IEE proceedings Information security |
Pubbl/distr/stampa | Stevenage, UK : , : Institution of Electrical Engineers, , c2005-c2006 |
Descrizione fisica | 1 online resource |
Soggetto topico |
Computer security
Cryptography Computer networks - Security measures Database security Réseaux d'ordinateurs - Sécurité - Périodiques Cryptographie Réseaux d'ordinateurs - Sécurité - Mesures Bases de données - Sécurité - Mesures Sécurité informatique |
Soggetto genere / forma | Periodicals. |
Soggetto non controllato | Computer Science |
ISSN | 1747-0730 |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Altri titoli varianti |
Information security
Institution of Electrical Engineers proceedings. |
Record Nr. | UNISA-996207302403316 |
Stevenage, UK : , : Institution of Electrical Engineers, , c2005-c2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
IEE proceedings Information security |
Pubbl/distr/stampa | Stevenage, UK : , : Institution of Electrical Engineers, , c2005-c2006 |
Descrizione fisica | 1 online resource |
Soggetto topico |
Computer security
Cryptography Computer networks - Security measures Database security Réseaux d'ordinateurs - Sécurité - Périodiques Cryptographie Réseaux d'ordinateurs - Sécurité - Mesures Bases de données - Sécurité - Mesures Sécurité informatique |
Soggetto genere / forma | Periodicals. |
Soggetto non controllato | Computer Science |
ISSN | 1747-0730 |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Altri titoli varianti |
Information security
Institution of Electrical Engineers proceedings. |
Record Nr. | UNINA-9910146767203321 |
Stevenage, UK : , : Institution of Electrical Engineers, , c2005-c2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
IET information security |
Pubbl/distr/stampa | Stevenage [Herts., U.K.] : , : Institution of Engineering and Technology, , ©2007- |
Descrizione fisica | 1 online resource |
Disciplina | 005 |
Soggetto topico |
Computer security
Cryptography Computer networks - Security measures Database security Sécurité informatique Cryptographie Réseaux d'ordinateurs - Sécurité - Mesures Bases de données - Sécurité - Mesures |
Soggetto genere / forma | Periodicals. |
ISSN | 1751-8717 |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Altri titoli varianti | Information security |
Record Nr. | UNISA-996207436803316 |
Stevenage [Herts., U.K.] : , : Institution of Engineering and Technology, , ©2007- | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
IET information security |
Pubbl/distr/stampa | Stevenage [Herts., U.K.] : , : Institution of Engineering and Technology, , ©2007- |
Descrizione fisica | 1 online resource |
Disciplina | 005 |
Soggetto topico |
Computer security
Cryptography Computer networks - Security measures Database security Sécurité informatique Cryptographie Réseaux d'ordinateurs - Sécurité - Mesures Bases de données - Sécurité - Mesures |
Soggetto genere / forma | Periodicals. |
ISSN | 1751-8717 |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Altri titoli varianti | Information security |
Record Nr. | UNINA-9910146335703321 |
Stevenage [Herts., U.K.] : , : Institution of Engineering and Technology, , ©2007- | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Implementing database security and auditing [[electronic resource] /] / Roy [i.e. Ron] Ben Natan |
Autore | Ben-Natan Ron |
Pubbl/distr/stampa | Boston, : Digital Press, 2005 |
Descrizione fisica | 1 online resource (433 p.) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Data protection Database security |
Soggetto genere / forma | Electronic books. |
ISBN |
1-280-96449-9
9786610964499 0-08-047064-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | front cover; copyright; Contents; front matter; Preface; body; 1. Getting Started; 2. Database Security within the General Security Landscape and a Defense- in- Depth Strategy; 3. The Database as a Networked Server; 4. Authentication and Password Security; 5. Application Security; 6. Using Granular Access Control; 7. Using the Database To Do Too Much; 8. Securing database- to- database communications; 9. Trojans; 10. Encryption; 11. Regulations and Compliance; 12. Auditing Categories; 13. Auditing Architectures; Index |
Record Nr. | UNINA-9910451452103321 |
Ben-Natan Ron | ||
Boston, : Digital Press, 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Implementing database security and auditing [[electronic resource] /] / Roy [i.e. Ron] Ben Natan |
Autore | Ben-Natan Ron |
Pubbl/distr/stampa | Boston, : Digital Press, 2005 |
Descrizione fisica | 1 online resource (433 p.) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Data protection Database security |
ISBN |
1-280-96449-9
9786610964499 0-08-047064-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | front cover; copyright; Contents; front matter; Preface; body; 1. Getting Started; 2. Database Security within the General Security Landscape and a Defense- in- Depth Strategy; 3. The Database as a Networked Server; 4. Authentication and Password Security; 5. Application Security; 6. Using Granular Access Control; 7. Using the Database To Do Too Much; 8. Securing database- to- database communications; 9. Trojans; 10. Encryption; 11. Regulations and Compliance; 12. Auditing Categories; 13. Auditing Architectures; Index |
Record Nr. | UNINA-9910784234403321 |
Ben-Natan Ron | ||
Boston, : Digital Press, 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Implementing database security and auditing / / Roy [i.e. Ron] Ben Natan |
Autore | Ben-Natan Ron |
Edizione | [5th ed.] |
Pubbl/distr/stampa | Boston, : Digital Press, 2005 |
Descrizione fisica | 1 online resource (433 p.) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Data protection Database security |
ISBN |
1-280-96449-9
9786610964499 0-08-047064-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | front cover; copyright; Contents; front matter; Preface; body; 1. Getting Started; 2. Database Security within the General Security Landscape and a Defense- in- Depth Strategy; 3. The Database as a Networked Server; 4. Authentication and Password Security; 5. Application Security; 6. Using Granular Access Control; 7. Using the Database To Do Too Much; 8. Securing database- to- database communications; 9. Trojans; 10. Encryption; 11. Regulations and Compliance; 12. Auditing Categories; 13. Auditing Architectures; Index |
Record Nr. | UNINA-9910826643103321 |
Ben-Natan Ron | ||
Boston, : Digital Press, 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Implementing database security and auditing [electronic resource] : a guide for DBAs, information security administrators and auditors / Ron Ben Natan |
Autore | Ben-Natan, Ron. |
Pubbl/distr/stampa | Burlington, MA : Elsevier Digital Press, c2005 |
Descrizione fisica | xvii, 413 p. : ill. ; 24 cm. |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Data protection Database security Systèmes informatiques - Sécurité - Mesures Protection de l'information (Informatique) Bases de données - Sécurité - Mesures |
Soggetto genere / forma | Electronic books. |
ISBN |
9781555583347
1555583342 |
Formato | Risorse elettroniche |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Preface -- 1. Getting Started -- 2. Database Security within the General Security -- Landscape and a Defense-in-Depth Strategy -- 3. The Database as a Networked Server -- 4. Authentication and Password Security -- 5. Application Security -- 6. Using Granular Access Control -- 7. Using the Database To Do Too Much -- 8. Securing database-to-database communications -- 9. Trojans -- 10. Encryption -- 11. Regulations and Compliance -- 12. Auditing Categories -- 13. Auditing Architectures -- Index. |
Record Nr. | UNISALENTO-991003247759707536 |
Ben-Natan, Ron. | ||
Burlington, MA : Elsevier Digital Press, c2005 | ||
Risorse elettroniche | ||
Lo trovi qui: Univ. del Salento | ||
|
Intel trusted execution technology for server platforms : a guide to more secure datacenters / / William Futral, James Greene ; foreword by Albert Caballero, CTO, Trapezoid |
Autore | Futral William |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Apress, 2013 |
Descrizione fisica | 1 online resource (xx, 133 pages) : illustrations (chiefly color) |
Disciplina |
004
005.74 005.8 005.82 |
Collana | The expert's voice in security |
Soggetto topico |
Client/server computing - Security measures
Database security Data encryption (Computer science) |
ISBN | 1-4302-6149-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1. Introduction to trust and Intel trusted execution technology -- Chapter 2. Fundamental principles of Intel TXT -- Chapter 3. Getting it to work : provisioning Intel TXT -- Chapter 4. Foundation for control : establishing launch control policy -- Chapter 5. Raising visibility for trust : the role of attestation -- Chapter 6. Trusted computing : opportunities in software -- Chapter 7. Creating a more secure datacenter and cloud -- Chapter 8. The future of trusted computing. |
Record Nr. | UNISA-996198790203316 |
Futral William | ||
Apress, 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Intel trusted execution technology for server platforms : a guide to more secure datacenters / / William Futral, James Greene ; foreword by Albert Caballero, CTO, Trapezoid |
Autore | Futral William |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Apress, 2013 |
Descrizione fisica | 1 online resource (xx, 133 pages) : illustrations (chiefly color) |
Disciplina |
004
005.74 005.8 005.82 |
Collana | The expert's voice in security |
Soggetto topico |
Client/server computing - Security measures
Database security Data encryption (Computer science) |
ISBN | 1-4302-6149-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1. Introduction to trust and Intel trusted execution technology -- Chapter 2. Fundamental principles of Intel TXT -- Chapter 3. Getting it to work : provisioning Intel TXT -- Chapter 4. Foundation for control : establishing launch control policy -- Chapter 5. Raising visibility for trust : the role of attestation -- Chapter 6. Trusted computing : opportunities in software -- Chapter 7. Creating a more secure datacenter and cloud -- Chapter 8. The future of trusted computing. |
Record Nr. | UNINA-9910293151603321 |
Futral William | ||
Apress, 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|