top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Business continuity and disaster recovery for infosec managers [electronic resource] / John W. Rittinghouse, James F. Ransome
Business continuity and disaster recovery for infosec managers [electronic resource] / John W. Rittinghouse, James F. Ransome
Autore Rittinghouse, John W.
Pubbl/distr/stampa Amsterdam ; Boston : Elsevier Digital Press, c2005
Descrizione fisica lxix, 338 p. : ill. ; 24 cm.
Disciplina 004/.0068/4
Altri autori (Persone) Ransome, James F.
Soggetto topico Business - Data processing - Security measures
Crisis management
Computer networks - Security measures
Information resources management
Soggetto genere / forma Electronic books.
ISBN 9781555583392
1555583393
Formato Risorse elettroniche
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction - Business Security; Contingency and Continuity Planning; Assessing; Mitigation Strategies; Preparing for a Possible Emergency; Disaster Recovery; Business Recovery Phase; Testing, Auditing, and Training; Maintaining a Business Continuity Plan; General References; Index.
Record Nr. UNISALENTO-991003247899707536
Rittinghouse, John W.  
Amsterdam ; Boston : Elsevier Digital Press, c2005
Risorse elettroniche
Lo trovi qui: Univ. del Salento
Opac: Controlla la disponibilità qui
Cybersecurity operations handbook [[electronic resource] /] / John W. Rittinghouse, William M. Hancock
Cybersecurity operations handbook [[electronic resource] /] / John W. Rittinghouse, William M. Hancock
Autore Rittinghouse John W
Pubbl/distr/stampa Amsterdam ; ; Boston, : Elsevier Digital Press, c2003
Descrizione fisica 1 online resource (1331 p.)
Disciplina 005.8
Altri autori (Persone) HancockBill <1957->
Soggetto topico Computer security
Computer networks - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-281-03527-0
9786611035273
0-08-053018-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Cybersecurity Operations Handbook; Copyright Page; Contents; List of Figures; List of Tables; Foreword; Preface; Acknowledgments; Disclaimer; Chapter 1. Why Worry about Security? I; 1.1 Threats to personal privacy; 1.2 Fraud and theft; 1.3 Employee sabotage; 1.4 Infrastructure attacks; 1.5 Malicious hackers; 1.6 Malicious code; 1.7 Industrial espionage; 1.8 The 1996 National Information Infrastructure Protection Act; 1.9 President's executive order on critical infrastructure protection; 1.10 The USA Patriot Act of 2001; 1.11 The Homeland Security Act of 2002; 1.12 Chapter summary
1.13 EndnotesChapter 2. Network Security Management Basics; 2.1 Foundations of information assurance; 2.2 Defense-in-depth strategy; 2.3 Overview of RFC 2196 (Site Security Handbook); 2.4 The Common Criteria model; 2.5 Privacy standards and regulations; 2.6 Password management; 2.7 Incident handling; 2.8 Information warfare and information operations; 2.9 Web security overview; 2.10 Chapter summary; 2.11 Endnotes; Chapter 3. Security Foundations; 3.1 Access control; 3.2 Purpose of access control; 3.3 Access control entities; 3.4 Fundamental concepts of access control
3.5 Access control criteria3.6 Access control models; 3.7 Uses of access control; 3.8 Access control administration models; 3.9 Access control mechanisms; 3.10 Physical and environmental security controls; 3.11 Applications development security; 3.12 Standardization of application security features; 3.13 Techniques to enforce application security; 3.14 Security architecture; 3.15 Security and the law; 3.16 Investigations; 3.17 Ethics; 3.18 Operations security; 3.19 Host-based intrusion detection; 3.20 Network-based detection efforts; 3.21 Chapter summary; 3.22 Endnotes
Chapter 4. Firewalls and Perimeters4.1 Firewall environments; 4.2 Perimeter concepts; 4.3 How intruders break; 4.4 What is a firewall?; 4.5 Static packet filtering; 4.6 Edge, or boundary, routers and packet filters; 4.7 Stateful filtering and inspection; 4.8 Proxy servers; 4.9 Circuit gateways; 4.10 Application gateway; 4.11 Chapter summary; 4.12 Endnotes; Chapter 5. VPNs and Remote Access; 5.1 Historical evolution of the VPN; 5.2 VPN basics; 5.3 Why is a VPN needed?; 5.4 VPN security essentials; 5.5 VPN tunneling and protocols; 5.6 Business benefits of VPNs; 5.7 A case study
5.8 Chapter summary5.9 Endnotes; Chapter 6. Intrusion Detection in Depth; 6.1 Basic intrusion detection concepts; 6.2 Types of IDSs; 6.3 IDS detectable attack types; 6.4 Understanding TCP/IP for intrusion detection; 6.5 Tcpdump overview; 6.6 Case study-Kevin Mitnik; 6.7 Chapter summary; 6.8 Endnotes; Chapter 7. Securing Communications; 7.1 Cryptography; 7.2 Cryptographic techniques; 7.3 Cryptographic keys; 7.4 Cryptographic hash functions; 7.5 Digital signatures; 7.6 Secret-key cryptography; 7.7 Public-key cryptography; 7.8 OpenPGP; 7.9 Cryptanalysis and cryptographic attack techniques
7.10 Steganography
Record Nr. UNINA-9910451167303321
Rittinghouse John W  
Amsterdam ; ; Boston, : Elsevier Digital Press, c2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity operations handbook [[electronic resource] /] / John W. Rittinghouse, William M. Hancock
Cybersecurity operations handbook [[electronic resource] /] / John W. Rittinghouse, William M. Hancock
Autore Rittinghouse John W
Pubbl/distr/stampa Amsterdam ; ; Boston, : Elsevier Digital Press, c2003
Descrizione fisica 1 online resource (1331 p.)
Disciplina 005.8
Altri autori (Persone) HancockBill <1957->
Soggetto topico Computer security
Computer networks - Security measures
ISBN 1-281-03527-0
9786611035273
0-08-053018-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Cybersecurity Operations Handbook; Copyright Page; Contents; List of Figures; List of Tables; Foreword; Preface; Acknowledgments; Disclaimer; Chapter 1. Why Worry about Security? I; 1.1 Threats to personal privacy; 1.2 Fraud and theft; 1.3 Employee sabotage; 1.4 Infrastructure attacks; 1.5 Malicious hackers; 1.6 Malicious code; 1.7 Industrial espionage; 1.8 The 1996 National Information Infrastructure Protection Act; 1.9 President's executive order on critical infrastructure protection; 1.10 The USA Patriot Act of 2001; 1.11 The Homeland Security Act of 2002; 1.12 Chapter summary
1.13 EndnotesChapter 2. Network Security Management Basics; 2.1 Foundations of information assurance; 2.2 Defense-in-depth strategy; 2.3 Overview of RFC 2196 (Site Security Handbook); 2.4 The Common Criteria model; 2.5 Privacy standards and regulations; 2.6 Password management; 2.7 Incident handling; 2.8 Information warfare and information operations; 2.9 Web security overview; 2.10 Chapter summary; 2.11 Endnotes; Chapter 3. Security Foundations; 3.1 Access control; 3.2 Purpose of access control; 3.3 Access control entities; 3.4 Fundamental concepts of access control
3.5 Access control criteria3.6 Access control models; 3.7 Uses of access control; 3.8 Access control administration models; 3.9 Access control mechanisms; 3.10 Physical and environmental security controls; 3.11 Applications development security; 3.12 Standardization of application security features; 3.13 Techniques to enforce application security; 3.14 Security architecture; 3.15 Security and the law; 3.16 Investigations; 3.17 Ethics; 3.18 Operations security; 3.19 Host-based intrusion detection; 3.20 Network-based detection efforts; 3.21 Chapter summary; 3.22 Endnotes
Chapter 4. Firewalls and Perimeters4.1 Firewall environments; 4.2 Perimeter concepts; 4.3 How intruders break; 4.4 What is a firewall?; 4.5 Static packet filtering; 4.6 Edge, or boundary, routers and packet filters; 4.7 Stateful filtering and inspection; 4.8 Proxy servers; 4.9 Circuit gateways; 4.10 Application gateway; 4.11 Chapter summary; 4.12 Endnotes; Chapter 5. VPNs and Remote Access; 5.1 Historical evolution of the VPN; 5.2 VPN basics; 5.3 Why is a VPN needed?; 5.4 VPN security essentials; 5.5 VPN tunneling and protocols; 5.6 Business benefits of VPNs; 5.7 A case study
5.8 Chapter summary5.9 Endnotes; Chapter 6. Intrusion Detection in Depth; 6.1 Basic intrusion detection concepts; 6.2 Types of IDSs; 6.3 IDS detectable attack types; 6.4 Understanding TCP/IP for intrusion detection; 6.5 Tcpdump overview; 6.6 Case study-Kevin Mitnik; 6.7 Chapter summary; 6.8 Endnotes; Chapter 7. Securing Communications; 7.1 Cryptography; 7.2 Cryptographic techniques; 7.3 Cryptographic keys; 7.4 Cryptographic hash functions; 7.5 Digital signatures; 7.6 Secret-key cryptography; 7.7 Public-key cryptography; 7.8 OpenPGP; 7.9 Cryptanalysis and cryptographic attack techniques
7.10 Steganography
Record Nr. UNINA-9910784232303321
Rittinghouse John W  
Amsterdam ; ; Boston, : Elsevier Digital Press, c2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity operations handbook / / John W. Rittinghouse, William M. Hancock
Cybersecurity operations handbook / / John W. Rittinghouse, William M. Hancock
Autore Rittinghouse John W
Edizione [1st ed.]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Elsevier Digital Press, c2003
Descrizione fisica 1 online resource (1331 p.)
Disciplina 005.8
Altri autori (Persone) HancockBill <1957->
Soggetto topico Computer security
Computer networks - Security measures
ISBN 1-281-03527-0
9786611035273
0-08-053018-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Cybersecurity Operations Handbook; Copyright Page; Contents; List of Figures; List of Tables; Foreword; Preface; Acknowledgments; Disclaimer; Chapter 1. Why Worry about Security? I; 1.1 Threats to personal privacy; 1.2 Fraud and theft; 1.3 Employee sabotage; 1.4 Infrastructure attacks; 1.5 Malicious hackers; 1.6 Malicious code; 1.7 Industrial espionage; 1.8 The 1996 National Information Infrastructure Protection Act; 1.9 President's executive order on critical infrastructure protection; 1.10 The USA Patriot Act of 2001; 1.11 The Homeland Security Act of 2002; 1.12 Chapter summary
1.13 EndnotesChapter 2. Network Security Management Basics; 2.1 Foundations of information assurance; 2.2 Defense-in-depth strategy; 2.3 Overview of RFC 2196 (Site Security Handbook); 2.4 The Common Criteria model; 2.5 Privacy standards and regulations; 2.6 Password management; 2.7 Incident handling; 2.8 Information warfare and information operations; 2.9 Web security overview; 2.10 Chapter summary; 2.11 Endnotes; Chapter 3. Security Foundations; 3.1 Access control; 3.2 Purpose of access control; 3.3 Access control entities; 3.4 Fundamental concepts of access control
3.5 Access control criteria3.6 Access control models; 3.7 Uses of access control; 3.8 Access control administration models; 3.9 Access control mechanisms; 3.10 Physical and environmental security controls; 3.11 Applications development security; 3.12 Standardization of application security features; 3.13 Techniques to enforce application security; 3.14 Security architecture; 3.15 Security and the law; 3.16 Investigations; 3.17 Ethics; 3.18 Operations security; 3.19 Host-based intrusion detection; 3.20 Network-based detection efforts; 3.21 Chapter summary; 3.22 Endnotes
Chapter 4. Firewalls and Perimeters4.1 Firewall environments; 4.2 Perimeter concepts; 4.3 How intruders break; 4.4 What is a firewall?; 4.5 Static packet filtering; 4.6 Edge, or boundary, routers and packet filters; 4.7 Stateful filtering and inspection; 4.8 Proxy servers; 4.9 Circuit gateways; 4.10 Application gateway; 4.11 Chapter summary; 4.12 Endnotes; Chapter 5. VPNs and Remote Access; 5.1 Historical evolution of the VPN; 5.2 VPN basics; 5.3 Why is a VPN needed?; 5.4 VPN security essentials; 5.5 VPN tunneling and protocols; 5.6 Business benefits of VPNs; 5.7 A case study
5.8 Chapter summary5.9 Endnotes; Chapter 6. Intrusion Detection in Depth; 6.1 Basic intrusion detection concepts; 6.2 Types of IDSs; 6.3 IDS detectable attack types; 6.4 Understanding TCP/IP for intrusion detection; 6.5 Tcpdump overview; 6.6 Case study-Kevin Mitnik; 6.7 Chapter summary; 6.8 Endnotes; Chapter 7. Securing Communications; 7.1 Cryptography; 7.2 Cryptographic techniques; 7.3 Cryptographic keys; 7.4 Cryptographic hash functions; 7.5 Digital signatures; 7.6 Secret-key cryptography; 7.7 Public-key cryptography; 7.8 OpenPGP; 7.9 Cryptanalysis and cryptographic attack techniques
7.10 Steganography
Record Nr. UNINA-9910826013203321
Rittinghouse John W  
Amsterdam ; ; Boston, : Elsevier Digital Press, c2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity operations handbook [electronic resource] / John W. Rittinghouse, William M. Hancock
Cybersecurity operations handbook [electronic resource] / John W. Rittinghouse, William M. Hancock
Autore Rittinghouse, John W.
Pubbl/distr/stampa Amsterdam ; Boston : Elsevier Digital Press, c2003
Descrizione fisica xli, 1287 p. : ill. ; 26 cm.
Disciplina 005.8
Altri autori (Persone) Hancock, Bill, 1957-
Soggetto topico Computer security
Computer networks - Security measures
Soggetto genere / forma Electronic books.
ISBN 9781555583064
1555583067
Formato Risorse elettroniche
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Why worry about Security?; Network Security Management Basics; Security Foundations; Firewalls and Perimeters; VPNs and Remote Access; Intrusion Detection in Depth; Securing Communications; Keys, Signatures, Certificates, and PKI; Hacker Exploits; Incident Handling Basics; Forensics, Investigation, and Response; Security Diligence; Business Continuity Planning; Auditing Fundamentals; Security-Management Issues; Outsourcing and Security; Security Service Level Agreements; Future Trends in Security; Sample Policy Documents -- Appendices: Audit Program for Networks; Useful URLs; Non-Disclosure Agreement; Professional Services Agreement; Physical Security Guidelines; NRIC Preventative Best Practices for Cybersecurity; NRIC Cybersecurity Recovery Best Practices; NRIC Physical Security Best.
Record Nr. UNISALENTO-991003247019707536
Rittinghouse, John W.  
Amsterdam ; Boston : Elsevier Digital Press, c2003
Risorse elettroniche
Lo trovi qui: Univ. del Salento
Opac: Controlla la disponibilità qui
Deploying Linux on the desktop [electronic resource] / Edward Haletky
Deploying Linux on the desktop [electronic resource] / Edward Haletky
Autore Haletky, Edward
Pubbl/distr/stampa Burlington, MA : Elsevier Digital Press, c2005
Descrizione fisica xv, 208 p. : ill. ; 24 cm.
Disciplina 005.4/32
Soggetto topico Operating systems (Computers)
Soggetto genere / forma Electronic books.
ISBN 9781555583286
1555583288
Formato Risorse elettroniche
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CHAPTERS -- 1. Requirements -- 2. VPN Connectivity -- PPTP -- IPSEC -- SSH Tunneling -- 3. Office -- Exchange -- Personal e-mail -- Word -- WordPerfect -- Excel -- PowerPoint -- Visio -- Access -- Printing -- 4. Web Browsing/Editing -- Internet Explorer -- FrontPage -- Media Player -- 5. File Sharing -- CIFS -- AppleTalk -- NFS -- 6. Messaging -- IRC -- NetMeeting -- Instant Messenger.
Record Nr. UNISALENTO-991003247609707536
Haletky, Edward  
Burlington, MA : Elsevier Digital Press, c2005
Risorse elettroniche
Lo trovi qui: Univ. del Salento
Opac: Controlla la disponibilità qui
Developing practical wireless applications [[electronic resource] /] / Dean A. Gratton
Developing practical wireless applications [[electronic resource] /] / Dean A. Gratton
Autore Gratton Dean A
Edizione [1st ed.]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Elsevier Digital Press, c2006
Descrizione fisica 1 online resource (279 p.)
Disciplina 621.384
Soggetto topico Wireless communication systems
Product management
Soggetto genere / forma Electronic books.
ISBN 1-280-75216-5
9786610752164
0-08-046960-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front cover; Developing Practical Wireless Applications; Copyright page; Contents; About the Author; Preface; Acknowledgements; Introduction; Part One: Understanding a Wireless World; Chapter 1: Making Sense of Wireless Technology; Where are We Today with New Wireless Technology?; Reasons for Choosing Wireless; Where is the Original Thought?; A New Way of Thinking; Summary; Chapter 2: Understanding the Wireless Audience; Categorizing the Wireless Audience; The Diffusion of Wireless Innovation; Cultural Economic Effects on Product Pricing; A Long-term Perspective; Summary
Chapter 3: Comparing Wide-area and Personal-area CommunicationsWide-area vs. Personal-area; Generations of Wireless Technology; Wireless Convergence; Manufacturers' Refocus of Consumer Perception and Usage Models; Summary; Chapter 4: Can we Confidently Rely on Wireless Communication?; How Safe is Your House?; Encryption Principles; It's All About Adopting a Common Sense Approach to Wireless Security; Enabling Intelligent Connectivity; Coexistence and Interoperation; Summary; Chapter 5: Realizing a True Wireless Life-style Vision; Defining Quantitative Needs for Technology
In Technology we TrustSummary; Part Two: A Proprietary Approach to Developing Wireless Applications; Chapter 6: An Introduction to the Notion of Proprietary-based Wireless Application Development; Case Studies; Chapter 7: ZenSys: An Open Standard for Wireless Home Control; Background; Enabling Wireless Home Control; Enabling the Wireless Home Control Network; Conclusion; Summary; Chapter 8: Cypress Semiconductor: Introducing WirelessUSB; Background; The WirelessUSB Challenge; Conclusion; Summary; Chapter 9: Aura Communications Technology: Creating the Personal Bubble; Background
Near Field Magnetic CommunicationConclusion; Summary; Part Three: A Standards Approach to Developing Wireless Applications; Chapter 10: An Introduction to the Notion of Standards-based Wireless Application Development; Case Studies; Chapter 11: Bluetooth: A Cable Replacement Technology; Bluetooth vs. Infrared; The Odd Couple: Bluetooth and Ultra-Wideband; The Original Bluetooth; The Radio Architecture; The Bluetooth Protocol Stack; What are Bluetooth Profiles?; Foundation Profiles; The Adopted Profiles; New Protocols; Conclusion; Summary; Chapter 12: ZigBee: Untethered and Unlicensed
Comparing ZigBee and Z-WaveOur Reasons to Believe; ZigBee's Networking Topology; The Radio Architecture; The ZigBee Protocol Stack; Conclusion; Summary; Chapter 13: WiFi: Enabling True Ubiquitous Connectivity; Overcoming the Obvious; There's Something about WiFi; Comparing WiFi and WiMAX; Generating Revenue from WiFi; The WiFi Network Topology; The WiFi Story Begins with the Letter B; The WiFi Protocol Stack; The Next Generation of WiFi; Conclusion; Summary; Chapter 14: Near Field Communications: The Smart Choice for Enabling Connectivity; What is RFID?; What is NFC?; Conclusion; Summary
Chapter 15: Ultra-Wideband: Introducing a New Short-Range Wireless Medium
Record Nr. UNINA-9910451167703321
Gratton Dean A  
Amsterdam ; ; Boston, : Elsevier Digital Press, c2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Developing practical wireless applications [[electronic resource] /] / Dean A. Gratton
Developing practical wireless applications [[electronic resource] /] / Dean A. Gratton
Autore Gratton Dean A
Edizione [1st ed.]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Elsevier Digital Press, c2006
Descrizione fisica 1 online resource (279 p.)
Disciplina 621.384
Soggetto topico Wireless communication systems
Product management
ISBN 1-280-75216-5
9786610752164
0-08-046960-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front cover; Developing Practical Wireless Applications; Copyright page; Contents; About the Author; Preface; Acknowledgements; Introduction; Part One: Understanding a Wireless World; Chapter 1: Making Sense of Wireless Technology; Where are We Today with New Wireless Technology?; Reasons for Choosing Wireless; Where is the Original Thought?; A New Way of Thinking; Summary; Chapter 2: Understanding the Wireless Audience; Categorizing the Wireless Audience; The Diffusion of Wireless Innovation; Cultural Economic Effects on Product Pricing; A Long-term Perspective; Summary
Chapter 3: Comparing Wide-area and Personal-area CommunicationsWide-area vs. Personal-area; Generations of Wireless Technology; Wireless Convergence; Manufacturers' Refocus of Consumer Perception and Usage Models; Summary; Chapter 4: Can we Confidently Rely on Wireless Communication?; How Safe is Your House?; Encryption Principles; It's All About Adopting a Common Sense Approach to Wireless Security; Enabling Intelligent Connectivity; Coexistence and Interoperation; Summary; Chapter 5: Realizing a True Wireless Life-style Vision; Defining Quantitative Needs for Technology
In Technology we TrustSummary; Part Two: A Proprietary Approach to Developing Wireless Applications; Chapter 6: An Introduction to the Notion of Proprietary-based Wireless Application Development; Case Studies; Chapter 7: ZenSys: An Open Standard for Wireless Home Control; Background; Enabling Wireless Home Control; Enabling the Wireless Home Control Network; Conclusion; Summary; Chapter 8: Cypress Semiconductor: Introducing WirelessUSB; Background; The WirelessUSB Challenge; Conclusion; Summary; Chapter 9: Aura Communications Technology: Creating the Personal Bubble; Background
Near Field Magnetic CommunicationConclusion; Summary; Part Three: A Standards Approach to Developing Wireless Applications; Chapter 10: An Introduction to the Notion of Standards-based Wireless Application Development; Case Studies; Chapter 11: Bluetooth: A Cable Replacement Technology; Bluetooth vs. Infrared; The Odd Couple: Bluetooth and Ultra-Wideband; The Original Bluetooth; The Radio Architecture; The Bluetooth Protocol Stack; What are Bluetooth Profiles?; Foundation Profiles; The Adopted Profiles; New Protocols; Conclusion; Summary; Chapter 12: ZigBee: Untethered and Unlicensed
Comparing ZigBee and Z-WaveOur Reasons to Believe; ZigBee's Networking Topology; The Radio Architecture; The ZigBee Protocol Stack; Conclusion; Summary; Chapter 13: WiFi: Enabling True Ubiquitous Connectivity; Overcoming the Obvious; There's Something about WiFi; Comparing WiFi and WiMAX; Generating Revenue from WiFi; The WiFi Network Topology; The WiFi Story Begins with the Letter B; The WiFi Protocol Stack; The Next Generation of WiFi; Conclusion; Summary; Chapter 14: Near Field Communications: The Smart Choice for Enabling Connectivity; What is RFID?; What is NFC?; Conclusion; Summary
Chapter 15: Ultra-Wideband: Introducing a New Short-Range Wireless Medium
Record Nr. UNINA-9910784232203321
Gratton Dean A  
Amsterdam ; ; Boston, : Elsevier Digital Press, c2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Developing practical wireless applications / / Dean A. Gratton
Developing practical wireless applications / / Dean A. Gratton
Autore Gratton Dean A
Edizione [1st ed.]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Elsevier Digital Press, c2006
Descrizione fisica 1 online resource (279 p.)
Disciplina 621.384
Soggetto topico Wireless communication systems
Product management
ISBN 1-280-75216-5
9786610752164
0-08-046960-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front cover; Developing Practical Wireless Applications; Copyright page; Contents; About the Author; Preface; Acknowledgements; Introduction; Part One: Understanding a Wireless World; Chapter 1: Making Sense of Wireless Technology; Where are We Today with New Wireless Technology?; Reasons for Choosing Wireless; Where is the Original Thought?; A New Way of Thinking; Summary; Chapter 2: Understanding the Wireless Audience; Categorizing the Wireless Audience; The Diffusion of Wireless Innovation; Cultural Economic Effects on Product Pricing; A Long-term Perspective; Summary
Chapter 3: Comparing Wide-area and Personal-area CommunicationsWide-area vs. Personal-area; Generations of Wireless Technology; Wireless Convergence; Manufacturers' Refocus of Consumer Perception and Usage Models; Summary; Chapter 4: Can we Confidently Rely on Wireless Communication?; How Safe is Your House?; Encryption Principles; It's All About Adopting a Common Sense Approach to Wireless Security; Enabling Intelligent Connectivity; Coexistence and Interoperation; Summary; Chapter 5: Realizing a True Wireless Life-style Vision; Defining Quantitative Needs for Technology
In Technology we TrustSummary; Part Two: A Proprietary Approach to Developing Wireless Applications; Chapter 6: An Introduction to the Notion of Proprietary-based Wireless Application Development; Case Studies; Chapter 7: ZenSys: An Open Standard for Wireless Home Control; Background; Enabling Wireless Home Control; Enabling the Wireless Home Control Network; Conclusion; Summary; Chapter 8: Cypress Semiconductor: Introducing WirelessUSB; Background; The WirelessUSB Challenge; Conclusion; Summary; Chapter 9: Aura Communications Technology: Creating the Personal Bubble; Background
Near Field Magnetic CommunicationConclusion; Summary; Part Three: A Standards Approach to Developing Wireless Applications; Chapter 10: An Introduction to the Notion of Standards-based Wireless Application Development; Case Studies; Chapter 11: Bluetooth: A Cable Replacement Technology; Bluetooth vs. Infrared; The Odd Couple: Bluetooth and Ultra-Wideband; The Original Bluetooth; The Radio Architecture; The Bluetooth Protocol Stack; What are Bluetooth Profiles?; Foundation Profiles; The Adopted Profiles; New Protocols; Conclusion; Summary; Chapter 12: ZigBee: Untethered and Unlicensed
Comparing ZigBee and Z-WaveOur Reasons to Believe; ZigBee's Networking Topology; The Radio Architecture; The ZigBee Protocol Stack; Conclusion; Summary; Chapter 13: WiFi: Enabling True Ubiquitous Connectivity; Overcoming the Obvious; There's Something about WiFi; Comparing WiFi and WiMAX; Generating Revenue from WiFi; The WiFi Network Topology; The WiFi Story Begins with the Letter B; The WiFi Protocol Stack; The Next Generation of WiFi; Conclusion; Summary; Chapter 14: Near Field Communications: The Smart Choice for Enabling Connectivity; What is RFID?; What is NFC?; Conclusion; Summary
Chapter 15: Ultra-Wideband: Introducing a New Short-Range Wireless Medium
Record Nr. UNINA-9910823935603321
Gratton Dean A  
Amsterdam ; ; Boston, : Elsevier Digital Press, c2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
HP Nonstop server securit [electronic resource]y: a practical handbook / Terri Hill, Ellen Alvarado
HP Nonstop server securit [electronic resource]y: a practical handbook / Terri Hill, Ellen Alvarado
Autore Hill, Terri
Pubbl/distr/stampa Amsterdam ; Boston : Elsevier Digital Press, c2004
Descrizione fisica xxxxiv, 616 p. ; 23 cm.
Disciplina 005.8
Altri autori (Persone) Alvarado, Ellen.author
Altri autori (Enti) XYPRO Technology Corporation
Soggetto topico Client/server computing - Security measures
Computer security
Hewlett-Packard computers - Security measures
Soggetto genere / forma Electronic books.
ISBN 9781555583149
1555583148
Formato Risorse elettroniche
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security Basics; The HP NonStop Server Architecture and Environment; Authentication:User Administration; Authentication, Granting Access to the HP NonStop Server; Authorization-Object Security; Gazette A to Z; Securing Applications. -- Appendeces: Gathering the Audit Information; HP NonStop File Codes: Third Party HP NonStop Server Security Vendors.
Altri titoli varianti Hewlett-Packard nonstop server security
Record Nr. UNISALENTO-991003247179707536
Hill, Terri  
Amsterdam ; Boston : Elsevier Digital Press, c2004
Risorse elettroniche
Lo trovi qui: Univ. del Salento
Opac: Controlla la disponibilità qui