Check Point NG [[electronic resource] ] : next generation security administration / / Drew Simonis ... [et al.] |
Autore | Simonis Drew |
Edizione | [First edition.] |
Pubbl/distr/stampa | Rockland, Mass., : Syngress Publishing, Inc., c2002 |
Descrizione fisica | 1 online resource (657 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | SimonisDrew |
Soggetto topico |
Computer security
Computers - Access control Database security |
ISBN |
1-281-05305-8
9786611053055 0-08-047645-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Contents; Foreword; Chapter 1 Introduction to Check Point Next Generation; Chapter 2 Installing and Configuring VPN-1/FireWall-1 Next Generation; Chapter 3 Using the Graphical Interface; Chapter 4 Creating a Security Policy; Chapter 5 Applying Network Address Translation; Chapter 6 Authenticating Users; Chapter 7 Open Security (OPSEC) and Content Filtering; Chapter 8 Managing Policies and Logs; Chapter 9 Tracking and Alerts; Chapter 10 Configuring Virtual Private Networks; Chapter 11 Securing Remote Clients; Chapter 12 Advanced Configurations; Appendix A Class C Subnet Mask Cheat Sheet
Appendix B Spoofing: Attacks on Trusted IdentityIndex |
Record Nr. | UNINA-9910779969303321 |
Simonis Drew | ||
Rockland, Mass., : Syngress Publishing, Inc., c2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Check Point NG : next generation security administration / / Drew Simonis ... [et al.] |
Autore | Simonis Drew |
Edizione | [First edition.] |
Pubbl/distr/stampa | Rockland, Mass., : Syngress Publishing, Inc., c2002 |
Descrizione fisica | 1 online resource (657 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | SimonisDrew |
Soggetto topico |
Computer security
Computers - Access control Database security |
ISBN |
1-281-05305-8
9786611053055 0-08-047645-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Contents; Foreword; Chapter 1 Introduction to Check Point Next Generation; Chapter 2 Installing and Configuring VPN-1/FireWall-1 Next Generation; Chapter 3 Using the Graphical Interface; Chapter 4 Creating a Security Policy; Chapter 5 Applying Network Address Translation; Chapter 6 Authenticating Users; Chapter 7 Open Security (OPSEC) and Content Filtering; Chapter 8 Managing Policies and Logs; Chapter 9 Tracking and Alerts; Chapter 10 Configuring Virtual Private Networks; Chapter 11 Securing Remote Clients; Chapter 12 Advanced Configurations; Appendix A Class C Subnet Mask Cheat Sheet
Appendix B Spoofing: Attacks on Trusted IdentityIndex |
Altri titoli varianti | Check Point next generation security administration |
Record Nr. | UNINA-9910817737303321 |
Simonis Drew | ||
Rockland, Mass., : Syngress Publishing, Inc., c2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Creating a patch and vulnerability management program [[electronic resource] ] : recommendations of the National Institute of Standards and Technology (NIST) / / Peter Mell, Tiffany Bergeron, David Henning |
Autore | Mell Peter |
Edizione | [Version 2.0.] |
Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Department of Commerce, Technology Administration, National Institute of Standards and Technology, , [2005] |
Descrizione fisica | 1 volume (various pagings) : digital, PDF file |
Altri autori (Persone) |
BergeronTiffany
HenningDavid |
Collana | NIST special publication ;Computer security |
Soggetto topico |
Computer security - Standards - United States
Computer networks - Security measures Database security |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Creating a patch and vulnerability management program |
Record Nr. | UNINA-9910695293703321 |
Mell Peter | ||
Gaithersburg, MD : , : U.S. Department of Commerce, Technology Administration, National Institute of Standards and Technology, , [2005] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Data and applications security [[electronic resource] ] : developments and directions : IFIP TC11 WG11.3 Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000 / / edited by Bhavani Thuraisingham ... [et al.] |
Edizione | [1st ed. 2001.] |
Pubbl/distr/stampa | Boston, : Kluwer Academic Publishers, 2001 |
Descrizione fisica | 1 online resource (391 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | ThuraisinghamBhavani M |
Collana | International Federation for Information Processing |
Soggetto topico | Database security |
Soggetto genere / forma | Electronic books. |
ISBN |
1-280-20580-6
9786610205806 0-306-47008-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Protecting Information when Access is Granted for Collaboration -- Author-?: A Java-Based System For XML Data Protection -- A Fair-Exchange E-Commerce Protocol With Automated Dispute Resolution -- XML Access Control Systems: A Component-Based Approach -- A Configurable Security Architecture Prototype -- Distributed Policies for Data Management — Making Policies Mobile -- Security Architecture of The Multimedia Mediator -- Simulation And Analysis of Cryptographic Protocols -- Authentic Third-Party Data Publication -- Protecting File Systems Against Corruption Using Checksums -- Web Security and Privacy -- Coordinating Policy for Federated Applications -- Integrating Multilevel Security Policies in Multilevel Federated Database Systems -- Wrappers – A Mechanism to Support State-Based Authorization in Web Applications -- An Integrated Framework for Database Privacy Protection -- Discovery of Multi-Level Security Policies -- Protecting Deductive Databases from Unauthorized Retrievals -- Confidentiality vs Integrity in Secure Databases -- Extending SQL’s Grant Operation to Limit Privileges -- Language Extensions for Programmable Security -- Protecting Privacy from Continuous High-Resolution Satellite Surveillance -- Database Security Integration Using Role-Based Access Control -- User Role-Based Security Model for a Distributed Environment -- WorkFlow Analyzed for Security and Privacy in using Databases -- Identifying Security Holes in OLAP Applications -- Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations -- Database Security 2000 -- Declarative Semantics of Belief Queries in Mls Deductive Databases -- Trust Management in Distributed Databases -- Active Authorization as High-level Control -- Conference Key Agreement Protocol using Oblivious Transfer -- An Integration Model of Role-Based Access Control and Activity-Based Access Control Using Task -- Authorization Model in Object-Oriented Systems -- Panel 2 -- Conference Summary. |
Record Nr. | UNINA-9910454823603321 |
Boston, : Kluwer Academic Publishers, 2001 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Data and applications security and privacy XXXVI : 36th Annual IFIP WG 11. 3 Conference, DBSec 2022, Newark, NJ, USA, July 18-20, 2022, proceedings / / Shamik Sural, Haibing Lu, editors |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (330 pages) |
Disciplina | 005.8 |
Collana | Lecture notes in computer science |
Soggetto topico |
Computer security
Data protection Database security |
ISBN | 3-031-10684-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910584478003321 |
Cham, Switzerland : , : Springer, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Data and applications security and privacy XXXVI : 36th Annual IFIP WG 11. 3 Conference, DBSec 2022, Newark, NJ, USA, July 18-20, 2022, proceedings / / Shamik Sural, Haibing Lu, editors |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (330 pages) |
Disciplina | 005.8 |
Collana | Lecture notes in computer science |
Soggetto topico |
Computer security
Data protection Database security |
ISBN | 3-031-10684-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996483163603316 |
Cham, Switzerland : , : Springer, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Data and applications security XXII : 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008 : proceedings / / Vijay Atluri (editor) |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer-Verlag, , [2008] |
Descrizione fisica | 1 online resource (XI, 352 p.) |
Disciplina | 004 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computer security
Database security |
ISBN | 3-540-70567-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Access Control -- Dynamic Meta-level Access Control in SQL -- On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model -- Audit and Logging -- A Unified Audit Expression Model for Auditing SQL Queries -- A New Approach to Secure Logging -- Keynote -- Security, Functionality and Scale? -- Privacy I -- P4A: A New Privacy Model for XML -- Privacy-Aware Collaborative Access Control in Web-Based Social Networks -- A Privacy-Preserving Ticketing System -- The Analysis of Windows Vista Disk Encryption Algorithm -- Shared and Searchable Encrypted Data for Untrusted Servers -- Secure Construction of Contingency Tables from Distributed Data -- Web Services Security: Techniques and Challenges (Extended Abstract) -- Empirical Analysis of Certificate Revocation Lists -- Using New Tools for Certificate Repositories Generation in MANETs -- Privacy II -- Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure -- Protecting the Publishing Identity in Multiple Tuples -- Panel Session: What Are the Key Challenges in Distributed Security? -- On the Applicability of Trusted Computing in Distributed Authorization Using Web Services -- Sharing but Protecting Content Against Internal Leakage for Organisations -- Regulating Exceptions in Healthcare Using Policy Spaces -- Towards Automation of Testing High-Level Security Properties -- An Attack Graph-Based Probabilistic Security Metric -- An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems -- DIWeDa - Detecting Intrusions in Web Databases -- Securing Workflows with XACML, RDF and BPEL. |
Record Nr. | UNINA-9910483892103321 |
Berlin, Heidelberg : , : Springer-Verlag, , [2008] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Data and applications security XXII : 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008 : proceedings / / Vijay Atluri (editor) |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer-Verlag, , [2008] |
Descrizione fisica | 1 online resource (XI, 352 p.) |
Disciplina | 004 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computer security
Database security |
ISBN | 3-540-70567-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Access Control -- Dynamic Meta-level Access Control in SQL -- On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model -- Audit and Logging -- A Unified Audit Expression Model for Auditing SQL Queries -- A New Approach to Secure Logging -- Keynote -- Security, Functionality and Scale? -- Privacy I -- P4A: A New Privacy Model for XML -- Privacy-Aware Collaborative Access Control in Web-Based Social Networks -- A Privacy-Preserving Ticketing System -- The Analysis of Windows Vista Disk Encryption Algorithm -- Shared and Searchable Encrypted Data for Untrusted Servers -- Secure Construction of Contingency Tables from Distributed Data -- Web Services Security: Techniques and Challenges (Extended Abstract) -- Empirical Analysis of Certificate Revocation Lists -- Using New Tools for Certificate Repositories Generation in MANETs -- Privacy II -- Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure -- Protecting the Publishing Identity in Multiple Tuples -- Panel Session: What Are the Key Challenges in Distributed Security? -- On the Applicability of Trusted Computing in Distributed Authorization Using Web Services -- Sharing but Protecting Content Against Internal Leakage for Organisations -- Regulating Exceptions in Healthcare Using Policy Spaces -- Towards Automation of Testing High-Level Security Properties -- An Attack Graph-Based Probabilistic Security Metric -- An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems -- DIWeDa - Detecting Intrusions in Web Databases -- Securing Workflows with XACML, RDF and BPEL. |
Record Nr. | UNISA-996465809503316 |
Berlin, Heidelberg : , : Springer-Verlag, , [2008] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Data and applications security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings / / Ehud Gudes, Jaideep Vaidya (editors) |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer-Verlag, , [2009] |
Descrizione fisica | 1 online resource (324 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Database security
Computer networks - Security measures Computers - Access control |
ISBN |
1-282-29798-8
9786612297984 3-642-03007-6 |
Classificazione |
DAT 465f
SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Database Security I -- Controlled Query Evaluation and Inference-Free View Updates -- Implementing Reflective Access Control in SQL -- Security Policies -- An Approach to Security Policy Configuration Using Semantic Threat Graphs -- Reaction Policy Model Based on Dynamic Organizations and Threat Context -- Towards System Integrity Protection with Graph-Based Policy Analysis -- Privacy I -- Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation -- Privacy-Preserving Telemonitoring for eHealth -- Intrusion Detection and Protocols -- Analysis of Data Dependency Based Intrusion Detection System -- Secure Method Calls by Instrumenting Bytecode with Aspects -- Access Control -- Distributed Privilege Enforcement in PACS -- Spatiotemporal Access Control Enforcement under Uncertain Location Estimates -- Using Edit Automata for Rewriting-Based Security Enforcement -- Privacy II -- Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providers -- Detecting Inference Channels in Private Multimedia Data via Social Networks -- Database Security II -- Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients -- Data Is Key: Introducing the Data-Based Access Control Paradigm -- Trusted Computing -- Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology -- PAES: Policy-Based Authority Evaluation Scheme -- Short Papers -- Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC -- Methods for Computing Trust and Reputation While Preserving Privacy -- Building an Application Data Behavior Model for Intrusion Detection -- A Trust-Based Access Control Model for Pervasive Computing Applications. |
Record Nr. | UNINA-9910484176403321 |
Berlin, Heidelberg : , : Springer-Verlag, , [2009] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Data and applications security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings / / Ehud Gudes, Jaideep Vaidya (editors) |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer-Verlag, , [2009] |
Descrizione fisica | 1 online resource (324 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Database security
Computer networks - Security measures Computers - Access control |
ISBN |
1-282-29798-8
9786612297984 3-642-03007-6 |
Classificazione |
DAT 465f
SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Database Security I -- Controlled Query Evaluation and Inference-Free View Updates -- Implementing Reflective Access Control in SQL -- Security Policies -- An Approach to Security Policy Configuration Using Semantic Threat Graphs -- Reaction Policy Model Based on Dynamic Organizations and Threat Context -- Towards System Integrity Protection with Graph-Based Policy Analysis -- Privacy I -- Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation -- Privacy-Preserving Telemonitoring for eHealth -- Intrusion Detection and Protocols -- Analysis of Data Dependency Based Intrusion Detection System -- Secure Method Calls by Instrumenting Bytecode with Aspects -- Access Control -- Distributed Privilege Enforcement in PACS -- Spatiotemporal Access Control Enforcement under Uncertain Location Estimates -- Using Edit Automata for Rewriting-Based Security Enforcement -- Privacy II -- Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providers -- Detecting Inference Channels in Private Multimedia Data via Social Networks -- Database Security II -- Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients -- Data Is Key: Introducing the Data-Based Access Control Paradigm -- Trusted Computing -- Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology -- PAES: Policy-Based Authority Evaluation Scheme -- Short Papers -- Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC -- Methods for Computing Trust and Reputation While Preserving Privacy -- Building an Application Data Behavior Model for Intrusion Detection -- A Trust-Based Access Control Model for Pervasive Computing Applications. |
Record Nr. | UNISA-996465625403316 |
Berlin, Heidelberg : , : Springer-Verlag, , [2009] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|