top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Carry on : sound advice from schneier on security / / Bruce Schneier
Carry on : sound advice from schneier on security / / Bruce Schneier
Autore Schneier Bruce
Edizione [1st edition]
Pubbl/distr/stampa Indianapolis, Indiana : , : Wiley, , 2014
Descrizione fisica 1 online resource (378 p.)
Disciplina 363.28
Soggetto topico Security systems
Terrorism
ISBN 1-118-79083-9
1-118-79082-0
Classificazione ST 277
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright; Contents; Chapter 1 The Business and Economics of Security; Consolidation: Plague or Progress; Prediction: RSA Conference Will Shrink Like a Punctured Balloon; How to Sell Security; Why People Are Willing to Take Risks; How to Sell Security; Why Do We Accept Signatures by Fax?; The Pros and Cons of LifeLock; The Problem Is Information Insecurity; Security ROI: Fact or Fiction?; The Data Imperative; Caveat Emptor; Social Networking Risks; Do You Know Where Your Data Are?; Be Careful When You Come to Put Your Trust in the Clouds; Is Perfect Access Control Possible?
News Media Strategies for Survival for JournalistsSecurity and Function Creep; Weighing the Risk of Hiring Hackers; Should Enterprises Give In to IT Consumerization at the Expense of Security?; The Vulnerabilities Market and the Future of Security; So You Want to Be a Security Expert; When It Comes to Security, We're Back to Feudalism; I Pledge Allegiance to the United States of Convenience; The Good, the Bad, and the Ugly; You Have No Control Over Security on the Feudal Internet; Chapter 2 Crime, Terrorism, Spying, and War; America's Dilemma: Close Security Holes, or Exploit Them Ourselves
Are Photographers Really a Threat?CCTV Doesn't Keep Us Safe, Yet the Cameras Are Everywhere; Chinese Cyberattacks: Myth or Menace?; How a Classic Man-in-the-Middle Attack Saved Colombian Hostages; How to Create the Perfect Fake Identity; A Fetishistic Approach to Security Is a Perverse Way to Keep Us Safe; The Seven Habits of Highly Ineffective Terrorists; Why Society Should Pay the True Costs of Security; Why Technology Won't Prevent Identity Theft; Terrorists May Use Google Earth, but Fear Is No Reason to Ban It; Thwarting an Internal Hacker
An Enterprising Criminal Has Spotted a Gap in the MarketWe Shouldn't Poison Our Minds with Fear of Bioterrorism; Raising the Cost of Paperwork Errors Will Improve Accuracy; So-Called Cyberattack Was Overblown; Why Framing Your Enemies Is Now Virtually Child's Play; Beyond Security Theater; Feeling and Reality; Refuse to Be Terrorized; Cold War Encryption Is Unrealistic in Today's Trenches; Profiling Makes Us Less Safe; Fixing Intelligence Failures; Spy Cameras Won't Make Us Safer; Scanners, Sensors Are Wrong Way to Secure the Subway; Preventing Terrorist Attacks in Crowded Areas
Where Are All the Terrorist Attacks?Hard to Pull Off; Few Terrorists; Small Attacks Aren't Enough; Worst-Case Thinking Makes Us Nuts, Not Safe; Threat of ""Cyberwar"" Has Been Hugely Hyped; Cyberwar and the Future of Cyber Conflict; Why Terror Alert Codes Never Made Sense; Debate Club: An International Cyberwar Treaty Is the Only Way to Stem the Threat; Overreaction and Overly Specific Reactions to Rare Risks; Militarizing Cyberspace Will Do More Harm Than Good; Rhetoric of Cyber War Breeds Fear-and More Cyber War; Attacks from China; GhostNet; Profitable
The Boston Marathon Bombing: Keep Calm and Carry On
Record Nr. UNINA-9910787630603321
Schneier Bruce  
Indianapolis, Indiana : , : Wiley, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Carry on : sound advice from schneier on security / / Bruce Schneier
Carry on : sound advice from schneier on security / / Bruce Schneier
Autore Schneier Bruce
Edizione [1st edition]
Pubbl/distr/stampa Indianapolis, Indiana : , : Wiley, , 2014
Descrizione fisica 1 online resource (378 p.)
Disciplina 363.28
Soggetto topico Security systems
Terrorism
ISBN 1-118-79083-9
1-118-79082-0
Classificazione ST 277
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright; Contents; Chapter 1 The Business and Economics of Security; Consolidation: Plague or Progress; Prediction: RSA Conference Will Shrink Like a Punctured Balloon; How to Sell Security; Why People Are Willing to Take Risks; How to Sell Security; Why Do We Accept Signatures by Fax?; The Pros and Cons of LifeLock; The Problem Is Information Insecurity; Security ROI: Fact or Fiction?; The Data Imperative; Caveat Emptor; Social Networking Risks; Do You Know Where Your Data Are?; Be Careful When You Come to Put Your Trust in the Clouds; Is Perfect Access Control Possible?
News Media Strategies for Survival for JournalistsSecurity and Function Creep; Weighing the Risk of Hiring Hackers; Should Enterprises Give In to IT Consumerization at the Expense of Security?; The Vulnerabilities Market and the Future of Security; So You Want to Be a Security Expert; When It Comes to Security, We're Back to Feudalism; I Pledge Allegiance to the United States of Convenience; The Good, the Bad, and the Ugly; You Have No Control Over Security on the Feudal Internet; Chapter 2 Crime, Terrorism, Spying, and War; America's Dilemma: Close Security Holes, or Exploit Them Ourselves
Are Photographers Really a Threat?CCTV Doesn't Keep Us Safe, Yet the Cameras Are Everywhere; Chinese Cyberattacks: Myth or Menace?; How a Classic Man-in-the-Middle Attack Saved Colombian Hostages; How to Create the Perfect Fake Identity; A Fetishistic Approach to Security Is a Perverse Way to Keep Us Safe; The Seven Habits of Highly Ineffective Terrorists; Why Society Should Pay the True Costs of Security; Why Technology Won't Prevent Identity Theft; Terrorists May Use Google Earth, but Fear Is No Reason to Ban It; Thwarting an Internal Hacker
An Enterprising Criminal Has Spotted a Gap in the MarketWe Shouldn't Poison Our Minds with Fear of Bioterrorism; Raising the Cost of Paperwork Errors Will Improve Accuracy; So-Called Cyberattack Was Overblown; Why Framing Your Enemies Is Now Virtually Child's Play; Beyond Security Theater; Feeling and Reality; Refuse to Be Terrorized; Cold War Encryption Is Unrealistic in Today's Trenches; Profiling Makes Us Less Safe; Fixing Intelligence Failures; Spy Cameras Won't Make Us Safer; Scanners, Sensors Are Wrong Way to Secure the Subway; Preventing Terrorist Attacks in Crowded Areas
Where Are All the Terrorist Attacks?Hard to Pull Off; Few Terrorists; Small Attacks Aren't Enough; Worst-Case Thinking Makes Us Nuts, Not Safe; Threat of ""Cyberwar"" Has Been Hugely Hyped; Cyberwar and the Future of Cyber Conflict; Why Terror Alert Codes Never Made Sense; Debate Club: An International Cyberwar Treaty Is the Only Way to Stem the Threat; Overreaction and Overly Specific Reactions to Rare Risks; Militarizing Cyberspace Will Do More Harm Than Good; Rhetoric of Cyber War Breeds Fear-and More Cyber War; Attacks from China; GhostNet; Profitable
The Boston Marathon Bombing: Keep Calm and Carry On
Record Nr. UNINA-9910814311403321
Schneier Bruce  
Indianapolis, Indiana : , : Wiley, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Client-Honeypots : exploring malicious websites / / Jan Gerrit Göbel, Andreas Dewald ; with a foreword by Prof. Dr. Felix Freiling ; Kathrin Mönch, editor
Client-Honeypots : exploring malicious websites / / Jan Gerrit Göbel, Andreas Dewald ; with a foreword by Prof. Dr. Felix Freiling ; Kathrin Mönch, editor
Autore Göbel Jan Gerrit
Pubbl/distr/stampa München, Germany : , : Oldenbourg Verlag München, , 2011
Descrizione fisica 1 online resource (236 p.)
Disciplina 005.8
Soggetto topico Computer networks - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-306-77960-X
3-486-71151-2
Classificazione ST 277
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Matter -- 1 Introduction -- 2 Honeypot Basics -- 3 An Introduction to Client-Side Exploits -- 4 Protection and Analysis Tools -- 5 A Survey of current Client-Side Honeypots -- 6 Composing a Honeyclient-Framework -- 7 Operating Selected Client-Side Honeypots -- 8 Epilogue -- Back Matter
Record Nr. UNINA-9910463748803321
Göbel Jan Gerrit  
München, Germany : , : Oldenbourg Verlag München, , 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Client-Honeypots : exploring malicious websites / / Jan Gerrit Göbel, Andreas Dewald ; with a foreword by Prof. Dr. Felix Freiling ; Kathrin Mönch, editor
Client-Honeypots : exploring malicious websites / / Jan Gerrit Göbel, Andreas Dewald ; with a foreword by Prof. Dr. Felix Freiling ; Kathrin Mönch, editor
Autore Göbel Jan Gerrit
Pubbl/distr/stampa München, Germany : , : Oldenbourg Verlag München, , 2011
Descrizione fisica 1 online resource (236 p.)
Disciplina 005.8
Soggetto topico Computer networks - Security measures
ISBN 1-306-77960-X
3-486-71151-2
Classificazione ST 277
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Matter -- 1 Introduction -- 2 Honeypot Basics -- 3 An Introduction to Client-Side Exploits -- 4 Protection and Analysis Tools -- 5 A Survey of current Client-Side Honeypots -- 6 Composing a Honeyclient-Framework -- 7 Operating Selected Client-Side Honeypots -- 8 Epilogue -- Back Matter
Record Nr. UNINA-9910788432303321
Göbel Jan Gerrit  
München, Germany : , : Oldenbourg Verlag München, , 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Client-Honeypots : exploring malicious websites / / Jan Gerrit Göbel, Andreas Dewald ; with a foreword by Prof. Dr. Felix Freiling ; Kathrin Mönch, editor
Client-Honeypots : exploring malicious websites / / Jan Gerrit Göbel, Andreas Dewald ; with a foreword by Prof. Dr. Felix Freiling ; Kathrin Mönch, editor
Autore Göbel Jan Gerrit
Pubbl/distr/stampa München, Germany : , : Oldenbourg Verlag München, , 2011
Descrizione fisica 1 online resource (236 p.)
Disciplina 005.8
Soggetto topico Computer networks - Security measures
ISBN 1-306-77960-X
3-486-71151-2
Classificazione ST 277
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Matter -- 1 Introduction -- 2 Honeypot Basics -- 3 An Introduction to Client-Side Exploits -- 4 Protection and Analysis Tools -- 5 A Survey of current Client-Side Honeypots -- 6 Composing a Honeyclient-Framework -- 7 Operating Selected Client-Side Honeypots -- 8 Epilogue -- Back Matter
Record Nr. UNINA-9910823292103321
Göbel Jan Gerrit  
München, Germany : , : Oldenbourg Verlag München, , 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Threat modeling : designing for security / / Adam Shostack
Threat modeling : designing for security / / Adam Shostack
Autore Shostack Adam
Edizione [1st edition]
Pubbl/distr/stampa Indianapolis, IN : , : John Wiley and Sons, , [2014]
Descrizione fisica 1 online resource (626 pages) : illustrations
Disciplina 005.8
Soggetto topico Computer security
Computer networks - Security measures
ISBN 1-118-82269-2
1-118-81005-8
Classificazione ST 277
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto part I. Getting started -- part II. Finding threats -- part III. Managing and addressing threats -- part IV. Threat modeling in technologies and tricky areas -- part V. Taking it to the next level.
Record Nr. UNINA-9910788861703321
Shostack Adam  
Indianapolis, IN : , : John Wiley and Sons, , [2014]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Threat modeling : designing for security / / Adam Shostack
Threat modeling : designing for security / / Adam Shostack
Autore Shostack Adam
Edizione [1st edition]
Pubbl/distr/stampa Indianapolis, IN : , : John Wiley and Sons, , [2014]
Descrizione fisica 1 online resource (626 pages) : illustrations
Disciplina 005.8
Soggetto topico Computer security
Computer networks - Security measures
ISBN 1-118-82269-2
1-118-81005-8
Classificazione ST 277
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto part I. Getting started -- part II. Finding threats -- part III. Managing and addressing threats -- part IV. Threat modeling in technologies and tricky areas -- part V. Taking it to the next level.
Record Nr. UNINA-9910817390803321
Shostack Adam  
Indianapolis, IN : , : John Wiley and Sons, , [2014]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui