Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies / / Ira Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor |
Autore | Winkler Ira |
Edizione | [1st edition] |
Pubbl/distr/stampa | Cambridge, MA : , : Syngress, , [2017] |
Descrizione fisica | 1 online resource (xvii, 241 pages) |
Disciplina | 005.8 |
Collana | Gale eBooks |
Soggetto topico |
Computer networks - Security measures
Computer security Hacking |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | What is advanced persistent security? -- Cyberwarfare concepts -- What is proaction? -- Risk management -- How to hack computers -- Threat -- Adversary infrastructure -- Governance -- Vulnerabilities to address -- Countermeasures -- Security culture -- What is threat intelligence? -- What is detection? -- Detection deficit disorder -- The human intrusion detection system -- Kill chain analysis -- Setting reaction strategy -- Incident response and investigations -- Know yourself -- Know your adversaries -- Define your strategy -- Determining the appropriate countermeasures -- Advanced persistent security. |
Record Nr. | UNINA-9910583064103321 |
Winkler Ira
![]() |
||
Cambridge, MA : , : Syngress, , [2017] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Android forensics [[electronic resource] ] : investigation, analysis, and mobile security for Google Android / / Andrew Hoog ; John McCash, technical editor |
Autore | Hoog Andrew |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, MA, : Syngress, c2011 |
Descrizione fisica | 1 online resource (393 p.) |
Disciplina |
005.4
005.4/46 005.446 363.25 |
Soggetto topico |
Smartphones - Security measures
Mobile computing - Security measures Data recovery (Computer science) Computer crimes - Investigation |
Soggetto genere / forma | Electronic books. |
ISBN |
1-283-28146-5
9786613281463 1-59749-652-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Android Forensics; Copyright; Dedication; Contents; Acknowledgements; Introduction; Chapter 1; Chapter 2; Chapter 3; Chapter 4; Chapter 5; Chapter 6; Chapter 7; Website; About the Author; About the Technical Editor; Chapter 1 -Android and mobile forensics; Introduction; Android platform; Linux, open source software, and forensics; Android Open Source Project; Internationalization; Android Market; Android forensics; Summary; References; Chapter 2 -Android hardware platforms; Introduction; Overview of core components; Overview of different device types; ROM and boot loaders
ManufacturersAndroid updates; Specific devices; Summary; References; Chapter 3 -Android software development kit and android debug bridge; Introduction; Android platforms; Software development kit (SDK); Android security model; Forensics and the SDK; Summary; References; Chapter 4 -Android file systems and data structures; Introduction; Data in the Shell; Type of memory; File systems; Mounted file systems; Summary; References; Chapter 5 -Android device, data, and app security; Introduction; Data theft targets and attack vectors; Security considerations; Individual security strategies Corporate security strategiesApp development security strategies; Summary; References; Chapter 6 -Android forensic techniques; Introduction; Procedures for handling an Android device; Imaging Android USB mass storage devices; Logical techniques; Physical techniques; Summary; References; Chapter 7 -Android application and forensic analysis; Introduction; Analysis techniques; FAT forensic analysis; YAFFS2 forensic analysis; Android app analysis and reference; Summary; References; Index |
Record Nr. | UNINA-9910461406503321 |
Hoog Andrew
![]() |
||
Waltham, MA, : Syngress, c2011 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Android forensics : investigation, analysis, and mobile security for Google Android / / Andrew Hoog ; John McCash, technical editor |
Autore | Hoog Andrew |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, MA, : Syngress, c2011 |
Descrizione fisica | 1 online resource (393 p.) |
Disciplina |
005.4
005.4/46 005.446 363.25 |
Soggetto topico |
Smartphones - Security measures
Mobile computing - Security measures Data recovery (Computer science) Computer crimes - Investigation |
ISBN |
1-283-28146-5
9786613281463 1-59749-652-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Android Forensics; Copyright; Dedication; Contents; Acknowledgements; Introduction; Chapter 1; Chapter 2; Chapter 3; Chapter 4; Chapter 5; Chapter 6; Chapter 7; Website; About the Author; About the Technical Editor; Chapter 1 -Android and mobile forensics; Introduction; Android platform; Linux, open source software, and forensics; Android Open Source Project; Internationalization; Android Market; Android forensics; Summary; References; Chapter 2 -Android hardware platforms; Introduction; Overview of core components; Overview of different device types; ROM and boot loaders
ManufacturersAndroid updates; Specific devices; Summary; References; Chapter 3 -Android software development kit and android debug bridge; Introduction; Android platforms; Software development kit (SDK); Android security model; Forensics and the SDK; Summary; References; Chapter 4 -Android file systems and data structures; Introduction; Data in the Shell; Type of memory; File systems; Mounted file systems; Summary; References; Chapter 5 -Android device, data, and app security; Introduction; Data theft targets and attack vectors; Security considerations; Individual security strategies Corporate security strategiesApp development security strategies; Summary; References; Chapter 6 -Android forensic techniques; Introduction; Procedures for handling an Android device; Imaging Android USB mass storage devices; Logical techniques; Physical techniques; Summary; References; Chapter 7 -Android application and forensic analysis; Introduction; Analysis techniques; FAT forensic analysis; YAFFS2 forensic analysis; Android app analysis and reference; Summary; References; Index |
Record Nr. | UNINA-9910789440003321 |
Hoog Andrew
![]() |
||
Waltham, MA, : Syngress, c2011 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Android forensics : investigation, analysis, and mobile security for Google Android / / Andrew Hoog ; John McCash, technical editor |
Autore | Hoog Andrew |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, MA, : Syngress, c2011 |
Descrizione fisica | 1 online resource (393 p.) |
Disciplina |
005.4
005.4/46 005.446 363.25 |
Soggetto topico |
Smartphones - Security measures
Mobile computing - Security measures Data recovery (Computer science) Computer crimes - Investigation |
ISBN |
1-283-28146-5
9786613281463 1-59749-652-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Android Forensics; Copyright; Dedication; Contents; Acknowledgements; Introduction; Chapter 1; Chapter 2; Chapter 3; Chapter 4; Chapter 5; Chapter 6; Chapter 7; Website; About the Author; About the Technical Editor; Chapter 1 -Android and mobile forensics; Introduction; Android platform; Linux, open source software, and forensics; Android Open Source Project; Internationalization; Android Market; Android forensics; Summary; References; Chapter 2 -Android hardware platforms; Introduction; Overview of core components; Overview of different device types; ROM and boot loaders
ManufacturersAndroid updates; Specific devices; Summary; References; Chapter 3 -Android software development kit and android debug bridge; Introduction; Android platforms; Software development kit (SDK); Android security model; Forensics and the SDK; Summary; References; Chapter 4 -Android file systems and data structures; Introduction; Data in the Shell; Type of memory; File systems; Mounted file systems; Summary; References; Chapter 5 -Android device, data, and app security; Introduction; Data theft targets and attack vectors; Security considerations; Individual security strategies Corporate security strategiesApp development security strategies; Summary; References; Chapter 6 -Android forensic techniques; Introduction; Procedures for handling an Android device; Imaging Android USB mass storage devices; Logical techniques; Physical techniques; Summary; References; Chapter 7 -Android application and forensic analysis; Introduction; Analysis techniques; FAT forensic analysis; YAFFS2 forensic analysis; Android app analysis and reference; Summary; References; Index |
Record Nr. | UNINA-9910820237003321 |
Hoog Andrew
![]() |
||
Waltham, MA, : Syngress, c2011 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Apple I replica creation [electronic resource] : back to the garage / Tom Owad ; with a foreward by Steve Wozniak |
Autore | Owad, Tom. |
Pubbl/distr/stampa | Rockland, MA : Syngress, c2005 |
Descrizione fisica | xxv, 333 p. : ill. ; 24 cm. + 1 computer optical disc (4 3/4 in.) |
Disciplina | 004.165 |
Soggetto topico |
Apple computer - Design and construction - Handbooks, manuals, etc
Apple computer - Programming - Handbooks, manuals, etc Assembler language (Computer program language) - Handbooks, manuals, etc BASIC (Computer program language) - Handbooks, manuals, etc |
Soggetto genere / forma | Electronic books. |
ISBN |
9781931836401
193183640X |
Formato | Risorse elettroniche ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part I - Hardware ; Introduction ; Understanding the Apple I ; The Processor ; On The Bus: Memory, ROM and RAM ; In, Out, and the 6821 ; Interfacing video and keyboard ; Building and Testing ; Setting it all up ; Choosing peripherals ; Building a case ; Part II - Programming ; BASIC ; Forth ; Assembly ; Part III -Additional Projects ; Single-step ; Reading sensors ; Controlling lights ; Controlling motors ; LCD display. |
Altri titoli varianti | Apple one replica creation |
Record Nr. | UNISALENTO-991003257469707536 |
Owad, Tom.
![]() |
||
Rockland, MA : Syngress, c2005 | ||
![]() | ||
Lo trovi qui: Univ. del Salento | ||
|
Applied cyber security and the smart grid : implementing security controls into the modern power infrastructure / / Eric D. Knapp, Raj Samani ; Joel Langill, technical editor |
Autore | Knapp Eric D |
Edizione | [1st edition] |
Pubbl/distr/stampa | Amsterdam ; ; Boston, : Elsevier/Syngress, 2013 |
Descrizione fisica | 1 online resource (xxii, 202 pages) : illustrations (some color) |
Disciplina | 621.310285/58 |
Collana | Gale eBooks |
Soggetto topico |
Smart power grids - Security measures
Computer networks - Security measures |
ISBN |
1-299-40881-8
0-12-404638-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Machine generated contents note: Introduction Chapter 1: What is the Smart Grid? Chapter 2: Smart Grid Network Architecture Chapter 3: Hacking the Smart Grid Chapter 4: Privacy Concerns with the Smart Grid Chapter 5: Security Models for SCADA, ICS and Smart Grid Chapter 6: Securing the Smart Grid Chapter 7: Securing the Supply Chain Chapter 8: The Future of the Grid Appendix A: Reference Models and Architectures Appendix B: Continued Reading Glossary. |
Record Nr. | UNINA-9910786127803321 |
Knapp Eric D
![]() |
||
Amsterdam ; ; Boston, : Elsevier/Syngress, 2013 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Applied cyber security and the smart grid : implementing security controls into the modern power infrastructure / / Eric D. Knapp, Raj Samani ; Joel Langill, technical editor |
Autore | Knapp Eric D |
Edizione | [1st edition] |
Pubbl/distr/stampa | Amsterdam ; ; Boston, : Elsevier/Syngress, 2013 |
Descrizione fisica | 1 online resource (xxii, 202 pages) : illustrations (some color) |
Disciplina | 621.310285/58 |
Collana | Gale eBooks |
Soggetto topico |
Smart power grids - Security measures
Computer networks - Security measures |
ISBN |
1-299-40881-8
0-12-404638-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Machine generated contents note: Introduction Chapter 1: What is the Smart Grid? Chapter 2: Smart Grid Network Architecture Chapter 3: Hacking the Smart Grid Chapter 4: Privacy Concerns with the Smart Grid Chapter 5: Security Models for SCADA, ICS and Smart Grid Chapter 6: Securing the Smart Grid Chapter 7: Securing the Supply Chain Chapter 8: The Future of the Grid Appendix A: Reference Models and Architectures Appendix B: Continued Reading Glossary. |
Record Nr. | UNINA-9910820595503321 |
Knapp Eric D
![]() |
||
Amsterdam ; ; Boston, : Elsevier/Syngress, 2013 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Asterisk hacking : toolkit and liveCD / Benjamin Jackson, Champ Clark III ; Larry Chaffin and Johnny Long, technical editors |
Autore | Jackson, Benjamin |
Pubbl/distr/stampa | Burlington, MA : Syngress, c2007 |
Descrizione fisica | xii, 253 p. : ill. ; 24 cm. + 1 CD-ROM |
Disciplina | 004.695 |
Altri autori (Persone) | Clark, Champ, III.author |
Soggetto topico | Internet telephony |
ISBN | 9781597491518 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISALENTO-991001896339707536 |
Jackson, Benjamin
![]() |
||
Burlington, MA : Syngress, c2007 | ||
![]() | ||
Lo trovi qui: Univ. del Salento | ||
|
Augmented reality [[electronic resource] ] : an emerging technologies guide to AR / / Gregory Kipper, Joseph Rampolla |
Autore | Kipper Gregory |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Waltham, Mass., : Syngress, 2012 |
Descrizione fisica | 1 online resource (177 p.) |
Disciplina | 006.8 |
Altri autori (Persone) | RampollaJoseph |
Soggetto topico |
Augmented reality
Human-computer interaction Real-time data processing Computer graphics Three-dimensional display systems Interactive multimedia |
Soggetto genere / forma | Electronic books. |
ISBN |
1-283-81064-6
1-59749-734-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Half Title; Title page; Copyright; Dedication; Contents; Acknowledgments; About the Authors; Foreword; 1 What Is Augmented Reality?; The Definition of Augmented Reality; What AR is Not; The Components of Augmented Reality; Augmented Reality Platforms; A Brief History of Augmented Reality; 1962; 1968; 1975; 1992; 1996; 1997; 1999; 2000; 2001; 2004; 2006; 2008; 2009; Augmented Reality Today: 2012; Advertising; Task Support; Navigation; Home and Industrial; Art; Sightseeing; Entertainment and Games; Social Networking; Education; Translation
The Differences Between Augmented Reality and Virtual RealityWhat is Virtual Reality?; Similarities and Differences Between VR and AR; The Difference Between AR and QR Codes; Challenges with AR; Technical Challenges of Augmented Reality; Social Challenges of Augmented Reality; The Opportunities for Augmented Reality; Summary; 2 The Types of Augmented Reality; How Augmented Reality Works; AR Systems and Functionality; AR Functions; The Augmented Perception of Reality; The Creation of an Artificial Environment; The Basic Process of Augmenting Reality; Recognition and Tracking Challenges Augmented Reality MethodsPattern; Outline; Location; Surface; AR Display Technology; Mobile Handheld Displays; Video Spatial Displays and Spatial Augmented Reality; Wearable Displays; Interaction in AR Applications; Tangible User Interface; Collaborative AR Interface; Hybrid AR Interface; Multimodal AR Interfaces; Summary; 3 The Value of Augmented Reality; The Next User Interface; The Command Line Interface: The First Dimension; The Graphical User Interface: The Second Dimension; Augmented Reality: The Third Dimension; Mobile Browsing: Eliminating the Need for Searching Advancing Computer InterfacesMinority Report and Mezzanine; Augmented Reality LEAP; The Uses of Augmented Reality; Sports, Gaming, and Entertainment; Sports; Gaming; AR and Location Information; AR and The Kinect; Holograms and 3D Video Conferencing; AR and Virtual Worlds; AR and Social Networking; AR Flash Mob; Mobile Social Networking; Facial Recognition; Recognizr; Social Camera; Movies; The "Outernet"; Virtual Sets; Augmented Television; The MetaMirror; Travel; Language Translation; Directions; An Expanded Experience; Augmented History; HistoryPin; TagWhat; Education Augmented Reality BooksCollaborative Learning; Construct3D; The Augmented Reality Education Group; Maintenance and Repair; Augmented Manuals; Medicine; Business and Commerce; Advertising, Public Relations, and Marketing; QR Codes and AR; Billboards and Posters; Movie Ads; Car Ads; Retail and Shopping; Moosejaw; Augmented Reality Windshields; Summary; 4 The Value of Augmented Reality: Public Safety, The Military, and The Law; Public Safety, The Military, and The Law; AR and Law Enforcement; Drone Technology and AR; Collaborative Crime Scene Investigation; AR for Firefighters AR and The Military |
Record Nr. | UNINA-9910462129603321 |
Kipper Gregory
![]() |
||
Waltham, Mass., : Syngress, 2012 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Augmented reality [[electronic resource] ] : an emerging technologies guide to AR / / Gregory Kipper, Joseph Rampolla |
Autore | Kipper Gregory |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Waltham, Mass., : Syngress, 2012 |
Descrizione fisica | 1 online resource (177 p.) |
Disciplina | 006.8 |
Altri autori (Persone) | RampollaJoseph |
Soggetto topico |
Augmented reality
Human-computer interaction Real-time data processing Computer graphics Three-dimensional display systems Interactive multimedia |
ISBN |
1-283-81064-6
1-59749-734-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Half Title; Title page; Copyright; Dedication; Contents; Acknowledgments; About the Authors; Foreword; 1 What Is Augmented Reality?; The Definition of Augmented Reality; What AR is Not; The Components of Augmented Reality; Augmented Reality Platforms; A Brief History of Augmented Reality; 1962; 1968; 1975; 1992; 1996; 1997; 1999; 2000; 2001; 2004; 2006; 2008; 2009; Augmented Reality Today: 2012; Advertising; Task Support; Navigation; Home and Industrial; Art; Sightseeing; Entertainment and Games; Social Networking; Education; Translation
The Differences Between Augmented Reality and Virtual RealityWhat is Virtual Reality?; Similarities and Differences Between VR and AR; The Difference Between AR and QR Codes; Challenges with AR; Technical Challenges of Augmented Reality; Social Challenges of Augmented Reality; The Opportunities for Augmented Reality; Summary; 2 The Types of Augmented Reality; How Augmented Reality Works; AR Systems and Functionality; AR Functions; The Augmented Perception of Reality; The Creation of an Artificial Environment; The Basic Process of Augmenting Reality; Recognition and Tracking Challenges Augmented Reality MethodsPattern; Outline; Location; Surface; AR Display Technology; Mobile Handheld Displays; Video Spatial Displays and Spatial Augmented Reality; Wearable Displays; Interaction in AR Applications; Tangible User Interface; Collaborative AR Interface; Hybrid AR Interface; Multimodal AR Interfaces; Summary; 3 The Value of Augmented Reality; The Next User Interface; The Command Line Interface: The First Dimension; The Graphical User Interface: The Second Dimension; Augmented Reality: The Third Dimension; Mobile Browsing: Eliminating the Need for Searching Advancing Computer InterfacesMinority Report and Mezzanine; Augmented Reality LEAP; The Uses of Augmented Reality; Sports, Gaming, and Entertainment; Sports; Gaming; AR and Location Information; AR and The Kinect; Holograms and 3D Video Conferencing; AR and Virtual Worlds; AR and Social Networking; AR Flash Mob; Mobile Social Networking; Facial Recognition; Recognizr; Social Camera; Movies; The "Outernet"; Virtual Sets; Augmented Television; The MetaMirror; Travel; Language Translation; Directions; An Expanded Experience; Augmented History; HistoryPin; TagWhat; Education Augmented Reality BooksCollaborative Learning; Construct3D; The Augmented Reality Education Group; Maintenance and Repair; Augmented Manuals; Medicine; Business and Commerce; Advertising, Public Relations, and Marketing; QR Codes and AR; Billboards and Posters; Movie Ads; Car Ads; Retail and Shopping; Moosejaw; Augmented Reality Windshields; Summary; 4 The Value of Augmented Reality: Public Safety, The Military, and The Law; Public Safety, The Military, and The Law; AR and Law Enforcement; Drone Technology and AR; Collaborative Crime Scene Investigation; AR for Firefighters AR and The Military |
Record Nr. | UNINA-9910785915703321 |
Kipper Gregory
![]() |
||
Waltham, Mass., : Syngress, 2012 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|