80 (ho tanta) storia : gli ottant'anni del Museo storico dell'Arma dei Carabinieri / a cura di Flavio Carbone
| 80 (ho tanta) storia : gli ottant'anni del Museo storico dell'Arma dei Carabinieri / a cura di Flavio Carbone |
| Pubbl/distr/stampa | Roma : Ente editoriale per l'Arma dei Carabinieri, 2019 |
| Descrizione fisica | 214 p. : ill. ; 22 cm |
| Disciplina | 363.28 |
| Altri autori (Persone) | Carbone, Flavio |
| Soggetto topico | Carabinieri - Storia - Esposizioni |
| ISBN | 978889242483 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | und |
| Record Nr. | UNISALENTO-991003949309707536 |
| Roma : Ente editoriale per l'Arma dei Carabinieri, 2019 | ||
| Lo trovi qui: Univ. del Salento | ||
| ||
80 ho tanta storia : gli ottant'anni del Museo storico dell'Arma dei Carabinieri / a cura di Flavio Carbone
| 80 ho tanta storia : gli ottant'anni del Museo storico dell'Arma dei Carabinieri / a cura di Flavio Carbone |
| Pubbl/distr/stampa | Roma, : Ente editoriale per l'Arma dei Carabinieri, 2019 |
| Descrizione fisica | 214 p. : ill. ; 22 cm |
| Disciplina | 363.28 |
| Soggetto topico |
Roma - Museo storico dell'Arma dei carabinieri
Museo storico dell'Arma dei Carabinieri - Storia |
| ISBN | 978889242483 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | ita |
| Altri titoli varianti | Ottanta (ho tanta) storia |
| Record Nr. | UNICAS-RML0448811 |
| Roma, : Ente editoriale per l'Arma dei Carabinieri, 2019 | ||
| Lo trovi qui: Univ. di Cassino e del Lazio Meridionale | ||
| ||
Carry on : sound advice from schneier on security / / Bruce Schneier
| Carry on : sound advice from schneier on security / / Bruce Schneier |
| Autore | Schneier Bruce |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Indianapolis, Indiana : , : Wiley, , 2014 |
| Descrizione fisica | 1 online resource (378 p.) |
| Disciplina | 363.28 |
| Soggetto topico |
Security systems
Terrorism |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-118-79083-9
1-118-79082-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Title Page; Copyright; Contents; Chapter 1 The Business and Economics of Security; Consolidation: Plague or Progress; Prediction: RSA Conference Will Shrink Like a Punctured Balloon; How to Sell Security; Why People Are Willing to Take Risks; How to Sell Security; Why Do We Accept Signatures by Fax?; The Pros and Cons of LifeLock; The Problem Is Information Insecurity; Security ROI: Fact or Fiction?; The Data Imperative; Caveat Emptor; Social Networking Risks; Do You Know Where Your Data Are?; Be Careful When You Come to Put Your Trust in the Clouds; Is Perfect Access Control Possible?
News Media Strategies for Survival for JournalistsSecurity and Function Creep; Weighing the Risk of Hiring Hackers; Should Enterprises Give In to IT Consumerization at the Expense of Security?; The Vulnerabilities Market and the Future of Security; So You Want to Be a Security Expert; When It Comes to Security, We're Back to Feudalism; I Pledge Allegiance to the United States of Convenience; The Good, the Bad, and the Ugly; You Have No Control Over Security on the Feudal Internet; Chapter 2 Crime, Terrorism, Spying, and War; America's Dilemma: Close Security Holes, or Exploit Them Ourselves Are Photographers Really a Threat?CCTV Doesn't Keep Us Safe, Yet the Cameras Are Everywhere; Chinese Cyberattacks: Myth or Menace?; How a Classic Man-in-the-Middle Attack Saved Colombian Hostages; How to Create the Perfect Fake Identity; A Fetishistic Approach to Security Is a Perverse Way to Keep Us Safe; The Seven Habits of Highly Ineffective Terrorists; Why Society Should Pay the True Costs of Security; Why Technology Won't Prevent Identity Theft; Terrorists May Use Google Earth, but Fear Is No Reason to Ban It; Thwarting an Internal Hacker An Enterprising Criminal Has Spotted a Gap in the MarketWe Shouldn't Poison Our Minds with Fear of Bioterrorism; Raising the Cost of Paperwork Errors Will Improve Accuracy; So-Called Cyberattack Was Overblown; Why Framing Your Enemies Is Now Virtually Child's Play; Beyond Security Theater; Feeling and Reality; Refuse to Be Terrorized; Cold War Encryption Is Unrealistic in Today's Trenches; Profiling Makes Us Less Safe; Fixing Intelligence Failures; Spy Cameras Won't Make Us Safer; Scanners, Sensors Are Wrong Way to Secure the Subway; Preventing Terrorist Attacks in Crowded Areas Where Are All the Terrorist Attacks?Hard to Pull Off; Few Terrorists; Small Attacks Aren't Enough; Worst-Case Thinking Makes Us Nuts, Not Safe; Threat of ""Cyberwar"" Has Been Hugely Hyped; Cyberwar and the Future of Cyber Conflict; Why Terror Alert Codes Never Made Sense; Debate Club: An International Cyberwar Treaty Is the Only Way to Stem the Threat; Overreaction and Overly Specific Reactions to Rare Risks; Militarizing Cyberspace Will Do More Harm Than Good; Rhetoric of Cyber War Breeds Fear-and More Cyber War; Attacks from China; GhostNet; Profitable The Boston Marathon Bombing: Keep Calm and Carry On |
| Record Nr. | UNINA-9910462985303321 |
Schneier Bruce
|
||
| Indianapolis, Indiana : , : Wiley, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Carry on : sound advice from schneier on security / / Bruce Schneier
| Carry on : sound advice from schneier on security / / Bruce Schneier |
| Autore | Schneier Bruce |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Indianapolis, Indiana : , : Wiley, , 2014 |
| Descrizione fisica | 1 online resource (378 p.) |
| Disciplina | 363.28 |
| Soggetto topico |
Security systems
Terrorism |
| ISBN |
1-118-79083-9
1-118-79082-0 |
| Classificazione | ST 277 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Title Page; Copyright; Contents; Chapter 1 The Business and Economics of Security; Consolidation: Plague or Progress; Prediction: RSA Conference Will Shrink Like a Punctured Balloon; How to Sell Security; Why People Are Willing to Take Risks; How to Sell Security; Why Do We Accept Signatures by Fax?; The Pros and Cons of LifeLock; The Problem Is Information Insecurity; Security ROI: Fact or Fiction?; The Data Imperative; Caveat Emptor; Social Networking Risks; Do You Know Where Your Data Are?; Be Careful When You Come to Put Your Trust in the Clouds; Is Perfect Access Control Possible?
News Media Strategies for Survival for JournalistsSecurity and Function Creep; Weighing the Risk of Hiring Hackers; Should Enterprises Give In to IT Consumerization at the Expense of Security?; The Vulnerabilities Market and the Future of Security; So You Want to Be a Security Expert; When It Comes to Security, We're Back to Feudalism; I Pledge Allegiance to the United States of Convenience; The Good, the Bad, and the Ugly; You Have No Control Over Security on the Feudal Internet; Chapter 2 Crime, Terrorism, Spying, and War; America's Dilemma: Close Security Holes, or Exploit Them Ourselves Are Photographers Really a Threat?CCTV Doesn't Keep Us Safe, Yet the Cameras Are Everywhere; Chinese Cyberattacks: Myth or Menace?; How a Classic Man-in-the-Middle Attack Saved Colombian Hostages; How to Create the Perfect Fake Identity; A Fetishistic Approach to Security Is a Perverse Way to Keep Us Safe; The Seven Habits of Highly Ineffective Terrorists; Why Society Should Pay the True Costs of Security; Why Technology Won't Prevent Identity Theft; Terrorists May Use Google Earth, but Fear Is No Reason to Ban It; Thwarting an Internal Hacker An Enterprising Criminal Has Spotted a Gap in the MarketWe Shouldn't Poison Our Minds with Fear of Bioterrorism; Raising the Cost of Paperwork Errors Will Improve Accuracy; So-Called Cyberattack Was Overblown; Why Framing Your Enemies Is Now Virtually Child's Play; Beyond Security Theater; Feeling and Reality; Refuse to Be Terrorized; Cold War Encryption Is Unrealistic in Today's Trenches; Profiling Makes Us Less Safe; Fixing Intelligence Failures; Spy Cameras Won't Make Us Safer; Scanners, Sensors Are Wrong Way to Secure the Subway; Preventing Terrorist Attacks in Crowded Areas Where Are All the Terrorist Attacks?Hard to Pull Off; Few Terrorists; Small Attacks Aren't Enough; Worst-Case Thinking Makes Us Nuts, Not Safe; Threat of ""Cyberwar"" Has Been Hugely Hyped; Cyberwar and the Future of Cyber Conflict; Why Terror Alert Codes Never Made Sense; Debate Club: An International Cyberwar Treaty Is the Only Way to Stem the Threat; Overreaction and Overly Specific Reactions to Rare Risks; Militarizing Cyberspace Will Do More Harm Than Good; Rhetoric of Cyber War Breeds Fear-and More Cyber War; Attacks from China; GhostNet; Profitable The Boston Marathon Bombing: Keep Calm and Carry On |
| Record Nr. | UNINA-9910787630603321 |
Schneier Bruce
|
||
| Indianapolis, Indiana : , : Wiley, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Carry on : sound advice from schneier on security / / Bruce Schneier
| Carry on : sound advice from schneier on security / / Bruce Schneier |
| Autore | Schneier Bruce |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Indianapolis, Indiana : , : Wiley, , 2014 |
| Descrizione fisica | 1 online resource (378 p.) |
| Disciplina | 363.28 |
| Soggetto topico |
Security systems
Terrorism |
| ISBN |
1-118-79083-9
1-118-79082-0 |
| Classificazione | ST 277 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Title Page; Copyright; Contents; Chapter 1 The Business and Economics of Security; Consolidation: Plague or Progress; Prediction: RSA Conference Will Shrink Like a Punctured Balloon; How to Sell Security; Why People Are Willing to Take Risks; How to Sell Security; Why Do We Accept Signatures by Fax?; The Pros and Cons of LifeLock; The Problem Is Information Insecurity; Security ROI: Fact or Fiction?; The Data Imperative; Caveat Emptor; Social Networking Risks; Do You Know Where Your Data Are?; Be Careful When You Come to Put Your Trust in the Clouds; Is Perfect Access Control Possible?
News Media Strategies for Survival for JournalistsSecurity and Function Creep; Weighing the Risk of Hiring Hackers; Should Enterprises Give In to IT Consumerization at the Expense of Security?; The Vulnerabilities Market and the Future of Security; So You Want to Be a Security Expert; When It Comes to Security, We're Back to Feudalism; I Pledge Allegiance to the United States of Convenience; The Good, the Bad, and the Ugly; You Have No Control Over Security on the Feudal Internet; Chapter 2 Crime, Terrorism, Spying, and War; America's Dilemma: Close Security Holes, or Exploit Them Ourselves Are Photographers Really a Threat?CCTV Doesn't Keep Us Safe, Yet the Cameras Are Everywhere; Chinese Cyberattacks: Myth or Menace?; How a Classic Man-in-the-Middle Attack Saved Colombian Hostages; How to Create the Perfect Fake Identity; A Fetishistic Approach to Security Is a Perverse Way to Keep Us Safe; The Seven Habits of Highly Ineffective Terrorists; Why Society Should Pay the True Costs of Security; Why Technology Won't Prevent Identity Theft; Terrorists May Use Google Earth, but Fear Is No Reason to Ban It; Thwarting an Internal Hacker An Enterprising Criminal Has Spotted a Gap in the MarketWe Shouldn't Poison Our Minds with Fear of Bioterrorism; Raising the Cost of Paperwork Errors Will Improve Accuracy; So-Called Cyberattack Was Overblown; Why Framing Your Enemies Is Now Virtually Child's Play; Beyond Security Theater; Feeling and Reality; Refuse to Be Terrorized; Cold War Encryption Is Unrealistic in Today's Trenches; Profiling Makes Us Less Safe; Fixing Intelligence Failures; Spy Cameras Won't Make Us Safer; Scanners, Sensors Are Wrong Way to Secure the Subway; Preventing Terrorist Attacks in Crowded Areas Where Are All the Terrorist Attacks?Hard to Pull Off; Few Terrorists; Small Attacks Aren't Enough; Worst-Case Thinking Makes Us Nuts, Not Safe; Threat of ""Cyberwar"" Has Been Hugely Hyped; Cyberwar and the Future of Cyber Conflict; Why Terror Alert Codes Never Made Sense; Debate Club: An International Cyberwar Treaty Is the Only Way to Stem the Threat; Overreaction and Overly Specific Reactions to Rare Risks; Militarizing Cyberspace Will Do More Harm Than Good; Rhetoric of Cyber War Breeds Fear-and More Cyber War; Attacks from China; GhostNet; Profitable The Boston Marathon Bombing: Keep Calm and Carry On |
| Record Nr. | UNINA-9910814311403321 |
Schneier Bruce
|
||
| Indianapolis, Indiana : , : Wiley, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Considering the creation of a domestic intelligence agency in the United States : lessons from the experiences of Australia, Canada, France, Germany, and the United Kingdom / / Brian A. Jackson, editor
| Considering the creation of a domestic intelligence agency in the United States : lessons from the experiences of Australia, Canada, France, Germany, and the United Kingdom / / Brian A. Jackson, editor |
| Pubbl/distr/stampa | Santa Monica, CA, : RAND, 2009 |
| Descrizione fisica | 1 online resource (217 p.) |
| Disciplina | 363.28 |
| Altri autori (Persone) | JacksonBrian A. <1972-> |
| Soggetto topico |
Intelligence service - United States
Intelligence service - Western countries Terrorism - United States - Prevention Terrorism - Government policy - United States |
| ISBN |
1-282-45113-8
9786612451133 0-8330-4823-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Cover; Preface; Contents; Figure and Tables; Acknowledgments; Abbreviations; Chapter One - Introduction; Chapter Two - Australia; Chapter Three - Canada; Chapter Four - France; Chapter Five - Germany; Chapter Six - The United Kingdom; Chapter Seven - Domestic Intelligence Agencies After September11, 2001: How Five Nations Have Grappled with the Evolving Threat; Chapter Eight - Conclusions: Lessons for the United States |
| Record Nr. | UNINA-9910219983603321 |
| Santa Monica, CA, : RAND, 2009 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Crossing empire's edge : Foreign Ministry police and Japanese expansionism in Northeast Asia / / Erik Esselstrom
| Crossing empire's edge : Foreign Ministry police and Japanese expansionism in Northeast Asia / / Erik Esselstrom |
| Autore | Esselstrom Erik |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Honolulu : , : University of Hawaii Press, , [2009] |
| Descrizione fisica | 1 online resource (1 p.) |
| Disciplina | 363.28 |
| Collana | The world of East Asia |
| Soggetto topico |
Intelligence service - Japan
Consular police - Japan |
| ISBN |
9780824887643
0824887646 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Intro -- Contents -- Acknowledgments -- Introduction -- 1 Patterns of Police Work in Late Chosŏn Korea -- 2 A Disputed Presence in Late Qing and Early Republican China -- 3 Policing Resistance to the Imperial State -- 4 Opposition, Escalation, and Integration -- 5 The Struggle for Security in Occupied China -- Conclusion -- Notes -- Bibliography -- Index. |
| Record Nr. | UNINA-9910476833503321 |
Esselstrom Erik
|
||
| Honolulu : , : University of Hawaii Press, , [2009] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Crossing Empire's Edge : Foreign Ministry Police and Japanese Expansionism in Northeast Asia / / Erik Esselstrom
| Crossing Empire's Edge : Foreign Ministry Police and Japanese Expansionism in Northeast Asia / / Erik Esselstrom |
| Autore | Esselstrom Erik |
| Pubbl/distr/stampa | Honolulu : , : University of Hawaii Press, , [2008] |
| Descrizione fisica | xii, 233 p. : ill., maps |
| Disciplina | 363.28 |
| Collana | The World of East Asia |
| Soggetto topico |
Consular police - Japan
Intelligence service - Japan |
| Soggetto genere / forma | Electronic books. |
| ISBN |
0-8248-6893-5
0-8248-6205-8 1-4416-1984-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Frontmatter -- Contents -- Acknowledgments -- Introduction -- 1. Patterns Of Police Work In Late Chosõn Korea -- 2. A Disputed Presence In Late Qing And Early Republican China -- 3. Policing Resistance To The Imperial State -- 4. Opposition, Escalation, And Integration -- 5. The Struggle For Security In Occupied China -- Conclusion -- Notes -- Bibliography -- Index -- About The Author |
| Record Nr. | UNISA-996344229103316 |
Esselstrom Erik
|
||
| Honolulu : , : University of Hawaii Press, , [2008] | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Crossing Empire's Edge : Foreign Ministry Police and Japanese Expansionism in Northeast Asia / / Erik Esselstrom
| Crossing Empire's Edge : Foreign Ministry Police and Japanese Expansionism in Northeast Asia / / Erik Esselstrom |
| Autore | Esselstrom Erik |
| Pubbl/distr/stampa | Honolulu : , : University of Hawaii Press, , [2008] |
| Descrizione fisica | xii, 233 p. : ill., maps |
| Disciplina | 363.28 |
| Collana | The World of East Asia |
| Soggetto topico |
Consular police - Japan
Intelligence service - Japan |
| ISBN |
9780824868932
0824868935 9780824862053 0824862058 9781441619846 1441619844 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Frontmatter -- Contents -- Acknowledgments -- Introduction -- 1. Patterns Of Police Work In Late Chosõn Korea -- 2. A Disputed Presence In Late Qing And Early Republican China -- 3. Policing Resistance To The Imperial State -- 4. Opposition, Escalation, And Integration -- 5. The Struggle For Security In Occupied China -- Conclusion -- Notes -- Bibliography -- Index -- About The Author |
| Record Nr. | UNINA-9910389555003321 |
Esselstrom Erik
|
||
| Honolulu : , : University of Hawaii Press, , [2008] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cultures of border control [Risorsa elettronica] : Schengen and the evolution of european frontiers / Ruben Zaiotti
| Cultures of border control [Risorsa elettronica] : Schengen and the evolution of european frontiers / Ruben Zaiotti |
| Autore | Zaiotti, Ruben |
| Pubbl/distr/stampa | Chicago ; London : University of Chicago Press : Ebrary [distributor], 2011 |
| Disciplina | 363.28 |
| ISBN | 9780226977881 |
| Formato | Risorse elettroniche |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-990009865650403321 |
Zaiotti, Ruben
|
||
| Chicago ; London : University of Chicago Press : Ebrary [distributor], 2011 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||