top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies / / Ira Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor
Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies / / Ira Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor
Autore Winkler Ira
Edizione [1st edition]
Pubbl/distr/stampa Cambridge, MA : , : Syngress, , [2017]
Descrizione fisica 1 online resource (xvii, 241 pages)
Disciplina 005.8
Collana Gale eBooks
Soggetto topico Computer networks - Security measures
Computer security
Hacking
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto What is advanced persistent security? -- Cyberwarfare concepts -- What is proaction? -- Risk management -- How to hack computers -- Threat -- Adversary infrastructure -- Governance -- Vulnerabilities to address -- Countermeasures -- Security culture -- What is threat intelligence? -- What is detection? -- Detection deficit disorder -- The human intrusion detection system -- Kill chain analysis -- Setting reaction strategy -- Incident response and investigations -- Know yourself -- Know your adversaries -- Define your strategy -- Determining the appropriate countermeasures -- Advanced persistent security.
Record Nr. UNINA-9910583064103321
Winkler Ira  
Cambridge, MA : , : Syngress, , [2017]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Android forensics [[electronic resource] ] : investigation, analysis, and mobile security for Google Android / / Andrew Hoog ; John McCash, technical editor
Android forensics [[electronic resource] ] : investigation, analysis, and mobile security for Google Android / / Andrew Hoog ; John McCash, technical editor
Autore Hoog Andrew
Edizione [1st edition]
Pubbl/distr/stampa Waltham, MA, : Syngress, c2011
Descrizione fisica 1 online resource (393 p.)
Disciplina 005.4
005.4/46
005.446
363.25
Soggetto topico Smartphones - Security measures
Mobile computing - Security measures
Data recovery (Computer science)
Computer crimes - Investigation
Soggetto genere / forma Electronic books.
ISBN 1-283-28146-5
9786613281463
1-59749-652-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Android Forensics; Copyright; Dedication; Contents; Acknowledgements; Introduction; Chapter 1; Chapter 2; Chapter 3; Chapter 4; Chapter 5; Chapter 6; Chapter 7; Website; About the Author; About the Technical Editor; Chapter 1 -Android and mobile forensics; Introduction; Android platform; Linux, open source software, and forensics; Android Open Source Project; Internationalization; Android Market; Android forensics; Summary; References; Chapter 2 -Android hardware platforms; Introduction; Overview of core components; Overview of different device types; ROM and boot loaders
ManufacturersAndroid updates; Specific devices; Summary; References; Chapter 3 -Android software development kit and android debug bridge; Introduction; Android platforms; Software development kit (SDK); Android security model; Forensics and the SDK; Summary; References; Chapter 4 -Android file systems and data structures; Introduction; Data in the Shell; Type of memory; File systems; Mounted file systems; Summary; References; Chapter 5 -Android device, data, and app security; Introduction; Data theft targets and attack vectors; Security considerations; Individual security strategies
Corporate security strategiesApp development security strategies; Summary; References; Chapter 6 -Android forensic techniques; Introduction; Procedures for handling an Android device; Imaging Android USB mass storage devices; Logical techniques; Physical techniques; Summary; References; Chapter 7 -Android application and forensic analysis; Introduction; Analysis techniques; FAT forensic analysis; YAFFS2 forensic analysis; Android app analysis and reference; Summary; References; Index
Record Nr. UNINA-9910461406503321
Hoog Andrew  
Waltham, MA, : Syngress, c2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Android forensics : investigation, analysis, and mobile security for Google Android / / Andrew Hoog ; John McCash, technical editor
Android forensics : investigation, analysis, and mobile security for Google Android / / Andrew Hoog ; John McCash, technical editor
Autore Hoog Andrew
Edizione [1st edition]
Pubbl/distr/stampa Waltham, MA, : Syngress, c2011
Descrizione fisica 1 online resource (393 p.)
Disciplina 005.4
005.4/46
005.446
363.25
Soggetto topico Smartphones - Security measures
Mobile computing - Security measures
Data recovery (Computer science)
Computer crimes - Investigation
ISBN 1-283-28146-5
9786613281463
1-59749-652-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Android Forensics; Copyright; Dedication; Contents; Acknowledgements; Introduction; Chapter 1; Chapter 2; Chapter 3; Chapter 4; Chapter 5; Chapter 6; Chapter 7; Website; About the Author; About the Technical Editor; Chapter 1 -Android and mobile forensics; Introduction; Android platform; Linux, open source software, and forensics; Android Open Source Project; Internationalization; Android Market; Android forensics; Summary; References; Chapter 2 -Android hardware platforms; Introduction; Overview of core components; Overview of different device types; ROM and boot loaders
ManufacturersAndroid updates; Specific devices; Summary; References; Chapter 3 -Android software development kit and android debug bridge; Introduction; Android platforms; Software development kit (SDK); Android security model; Forensics and the SDK; Summary; References; Chapter 4 -Android file systems and data structures; Introduction; Data in the Shell; Type of memory; File systems; Mounted file systems; Summary; References; Chapter 5 -Android device, data, and app security; Introduction; Data theft targets and attack vectors; Security considerations; Individual security strategies
Corporate security strategiesApp development security strategies; Summary; References; Chapter 6 -Android forensic techniques; Introduction; Procedures for handling an Android device; Imaging Android USB mass storage devices; Logical techniques; Physical techniques; Summary; References; Chapter 7 -Android application and forensic analysis; Introduction; Analysis techniques; FAT forensic analysis; YAFFS2 forensic analysis; Android app analysis and reference; Summary; References; Index
Record Nr. UNINA-9910789440003321
Hoog Andrew  
Waltham, MA, : Syngress, c2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Android forensics : investigation, analysis, and mobile security for Google Android / / Andrew Hoog ; John McCash, technical editor
Android forensics : investigation, analysis, and mobile security for Google Android / / Andrew Hoog ; John McCash, technical editor
Autore Hoog Andrew
Edizione [1st edition]
Pubbl/distr/stampa Waltham, MA, : Syngress, c2011
Descrizione fisica 1 online resource (393 p.)
Disciplina 005.4
005.4/46
005.446
363.25
Soggetto topico Smartphones - Security measures
Mobile computing - Security measures
Data recovery (Computer science)
Computer crimes - Investigation
ISBN 1-283-28146-5
9786613281463
1-59749-652-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Android Forensics; Copyright; Dedication; Contents; Acknowledgements; Introduction; Chapter 1; Chapter 2; Chapter 3; Chapter 4; Chapter 5; Chapter 6; Chapter 7; Website; About the Author; About the Technical Editor; Chapter 1 -Android and mobile forensics; Introduction; Android platform; Linux, open source software, and forensics; Android Open Source Project; Internationalization; Android Market; Android forensics; Summary; References; Chapter 2 -Android hardware platforms; Introduction; Overview of core components; Overview of different device types; ROM and boot loaders
ManufacturersAndroid updates; Specific devices; Summary; References; Chapter 3 -Android software development kit and android debug bridge; Introduction; Android platforms; Software development kit (SDK); Android security model; Forensics and the SDK; Summary; References; Chapter 4 -Android file systems and data structures; Introduction; Data in the Shell; Type of memory; File systems; Mounted file systems; Summary; References; Chapter 5 -Android device, data, and app security; Introduction; Data theft targets and attack vectors; Security considerations; Individual security strategies
Corporate security strategiesApp development security strategies; Summary; References; Chapter 6 -Android forensic techniques; Introduction; Procedures for handling an Android device; Imaging Android USB mass storage devices; Logical techniques; Physical techniques; Summary; References; Chapter 7 -Android application and forensic analysis; Introduction; Analysis techniques; FAT forensic analysis; YAFFS2 forensic analysis; Android app analysis and reference; Summary; References; Index
Record Nr. UNINA-9910820237003321
Hoog Andrew  
Waltham, MA, : Syngress, c2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Apple I replica creation [electronic resource] : back to the garage / Tom Owad ; with a foreward by Steve Wozniak
Apple I replica creation [electronic resource] : back to the garage / Tom Owad ; with a foreward by Steve Wozniak
Autore Owad, Tom.
Pubbl/distr/stampa Rockland, MA : Syngress, c2005
Descrizione fisica xxv, 333 p. : ill. ; 24 cm. + 1 computer optical disc (4 3/4 in.)
Disciplina 004.165
Soggetto topico Apple computer - Design and construction - Handbooks, manuals, etc
Apple computer - Programming - Handbooks, manuals, etc
Assembler language (Computer program language) - Handbooks, manuals, etc
BASIC (Computer program language) - Handbooks, manuals, etc
Soggetto genere / forma Electronic books.
ISBN 9781931836401
193183640X
Formato Risorse elettroniche
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part I - Hardware ; Introduction ; Understanding the Apple I ; The Processor ; On The Bus: Memory, ROM and RAM ; In, Out, and the 6821 ; Interfacing video and keyboard ; Building and Testing ; Setting it all up ; Choosing peripherals ; Building a case ; Part II - Programming ; BASIC ; Forth ; Assembly ; Part III -Additional Projects ; Single-step ; Reading sensors ; Controlling lights ; Controlling motors ; LCD display.
Altri titoli varianti Apple one replica creation
Record Nr. UNISALENTO-991003257469707536
Owad, Tom.  
Rockland, MA : Syngress, c2005
Risorse elettroniche
Lo trovi qui: Univ. del Salento
Opac: Controlla la disponibilità qui
Applied cyber security and the smart grid : implementing security controls into the modern power infrastructure / / Eric D. Knapp, Raj Samani ; Joel Langill, technical editor
Applied cyber security and the smart grid : implementing security controls into the modern power infrastructure / / Eric D. Knapp, Raj Samani ; Joel Langill, technical editor
Autore Knapp Eric D
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Elsevier/Syngress, 2013
Descrizione fisica 1 online resource (xxii, 202 pages) : illustrations (some color)
Disciplina 621.310285/58
Collana Gale eBooks
Soggetto topico Smart power grids - Security measures
Computer networks - Security measures
ISBN 1-299-40881-8
0-12-404638-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Machine generated contents note: Introduction Chapter 1: What is the Smart Grid? Chapter 2: Smart Grid Network Architecture Chapter 3: Hacking the Smart Grid Chapter 4: Privacy Concerns with the Smart Grid Chapter 5: Security Models for SCADA, ICS and Smart Grid Chapter 6: Securing the Smart Grid Chapter 7: Securing the Supply Chain Chapter 8: The Future of the Grid Appendix A: Reference Models and Architectures Appendix B: Continued Reading Glossary.
Record Nr. UNINA-9910786127803321
Knapp Eric D  
Amsterdam ; ; Boston, : Elsevier/Syngress, 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Applied cyber security and the smart grid : implementing security controls into the modern power infrastructure / / Eric D. Knapp, Raj Samani ; Joel Langill, technical editor
Applied cyber security and the smart grid : implementing security controls into the modern power infrastructure / / Eric D. Knapp, Raj Samani ; Joel Langill, technical editor
Autore Knapp Eric D
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Elsevier/Syngress, 2013
Descrizione fisica 1 online resource (xxii, 202 pages) : illustrations (some color)
Disciplina 621.310285/58
Collana Gale eBooks
Soggetto topico Smart power grids - Security measures
Computer networks - Security measures
ISBN 1-299-40881-8
0-12-404638-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Machine generated contents note: Introduction Chapter 1: What is the Smart Grid? Chapter 2: Smart Grid Network Architecture Chapter 3: Hacking the Smart Grid Chapter 4: Privacy Concerns with the Smart Grid Chapter 5: Security Models for SCADA, ICS and Smart Grid Chapter 6: Securing the Smart Grid Chapter 7: Securing the Supply Chain Chapter 8: The Future of the Grid Appendix A: Reference Models and Architectures Appendix B: Continued Reading Glossary.
Record Nr. UNINA-9910820595503321
Knapp Eric D  
Amsterdam ; ; Boston, : Elsevier/Syngress, 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Asterisk hacking : toolkit and liveCD / Benjamin Jackson, Champ Clark III ; Larry Chaffin and Johnny Long, technical editors
Asterisk hacking : toolkit and liveCD / Benjamin Jackson, Champ Clark III ; Larry Chaffin and Johnny Long, technical editors
Autore Jackson, Benjamin
Pubbl/distr/stampa Burlington, MA : Syngress, c2007
Descrizione fisica xii, 253 p. : ill. ; 24 cm. + 1 CD-ROM
Disciplina 004.695
Altri autori (Persone) Clark, Champ, III.author
Soggetto topico Internet telephony
ISBN 9781597491518
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISALENTO-991001896339707536
Jackson, Benjamin  
Burlington, MA : Syngress, c2007
Materiale a stampa
Lo trovi qui: Univ. del Salento
Opac: Controlla la disponibilità qui
Augmented reality [[electronic resource] ] : an emerging technologies guide to AR / / Gregory Kipper, Joseph Rampolla
Augmented reality [[electronic resource] ] : an emerging technologies guide to AR / / Gregory Kipper, Joseph Rampolla
Autore Kipper Gregory
Edizione [1st ed.]
Pubbl/distr/stampa Waltham, Mass., : Syngress, 2012
Descrizione fisica 1 online resource (177 p.)
Disciplina 006.8
Altri autori (Persone) RampollaJoseph
Soggetto topico Augmented reality
Human-computer interaction
Real-time data processing
Computer graphics
Three-dimensional display systems
Interactive multimedia
Soggetto genere / forma Electronic books.
ISBN 1-283-81064-6
1-59749-734-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Half Title; Title page; Copyright; Dedication; Contents; Acknowledgments; About the Authors; Foreword; 1 What Is Augmented Reality?; The Definition of Augmented Reality; What AR is Not; The Components of Augmented Reality; Augmented Reality Platforms; A Brief History of Augmented Reality; 1962; 1968; 1975; 1992; 1996; 1997; 1999; 2000; 2001; 2004; 2006; 2008; 2009; Augmented Reality Today: 2012; Advertising; Task Support; Navigation; Home and Industrial; Art; Sightseeing; Entertainment and Games; Social Networking; Education; Translation
The Differences Between Augmented Reality and Virtual RealityWhat is Virtual Reality?; Similarities and Differences Between VR and AR; The Difference Between AR and QR Codes; Challenges with AR; Technical Challenges of Augmented Reality; Social Challenges of Augmented Reality; The Opportunities for Augmented Reality; Summary; 2 The Types of Augmented Reality; How Augmented Reality Works; AR Systems and Functionality; AR Functions; The Augmented Perception of Reality; The Creation of an Artificial Environment; The Basic Process of Augmenting Reality; Recognition and Tracking Challenges
Augmented Reality MethodsPattern; Outline; Location; Surface; AR Display Technology; Mobile Handheld Displays; Video Spatial Displays and Spatial Augmented Reality; Wearable Displays; Interaction in AR Applications; Tangible User Interface; Collaborative AR Interface; Hybrid AR Interface; Multimodal AR Interfaces; Summary; 3 The Value of Augmented Reality; The Next User Interface; The Command Line Interface: The First Dimension; The Graphical User Interface: The Second Dimension; Augmented Reality: The Third Dimension; Mobile Browsing: Eliminating the Need for Searching
Advancing Computer InterfacesMinority Report and Mezzanine; Augmented Reality LEAP; The Uses of Augmented Reality; Sports, Gaming, and Entertainment; Sports; Gaming; AR and Location Information; AR and The Kinect; Holograms and 3D Video Conferencing; AR and Virtual Worlds; AR and Social Networking; AR Flash Mob; Mobile Social Networking; Facial Recognition; Recognizr; Social Camera; Movies; The "Outernet"; Virtual Sets; Augmented Television; The MetaMirror; Travel; Language Translation; Directions; An Expanded Experience; Augmented History; HistoryPin; TagWhat; Education
Augmented Reality BooksCollaborative Learning; Construct3D; The Augmented Reality Education Group; Maintenance and Repair; Augmented Manuals; Medicine; Business and Commerce; Advertising, Public Relations, and Marketing; QR Codes and AR; Billboards and Posters; Movie Ads; Car Ads; Retail and Shopping; Moosejaw; Augmented Reality Windshields; Summary; 4 The Value of Augmented Reality: Public Safety, The Military, and The Law; Public Safety, The Military, and The Law; AR and Law Enforcement; Drone Technology and AR; Collaborative Crime Scene Investigation; AR for Firefighters
AR and The Military
Record Nr. UNINA-9910462129603321
Kipper Gregory  
Waltham, Mass., : Syngress, 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Augmented reality [[electronic resource] ] : an emerging technologies guide to AR / / Gregory Kipper, Joseph Rampolla
Augmented reality [[electronic resource] ] : an emerging technologies guide to AR / / Gregory Kipper, Joseph Rampolla
Autore Kipper Gregory
Edizione [1st ed.]
Pubbl/distr/stampa Waltham, Mass., : Syngress, 2012
Descrizione fisica 1 online resource (177 p.)
Disciplina 006.8
Altri autori (Persone) RampollaJoseph
Soggetto topico Augmented reality
Human-computer interaction
Real-time data processing
Computer graphics
Three-dimensional display systems
Interactive multimedia
ISBN 1-283-81064-6
1-59749-734-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Half Title; Title page; Copyright; Dedication; Contents; Acknowledgments; About the Authors; Foreword; 1 What Is Augmented Reality?; The Definition of Augmented Reality; What AR is Not; The Components of Augmented Reality; Augmented Reality Platforms; A Brief History of Augmented Reality; 1962; 1968; 1975; 1992; 1996; 1997; 1999; 2000; 2001; 2004; 2006; 2008; 2009; Augmented Reality Today: 2012; Advertising; Task Support; Navigation; Home and Industrial; Art; Sightseeing; Entertainment and Games; Social Networking; Education; Translation
The Differences Between Augmented Reality and Virtual RealityWhat is Virtual Reality?; Similarities and Differences Between VR and AR; The Difference Between AR and QR Codes; Challenges with AR; Technical Challenges of Augmented Reality; Social Challenges of Augmented Reality; The Opportunities for Augmented Reality; Summary; 2 The Types of Augmented Reality; How Augmented Reality Works; AR Systems and Functionality; AR Functions; The Augmented Perception of Reality; The Creation of an Artificial Environment; The Basic Process of Augmenting Reality; Recognition and Tracking Challenges
Augmented Reality MethodsPattern; Outline; Location; Surface; AR Display Technology; Mobile Handheld Displays; Video Spatial Displays and Spatial Augmented Reality; Wearable Displays; Interaction in AR Applications; Tangible User Interface; Collaborative AR Interface; Hybrid AR Interface; Multimodal AR Interfaces; Summary; 3 The Value of Augmented Reality; The Next User Interface; The Command Line Interface: The First Dimension; The Graphical User Interface: The Second Dimension; Augmented Reality: The Third Dimension; Mobile Browsing: Eliminating the Need for Searching
Advancing Computer InterfacesMinority Report and Mezzanine; Augmented Reality LEAP; The Uses of Augmented Reality; Sports, Gaming, and Entertainment; Sports; Gaming; AR and Location Information; AR and The Kinect; Holograms and 3D Video Conferencing; AR and Virtual Worlds; AR and Social Networking; AR Flash Mob; Mobile Social Networking; Facial Recognition; Recognizr; Social Camera; Movies; The "Outernet"; Virtual Sets; Augmented Television; The MetaMirror; Travel; Language Translation; Directions; An Expanded Experience; Augmented History; HistoryPin; TagWhat; Education
Augmented Reality BooksCollaborative Learning; Construct3D; The Augmented Reality Education Group; Maintenance and Repair; Augmented Manuals; Medicine; Business and Commerce; Advertising, Public Relations, and Marketing; QR Codes and AR; Billboards and Posters; Movie Ads; Car Ads; Retail and Shopping; Moosejaw; Augmented Reality Windshields; Summary; 4 The Value of Augmented Reality: Public Safety, The Military, and The Law; Public Safety, The Military, and The Law; AR and Law Enforcement; Drone Technology and AR; Collaborative Crime Scene Investigation; AR for Firefighters
AR and The Military
Record Nr. UNINA-9910785915703321
Kipper Gregory  
Waltham, Mass., : Syngress, 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui