top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
La Gestion des Identités Numériques / / sous la direction de Maryline Laurent, Samia Bouzefrane
La Gestion des Identités Numériques / / sous la direction de Maryline Laurent, Samia Bouzefrane
Pubbl/distr/stampa London : , : ISTE Editions Ltd., , 2015
Descrizione fisica 1 online resource (284 pages)
Disciplina 005.8
Collana Systèmes d'information, web et informatique ubiquitaire
Soggetto topico Computer security
Computer networks - Access control
ISBN 1-78406-056-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione fre
Nota di contenuto Intro -- Table des matières -- Préface -- 1 Les identités numériques -- 2 La gestion d'identités par la fédération -- 3 Systèmes d'authentification -- 4 Gestion de la vie privée et protection des données à caractère personnel -- 5 L'identité numérique dans le Cloud computing -- Index.
Record Nr. UNINA-9910797062703321
London : , : ISTE Editions Ltd., , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
La Gestion des Identités Numériques / / sous la direction de Maryline Laurent, Samia Bouzefrane
La Gestion des Identités Numériques / / sous la direction de Maryline Laurent, Samia Bouzefrane
Pubbl/distr/stampa London : , : ISTE Editions Ltd., , 2015
Descrizione fisica 1 online resource (284 pages)
Disciplina 005.8
Collana Systèmes d'information, web et informatique ubiquitaire
Soggetto topico Computer security
Computer networks - Access control
ISBN 1-78406-056-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione fre
Nota di contenuto Intro -- Table des matières -- Préface -- 1 Les identités numériques -- 2 La gestion d'identités par la fédération -- 3 Systèmes d'authentification -- 4 Gestion de la vie privée et protection des données à caractère personnel -- 5 L'identité numérique dans le Cloud computing -- Index.
Record Nr. UNINA-9910821658103321
London : , : ISTE Editions Ltd., , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Wireless and mobile networks security [[electronic resource] ] : security basics, security in on-the-shelf and emerging technologies / / edited by Hakima Chaouchi, Maryline Laurent-Maknavicius
Wireless and mobile networks security [[electronic resource] ] : security basics, security in on-the-shelf and emerging technologies / / edited by Hakima Chaouchi, Maryline Laurent-Maknavicius
Pubbl/distr/stampa London, : ISTE
Descrizione fisica 1 online resource (689 p.)
Disciplina 005.8
Altri autori (Persone) ChaouchiHakima
Laurent-MaknaviciusMaryline
Collana ISTE
Soggetto topico Wireless communication systems - Security measures
Mobile communication systems - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-282-69149-X
9786612691492
0-470-61188-X
0-470-61028-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Wireless and Mobile Network Security: Security Basics, Security in On-the-shelf and Emerging Technologies; Table of Contents; Introduction; Part 1. Basic Concepts; Chapter 1. Introduction to Mobile and Wireless Networks; 1.1. Introduction; 1.2. Mobile cellular networks; 1.2.1. Introduction; 1.2.2. Cellular network basic concepts; 1.2.3. First generation (1G) mobile; 1.2.4. Second generation (2G) mobile; 1.2.5. Third generation (3G) mobile; 1.3. IEEE wireless networks; 1.3.1. Introduction; 1.3.2. WLAN: IEEE 802.11; 1.3.3. WPAN: IEEE 802.15; 1.3.4. WMAN: IEEE 802.16
1.3.5. WMAN mobile: IEEE 802.201.3.6. MIH: IEEE 802.21; 1.3.7. WRAN: IEEE 802.22; 1.4. Mobile Internet networks; 1.4.1. Introduction; 1.4.2. Macro mobility; 1.4.3. Micro mobility; 1.4.4. Personal mobility and SIP; 1.4.5. Identity based mobility; 1.4.6. NEMO and MANET networks; 1.5. Current trends; 1.5.1. All-IP, IMS and FMC; 1.5.2. B3G and 4G; 1.5.3. Applications; 1.6. Conclusions; 1.7. Bibliography; Chapter 2. Vulnerabilities of Wired and Wireless Networks; 2.1. Introduction; 2.2. Security in the digital age; 2.2.1. Private property: from vulnerabilities to risks
2.2.2. Definition of security2.2.3. Trust and subjectivity in security; 2.2.4. Services and security; 2.3. Threats and risks to telecommunications systems; 2.3.1. Role of telecommunications systems; 2.3.2. Threat models in telecommunications systems; 2.3.3. Homogenity vs. heterogenity; 2.3.4. The Internet and security; 2.3.5. The role of the medium; 2.3.6. Risks to the infrastructure; 2.3.7. Personal risks; 2.4. From wireline vulnerabilities to vulnerabilities in wireless communications; 2.4.1. Changing the medium; 2.4.2. Wireless terminals; 2.4.3. New services; 2.5. Conclusions
2.6. BibliographyChapter 3. Fundamental Security Mechanisms; 3.1. Introduction; 3.2. Basics on security; 3.2.1. Security services; 3.2.2. Symmetric and asymmetric cryptography; 3.2.3. Hash functions; 3.2.4. Electronic signatures and MAC; 3.2.5. Public Key Infrastructure (PKI) and electronic certificates; 3.2.6. Management of cryptographic keys; 3.2.7. Cryptographic protocols; 3.3. Secure communication protocols and VPN implementation; 3.3.1. Secure Socket Layer (SSL) and Transport Layer Security (TLS); 3.3.2. IPsec protocol suite; 3.3.3. Comparison between SSL and IPsec security protocols
3.3.4. IPsec VPN and SSL VPN3.4. Authentication; 3.4.1. Authentication mechanisms.; 3.4.2. AAA protocols to control access to a private network or an operator's network; 3.5. Access control; 3.5.1. Firewalls; 3.5.2. Intrusion detection; 3.6. Conclusions; 3.7. Bibliography; Chapter 4. Wi-Fi Security Dedicated Architectures; 4.1. Introduction; 4.2. Hot spot architecture: captive portals; 4.2.1. Overview; 4.2.2. Captive portal overview; 4.2.3. Security analysis; 4.2.4. Conclusions; 4.3. Wireless intrusion detection systems (WIDS); 4.3.1. Introduction
4.3.2. Wireless intrusion detection systems architectures
Record Nr. UNINA-9910139512903321
London, : ISTE
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Wireless and mobile networks security [[electronic resource] ] : security basics, security in on-the-shelf and emerging technologies / / edited by Hakima Chaouchi, Maryline Laurent-Maknavicius
Wireless and mobile networks security [[electronic resource] ] : security basics, security in on-the-shelf and emerging technologies / / edited by Hakima Chaouchi, Maryline Laurent-Maknavicius
Pubbl/distr/stampa London, : ISTE
Descrizione fisica 1 online resource (689 p.)
Disciplina 005.8
Altri autori (Persone) ChaouchiHakima
Laurent-MaknaviciusMaryline
Collana ISTE
Soggetto topico Wireless communication systems - Security measures
Mobile communication systems - Security measures
ISBN 1-282-69149-X
9786612691492
0-470-61188-X
0-470-61028-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Wireless and Mobile Network Security: Security Basics, Security in On-the-shelf and Emerging Technologies; Table of Contents; Introduction; Part 1. Basic Concepts; Chapter 1. Introduction to Mobile and Wireless Networks; 1.1. Introduction; 1.2. Mobile cellular networks; 1.2.1. Introduction; 1.2.2. Cellular network basic concepts; 1.2.3. First generation (1G) mobile; 1.2.4. Second generation (2G) mobile; 1.2.5. Third generation (3G) mobile; 1.3. IEEE wireless networks; 1.3.1. Introduction; 1.3.2. WLAN: IEEE 802.11; 1.3.3. WPAN: IEEE 802.15; 1.3.4. WMAN: IEEE 802.16
1.3.5. WMAN mobile: IEEE 802.201.3.6. MIH: IEEE 802.21; 1.3.7. WRAN: IEEE 802.22; 1.4. Mobile Internet networks; 1.4.1. Introduction; 1.4.2. Macro mobility; 1.4.3. Micro mobility; 1.4.4. Personal mobility and SIP; 1.4.5. Identity based mobility; 1.4.6. NEMO and MANET networks; 1.5. Current trends; 1.5.1. All-IP, IMS and FMC; 1.5.2. B3G and 4G; 1.5.3. Applications; 1.6. Conclusions; 1.7. Bibliography; Chapter 2. Vulnerabilities of Wired and Wireless Networks; 2.1. Introduction; 2.2. Security in the digital age; 2.2.1. Private property: from vulnerabilities to risks
2.2.2. Definition of security2.2.3. Trust and subjectivity in security; 2.2.4. Services and security; 2.3. Threats and risks to telecommunications systems; 2.3.1. Role of telecommunications systems; 2.3.2. Threat models in telecommunications systems; 2.3.3. Homogenity vs. heterogenity; 2.3.4. The Internet and security; 2.3.5. The role of the medium; 2.3.6. Risks to the infrastructure; 2.3.7. Personal risks; 2.4. From wireline vulnerabilities to vulnerabilities in wireless communications; 2.4.1. Changing the medium; 2.4.2. Wireless terminals; 2.4.3. New services; 2.5. Conclusions
2.6. BibliographyChapter 3. Fundamental Security Mechanisms; 3.1. Introduction; 3.2. Basics on security; 3.2.1. Security services; 3.2.2. Symmetric and asymmetric cryptography; 3.2.3. Hash functions; 3.2.4. Electronic signatures and MAC; 3.2.5. Public Key Infrastructure (PKI) and electronic certificates; 3.2.6. Management of cryptographic keys; 3.2.7. Cryptographic protocols; 3.3. Secure communication protocols and VPN implementation; 3.3.1. Secure Socket Layer (SSL) and Transport Layer Security (TLS); 3.3.2. IPsec protocol suite; 3.3.3. Comparison between SSL and IPsec security protocols
3.3.4. IPsec VPN and SSL VPN3.4. Authentication; 3.4.1. Authentication mechanisms.; 3.4.2. AAA protocols to control access to a private network or an operator's network; 3.5. Access control; 3.5.1. Firewalls; 3.5.2. Intrusion detection; 3.6. Conclusions; 3.7. Bibliography; Chapter 4. Wi-Fi Security Dedicated Architectures; 4.1. Introduction; 4.2. Hot spot architecture: captive portals; 4.2.1. Overview; 4.2.2. Captive portal overview; 4.2.3. Security analysis; 4.2.4. Conclusions; 4.3. Wireless intrusion detection systems (WIDS); 4.3.1. Introduction
4.3.2. Wireless intrusion detection systems architectures
Record Nr. UNINA-9910830184103321
London, : ISTE
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Wireless and mobile networks security : security basics, security in on-the-shelf and emerging technologies / / edited by Hakima Chaouchi, Maryline Laurent-Maknavicius
Wireless and mobile networks security : security basics, security in on-the-shelf and emerging technologies / / edited by Hakima Chaouchi, Maryline Laurent-Maknavicius
Pubbl/distr/stampa London, : ISTE
Descrizione fisica 1 online resource (689 p.)
Disciplina 005.8
Altri autori (Persone) ChaouchiHakima
Laurent-MaknaviciusMaryline
Collana ISTE
Soggetto topico Wireless communication systems - Security measures
Mobile communication systems - Security measures
ISBN 1-282-69149-X
9786612691492
0-470-61188-X
0-470-61028-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Wireless and Mobile Network Security: Security Basics, Security in On-the-shelf and Emerging Technologies; Table of Contents; Introduction; Part 1. Basic Concepts; Chapter 1. Introduction to Mobile and Wireless Networks; 1.1. Introduction; 1.2. Mobile cellular networks; 1.2.1. Introduction; 1.2.2. Cellular network basic concepts; 1.2.3. First generation (1G) mobile; 1.2.4. Second generation (2G) mobile; 1.2.5. Third generation (3G) mobile; 1.3. IEEE wireless networks; 1.3.1. Introduction; 1.3.2. WLAN: IEEE 802.11; 1.3.3. WPAN: IEEE 802.15; 1.3.4. WMAN: IEEE 802.16
1.3.5. WMAN mobile: IEEE 802.201.3.6. MIH: IEEE 802.21; 1.3.7. WRAN: IEEE 802.22; 1.4. Mobile Internet networks; 1.4.1. Introduction; 1.4.2. Macro mobility; 1.4.3. Micro mobility; 1.4.4. Personal mobility and SIP; 1.4.5. Identity based mobility; 1.4.6. NEMO and MANET networks; 1.5. Current trends; 1.5.1. All-IP, IMS and FMC; 1.5.2. B3G and 4G; 1.5.3. Applications; 1.6. Conclusions; 1.7. Bibliography; Chapter 2. Vulnerabilities of Wired and Wireless Networks; 2.1. Introduction; 2.2. Security in the digital age; 2.2.1. Private property: from vulnerabilities to risks
2.2.2. Definition of security2.2.3. Trust and subjectivity in security; 2.2.4. Services and security; 2.3. Threats and risks to telecommunications systems; 2.3.1. Role of telecommunications systems; 2.3.2. Threat models in telecommunications systems; 2.3.3. Homogenity vs. heterogenity; 2.3.4. The Internet and security; 2.3.5. The role of the medium; 2.3.6. Risks to the infrastructure; 2.3.7. Personal risks; 2.4. From wireline vulnerabilities to vulnerabilities in wireless communications; 2.4.1. Changing the medium; 2.4.2. Wireless terminals; 2.4.3. New services; 2.5. Conclusions
2.6. BibliographyChapter 3. Fundamental Security Mechanisms; 3.1. Introduction; 3.2. Basics on security; 3.2.1. Security services; 3.2.2. Symmetric and asymmetric cryptography; 3.2.3. Hash functions; 3.2.4. Electronic signatures and MAC; 3.2.5. Public Key Infrastructure (PKI) and electronic certificates; 3.2.6. Management of cryptographic keys; 3.2.7. Cryptographic protocols; 3.3. Secure communication protocols and VPN implementation; 3.3.1. Secure Socket Layer (SSL) and Transport Layer Security (TLS); 3.3.2. IPsec protocol suite; 3.3.3. Comparison between SSL and IPsec security protocols
3.3.4. IPsec VPN and SSL VPN3.4. Authentication; 3.4.1. Authentication mechanisms.; 3.4.2. AAA protocols to control access to a private network or an operator's network; 3.5. Access control; 3.5.1. Firewalls; 3.5.2. Intrusion detection; 3.6. Conclusions; 3.7. Bibliography; Chapter 4. Wi-Fi Security Dedicated Architectures; 4.1. Introduction; 4.2. Hot spot architecture: captive portals; 4.2.1. Overview; 4.2.2. Captive portal overview; 4.2.3. Security analysis; 4.2.4. Conclusions; 4.3. Wireless intrusion detection systems (WIDS); 4.3.1. Introduction
4.3.2. Wireless intrusion detection systems architectures
Record Nr. UNINA-9910876886103321
London, : ISTE
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui