Business continuity and disaster recovery for infosec managers [electronic resource] / John W. Rittinghouse, James F. Ransome |
Autore | Rittinghouse, John W. |
Pubbl/distr/stampa | Amsterdam ; Boston : Elsevier Digital Press, c2005 |
Descrizione fisica | lxix, 338 p. : ill. ; 24 cm. |
Disciplina | 004/.0068/4 |
Altri autori (Persone) | Ransome, James F. |
Soggetto topico |
Business - Data processing - Security measures
Crisis management Computer networks - Security measures Information resources management |
Soggetto genere / forma | Electronic books. |
ISBN |
9781555583392
1555583393 |
Formato | Risorse elettroniche ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction - Business Security; Contingency and Continuity Planning; Assessing; Mitigation Strategies; Preparing for a Possible Emergency; Disaster Recovery; Business Recovery Phase; Testing, Auditing, and Training; Maintaining a Business Continuity Plan; General References; Index. |
Record Nr. | UNISALENTO-991003247899707536 |
Rittinghouse, John W.
![]() |
||
Amsterdam ; Boston : Elsevier Digital Press, c2005 | ||
![]() | ||
Lo trovi qui: Univ. del Salento | ||
|
Cybersecurity operations handbook [[electronic resource] /] / John W. Rittinghouse, William M. Hancock |
Autore | Rittinghouse John W |
Pubbl/distr/stampa | Amsterdam ; ; Boston, : Elsevier Digital Press, c2003 |
Descrizione fisica | 1 online resource (1331 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | HancockBill <1957-> |
Soggetto topico |
Computer security
Computer networks - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-03527-0
9786611035273 0-08-053018-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Cybersecurity Operations Handbook; Copyright Page; Contents; List of Figures; List of Tables; Foreword; Preface; Acknowledgments; Disclaimer; Chapter 1. Why Worry about Security? I; 1.1 Threats to personal privacy; 1.2 Fraud and theft; 1.3 Employee sabotage; 1.4 Infrastructure attacks; 1.5 Malicious hackers; 1.6 Malicious code; 1.7 Industrial espionage; 1.8 The 1996 National Information Infrastructure Protection Act; 1.9 President's executive order on critical infrastructure protection; 1.10 The USA Patriot Act of 2001; 1.11 The Homeland Security Act of 2002; 1.12 Chapter summary
1.13 EndnotesChapter 2. Network Security Management Basics; 2.1 Foundations of information assurance; 2.2 Defense-in-depth strategy; 2.3 Overview of RFC 2196 (Site Security Handbook); 2.4 The Common Criteria model; 2.5 Privacy standards and regulations; 2.6 Password management; 2.7 Incident handling; 2.8 Information warfare and information operations; 2.9 Web security overview; 2.10 Chapter summary; 2.11 Endnotes; Chapter 3. Security Foundations; 3.1 Access control; 3.2 Purpose of access control; 3.3 Access control entities; 3.4 Fundamental concepts of access control 3.5 Access control criteria3.6 Access control models; 3.7 Uses of access control; 3.8 Access control administration models; 3.9 Access control mechanisms; 3.10 Physical and environmental security controls; 3.11 Applications development security; 3.12 Standardization of application security features; 3.13 Techniques to enforce application security; 3.14 Security architecture; 3.15 Security and the law; 3.16 Investigations; 3.17 Ethics; 3.18 Operations security; 3.19 Host-based intrusion detection; 3.20 Network-based detection efforts; 3.21 Chapter summary; 3.22 Endnotes Chapter 4. Firewalls and Perimeters4.1 Firewall environments; 4.2 Perimeter concepts; 4.3 How intruders break; 4.4 What is a firewall?; 4.5 Static packet filtering; 4.6 Edge, or boundary, routers and packet filters; 4.7 Stateful filtering and inspection; 4.8 Proxy servers; 4.9 Circuit gateways; 4.10 Application gateway; 4.11 Chapter summary; 4.12 Endnotes; Chapter 5. VPNs and Remote Access; 5.1 Historical evolution of the VPN; 5.2 VPN basics; 5.3 Why is a VPN needed?; 5.4 VPN security essentials; 5.5 VPN tunneling and protocols; 5.6 Business benefits of VPNs; 5.7 A case study 5.8 Chapter summary5.9 Endnotes; Chapter 6. Intrusion Detection in Depth; 6.1 Basic intrusion detection concepts; 6.2 Types of IDSs; 6.3 IDS detectable attack types; 6.4 Understanding TCP/IP for intrusion detection; 6.5 Tcpdump overview; 6.6 Case study-Kevin Mitnik; 6.7 Chapter summary; 6.8 Endnotes; Chapter 7. Securing Communications; 7.1 Cryptography; 7.2 Cryptographic techniques; 7.3 Cryptographic keys; 7.4 Cryptographic hash functions; 7.5 Digital signatures; 7.6 Secret-key cryptography; 7.7 Public-key cryptography; 7.8 OpenPGP; 7.9 Cryptanalysis and cryptographic attack techniques 7.10 Steganography |
Record Nr. | UNINA-9910451167303321 |
Rittinghouse John W
![]() |
||
Amsterdam ; ; Boston, : Elsevier Digital Press, c2003 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cybersecurity operations handbook [[electronic resource] /] / John W. Rittinghouse, William M. Hancock |
Autore | Rittinghouse John W |
Pubbl/distr/stampa | Amsterdam ; ; Boston, : Elsevier Digital Press, c2003 |
Descrizione fisica | 1 online resource (1331 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | HancockBill <1957-> |
Soggetto topico |
Computer security
Computer networks - Security measures |
ISBN |
1-281-03527-0
9786611035273 0-08-053018-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Cybersecurity Operations Handbook; Copyright Page; Contents; List of Figures; List of Tables; Foreword; Preface; Acknowledgments; Disclaimer; Chapter 1. Why Worry about Security? I; 1.1 Threats to personal privacy; 1.2 Fraud and theft; 1.3 Employee sabotage; 1.4 Infrastructure attacks; 1.5 Malicious hackers; 1.6 Malicious code; 1.7 Industrial espionage; 1.8 The 1996 National Information Infrastructure Protection Act; 1.9 President's executive order on critical infrastructure protection; 1.10 The USA Patriot Act of 2001; 1.11 The Homeland Security Act of 2002; 1.12 Chapter summary
1.13 EndnotesChapter 2. Network Security Management Basics; 2.1 Foundations of information assurance; 2.2 Defense-in-depth strategy; 2.3 Overview of RFC 2196 (Site Security Handbook); 2.4 The Common Criteria model; 2.5 Privacy standards and regulations; 2.6 Password management; 2.7 Incident handling; 2.8 Information warfare and information operations; 2.9 Web security overview; 2.10 Chapter summary; 2.11 Endnotes; Chapter 3. Security Foundations; 3.1 Access control; 3.2 Purpose of access control; 3.3 Access control entities; 3.4 Fundamental concepts of access control 3.5 Access control criteria3.6 Access control models; 3.7 Uses of access control; 3.8 Access control administration models; 3.9 Access control mechanisms; 3.10 Physical and environmental security controls; 3.11 Applications development security; 3.12 Standardization of application security features; 3.13 Techniques to enforce application security; 3.14 Security architecture; 3.15 Security and the law; 3.16 Investigations; 3.17 Ethics; 3.18 Operations security; 3.19 Host-based intrusion detection; 3.20 Network-based detection efforts; 3.21 Chapter summary; 3.22 Endnotes Chapter 4. Firewalls and Perimeters4.1 Firewall environments; 4.2 Perimeter concepts; 4.3 How intruders break; 4.4 What is a firewall?; 4.5 Static packet filtering; 4.6 Edge, or boundary, routers and packet filters; 4.7 Stateful filtering and inspection; 4.8 Proxy servers; 4.9 Circuit gateways; 4.10 Application gateway; 4.11 Chapter summary; 4.12 Endnotes; Chapter 5. VPNs and Remote Access; 5.1 Historical evolution of the VPN; 5.2 VPN basics; 5.3 Why is a VPN needed?; 5.4 VPN security essentials; 5.5 VPN tunneling and protocols; 5.6 Business benefits of VPNs; 5.7 A case study 5.8 Chapter summary5.9 Endnotes; Chapter 6. Intrusion Detection in Depth; 6.1 Basic intrusion detection concepts; 6.2 Types of IDSs; 6.3 IDS detectable attack types; 6.4 Understanding TCP/IP for intrusion detection; 6.5 Tcpdump overview; 6.6 Case study-Kevin Mitnik; 6.7 Chapter summary; 6.8 Endnotes; Chapter 7. Securing Communications; 7.1 Cryptography; 7.2 Cryptographic techniques; 7.3 Cryptographic keys; 7.4 Cryptographic hash functions; 7.5 Digital signatures; 7.6 Secret-key cryptography; 7.7 Public-key cryptography; 7.8 OpenPGP; 7.9 Cryptanalysis and cryptographic attack techniques 7.10 Steganography |
Record Nr. | UNINA-9910784232303321 |
Rittinghouse John W
![]() |
||
Amsterdam ; ; Boston, : Elsevier Digital Press, c2003 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cybersecurity operations handbook / / John W. Rittinghouse, William M. Hancock |
Autore | Rittinghouse John W |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Amsterdam ; ; Boston, : Elsevier Digital Press, c2003 |
Descrizione fisica | 1 online resource (1331 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | HancockBill <1957-> |
Soggetto topico |
Computer security
Computer networks - Security measures |
ISBN |
1-281-03527-0
9786611035273 0-08-053018-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Cybersecurity Operations Handbook; Copyright Page; Contents; List of Figures; List of Tables; Foreword; Preface; Acknowledgments; Disclaimer; Chapter 1. Why Worry about Security? I; 1.1 Threats to personal privacy; 1.2 Fraud and theft; 1.3 Employee sabotage; 1.4 Infrastructure attacks; 1.5 Malicious hackers; 1.6 Malicious code; 1.7 Industrial espionage; 1.8 The 1996 National Information Infrastructure Protection Act; 1.9 President's executive order on critical infrastructure protection; 1.10 The USA Patriot Act of 2001; 1.11 The Homeland Security Act of 2002; 1.12 Chapter summary
1.13 EndnotesChapter 2. Network Security Management Basics; 2.1 Foundations of information assurance; 2.2 Defense-in-depth strategy; 2.3 Overview of RFC 2196 (Site Security Handbook); 2.4 The Common Criteria model; 2.5 Privacy standards and regulations; 2.6 Password management; 2.7 Incident handling; 2.8 Information warfare and information operations; 2.9 Web security overview; 2.10 Chapter summary; 2.11 Endnotes; Chapter 3. Security Foundations; 3.1 Access control; 3.2 Purpose of access control; 3.3 Access control entities; 3.4 Fundamental concepts of access control 3.5 Access control criteria3.6 Access control models; 3.7 Uses of access control; 3.8 Access control administration models; 3.9 Access control mechanisms; 3.10 Physical and environmental security controls; 3.11 Applications development security; 3.12 Standardization of application security features; 3.13 Techniques to enforce application security; 3.14 Security architecture; 3.15 Security and the law; 3.16 Investigations; 3.17 Ethics; 3.18 Operations security; 3.19 Host-based intrusion detection; 3.20 Network-based detection efforts; 3.21 Chapter summary; 3.22 Endnotes Chapter 4. Firewalls and Perimeters4.1 Firewall environments; 4.2 Perimeter concepts; 4.3 How intruders break; 4.4 What is a firewall?; 4.5 Static packet filtering; 4.6 Edge, or boundary, routers and packet filters; 4.7 Stateful filtering and inspection; 4.8 Proxy servers; 4.9 Circuit gateways; 4.10 Application gateway; 4.11 Chapter summary; 4.12 Endnotes; Chapter 5. VPNs and Remote Access; 5.1 Historical evolution of the VPN; 5.2 VPN basics; 5.3 Why is a VPN needed?; 5.4 VPN security essentials; 5.5 VPN tunneling and protocols; 5.6 Business benefits of VPNs; 5.7 A case study 5.8 Chapter summary5.9 Endnotes; Chapter 6. Intrusion Detection in Depth; 6.1 Basic intrusion detection concepts; 6.2 Types of IDSs; 6.3 IDS detectable attack types; 6.4 Understanding TCP/IP for intrusion detection; 6.5 Tcpdump overview; 6.6 Case study-Kevin Mitnik; 6.7 Chapter summary; 6.8 Endnotes; Chapter 7. Securing Communications; 7.1 Cryptography; 7.2 Cryptographic techniques; 7.3 Cryptographic keys; 7.4 Cryptographic hash functions; 7.5 Digital signatures; 7.6 Secret-key cryptography; 7.7 Public-key cryptography; 7.8 OpenPGP; 7.9 Cryptanalysis and cryptographic attack techniques 7.10 Steganography |
Record Nr. | UNINA-9910826013203321 |
Rittinghouse John W
![]() |
||
Amsterdam ; ; Boston, : Elsevier Digital Press, c2003 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cybersecurity operations handbook [electronic resource] / John W. Rittinghouse, William M. Hancock |
Autore | Rittinghouse, John W. |
Pubbl/distr/stampa | Amsterdam ; Boston : Elsevier Digital Press, c2003 |
Descrizione fisica | xli, 1287 p. : ill. ; 26 cm. |
Disciplina | 005.8 |
Altri autori (Persone) | Hancock, Bill, 1957- |
Soggetto topico |
Computer security
Computer networks - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN |
9781555583064
1555583067 |
Formato | Risorse elettroniche ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Why worry about Security?; Network Security Management Basics; Security Foundations; Firewalls and Perimeters; VPNs and Remote Access; Intrusion Detection in Depth; Securing Communications; Keys, Signatures, Certificates, and PKI; Hacker Exploits; Incident Handling Basics; Forensics, Investigation, and Response; Security Diligence; Business Continuity Planning; Auditing Fundamentals; Security-Management Issues; Outsourcing and Security; Security Service Level Agreements; Future Trends in Security; Sample Policy Documents -- Appendices: Audit Program for Networks; Useful URLs; Non-Disclosure Agreement; Professional Services Agreement; Physical Security Guidelines; NRIC Preventative Best Practices for Cybersecurity; NRIC Cybersecurity Recovery Best Practices; NRIC Physical Security Best. |
Record Nr. | UNISALENTO-991003247019707536 |
Rittinghouse, John W.
![]() |
||
Amsterdam ; Boston : Elsevier Digital Press, c2003 | ||
![]() | ||
Lo trovi qui: Univ. del Salento | ||
|
Deploying Linux on the desktop [electronic resource] / Edward Haletky |
Autore | Haletky, Edward |
Pubbl/distr/stampa | Burlington, MA : Elsevier Digital Press, c2005 |
Descrizione fisica | xv, 208 p. : ill. ; 24 cm. |
Disciplina | 005.4/32 |
Soggetto topico | Operating systems (Computers) |
Soggetto genere / forma | Electronic books. |
ISBN |
9781555583286
1555583288 |
Formato | Risorse elettroniche ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | CHAPTERS -- 1. Requirements -- 2. VPN Connectivity -- PPTP -- IPSEC -- SSH Tunneling -- 3. Office -- Exchange -- Personal e-mail -- Word -- WordPerfect -- Excel -- PowerPoint -- Visio -- Access -- Printing -- 4. Web Browsing/Editing -- Internet Explorer -- FrontPage -- Media Player -- 5. File Sharing -- CIFS -- AppleTalk -- NFS -- 6. Messaging -- IRC -- NetMeeting -- Instant Messenger. |
Record Nr. | UNISALENTO-991003247609707536 |
Haletky, Edward
![]() |
||
Burlington, MA : Elsevier Digital Press, c2005 | ||
![]() | ||
Lo trovi qui: Univ. del Salento | ||
|
Developing practical wireless applications [[electronic resource] /] / Dean A. Gratton |
Autore | Gratton Dean A |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Amsterdam ; ; Boston, : Elsevier Digital Press, c2006 |
Descrizione fisica | 1 online resource (279 p.) |
Disciplina | 621.384 |
Soggetto topico |
Wireless communication systems
Product management |
Soggetto genere / forma | Electronic books. |
ISBN |
1-280-75216-5
9786610752164 0-08-046960-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front cover; Developing Practical Wireless Applications; Copyright page; Contents; About the Author; Preface; Acknowledgements; Introduction; Part One: Understanding a Wireless World; Chapter 1: Making Sense of Wireless Technology; Where are We Today with New Wireless Technology?; Reasons for Choosing Wireless; Where is the Original Thought?; A New Way of Thinking; Summary; Chapter 2: Understanding the Wireless Audience; Categorizing the Wireless Audience; The Diffusion of Wireless Innovation; Cultural Economic Effects on Product Pricing; A Long-term Perspective; Summary
Chapter 3: Comparing Wide-area and Personal-area CommunicationsWide-area vs. Personal-area; Generations of Wireless Technology; Wireless Convergence; Manufacturers' Refocus of Consumer Perception and Usage Models; Summary; Chapter 4: Can we Confidently Rely on Wireless Communication?; How Safe is Your House?; Encryption Principles; It's All About Adopting a Common Sense Approach to Wireless Security; Enabling Intelligent Connectivity; Coexistence and Interoperation; Summary; Chapter 5: Realizing a True Wireless Life-style Vision; Defining Quantitative Needs for Technology In Technology we TrustSummary; Part Two: A Proprietary Approach to Developing Wireless Applications; Chapter 6: An Introduction to the Notion of Proprietary-based Wireless Application Development; Case Studies; Chapter 7: ZenSys: An Open Standard for Wireless Home Control; Background; Enabling Wireless Home Control; Enabling the Wireless Home Control Network; Conclusion; Summary; Chapter 8: Cypress Semiconductor: Introducing WirelessUSB; Background; The WirelessUSB Challenge; Conclusion; Summary; Chapter 9: Aura Communications Technology: Creating the Personal Bubble; Background Near Field Magnetic CommunicationConclusion; Summary; Part Three: A Standards Approach to Developing Wireless Applications; Chapter 10: An Introduction to the Notion of Standards-based Wireless Application Development; Case Studies; Chapter 11: Bluetooth: A Cable Replacement Technology; Bluetooth vs. Infrared; The Odd Couple: Bluetooth and Ultra-Wideband; The Original Bluetooth; The Radio Architecture; The Bluetooth Protocol Stack; What are Bluetooth Profiles?; Foundation Profiles; The Adopted Profiles; New Protocols; Conclusion; Summary; Chapter 12: ZigBee: Untethered and Unlicensed Comparing ZigBee and Z-WaveOur Reasons to Believe; ZigBee's Networking Topology; The Radio Architecture; The ZigBee Protocol Stack; Conclusion; Summary; Chapter 13: WiFi: Enabling True Ubiquitous Connectivity; Overcoming the Obvious; There's Something about WiFi; Comparing WiFi and WiMAX; Generating Revenue from WiFi; The WiFi Network Topology; The WiFi Story Begins with the Letter B; The WiFi Protocol Stack; The Next Generation of WiFi; Conclusion; Summary; Chapter 14: Near Field Communications: The Smart Choice for Enabling Connectivity; What is RFID?; What is NFC?; Conclusion; Summary Chapter 15: Ultra-Wideband: Introducing a New Short-Range Wireless Medium |
Record Nr. | UNINA-9910451167703321 |
Gratton Dean A
![]() |
||
Amsterdam ; ; Boston, : Elsevier Digital Press, c2006 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Developing practical wireless applications [[electronic resource] /] / Dean A. Gratton |
Autore | Gratton Dean A |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Amsterdam ; ; Boston, : Elsevier Digital Press, c2006 |
Descrizione fisica | 1 online resource (279 p.) |
Disciplina | 621.384 |
Soggetto topico |
Wireless communication systems
Product management |
ISBN |
1-280-75216-5
9786610752164 0-08-046960-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front cover; Developing Practical Wireless Applications; Copyright page; Contents; About the Author; Preface; Acknowledgements; Introduction; Part One: Understanding a Wireless World; Chapter 1: Making Sense of Wireless Technology; Where are We Today with New Wireless Technology?; Reasons for Choosing Wireless; Where is the Original Thought?; A New Way of Thinking; Summary; Chapter 2: Understanding the Wireless Audience; Categorizing the Wireless Audience; The Diffusion of Wireless Innovation; Cultural Economic Effects on Product Pricing; A Long-term Perspective; Summary
Chapter 3: Comparing Wide-area and Personal-area CommunicationsWide-area vs. Personal-area; Generations of Wireless Technology; Wireless Convergence; Manufacturers' Refocus of Consumer Perception and Usage Models; Summary; Chapter 4: Can we Confidently Rely on Wireless Communication?; How Safe is Your House?; Encryption Principles; It's All About Adopting a Common Sense Approach to Wireless Security; Enabling Intelligent Connectivity; Coexistence and Interoperation; Summary; Chapter 5: Realizing a True Wireless Life-style Vision; Defining Quantitative Needs for Technology In Technology we TrustSummary; Part Two: A Proprietary Approach to Developing Wireless Applications; Chapter 6: An Introduction to the Notion of Proprietary-based Wireless Application Development; Case Studies; Chapter 7: ZenSys: An Open Standard for Wireless Home Control; Background; Enabling Wireless Home Control; Enabling the Wireless Home Control Network; Conclusion; Summary; Chapter 8: Cypress Semiconductor: Introducing WirelessUSB; Background; The WirelessUSB Challenge; Conclusion; Summary; Chapter 9: Aura Communications Technology: Creating the Personal Bubble; Background Near Field Magnetic CommunicationConclusion; Summary; Part Three: A Standards Approach to Developing Wireless Applications; Chapter 10: An Introduction to the Notion of Standards-based Wireless Application Development; Case Studies; Chapter 11: Bluetooth: A Cable Replacement Technology; Bluetooth vs. Infrared; The Odd Couple: Bluetooth and Ultra-Wideband; The Original Bluetooth; The Radio Architecture; The Bluetooth Protocol Stack; What are Bluetooth Profiles?; Foundation Profiles; The Adopted Profiles; New Protocols; Conclusion; Summary; Chapter 12: ZigBee: Untethered and Unlicensed Comparing ZigBee and Z-WaveOur Reasons to Believe; ZigBee's Networking Topology; The Radio Architecture; The ZigBee Protocol Stack; Conclusion; Summary; Chapter 13: WiFi: Enabling True Ubiquitous Connectivity; Overcoming the Obvious; There's Something about WiFi; Comparing WiFi and WiMAX; Generating Revenue from WiFi; The WiFi Network Topology; The WiFi Story Begins with the Letter B; The WiFi Protocol Stack; The Next Generation of WiFi; Conclusion; Summary; Chapter 14: Near Field Communications: The Smart Choice for Enabling Connectivity; What is RFID?; What is NFC?; Conclusion; Summary Chapter 15: Ultra-Wideband: Introducing a New Short-Range Wireless Medium |
Record Nr. | UNINA-9910784232203321 |
Gratton Dean A
![]() |
||
Amsterdam ; ; Boston, : Elsevier Digital Press, c2006 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Developing practical wireless applications / / Dean A. Gratton |
Autore | Gratton Dean A |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Amsterdam ; ; Boston, : Elsevier Digital Press, c2006 |
Descrizione fisica | 1 online resource (279 p.) |
Disciplina | 621.384 |
Soggetto topico |
Wireless communication systems
Product management |
ISBN |
1-280-75216-5
9786610752164 0-08-046960-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front cover; Developing Practical Wireless Applications; Copyright page; Contents; About the Author; Preface; Acknowledgements; Introduction; Part One: Understanding a Wireless World; Chapter 1: Making Sense of Wireless Technology; Where are We Today with New Wireless Technology?; Reasons for Choosing Wireless; Where is the Original Thought?; A New Way of Thinking; Summary; Chapter 2: Understanding the Wireless Audience; Categorizing the Wireless Audience; The Diffusion of Wireless Innovation; Cultural Economic Effects on Product Pricing; A Long-term Perspective; Summary
Chapter 3: Comparing Wide-area and Personal-area CommunicationsWide-area vs. Personal-area; Generations of Wireless Technology; Wireless Convergence; Manufacturers' Refocus of Consumer Perception and Usage Models; Summary; Chapter 4: Can we Confidently Rely on Wireless Communication?; How Safe is Your House?; Encryption Principles; It's All About Adopting a Common Sense Approach to Wireless Security; Enabling Intelligent Connectivity; Coexistence and Interoperation; Summary; Chapter 5: Realizing a True Wireless Life-style Vision; Defining Quantitative Needs for Technology In Technology we TrustSummary; Part Two: A Proprietary Approach to Developing Wireless Applications; Chapter 6: An Introduction to the Notion of Proprietary-based Wireless Application Development; Case Studies; Chapter 7: ZenSys: An Open Standard for Wireless Home Control; Background; Enabling Wireless Home Control; Enabling the Wireless Home Control Network; Conclusion; Summary; Chapter 8: Cypress Semiconductor: Introducing WirelessUSB; Background; The WirelessUSB Challenge; Conclusion; Summary; Chapter 9: Aura Communications Technology: Creating the Personal Bubble; Background Near Field Magnetic CommunicationConclusion; Summary; Part Three: A Standards Approach to Developing Wireless Applications; Chapter 10: An Introduction to the Notion of Standards-based Wireless Application Development; Case Studies; Chapter 11: Bluetooth: A Cable Replacement Technology; Bluetooth vs. Infrared; The Odd Couple: Bluetooth and Ultra-Wideband; The Original Bluetooth; The Radio Architecture; The Bluetooth Protocol Stack; What are Bluetooth Profiles?; Foundation Profiles; The Adopted Profiles; New Protocols; Conclusion; Summary; Chapter 12: ZigBee: Untethered and Unlicensed Comparing ZigBee and Z-WaveOur Reasons to Believe; ZigBee's Networking Topology; The Radio Architecture; The ZigBee Protocol Stack; Conclusion; Summary; Chapter 13: WiFi: Enabling True Ubiquitous Connectivity; Overcoming the Obvious; There's Something about WiFi; Comparing WiFi and WiMAX; Generating Revenue from WiFi; The WiFi Network Topology; The WiFi Story Begins with the Letter B; The WiFi Protocol Stack; The Next Generation of WiFi; Conclusion; Summary; Chapter 14: Near Field Communications: The Smart Choice for Enabling Connectivity; What is RFID?; What is NFC?; Conclusion; Summary Chapter 15: Ultra-Wideband: Introducing a New Short-Range Wireless Medium |
Record Nr. | UNINA-9910823935603321 |
Gratton Dean A
![]() |
||
Amsterdam ; ; Boston, : Elsevier Digital Press, c2006 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
HP Nonstop server securit [electronic resource]y: a practical handbook / Terri Hill, Ellen Alvarado |
Autore | Hill, Terri |
Pubbl/distr/stampa | Amsterdam ; Boston : Elsevier Digital Press, c2004 |
Descrizione fisica | xxxxiv, 616 p. ; 23 cm. |
Disciplina | 005.8 |
Altri autori (Persone) | Alvarado, Ellen.author |
Altri autori (Enti) | XYPRO Technology Corporation |
Soggetto topico |
Client/server computing - Security measures
Computer security Hewlett-Packard computers - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN |
9781555583149
1555583148 |
Formato | Risorse elettroniche ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Security Basics; The HP NonStop Server Architecture and Environment; Authentication:User Administration; Authentication, Granting Access to the HP NonStop Server; Authorization-Object Security; Gazette A to Z; Securing Applications. -- Appendeces: Gathering the Audit Information; HP NonStop File Codes: Third Party HP NonStop Server Security Vendors. |
Altri titoli varianti | Hewlett-Packard nonstop server security |
Record Nr. | UNISALENTO-991003247179707536 |
Hill, Terri
![]() |
||
Amsterdam ; Boston : Elsevier Digital Press, c2004 | ||
![]() | ||
Lo trovi qui: Univ. del Salento | ||
|