top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Check Point NG [[electronic resource] ] : next generation security administration / / Drew Simonis ... [et al.]
Check Point NG [[electronic resource] ] : next generation security administration / / Drew Simonis ... [et al.]
Autore Simonis Drew
Edizione [First edition.]
Pubbl/distr/stampa Rockland, Mass., : Syngress Publishing, Inc., c2002
Descrizione fisica 1 online resource (657 p.)
Disciplina 005.8
Altri autori (Persone) SimonisDrew
Soggetto topico Computer security
Computers - Access control
Database security
ISBN 1-281-05305-8
9786611053055
0-08-047645-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Contents; Foreword; Chapter 1 Introduction to Check Point Next Generation; Chapter 2 Installing and Configuring VPN-1/FireWall-1 Next Generation; Chapter 3 Using the Graphical Interface; Chapter 4 Creating a Security Policy; Chapter 5 Applying Network Address Translation; Chapter 6 Authenticating Users; Chapter 7 Open Security (OPSEC) and Content Filtering; Chapter 8 Managing Policies and Logs; Chapter 9 Tracking and Alerts; Chapter 10 Configuring Virtual Private Networks; Chapter 11 Securing Remote Clients; Chapter 12 Advanced Configurations; Appendix A Class C Subnet Mask Cheat Sheet
Appendix B Spoofing: Attacks on Trusted IdentityIndex
Record Nr. UNINA-9910779969303321
Simonis Drew  
Rockland, Mass., : Syngress Publishing, Inc., c2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Check Point NG [[electronic resource] ] : next generation security administration / / Drew Simonis ... [et al.]
Check Point NG [[electronic resource] ] : next generation security administration / / Drew Simonis ... [et al.]
Autore Simonis Drew
Edizione [First edition.]
Pubbl/distr/stampa Rockland, Mass., : Syngress Publishing, Inc., c2002
Descrizione fisica 1 online resource (657 p.)
Disciplina 005.8
Altri autori (Persone) SimonisDrew
Soggetto topico Computer security
Computers - Access control
Database security
ISBN 1-281-05305-8
9786611053055
0-08-047645-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Contents; Foreword; Chapter 1 Introduction to Check Point Next Generation; Chapter 2 Installing and Configuring VPN-1/FireWall-1 Next Generation; Chapter 3 Using the Graphical Interface; Chapter 4 Creating a Security Policy; Chapter 5 Applying Network Address Translation; Chapter 6 Authenticating Users; Chapter 7 Open Security (OPSEC) and Content Filtering; Chapter 8 Managing Policies and Logs; Chapter 9 Tracking and Alerts; Chapter 10 Configuring Virtual Private Networks; Chapter 11 Securing Remote Clients; Chapter 12 Advanced Configurations; Appendix A Class C Subnet Mask Cheat Sheet
Appendix B Spoofing: Attacks on Trusted IdentityIndex
Record Nr. UNINA-9910817737303321
Simonis Drew  
Rockland, Mass., : Syngress Publishing, Inc., c2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Creating a patch and vulnerability management program [[electronic resource] ] : recommendations of the National Institute of Standards and Technology (NIST) / / Peter Mell, Tiffany Bergeron, David Henning
Creating a patch and vulnerability management program [[electronic resource] ] : recommendations of the National Institute of Standards and Technology (NIST) / / Peter Mell, Tiffany Bergeron, David Henning
Autore Mell Peter
Edizione [Version 2.0.]
Pubbl/distr/stampa Gaithersburg, MD : , : U.S. Department of Commerce, Technology Administration, National Institute of Standards and Technology, , [2005]
Descrizione fisica 1 volume (various pagings) : digital, PDF file
Altri autori (Persone) BergeronTiffany
HenningDavid
Collana NIST special publication ;Computer security
Soggetto topico Computer security - Standards - United States
Computer networks - Security measures
Database security
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Creating a patch and vulnerability management program
Record Nr. UNINA-9910695293703321
Mell Peter  
Gaithersburg, MD : , : U.S. Department of Commerce, Technology Administration, National Institute of Standards and Technology, , [2005]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data and applications security [[electronic resource] ] : developments and directions : IFIP TC11 WG11.3 Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000 / / edited by Bhavani Thuraisingham ... [et al.]
Data and applications security [[electronic resource] ] : developments and directions : IFIP TC11 WG11.3 Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000 / / edited by Bhavani Thuraisingham ... [et al.]
Edizione [1st ed. 2001.]
Pubbl/distr/stampa Boston, : Kluwer Academic Publishers, 2001
Descrizione fisica 1 online resource (391 p.)
Disciplina 005.8
Altri autori (Persone) ThuraisinghamBhavani M
Collana International Federation for Information Processing
Soggetto topico Database security
Soggetto genere / forma Electronic books.
ISBN 1-280-20580-6
9786610205806
0-306-47008-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Protecting Information when Access is Granted for Collaboration -- Author-?: A Java-Based System For XML Data Protection -- A Fair-Exchange E-Commerce Protocol With Automated Dispute Resolution -- XML Access Control Systems: A Component-Based Approach -- A Configurable Security Architecture Prototype -- Distributed Policies for Data Management — Making Policies Mobile -- Security Architecture of The Multimedia Mediator -- Simulation And Analysis of Cryptographic Protocols -- Authentic Third-Party Data Publication -- Protecting File Systems Against Corruption Using Checksums -- Web Security and Privacy -- Coordinating Policy for Federated Applications -- Integrating Multilevel Security Policies in Multilevel Federated Database Systems -- Wrappers – A Mechanism to Support State-Based Authorization in Web Applications -- An Integrated Framework for Database Privacy Protection -- Discovery of Multi-Level Security Policies -- Protecting Deductive Databases from Unauthorized Retrievals -- Confidentiality vs Integrity in Secure Databases -- Extending SQL’s Grant Operation to Limit Privileges -- Language Extensions for Programmable Security -- Protecting Privacy from Continuous High-Resolution Satellite Surveillance -- Database Security Integration Using Role-Based Access Control -- User Role-Based Security Model for a Distributed Environment -- WorkFlow Analyzed for Security and Privacy in using Databases -- Identifying Security Holes in OLAP Applications -- Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations -- Database Security 2000 -- Declarative Semantics of Belief Queries in Mls Deductive Databases -- Trust Management in Distributed Databases -- Active Authorization as High-level Control -- Conference Key Agreement Protocol using Oblivious Transfer -- An Integration Model of Role-Based Access Control and Activity-Based Access Control Using Task -- Authorization Model in Object-Oriented Systems -- Panel 2 -- Conference Summary.
Record Nr. UNINA-9910454823603321
Boston, : Kluwer Academic Publishers, 2001
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data and applications security and privacy XXXVI : 36th Annual IFIP WG 11. 3 Conference, DBSec 2022, Newark, NJ, USA, July 18-20, 2022, proceedings / / Shamik Sural, Haibing Lu, editors
Data and applications security and privacy XXXVI : 36th Annual IFIP WG 11. 3 Conference, DBSec 2022, Newark, NJ, USA, July 18-20, 2022, proceedings / / Shamik Sural, Haibing Lu, editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (330 pages)
Disciplina 005.8
Collana Lecture notes in computer science
Soggetto topico Computer security
Data protection
Database security
ISBN 3-031-10684-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910584478003321
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data and applications security and privacy XXXVI : 36th Annual IFIP WG 11. 3 Conference, DBSec 2022, Newark, NJ, USA, July 18-20, 2022, proceedings / / Shamik Sural, Haibing Lu, editors
Data and applications security and privacy XXXVI : 36th Annual IFIP WG 11. 3 Conference, DBSec 2022, Newark, NJ, USA, July 18-20, 2022, proceedings / / Shamik Sural, Haibing Lu, editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (330 pages)
Disciplina 005.8
Collana Lecture notes in computer science
Soggetto topico Computer security
Data protection
Database security
ISBN 3-031-10684-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996483163603316
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Data and applications security XXII : 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008 : proceedings / / Vijay Atluri (editor)
Data and applications security XXII : 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008 : proceedings / / Vijay Atluri (editor)
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer-Verlag, , [2008]
Descrizione fisica 1 online resource (XI, 352 p.)
Disciplina 004
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
Database security
ISBN 3-540-70567-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Access Control -- Dynamic Meta-level Access Control in SQL -- On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model -- Audit and Logging -- A Unified Audit Expression Model for Auditing SQL Queries -- A New Approach to Secure Logging -- Keynote -- Security, Functionality and Scale? -- Privacy I -- P4A: A New Privacy Model for XML -- Privacy-Aware Collaborative Access Control in Web-Based Social Networks -- A Privacy-Preserving Ticketing System -- The Analysis of Windows Vista Disk Encryption Algorithm -- Shared and Searchable Encrypted Data for Untrusted Servers -- Secure Construction of Contingency Tables from Distributed Data -- Web Services Security: Techniques and Challenges (Extended Abstract) -- Empirical Analysis of Certificate Revocation Lists -- Using New Tools for Certificate Repositories Generation in MANETs -- Privacy II -- Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure -- Protecting the Publishing Identity in Multiple Tuples -- Panel Session: What Are the Key Challenges in Distributed Security? -- On the Applicability of Trusted Computing in Distributed Authorization Using Web Services -- Sharing but Protecting Content Against Internal Leakage for Organisations -- Regulating Exceptions in Healthcare Using Policy Spaces -- Towards Automation of Testing High-Level Security Properties -- An Attack Graph-Based Probabilistic Security Metric -- An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems -- DIWeDa - Detecting Intrusions in Web Databases -- Securing Workflows with XACML, RDF and BPEL.
Record Nr. UNINA-9910483892103321
Berlin, Heidelberg : , : Springer-Verlag, , [2008]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data and applications security XXII : 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008 : proceedings / / Vijay Atluri (editor)
Data and applications security XXII : 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008 : proceedings / / Vijay Atluri (editor)
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer-Verlag, , [2008]
Descrizione fisica 1 online resource (XI, 352 p.)
Disciplina 004
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
Database security
ISBN 3-540-70567-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Access Control -- Dynamic Meta-level Access Control in SQL -- On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model -- Audit and Logging -- A Unified Audit Expression Model for Auditing SQL Queries -- A New Approach to Secure Logging -- Keynote -- Security, Functionality and Scale? -- Privacy I -- P4A: A New Privacy Model for XML -- Privacy-Aware Collaborative Access Control in Web-Based Social Networks -- A Privacy-Preserving Ticketing System -- The Analysis of Windows Vista Disk Encryption Algorithm -- Shared and Searchable Encrypted Data for Untrusted Servers -- Secure Construction of Contingency Tables from Distributed Data -- Web Services Security: Techniques and Challenges (Extended Abstract) -- Empirical Analysis of Certificate Revocation Lists -- Using New Tools for Certificate Repositories Generation in MANETs -- Privacy II -- Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure -- Protecting the Publishing Identity in Multiple Tuples -- Panel Session: What Are the Key Challenges in Distributed Security? -- On the Applicability of Trusted Computing in Distributed Authorization Using Web Services -- Sharing but Protecting Content Against Internal Leakage for Organisations -- Regulating Exceptions in Healthcare Using Policy Spaces -- Towards Automation of Testing High-Level Security Properties -- An Attack Graph-Based Probabilistic Security Metric -- An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems -- DIWeDa - Detecting Intrusions in Web Databases -- Securing Workflows with XACML, RDF and BPEL.
Record Nr. UNISA-996465809503316
Berlin, Heidelberg : , : Springer-Verlag, , [2008]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Data and applications security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings / / Ehud Gudes, Jaideep Vaidya (editors)
Data and applications security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings / / Ehud Gudes, Jaideep Vaidya (editors)
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer-Verlag, , [2009]
Descrizione fisica 1 online resource (324 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Database security
Computer networks - Security measures
Computers - Access control
ISBN 1-282-29798-8
9786612297984
3-642-03007-6
Classificazione DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Database Security I -- Controlled Query Evaluation and Inference-Free View Updates -- Implementing Reflective Access Control in SQL -- Security Policies -- An Approach to Security Policy Configuration Using Semantic Threat Graphs -- Reaction Policy Model Based on Dynamic Organizations and Threat Context -- Towards System Integrity Protection with Graph-Based Policy Analysis -- Privacy I -- Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation -- Privacy-Preserving Telemonitoring for eHealth -- Intrusion Detection and Protocols -- Analysis of Data Dependency Based Intrusion Detection System -- Secure Method Calls by Instrumenting Bytecode with Aspects -- Access Control -- Distributed Privilege Enforcement in PACS -- Spatiotemporal Access Control Enforcement under Uncertain Location Estimates -- Using Edit Automata for Rewriting-Based Security Enforcement -- Privacy II -- Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providers -- Detecting Inference Channels in Private Multimedia Data via Social Networks -- Database Security II -- Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients -- Data Is Key: Introducing the Data-Based Access Control Paradigm -- Trusted Computing -- Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology -- PAES: Policy-Based Authority Evaluation Scheme -- Short Papers -- Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC -- Methods for Computing Trust and Reputation While Preserving Privacy -- Building an Application Data Behavior Model for Intrusion Detection -- A Trust-Based Access Control Model for Pervasive Computing Applications.
Record Nr. UNINA-9910484176403321
Berlin, Heidelberg : , : Springer-Verlag, , [2009]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data and applications security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings / / Ehud Gudes, Jaideep Vaidya (editors)
Data and applications security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings / / Ehud Gudes, Jaideep Vaidya (editors)
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer-Verlag, , [2009]
Descrizione fisica 1 online resource (324 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Database security
Computer networks - Security measures
Computers - Access control
ISBN 1-282-29798-8
9786612297984
3-642-03007-6
Classificazione DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Database Security I -- Controlled Query Evaluation and Inference-Free View Updates -- Implementing Reflective Access Control in SQL -- Security Policies -- An Approach to Security Policy Configuration Using Semantic Threat Graphs -- Reaction Policy Model Based on Dynamic Organizations and Threat Context -- Towards System Integrity Protection with Graph-Based Policy Analysis -- Privacy I -- Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation -- Privacy-Preserving Telemonitoring for eHealth -- Intrusion Detection and Protocols -- Analysis of Data Dependency Based Intrusion Detection System -- Secure Method Calls by Instrumenting Bytecode with Aspects -- Access Control -- Distributed Privilege Enforcement in PACS -- Spatiotemporal Access Control Enforcement under Uncertain Location Estimates -- Using Edit Automata for Rewriting-Based Security Enforcement -- Privacy II -- Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providers -- Detecting Inference Channels in Private Multimedia Data via Social Networks -- Database Security II -- Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients -- Data Is Key: Introducing the Data-Based Access Control Paradigm -- Trusted Computing -- Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology -- PAES: Policy-Based Authority Evaluation Scheme -- Short Papers -- Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC -- Methods for Computing Trust and Reputation While Preserving Privacy -- Building an Application Data Behavior Model for Intrusion Detection -- A Trust-Based Access Control Model for Pervasive Computing Applications.
Record Nr. UNISA-996465625403316
Berlin, Heidelberg : , : Springer-Verlag, , [2009]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui