top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
10 don'ts on your digital devices [[e-book] ] : the non-techie's survival guide to cyber security and privacy / / Daniel G. Bachrach, Eric J. Rzeszut
10 don'ts on your digital devices [[e-book] ] : the non-techie's survival guide to cyber security and privacy / / Daniel G. Bachrach, Eric J. Rzeszut
Autore Bachrach Daniel G
Pubbl/distr/stampa [New York, NY] : , : Apress, , [2014]
Descrizione fisica 1 online resource (xxvi, 150 pages) : illustrations
Disciplina 004
005.82
Soggetto topico Data protection
Data encryption (Computer science)
ISBN 1-4842-0367-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents; Introduction; Chapter 1: Don't Get Phished; A Closer Look at "Phishing"; "Target"-ed Phishing; Other Forms; What Should You Do?; Additional Reading; Chapter 2: Don't Give Up Your Passwords; Where Did Passwords Come From?; Password Threats and New Solutions; Alternatives to the "Simple" Password: Biometrics and Two-Factor Authentication; Bigger Can Be Better. . .; Mix It Up; Protecting Passwords; What Should You Do?; Additional Reading; Chapter 3: Don't Get Lost in "The Cloud "; What Is "The Cloud"?; Cloud Controversy and Risks; Formalizing an Informal Relationship; Data Breaches
Not Just for Storage AnymoreReliability; Accessibility; What Should You Do?; Additional Reading; Chapter 4: Don't Look for a Free Lunch; Software-Consider the Source; Issues with Warez; Hidden Agenda; Lesser Threats; How to Protect Yourself; Additional Reading; Chapter 5: Don't Do Secure Things from Insecure Places; Background: Wireless Networking at Home, at Work, and on the Road; Home Sweet Home. . .; Back at the Office. . .; On the Road Again. . .; Encryption Standards; VPN; Workplace Security, on the Road; Extra Layers of Protection; Other Uses for VPNs; Additional Reading
Chapter 6: Don't Let the Snoops InWho Are the "Snoops"?; Boundless Informant; PRISM; Tempora; MUSCULAR; FASCIA; Dishfire; Optic Nerve; So, Who Else Is Snooping?; For-Profit Corporations; Employers; Where Your Data Are…; Data on the Move; Taking an Active Role in Protecting Your Data; Data at Rest; Additional Reading; Chapter 7: Don't Be Careless with Your Phone; Mobility in the 21st Century; When It's the Employee's Device, but the Company's Resources-BYOD; When It's the Company's Device, but Used at the Employee's Discretion-COPE; Know Your Rights; Physically Securing Your Phone
Start Me Up-but Not Without a PasswordWhen a Password Isn't Enough; Losing (and Finding!) the Key to Your Digital Life; Mobile Law; Insecure Background Wireless Networks; Don't Trust a Wireless Network Based on Its Name; Don't Trust Your Phone to Connect for You; Bluetooth Hacking; Malware Apps; Operating System Updates; Additional Reading; Chapter 8: Don't Use Dinosaurs; Software: It Has an Expiration Date; The "Good Old Days" of Software; New Software for a New Era; Don't Forget About Mobile Apps; Windows XP; Not Just Windows; Not Just Operating Systems; Not Just Desktops and Laptops
What Can You Do?Additional Reading; Chapter 9: Don't Trust Anyone Over . . . Anything; What Is Social Engineering?; Keep Your Eye on the Ball; Hooking the Phish; Social Engineering via Social Networking; Knowledge Is Power; Big Companies, Big Problems; Ransomware; In-Person Tricks; Not Your Mother's Kind of Tailgating; How to Combat Social Engineering; Additional Reading; Chapter 10: Don't Forget the Physical; Physical Security: An Overview; Physical Security at Home; Letting Outsiders In; Removing Temptation; Don't Blanket the Neighborhood with Wi-Fi; Physical Security at Work
Limit Your Paper (or Whiteboard) Trails
Altri titoli varianti Ten don'ts on your digital devices
Record Nr. UNINA-9910300464403321
Bachrach Daniel G  
[New York, NY] : , : Apress, , [2014]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
2013 International Conference on Anti-Counterfeiting, Security and Identification (ASID) : Shanghai, China, 25-27 August 2013 / / Institute of Electrical and Electronics Engineers
2013 International Conference on Anti-Counterfeiting, Security and Identification (ASID) : Shanghai, China, 25-27 August 2013 / / Institute of Electrical and Electronics Engineers
Pubbl/distr/stampa Piscataway, New Jersey : , : IEEE, , 2013
Descrizione fisica 1 online resource : illustrations
Disciplina 005.82
Soggetto topico Data encryption (Computer science)
ISBN 1-4799-1109-7
1-4799-1111-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti 2013 International Conference on Anti-Counterfeiting, Security and Identification (ASID)
2013 International Conference on Anti-Counterfeiting, Security and Identification
Anti-Counterfeiting, Security and Identification
Record Nr. UNISA-996280853303316
Piscataway, New Jersey : , : IEEE, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
2013 International Conference on Anti-Counterfeiting, Security and Identification (ASID) : Shanghai, China, 25-27 August 2013 / / Institute of Electrical and Electronics Engineers
2013 International Conference on Anti-Counterfeiting, Security and Identification (ASID) : Shanghai, China, 25-27 August 2013 / / Institute of Electrical and Electronics Engineers
Pubbl/distr/stampa Piscataway, New Jersey : , : IEEE, , 2013
Descrizione fisica 1 online resource : illustrations
Disciplina 005.82
Soggetto topico Data encryption (Computer science)
ISBN 1-4799-1109-7
1-4799-1111-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti 2013 International Conference on Anti-Counterfeiting, Security and Identification (ASID)
2013 International Conference on Anti-Counterfeiting, Security and Identification
Anti-Counterfeiting, Security and Identification
Record Nr. UNINA-9910135091303321
Piscataway, New Jersey : , : IEEE, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
2015 International Symposium on Security and Privacy in Social Networks and Big Data : proceedings : 16-18 November 2015, Hangzhou, China / / Institute of Electrical and Electronics Engineers
2015 International Symposium on Security and Privacy in Social Networks and Big Data : proceedings : 16-18 November 2015, Hangzhou, China / / Institute of Electrical and Electronics Engineers
Pubbl/distr/stampa Piscataway, New Jersey : , : IEEE, , [2015]
Descrizione fisica 1 online resource (85 pages) : illustrations
Disciplina 005.82
Soggetto topico Data encryption (Computer science)
Online social networks - Security measures
Privacy, Right of
ISBN 1-4673-8420-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti 2015 International Symposium on Security and Privacy in Social Networks and Big Data
2015 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec)
Security and Privacy in Social Networks and Big Data
Record Nr. UNISA-996280948803316
Piscataway, New Jersey : , : IEEE, , [2015]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
2015 International Symposium on Security and Privacy in Social Networks and Big Data : proceedings : 16-18 November 2015, Hangzhou, China / / Institute of Electrical and Electronics Engineers
2015 International Symposium on Security and Privacy in Social Networks and Big Data : proceedings : 16-18 November 2015, Hangzhou, China / / Institute of Electrical and Electronics Engineers
Pubbl/distr/stampa Piscataway, New Jersey : , : IEEE, , [2015]
Descrizione fisica 1 online resource (85 pages) : illustrations
Disciplina 005.82
Soggetto topico Data encryption (Computer science)
Online social networks - Security measures
Privacy, Right of
ISBN 1-4673-8420-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti 2015 International Symposium on Security and Privacy in Social Networks and Big Data
2015 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec)
Security and Privacy in Social Networks and Big Data
Record Nr. UNINA-9910137400003321
Piscataway, New Jersey : , : IEEE, , [2015]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2020 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom) : CSCloud-EdgeCom 2020 : New York, United States, 1-3 August 2020 : proceedings / / Institute of Electrical and Electronics Engineers
2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2020 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom) : CSCloud-EdgeCom 2020 : New York, United States, 1-3 August 2020 : proceedings / / Institute of Electrical and Electronics Engineers
Pubbl/distr/stampa Piscataway, NJ : , : IEEE, , 2020
Descrizione fisica 1 online resource (xvi, 289 pages) : illustrations
Disciplina 005.82
Soggetto topico Cyberspace - Security measures
ISBN 1-7281-6550-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Deep Learning, Cloud Computing for Credit/Debit Industry Analysis of Consumer Behavior -- Cyber Security and Artificial Intelligence for Cloud-based Internet of Transportation Systems -- Research on Text Classification Method of Distribution Network Equipment Fault based on Deep Learning -- Autonomous Driving and Control: Case Studies with Self-Driving Platforms -- Attribute-Based Weighted Keyword Search Scheme Supporting Multi-Search Mechanism in Fog Computing -- Derepo: A Distributed Privacy-Preserving Data Repository with Decentralized Access Control for Smart Health -- Minimizing Data Breach by a Malicious Fog Node within a Fog Federation -- Digital Forensic Analysis of Fitbit Wearable Technology: An Investigator's Guide -- Kernel-Level Rootkits Features to Train Learning Models Against Namespace Attacks on Containers -- Empirical Evaluation of the Ensemble Framework for Feature Selection in DDoS Attack -- LSTM-based Network Attack Detection: Performance Comparison by Hyper-parameter Values Tuning -- DeepfakeStack: A Deep Ensemble-based Learning Technique for Deepfake Detection -- Trustworthy When Human and Bots Are Mingled -- Detection and Blocking of DGA-based Bot Infected Computers by Monitoring NXDOMAIN Responses -- G-Model: A Novel Approach to Privacy-Preserving 1:M Microdata Publication -- Blockchain-Based Architecture for Secured Cyber-Attack Features Exchange.
Altri titoli varianti 2020 7th IEEE International Conference on Cyber Security and Cloud Computing
Record Nr. UNINA-9910437228103321
Piscataway, NJ : , : IEEE, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2020 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom) : CSCloud-EdgeCom 2020 : New York, United States, 1-3 August 2020 : proceedings / / Institute of Electrical and Electronics Engineers
2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2020 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom) : CSCloud-EdgeCom 2020 : New York, United States, 1-3 August 2020 : proceedings / / Institute of Electrical and Electronics Engineers
Pubbl/distr/stampa Piscataway, NJ : , : IEEE, , 2020
Descrizione fisica 1 online resource (xvi, 289 pages) : illustrations
Disciplina 005.82
Soggetto topico Cyberspace - Security measures
ISBN 1-7281-6550-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Deep Learning, Cloud Computing for Credit/Debit Industry Analysis of Consumer Behavior -- Cyber Security and Artificial Intelligence for Cloud-based Internet of Transportation Systems -- Research on Text Classification Method of Distribution Network Equipment Fault based on Deep Learning -- Autonomous Driving and Control: Case Studies with Self-Driving Platforms -- Attribute-Based Weighted Keyword Search Scheme Supporting Multi-Search Mechanism in Fog Computing -- Derepo: A Distributed Privacy-Preserving Data Repository with Decentralized Access Control for Smart Health -- Minimizing Data Breach by a Malicious Fog Node within a Fog Federation -- Digital Forensic Analysis of Fitbit Wearable Technology: An Investigator's Guide -- Kernel-Level Rootkits Features to Train Learning Models Against Namespace Attacks on Containers -- Empirical Evaluation of the Ensemble Framework for Feature Selection in DDoS Attack -- LSTM-based Network Attack Detection: Performance Comparison by Hyper-parameter Values Tuning -- DeepfakeStack: A Deep Ensemble-based Learning Technique for Deepfake Detection -- Trustworthy When Human and Bots Are Mingled -- Detection and Blocking of DGA-based Bot Infected Computers by Monitoring NXDOMAIN Responses -- G-Model: A Novel Approach to Privacy-Preserving 1:M Microdata Publication -- Blockchain-Based Architecture for Secured Cyber-Attack Features Exchange.
Altri titoli varianti 2020 7th IEEE International Conference on Cyber Security and Cloud Computing
Record Nr. UNISA-996575567803316
Piscataway, NJ : , : IEEE, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
2842-2021 : IEEE Recommended Practice for Secure Multi-Party Computation / / Institute of Electrical and Electronics Engineers
2842-2021 : IEEE Recommended Practice for Secure Multi-Party Computation / / Institute of Electrical and Electronics Engineers
Pubbl/distr/stampa New York, NY, USA : , : IEEE, , 2021
Descrizione fisica 1 online resource (30 pages)
Disciplina 005.82
Soggetto topico Data encryption (Computer science)
Computer security - Management
Cryptography
ISBN 1-5044-7986-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910507107203321
New York, NY, USA : , : IEEE, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
2842-2021 : IEEE Recommended Practice for Secure Multi-Party Computation / / Institute of Electrical and Electronics Engineers
2842-2021 : IEEE Recommended Practice for Secure Multi-Party Computation / / Institute of Electrical and Electronics Engineers
Pubbl/distr/stampa New York, NY, USA : , : IEEE, , 2021
Descrizione fisica 1 online resource (30 pages)
Disciplina 005.82
Soggetto topico Data encryption (Computer science)
Computer security - Management
Cryptography
ISBN 1-5044-7986-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996574861003316
New York, NY, USA : , : IEEE, , 2021
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Ad Hoc Networks [[electronic resource] ] : Fourth International ICST Conference, ADHOCNETS 2012, Paris, France, October 16-17, 2012, Revised Selected Papers / / edited by Jun Zhi-zhong, Nathalie Mitton
Ad Hoc Networks [[electronic resource] ] : Fourth International ICST Conference, ADHOCNETS 2012, Paris, France, October 16-17, 2012, Revised Selected Papers / / edited by Jun Zhi-zhong, Nathalie Mitton
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XII, 366 p. 168 illus.)
Disciplina 005.82
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computer communication systems
Computer security
Data encryption (Computer science)
Algorithms
Computer Communication Networks
Systems and Data Security
Cryptology
Algorithm Analysis and Problem Complexity
ISBN 3-642-36958-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Substitution Networks: Performance Collapse Due to Overhead in Communication Times -- Handheld Analyzer of IEEE 802.15.4 PHY and MAC Frames -- Distributed Medium Access Control with Dynamic Altruism -- Providing Throughput Guarantees in IEEE 802.11 Wireless Networks -- Node Discovery and Replacement Using Mobile Robot -- Dynamic Tracking of Composite Events in Wireless Sensor Networks -- Localization in Wireless Sensor Networks by Cross Entropy Method -- Auction-Based Agent Negotiation in Cognitive Radio Ad Hoc Networks -- Asynchronous Rendezvous Protocol for Cognitive Radio Ad Hoc Networks -- DISON: A Self-organizing Network Management Framework for Wireless Sensor Networks -- A Flexible Deterministic Approach to Key Pre-distribution in Grid Based WSNs -- LPKM: A Lightweight Polynomial-Based Key Management Protocol for Distributed Wireless Sensor Networks -- Cross-Layer Interception Caching for MANETs -- Below Cross-Layer: An Alternative Approach to Service Discovery -- Modeling the Spontaneous Reaction of Mammalian Cells to External Stimuli -- Substitution Networks Based on Software Defined Networking -- A Modular Architecture for Reconfigurable Heterogeneous Networks -- Design Challenges and Solutions for Multi-channel Communications in Vehicular Ad Hoc NETworks -- Movement Speed Based Inter-probe Times for Neighbour Discovery.    .
Record Nr. UNINA-9910437573203321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui

Data di pubblicazione

Altro...