802.1X-2020 - IEEE Standard for Local and Metropolitan Area Networks : Port-Based Network Access Control / / IEEE
| 802.1X-2020 - IEEE Standard for Local and Metropolitan Area Networks : Port-Based Network Access Control / / IEEE |
| Pubbl/distr/stampa | New York. : , : IEEE, , 2020 |
| Descrizione fisica | 1 online resource (289 pages) |
| Disciplina | 004.68 |
| Soggetto topico |
Local area networks (Computer networks) - Standards
Metropolitan area networks (Computer networks) - Standards IEEE Standards Computer networks - Security measures - Standards Access control Authorization Media Access Protocol Authentication Security |
| ISBN | 1-5044-6440-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti |
IEEE 802.1X-2020 Standard
IEEE Standard for Local and Metropolitan Area Networks |
| Record Nr. | UNINA-9910389743803321 |
| New York. : , : IEEE, , 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
802.1X-2020 - IEEE Standard for Local and Metropolitan Area Networks : Port-Based Network Access Control / / IEEE
| 802.1X-2020 - IEEE Standard for Local and Metropolitan Area Networks : Port-Based Network Access Control / / IEEE |
| Pubbl/distr/stampa | New York. : , : IEEE, , 2020 |
| Descrizione fisica | 1 online resource (289 pages) |
| Disciplina | 004.68 |
| Soggetto topico |
Local area networks (Computer networks) - Standards
Metropolitan area networks (Computer networks) - Standards IEEE Standards Computer networks - Security measures - Standards Access control Authorization Media Access Protocol Authentication Security |
| ISBN | 1-5044-6440-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti |
IEEE 802.1X-2020 Standard
IEEE Standard for Local and Metropolitan Area Networks |
| Record Nr. | UNISA-996574711503316 |
| New York. : , : IEEE, , 2020 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Access control and privacy in large distributed systems / / Barry M. Leiner, Matt Bishop
| Access control and privacy in large distributed systems / / Barry M. Leiner, Matt Bishop |
| Autore | Leiner B (Barry) |
| Pubbl/distr/stampa | Moffett Field, CA : , : The Research Institute for Advanced Computer Science, NASA Ames Research Center, , March 1986 |
| Descrizione fisica | 1 online resource (16 pages) : illustrations |
| Collana | NASA/TM |
| Soggetto topico |
Access control
Computer systems programs |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910716628203321 |
Leiner B (Barry)
|
||
| Moffett Field, CA : , : The Research Institute for Advanced Computer Science, NASA Ames Research Center, , March 1986 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Applying the take-grant protection model [[electronic resource] /] / Matt Bishop
| Applying the take-grant protection model [[electronic resource] /] / Matt Bishop |
| Autore | Bishop Matt (Matthew A.) |
| Pubbl/distr/stampa | Hanover, NH : , : Department of Mathematics and Computer Science, Dartmouth College |
| Descrizione fisica | 1 online resource (26 pages) : illustrations |
| Collana |
[NASA contractor report
Technical report |
| Soggetto topico |
Access control
Computer information security Information flow Information transfer Models Policies Protection |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910702279603321 |
Bishop Matt (Matthew A.)
|
||
| Hanover, NH : , : Department of Mathematics and Computer Science, Dartmouth College | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
A brief survey of media access control, data link layer, and protocol technologies for Lunar surface communications [[electronic resource] ] : comparison / / Thomas M. Wallett
| A brief survey of media access control, data link layer, and protocol technologies for Lunar surface communications [[electronic resource] ] : comparison / / Thomas M. Wallett |
| Autore | Wallett Thomas M |
| Pubbl/distr/stampa | Cleveland, Ohio : , : National Aeronautics and Space Administration, Glenn Research Center, , [2009] |
| Descrizione fisica | 1 online resource (6 pages) : illustrations |
| Collana | NASA/TM- |
| Soggetto topico |
Code division multiple access
Data links Lunar surface Time division multiple access Wireless communication Spacecraft communication Phased arrays Antenna design Access control Control systems design |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Brief survey of media access control, data link layer, and protocol technologies for Lunar surface communications |
| Record Nr. | UNINA-9910697080203321 |
Wallett Thomas M
|
||
| Cleveland, Ohio : , : National Aeronautics and Space Administration, Glenn Research Center, , [2009] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Building Cyber Resilience Against Hybrid Threats / / edited by Mitko Bogdanoski
| Building Cyber Resilience Against Hybrid Threats / / edited by Mitko Bogdanoski |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Amsterdam : , : IOS Press, Incorporated, , 2022 |
| Descrizione fisica | 1 online resource (166 pages) |
| Collana | NATO Science for Peace and Security Series - d: Information and Communication Security |
| Soggetto topico |
Computers - Access control
Access control Computer security |
| ISBN |
9781643682938
9781643682921 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Intro -- Title Page -- Foreword -- About the Authors -- Acknowledgment -- Contents -- NATO Cyber Defence Policy and Hybrid Threats: The Way to Enhance Our Resilience -- EU-NATO Hybrid Warfare -- Understanding Hybrid Warfare in Cyberspace: Building Resiliance Through Understanding -- Applying Resilience to Hybrid Threats in Infrastructure, Digital, and Social Domains Using Multisectoral, Multidisciplinary, and Whole-of-Government Approach -- Public Opinion Influence Through Electronic Propaganda Activities -- Legal Perspectives of Hybrid Warfare Activities in Cyberspace -- Cyber Security Perspective of Top Future Technologies -- Use of Technological Advances Against Hybrid-Based Threats in SEE -- Deep Learning in Cyber Security -- Lattice-Based Cryptography: A Quantum Approach to Secure the IoT Technology -- Positioning Cyber Security Risk Management Within a Consolidated Security Platform -- Subject Index -- Author Index. |
| Record Nr. | UNINA-9910795985203321 |
| Amsterdam : , : IOS Press, Incorporated, , 2022 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Building Cyber Resilience Against Hybrid Threats / / edited by Mitko Bogdanoski
| Building Cyber Resilience Against Hybrid Threats / / edited by Mitko Bogdanoski |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Amsterdam : , : IOS Press, Incorporated, , 2022 |
| Descrizione fisica | 1 online resource (166 pages) |
| Collana | NATO Science for Peace and Security Series - d: Information and Communication Security |
| Soggetto topico |
Computers - Access control
Access control Computer security |
| ISBN |
9781643682938
9781643682921 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Intro -- Title Page -- Foreword -- About the Authors -- Acknowledgment -- Contents -- NATO Cyber Defence Policy and Hybrid Threats: The Way to Enhance Our Resilience -- EU-NATO Hybrid Warfare -- Understanding Hybrid Warfare in Cyberspace: Building Resiliance Through Understanding -- Applying Resilience to Hybrid Threats in Infrastructure, Digital, and Social Domains Using Multisectoral, Multidisciplinary, and Whole-of-Government Approach -- Public Opinion Influence Through Electronic Propaganda Activities -- Legal Perspectives of Hybrid Warfare Activities in Cyberspace -- Cyber Security Perspective of Top Future Technologies -- Use of Technological Advances Against Hybrid-Based Threats in SEE -- Deep Learning in Cyber Security -- Lattice-Based Cryptography: A Quantum Approach to Secure the IoT Technology -- Positioning Cyber Security Risk Management Within a Consolidated Security Platform -- Subject Index -- Author Index. |
| Record Nr. | UNINA-9910821278203321 |
| Amsterdam : , : IOS Press, Incorporated, , 2022 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
A methodology for handling standards terminology for sustainable manufacturing / / Anantha Narayanan; David Lechevalier; KC Morris; Sudarsan Rachuri
| A methodology for handling standards terminology for sustainable manufacturing / / Anantha Narayanan; David Lechevalier; KC Morris; Sudarsan Rachuri |
| Autore | Narayanan Anantha |
| Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2013 |
| Descrizione fisica | 1 online resource (21 pages) : illustrations (color) |
| Altri autori (Persone) |
LechevalierDavid
MorrisK. C NarayananAnantha RachuriSudarsan |
| Collana | NISTIR |
| Soggetto topico |
Access control
Authentication |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910710507503321 |
Narayanan Anantha
|
||
| Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Policy machine : features, architecture, and specification / / David Ferraiolo; Serban Gavrila; Wayne Jansen
| Policy machine : features, architecture, and specification / / David Ferraiolo; Serban Gavrila; Wayne Jansen |
| Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2014 |
| Descrizione fisica | 1 online resource (103 pages) : illustrations (black and white) |
| Altri autori (Persone) |
FerraioloDavid
GavrilaSerban JansenWayne |
| Collana | NISTIR |
| Soggetto topico |
Access control
Computer security |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Policy machine |
| Record Nr. | UNINA-9910709591103321 |
| Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Security of interactive and automated access management using secure shell (SSH) / / Tatu Ylonen; paul Turner; Karen Scarfone; Murugiah Souppaya
| Security of interactive and automated access management using secure shell (SSH) / / Tatu Ylonen; paul Turner; Karen Scarfone; Murugiah Souppaya |
| Autore | Ylonen Tatu |
| Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2015 |
| Descrizione fisica | 1 online resource (50 pages) : illustrations (chiefly color) |
| Altri autori (Persone) |
ScarfoneKaren
SouppayaMurugiah TurnerPaul YlonenTatu |
| Collana | NISTIR |
| Soggetto topico |
Access control
Authentication |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Security of interactive and automated access management using secure shell |
| Record Nr. | UNINA-9910710790203321 |
Ylonen Tatu
|
||
| Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||