology Usability and Management; 4.1 Introduction; 4.2 Usability and Security: Current Research; 4.2.1 Improving Existing Security Technologies; 4.3 Systems Management; 4.4 Web Security and Phishing; 4.4.1 Designing New Technologies with Usability in Mind; 4.4.2 Design Guidelines for Building Better Systems
4.5 Open Challenges and Take-Aways4.6 Conclusions; References; Further Reading; Chapter 5 Security of Distributed, Ubiquitous, and Embedded Computing Platforms; 5.1 Introduction; 5.2 Scientific Overview; 5.2.1 Security Properties; 5.2.2 Constraints on the Design Space; 5.2.3 Solution Approaches; 5.2.4 Physical Layer; 5.2.5 Networking Layers; 5.2.6 Middleware and Applications; 5.3 Global Research and Funding; 5.4 Critical Needs Analysis; 5.5 Research Directions; References; Further Reading; Chapter 6 Advanced Attacker Detection and Understanding with Emerging Honeynet Technologies
6.1 Honeypot Essentials6.2 Honeypot Risk; Legal and Ethical Issues; 6.3 Honeynet Technologies; 6.3.1 Generation III Honeynet; 6.3.2 Global Distributed Honeynet (GDH); 6.3.3 Honeyclients; 6.3.4 Low-Interaction Malware Collectors; References; Chapter 7 Security of Web Application and Services and Service-Oriented Architectures; 7.1 Introduction; 7.2 SOA Security Challenges; 7.3 Secure Web Services for SOA; 7.3.1 Transport-Based Security; 7.3.2 Message-Based Security; 7.4 Web Service Security Directions; 7.4.1 Federation; 7.4.2 Identity; 7.5 Summary; References
Chapter 8 Industrial Process Control System Security
Record Nr. UNINA-9910818299503321
Hoboken, New Jersey : , : John Wiley & Sons, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber security and resiliency policy framework / / edited by Ashok Vaseashta, Philip Susmann and Eric Braman
Cyber security and resiliency policy framework / / edited by Ashok Vaseashta, Philip Susmann and Eric Braman
Pubbl/distr/stampa Amsterdam, Netherlands : , : IOS Press, , 2014
Descrizione fisica 1 online resource (176 p.)
Disciplina 005.82
Collana NATO Science for Peace and Security Series - D : Information and Communication Security
Soggetto topico Cyberspace - Security measures
Computer networks - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-61499-446-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto ""CYBER SECURITY AND RESILIENCY POLICY FRAMEWORK""; ""Preface""; ""Meet the Authors""; ""Contents""; ""Cyber Security � Threat Scenarios, Policy Framework and Cyber Wargames""; ""E-Government 3 Web Security Issues: Who, What, When?""; ""Cyber Security Issues of Telecommunication Infrastructure""; ""Security Issues for Mobile Devices""; ""Strengthening Cyber Security Policy by Means of End-Users Dedicated Training""; ""Toward Effective National Cyber Security Strategy: The Path Forward For Macedonia""
""Overview of the Current Situation in Bosnia and Herzegovina with Focus on Cyber Security and Fighting Cyber-Crime by Establishment of BIH CERT Body""""Turkey's Approaches on Cyber Security Policy Framework""; ""Cyber Security Challenges in Smart Homes""; ""Development of Defense-Oriented Application Software under Fire: The Case of Israel""; ""Education as a Long-Term Strategy for Cyber Security""; ""Protecting and Preserving Ground Water with Monitoring Systems and Vulnerability Maps""; ""Subject Index""; ""Author Index""
Record Nr. UNINA-9910463849903321
Amsterdam, Netherlands : , : IOS Press, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber security and resiliency policy framework / / edited by Ashok Vaseashta, Philip Susmann and Eric Braman
Cyber security and resiliency policy framework / / edited by Ashok Vaseashta, Philip Susmann and Eric Braman
Pubbl/distr/stampa Amsterdam, Netherlands : , : IOS Press, , 2014
Descrizione fisica 1 online resource (176 p.)
Disciplina 005.82
Collana NATO Science for Peace and Security Series - D : Information and Communication Security
Soggetto topico Cyberspace - Security measures
Computer networks - Security measures
ISBN 1-61499-446-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto ""CYBER SECURITY AND RESILIENCY POLICY FRAMEWORK""; ""Preface""; ""Meet the Authors""; ""Contents""; ""Cyber Security � Threat Scenarios, Policy Framework and Cyber Wargames""; ""E-Government 3 Web Security Issues: Who, What, When?""; ""Cyber Security Issues of Telecommunication Infrastructure""; ""Security Issues for Mobile Devices""; ""Strengthening Cyber Security Policy by Means of End-Users Dedicated Training""; ""Toward Effective National Cyber Security Strategy: The Path Forward For Macedonia""
""Overview of the Current Situation in Bosnia and Herzegovina with Focus on Cyber Security and Fighting Cyber-Crime by Establishment of BIH CERT Body""""Turkey's Approaches on Cyber Security Policy Framework""; ""Cyber Security Challenges in Smart Homes""; ""Development of Defense-Oriented Application Software under Fire: The Case of Israel""; ""Education as a Long-Term Strategy for Cyber Security""; ""Protecting and Preserving Ground Water with Monitoring Systems and Vulnerability Maps""; ""Subject Index""; ""Author Index""
Record Nr. UNINA-9910788090103321
Amsterdam, Netherlands : , : IOS Press, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber security and resiliency policy framework / / edited by Ashok Vaseashta, Philip Susmann and Eric Braman
Cyber security and resiliency policy framework / / edited by Ashok Vaseashta, Philip Susmann and Eric Braman
Pubbl/distr/stampa Amsterdam, Netherlands : , : IOS Press, , 2014
Descrizione fisica 1 online resource (176 p.)
Disciplina 005.82
Collana NATO Science for Peace and Security Series - D : Information and Communication Security
Soggetto topico Cyberspace - Security measures
Computer networks - Security measures
ISBN 1-61499-446-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto ""CYBER SECURITY AND RESILIENCY POLICY FRAMEWORK""; ""Preface""; ""Meet the Authors""; ""Contents""; ""Cyber Security � Threat Scenarios, Policy Framework and Cyber Wargames""; ""E-Government 3 Web Security Issues: Who, What, When?""; ""Cyber Security Issues of Telecommunication Infrastructure""; ""Security Issues for Mobile Devices""; ""Strengthening Cyber Security Policy by Means of End-Users Dedicated Training""; ""Toward Effective National Cyber Security Strategy: The Path Forward For Macedonia""
""Overview of the Current Situation in Bosnia and Herzegovina with Focus on Cyber Security and Fighting Cyber-Crime by Establishment of BIH CERT Body""""Turkey's Approaches on Cyber Security Policy Framework""; ""Cyber Security Challenges in Smart Homes""; ""Development of Defense-Oriented Application Software under Fire: The Case of Israel""; ""Education as a Long-Term Strategy for Cyber Security""; ""Protecting and Preserving Ground Water with Monitoring Systems and Vulnerability Maps""; ""Subject Index""; ""Author Index""
Record Nr. UNINA-9910817407203321
Amsterdam, Netherlands : , : IOS Press, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber security for educational leaders : a guide to understanding and implementing technology policies / / Richard Phillips and Rayton R. Sianjina
Cyber security for educational leaders : a guide to understanding and implementing technology policies / / Richard Phillips and Rayton R. Sianjina
Autore Phillips Richard <1958-, >
Pubbl/distr/stampa New York : , : Routledge, , 2013
Descrizione fisica 1 online resource (165 p.)
Disciplina 371.33
Soggetto topico Educational technology - Security measures
Cyberspace - Security measures
Computer security
Soggetto genere / forma Electronic books.
ISBN 0-203-09621-5
1-299-27920-1
1-136-21735-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Cyber Security for Educational Leaders; Title Page; Copyright Page; Table of Contents; Preface; ELCC Elements and Related Chapters; Matrix ELCC Elements and Related Chapters; Acknowledgments; Chapter 1: Introduction; Chapter 2: Total Cost of Ownership; Chapter 3: Acceptable Use Policy; Chapter 4: Authentication Policy; Chapter 5: Internet-Use Policy; Chapter 6: Access Policy; Chapter 7: Auditing Policy; Chapter 8: Physical Policy; Chapter 9: Analysis Policy; Chapter 10: Privacy Policy; Chapter 11: Cyber Risk Assessment Checklist Profile and Questionnaire
Chapter 12: Electronic BullyingChapter 13: Electronic Sexual Harassment; Chapter 14: Basics of Copyright and Fair Use; Glossary; References; Index
Record Nr. UNINA-9910465456603321
Phillips Richard <1958-, >  
New York : , : Routledge, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui