10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacy / / Daniel G. Bachrach, Eric J. Rzeszut |
Autore | Bachrach Daniel G |
Pubbl/distr/stampa | [New York, NY] : , : Apress, , [2014] |
Descrizione fisica | 1 online resource (xxvi, 150 pages) : illustrations |
Disciplina |
004
005.82 |
Soggetto topico |
Data protection
Data encryption (Computer science) |
ISBN |
9781484203675
1484203674 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Contents; Introduction; Chapter 1: Don't Get Phished; A Closer Look at "Phishing"; "Target"-ed Phishing; Other Forms; What Should You Do?; Additional Reading; Chapter 2: Don't Give Up Your Passwords; Where Did Passwords Come From?; Password Threats and New Solutions; Alternatives to the "Simple" Password: Biometrics and Two-Factor Authentication; Bigger Can Be Better. . .; Mix It Up; Protecting Passwords; What Should You Do?; Additional Reading; Chapter 3: Don't Get Lost in "The Cloud "; What Is "The Cloud"?; Cloud Controversy and Risks; Formalizing an Informal Relationship; Data Breaches
Not Just for Storage AnymoreReliability; Accessibility; What Should You Do?; Additional Reading; Chapter 4: Don't Look for a Free Lunch; Software-Consider the Source; Issues with Warez; Hidden Agenda; Lesser Threats; How to Protect Yourself; Additional Reading; Chapter 5: Don't Do Secure Things from Insecure Places; Background: Wireless Networking at Home, at Work, and on the Road; Home Sweet Home. . .; Back at the Office. . .; On the Road Again. . .; Encryption Standards; VPN; Workplace Security, on the Road; Extra Layers of Protection; Other Uses for VPNs; Additional Reading Chapter 6: Don't Let the Snoops InWho Are the "Snoops"?; Boundless Informant; PRISM; Tempora; MUSCULAR; FASCIA; Dishfire; Optic Nerve; So, Who Else Is Snooping?; For-Profit Corporations; Employers; Where Your Data Are…; Data on the Move; Taking an Active Role in Protecting Your Data; Data at Rest; Additional Reading; Chapter 7: Don't Be Careless with Your Phone; Mobility in the 21st Century; When It's the Employee's Device, but the Company's Resources-BYOD; When It's the Company's Device, but Used at the Employee's Discretion-COPE; Know Your Rights; Physically Securing Your Phone Start Me Up-but Not Without a PasswordWhen a Password Isn't Enough; Losing (and Finding!) the Key to Your Digital Life; Mobile Law; Insecure Background Wireless Networks; Don't Trust a Wireless Network Based on Its Name; Don't Trust Your Phone to Connect for You; Bluetooth Hacking; Malware Apps; Operating System Updates; Additional Reading; Chapter 8: Don't Use Dinosaurs; Software: It Has an Expiration Date; The "Good Old Days" of Software; New Software for a New Era; Don't Forget About Mobile Apps; Windows XP; Not Just Windows; Not Just Operating Systems; Not Just Desktops and Laptops What Can You Do?Additional Reading; Chapter 9: Don't Trust Anyone Over . . . Anything; What Is Social Engineering?; Keep Your Eye on the Ball; Hooking the Phish; Social Engineering via Social Networking; Knowledge Is Power; Big Companies, Big Problems; Ransomware; In-Person Tricks; Not Your Mother's Kind of Tailgating; How to Combat Social Engineering; Additional Reading; Chapter 10: Don't Forget the Physical; Physical Security: An Overview; Physical Security at Home; Letting Outsiders In; Removing Temptation; Don't Blanket the Neighborhood with Wi-Fi; Physical Security at Work Limit Your Paper (or Whiteboard) Trails |
Altri titoli varianti | Ten don'ts on your digital devices |
Record Nr. | UNINA-9910300464403321 |
Bachrach Daniel G
![]() |
||
[New York, NY] : , : Apress, , [2014] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
2013 International Conference on Anti-Counterfeiting, Security and Identification (ASID) : Shanghai, China, 25-27 August 2013 / / Institute of Electrical and Electronics Engineers |
Pubbl/distr/stampa | Piscataway, New Jersey : , : IEEE, , 2013 |
Descrizione fisica | 1 online resource : illustrations |
Disciplina | 005.82 |
Soggetto topico | Data encryption (Computer science) |
ISBN |
1-4799-1109-7
1-4799-1111-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti |
2013 International Conference on Anti-Counterfeiting, Security and Identification (ASID)
2013 International Conference on Anti-Counterfeiting, Security and Identification Anti-Counterfeiting, Security and Identification |
Record Nr. | UNISA-996280853303316 |
Piscataway, New Jersey : , : IEEE, , 2013 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
2013 International Conference on Anti-Counterfeiting, Security and Identification (ASID) : Shanghai, China, 25-27 August 2013 / / Institute of Electrical and Electronics Engineers |
Pubbl/distr/stampa | Piscataway, New Jersey : , : IEEE, , 2013 |
Descrizione fisica | 1 online resource : illustrations |
Disciplina | 005.82 |
Soggetto topico | Data encryption (Computer science) |
ISBN |
1-4799-1109-7
1-4799-1111-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti |
2013 International Conference on Anti-Counterfeiting, Security and Identification (ASID)
2013 International Conference on Anti-Counterfeiting, Security and Identification Anti-Counterfeiting, Security and Identification |
Record Nr. | UNINA-9910135091303321 |
Piscataway, New Jersey : , : IEEE, , 2013 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
2015 International Symposium on Security and Privacy in Social Networks and Big Data : proceedings : 16-18 November 2015, Hangzhou, China / / Institute of Electrical and Electronics Engineers |
Pubbl/distr/stampa | Piscataway, New Jersey : , : IEEE, , [2015] |
Descrizione fisica | 1 online resource (85 pages) : illustrations |
Disciplina | 005.82 |
Soggetto topico |
Data encryption (Computer science)
Online social networks - Security measures Privacy, Right of |
ISBN | 1-4673-8420-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti |
2015 International Symposium on Security and Privacy in Social Networks and Big Data
2015 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec) Security and Privacy in Social Networks and Big Data |
Record Nr. | UNISA-996280948803316 |
Piscataway, New Jersey : , : IEEE, , [2015] | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
2015 International Symposium on Security and Privacy in Social Networks and Big Data : proceedings : 16-18 November 2015, Hangzhou, China / / Institute of Electrical and Electronics Engineers |
Pubbl/distr/stampa | Piscataway, New Jersey : , : IEEE, , [2015] |
Descrizione fisica | 1 online resource (85 pages) : illustrations |
Disciplina | 005.82 |
Soggetto topico |
Data encryption (Computer science)
Online social networks - Security measures Privacy, Right of |
ISBN | 1-4673-8420-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti |
2015 International Symposium on Security and Privacy in Social Networks and Big Data
2015 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec) Security and Privacy in Social Networks and Big Data |
Record Nr. | UNINA-9910137400003321 |
Piscataway, New Jersey : , : IEEE, , [2015] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2020 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom) : CSCloud-EdgeCom 2020 : New York, United States, 1-3 August 2020 : proceedings / / Institute of Electrical and Electronics Engineers |
Pubbl/distr/stampa | Piscataway, NJ : , : IEEE, , 2020 |
Descrizione fisica | 1 online resource (xvi, 289 pages) : illustrations |
Disciplina | 005.82 |
Soggetto topico | Cyberspace - Security measures |
ISBN | 1-7281-6550-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Deep Learning, Cloud Computing for Credit/Debit Industry Analysis of Consumer Behavior -- Cyber Security and Artificial Intelligence for Cloud-based Internet of Transportation Systems -- Research on Text Classification Method of Distribution Network Equipment Fault based on Deep Learning -- Autonomous Driving and Control: Case Studies with Self-Driving Platforms -- Attribute-Based Weighted Keyword Search Scheme Supporting Multi-Search Mechanism in Fog Computing -- Derepo: A Distributed Privacy-Preserving Data Repository with Decentralized Access Control for Smart Health -- Minimizing Data Breach by a Malicious Fog Node within a Fog Federation -- Digital Forensic Analysis of Fitbit Wearable Technology: An Investigator's Guide -- Kernel-Level Rootkits Features to Train Learning Models Against Namespace Attacks on Containers -- Empirical Evaluation of the Ensemble Framework for Feature Selection in DDoS Attack -- LSTM-based Network Attack Detection: Performance Comparison by Hyper-parameter Values Tuning -- DeepfakeStack: A Deep Ensemble-based Learning Technique for Deepfake Detection -- Trustworthy When Human and Bots Are Mingled -- Detection and Blocking of DGA-based Bot Infected Computers by Monitoring NXDOMAIN Responses -- G-Model: A Novel Approach to Privacy-Preserving 1:M Microdata Publication -- Blockchain-Based Architecture for Secured Cyber-Attack Features Exchange. |
Altri titoli varianti | 2020 7th IEEE International Conference on Cyber Security and Cloud Computing |
Record Nr. | UNINA-9910437228103321 |
Piscataway, NJ : , : IEEE, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2020 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom) : CSCloud-EdgeCom 2020 : New York, United States, 1-3 August 2020 : proceedings / / Institute of Electrical and Electronics Engineers |
Pubbl/distr/stampa | Piscataway, NJ : , : IEEE, , 2020 |
Descrizione fisica | 1 online resource (xvi, 289 pages) : illustrations |
Disciplina | 005.82 |
Soggetto topico | Cyberspace - Security measures |
ISBN | 1-7281-6550-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Deep Learning, Cloud Computing for Credit/Debit Industry Analysis of Consumer Behavior -- Cyber Security and Artificial Intelligence for Cloud-based Internet of Transportation Systems -- Research on Text Classification Method of Distribution Network Equipment Fault based on Deep Learning -- Autonomous Driving and Control: Case Studies with Self-Driving Platforms -- Attribute-Based Weighted Keyword Search Scheme Supporting Multi-Search Mechanism in Fog Computing -- Derepo: A Distributed Privacy-Preserving Data Repository with Decentralized Access Control for Smart Health -- Minimizing Data Breach by a Malicious Fog Node within a Fog Federation -- Digital Forensic Analysis of Fitbit Wearable Technology: An Investigator's Guide -- Kernel-Level Rootkits Features to Train Learning Models Against Namespace Attacks on Containers -- Empirical Evaluation of the Ensemble Framework for Feature Selection in DDoS Attack -- LSTM-based Network Attack Detection: Performance Comparison by Hyper-parameter Values Tuning -- DeepfakeStack: A Deep Ensemble-based Learning Technique for Deepfake Detection -- Trustworthy When Human and Bots Are Mingled -- Detection and Blocking of DGA-based Bot Infected Computers by Monitoring NXDOMAIN Responses -- G-Model: A Novel Approach to Privacy-Preserving 1:M Microdata Publication -- Blockchain-Based Architecture for Secured Cyber-Attack Features Exchange. |
Altri titoli varianti | 2020 7th IEEE International Conference on Cyber Security and Cloud Computing |
Record Nr. | UNISA-996575567803316 |
Piscataway, NJ : , : IEEE, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
2842-2021 : IEEE Recommended Practice for Secure Multi-Party Computation / / Institute of Electrical and Electronics Engineers |
Pubbl/distr/stampa | New York, NY, USA : , : IEEE, , 2021 |
Descrizione fisica | 1 online resource (30 pages) |
Disciplina | 005.82 |
Soggetto topico |
Data encryption (Computer science)
Computer security - Management Cryptography |
ISBN | 1-5044-7986-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910507107203321 |
New York, NY, USA : , : IEEE, , 2021 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
2842-2021 : IEEE Recommended Practice for Secure Multi-Party Computation / / Institute of Electrical and Electronics Engineers |
Pubbl/distr/stampa | New York, NY, USA : , : IEEE, , 2021 |
Descrizione fisica | 1 online resource (30 pages) |
Disciplina | 005.82 |
Soggetto topico |
Data encryption (Computer science)
Computer security - Management Cryptography |
ISBN | 1-5044-7986-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996574861003316 |
New York, NY, USA : , : IEEE, , 2021 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Ad Hoc Networks : Fourth International ICST Conference, ADHOCNETS 2012, Paris, France, October 16-17, 2012, Revised Selected Papers / / edited by Jun Zhi-zhong, Nathalie Mitton |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XII, 366 p. 168 illus.) |
Disciplina | 005.82 |
Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Soggetto topico |
Computer communication systems
Computer security Data encryption (Computer science) Algorithms Computer Communication Networks Systems and Data Security Cryptology Algorithm Analysis and Problem Complexity |
ISBN | 3-642-36958-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Substitution Networks: Performance Collapse Due to Overhead in Communication Times -- Handheld Analyzer of IEEE 802.15.4 PHY and MAC Frames -- Distributed Medium Access Control with Dynamic Altruism -- Providing Throughput Guarantees in IEEE 802.11 Wireless Networks -- Node Discovery and Replacement Using Mobile Robot -- Dynamic Tracking of Composite Events in Wireless Sensor Networks -- Localization in Wireless Sensor Networks by Cross Entropy Method -- Auction-Based Agent Negotiation in Cognitive Radio Ad Hoc Networks -- Asynchronous Rendezvous Protocol for Cognitive Radio Ad Hoc Networks -- DISON: A Self-organizing Network Management Framework for Wireless Sensor Networks -- A Flexible Deterministic Approach to Key Pre-distribution in Grid Based WSNs -- LPKM: A Lightweight Polynomial-Based Key Management Protocol for Distributed Wireless Sensor Networks -- Cross-Layer Interception Caching for MANETs -- Below Cross-Layer: An Alternative Approach to Service Discovery -- Modeling the Spontaneous Reaction of Mammalian Cells to External Stimuli -- Substitution Networks Based on Software Defined Networking -- A Modular Architecture for Reconfigurable Heterogeneous Networks -- Design Challenges and Solutions for Multi-channel Communications in Vehicular Ad Hoc NETworks -- Movement Speed Based Inter-probe Times for Neighbour Discovery. . |
Record Nr. | UNINA-9910437573203321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|