802.1X-2020 - IEEE Standard for Local and Metropolitan Area Networks : Port-Based Network Access Control / / IEEE |
Pubbl/distr/stampa | New York. : , : IEEE, , 2020 |
Descrizione fisica | 1 online resource (289 pages) |
Disciplina | 004.68 |
Soggetto topico |
Local area networks (Computer networks) - Standards
Metropolitan area networks (Computer networks) - Standards IEEE Standards Computer networks - Security measures - Standards Access control Authorization Media Access Protocol Authentication Security |
ISBN | 1-5044-6440-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti |
IEEE 802.1X-2020 Standard
IEEE Standard for Local and Metropolitan Area Networks |
Record Nr. | UNINA-9910389743803321 |
New York. : , : IEEE, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
802.1X-2020 - IEEE Standard for Local and Metropolitan Area Networks : Port-Based Network Access Control / / IEEE |
Pubbl/distr/stampa | New York. : , : IEEE, , 2020 |
Descrizione fisica | 1 online resource (289 pages) |
Disciplina | 004.68 |
Soggetto topico |
Local area networks (Computer networks) - Standards
Metropolitan area networks (Computer networks) - Standards IEEE Standards Computer networks - Security measures - Standards Access control Authorization Media Access Protocol Authentication Security |
ISBN | 1-5044-6440-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti |
IEEE 802.1X-2020 Standard
IEEE Standard for Local and Metropolitan Area Networks |
Record Nr. | UNISA-996574711503316 |
New York. : , : IEEE, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Application security in the ISO 27001:2013 environment / / Vinod Vasudevan [and five others] |
Autore | Vasudevan Vinod |
Edizione | [Second edition.] |
Pubbl/distr/stampa | Ely Cambridgeshire : , : IT Governance Publishing, , 2015 |
Descrizione fisica | 1 online resource (254 pages) : illustrations |
Disciplina | 005.8 |
Soggetto topico |
Data protection - Standards
Computer security Computer networks - Security measures - Standards Information technology - Standards Computer software - Reliability |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cover; Title; Copyright; Preface; About The Authors; Acknowledgements; Contents; Chapter 1: Introduction To The International Information Security Standards Iso27001 And Iso27002; Chapter 2: The Iso27001 Implementation Project; Chapter 3: Risk Assessment; Chapter 4: Introduction To Application Security Theats; Chapter 5: Application Security And Iso27001; Chapter 6: Attacks On Applications; Chapter 7: Secure Development Lifecycle; Chapter 8: Threat Profiling And Security Testing; Chapter 9: Secure Coding Guidelines; Itg Resources. |
Record Nr. | UNINA-9910798238503321 |
Vasudevan Vinod | ||
Ely Cambridgeshire : , : IT Governance Publishing, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Application security in the ISO 27001:2013 environment / / Vinod Vasudevan [and five others] |
Autore | Vasudevan Vinod |
Edizione | [Second edition.] |
Pubbl/distr/stampa | Ely Cambridgeshire : , : IT Governance Publishing, , 2015 |
Descrizione fisica | 1 online resource (254 pages) : illustrations |
Disciplina | 005.8 |
Soggetto topico |
Data protection - Standards
Computer security Computer networks - Security measures - Standards Information technology - Standards Computer software - Reliability |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cover; Title; Copyright; Preface; About The Authors; Acknowledgements; Contents; Chapter 1: Introduction To The International Information Security Standards Iso27001 And Iso27002; Chapter 2: The Iso27001 Implementation Project; Chapter 3: Risk Assessment; Chapter 4: Introduction To Application Security Theats; Chapter 5: Application Security And Iso27001; Chapter 6: Attacks On Applications; Chapter 7: Secure Development Lifecycle; Chapter 8: Threat Profiling And Security Testing; Chapter 9: Secure Coding Guidelines; Itg Resources. |
Record Nr. | UNINA-9910827160103321 |
Vasudevan Vinod | ||
Ely Cambridgeshire : , : IT Governance Publishing, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber risks for business professionals [[electronic resource] ] : a management guide / / Rupert Kendrick |
Autore | Kendrick Rupert |
Edizione | [1st edition] |
Pubbl/distr/stampa | Ely, : IT Governance Pub., 2010 |
Descrizione fisica | 1 online resource (305 p.) |
Disciplina | 005.8 |
Soggetto topico |
Computer crimes - Prevention
Cyberterrorism - Prevention Computer networks - Security measures - Standards Computer networks - Security measures - Quality control Internet - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN |
1-84928-143-2
1-283-00641-3 9786613006417 1-84928-093-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | PART 1 - IDENTIFYING CYBER RISKS; CHAPTER 1: SETTING THE SCENE; CHAPTER 2: TECHNOLOGY RISKS; CHAPTER 3: LEGAL COMPLIANCE RISKS; CHAPTER 4: OPERATIONAL RISKS; PART 2 - RISK MANAGEMENT STRATEGIES; CHAPTER 5: THE NEED FOR GOVERNANCE; CHAPTER 6: ASSESSING RISK; CHAPTER 7: RISK MANAGEMENT STRATEGIES; PART 3 - CYBER RISK SOLUTIONS; CHAPTER 8: TECHNOLOGY SOLUTIONS; CHAPTER 9: COMPLIANCE SOLUTIONS; CHAPTER 10: OPERATIONAL SOLUTIONS; CHAPTER 11: THE CYBERSECURE ENTITY |
Record Nr. | UNINA-9910460411703321 |
Kendrick Rupert | ||
Ely, : IT Governance Pub., 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyberwar, cyberterror, cybercrime [[electronic resource] ] : a guide to the role of standards in an environment of change and danger / / Julie E. Mehan |
Autore | Mehan Julie E |
Edizione | [1st edition] |
Pubbl/distr/stampa | Ely, : IT Governance Pub., 2008 |
Descrizione fisica | 1 online resource (281 p.) |
Disciplina | 005.802/18 |
Soggetto topico |
Computer crimes - Prevention
Cyberterrorism - Prevention Computer networks - Security measures - Standards Computer networks - Security measures - Quality control Internet - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN |
1-282-26359-5
9786612263590 1-905356-48-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
INTRODUCTION; CHAPTER 1: WHAT TECHNOLOGY GIVETH IT TAKETH AWAY; CHAPTER 2: CYBERATTACK: IT'S A DANGEROUS WORLD FOR INFORMATION SYSTEMS; CHAPTER 3: THE HUMAN FACTOR: THE UNDERRATED THREAT; CHAPTER 4: TRANSITION FROM AN ENVIRONMENT OF 'FUD' TO A STANDARDS-BASED ENVIRONMENT; CHAPTER 5: ESTABLISHING A CULTURE OF CYBERSECURITY; CHAPTER 6: INCREASING INTERNATIONALISM: GOVERNANCE, LAWS, AND ETHICS; CHAPTER 7: STANDARDS: WHAT ARE THEY AND WHY SHOULD WE CARE?; CHAPTER 8: FROM CYBERWAR TO CYBERDEFENCE: APPLYING STANDARDS IN AN ENVIRONMENT OF CHANGE AND DANGER
CHAPTER 9: CONCLUSION: WHERE DO WE GO FROM HERE?APPENDIX 1: GAP ANALYSIS AREAS OF INTEREST; APPENDIX 2: STANDARDS CROSSWALK; DEFINITIONS; ACRONYMS; INDEX |
Record Nr. | UNINA-9910455517103321 |
Mehan Julie E | ||
Ely, : IT Governance Pub., 2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyberwar, cyberterror, cybercrime [[electronic resource] ] : a guide to the role of standards in an environment of change and danger / / Julie E. Mehan |
Autore | Mehan Julie E |
Edizione | [1st edition] |
Pubbl/distr/stampa | Ely, : IT Governance Pub., 2008 |
Descrizione fisica | 1 online resource (281 p.) |
Disciplina | 005.802/18 |
Soggetto topico |
Computer crimes - Prevention
Cyberterrorism - Prevention Computer networks - Security measures - Standards Computer networks - Security measures - Quality control Internet - Security measures |
ISBN |
1-282-26359-5
9786612263590 1-905356-48-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
INTRODUCTION; CHAPTER 1: WHAT TECHNOLOGY GIVETH IT TAKETH AWAY; CHAPTER 2: CYBERATTACK: IT'S A DANGEROUS WORLD FOR INFORMATION SYSTEMS; CHAPTER 3: THE HUMAN FACTOR: THE UNDERRATED THREAT; CHAPTER 4: TRANSITION FROM AN ENVIRONMENT OF 'FUD' TO A STANDARDS-BASED ENVIRONMENT; CHAPTER 5: ESTABLISHING A CULTURE OF CYBERSECURITY; CHAPTER 6: INCREASING INTERNATIONALISM: GOVERNANCE, LAWS, AND ETHICS; CHAPTER 7: STANDARDS: WHAT ARE THEY AND WHY SHOULD WE CARE?; CHAPTER 8: FROM CYBERWAR TO CYBERDEFENCE: APPLYING STANDARDS IN AN ENVIRONMENT OF CHANGE AND DANGER
CHAPTER 9: CONCLUSION: WHERE DO WE GO FROM HERE?APPENDIX 1: GAP ANALYSIS AREAS OF INTEREST; APPENDIX 2: STANDARDS CROSSWALK; DEFINITIONS; ACRONYMS; INDEX |
Record Nr. | UNINA-9910778085203321 |
Mehan Julie E | ||
Ely, : IT Governance Pub., 2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
CyberWar, CyberTerror, CyberCrime and CyberActivism : an in-depth guide to the role of standards in cybersecurity environment / / Dr. Julie E. Mehan |
Autore | Mehan Julie E. |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | [Cambridge, England] : , : IT Governance Publishing, , 2014 |
Descrizione fisica | 1 online resource (352 p.) |
Disciplina | 658.478 |
Soggetto topico |
Computer crimes - Prevention
Cyberterrorism - Prevention Computer networks - Security measures - Standards |
Soggetto genere / forma | Electronic books. |
ISBN | 1-84928-572-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title; Copyright; Preface; About the Author; Contents; Introduction; Chapter 1: Technology Is a Double-Edged Sword; From the printing press to the information age; The 'dark side of high tech'; Chapter 2: Cyber Attack: It's A Dangerous World for Information Systems; Cyberwar; Cyberterror; Cybercrime; CyberEspionage (and Information Exfiltration) - It's midnight; do you know where your data is?; Social Media - an opportunity and a challenge; Supply Chain (In-) security; The blended threat; The asymmetric effects of cyber attacks; Porous perimeters, compromisable software - or both?
If we know about the vulnerabilities, why are exploits still successful?Chapter 3: The Human Factor: The Underrated Threat; Are people the problem?; Who are the attackers?; Most likely forms of attack; Sometimes it's just human error; People can also be the solution!; Chapter 4: Transition from an Environment of 'FUD' to a Standards-Based Environment; Chapter 5: Establishing a Culture of Cybersecurity; Chapter 6: Increasing Internationalism: Governance, Laws, and Ethics; Information globalism equals increased exposure; Following the lead of good governance; The proliferation of laws Ethics in an information society and a minimum standard of due care in cybersecurityCybersecurity and privacy; Chapter 7: Standards: What Are They and Why Should We Care?; What are standards?; How and by whom are standards developed?; The importance of terminology; Standards-based process improvement; Focus on consensus-based cybersecurity; Standards provide a level playing-field for co-ordination and co-operation; If standards are so good, then why is it so hard?; Chapter 8: From Reaction to Proaction: Applying Standards in an Environment of Change and Danger Moving beyond compliance and reactionA quick look at relevant standards; Take four steps forward; The future is 'ROSI'; Making the case for cybersecurity assurance; Chapter 9: Conclusion: Where Do We Go From Here?; Cybersecurity program roadmap; Appendix 1: Gap Analysis Areas of Interest; Appendix 2: Standards Crosswalk; Definitions; Acronyms; Index; A; B; C; D; E; F; G; H; I; J; K; L; M; N; O; P; Q; R; S; T; U; V; W; X; Y; ITG Resources |
Record Nr. | UNINA-9910459843303321 |
Mehan Julie E. | ||
[Cambridge, England] : , : IT Governance Publishing, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
CyberWar, CyberTerror, CyberCrime and CyberActivism : an in-depth guide to the role of standards in cybersecurity environment / / Dr. Julie E. Mehan |
Autore | Mehan Julie E. |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | [Cambridge, England] : , : IT Governance Publishing, , 2014 |
Descrizione fisica | 1 online resource (352 p.) |
Disciplina | 658.478 |
Soggetto topico |
Computer crimes - Prevention
Cyberterrorism - Prevention Computer networks - Security measures - Standards |
ISBN | 1-84928-572-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title; Copyright; Preface; About the Author; Contents; Introduction; Chapter 1: Technology Is a Double-Edged Sword; From the printing press to the information age; The 'dark side of high tech'; Chapter 2: Cyber Attack: It's A Dangerous World for Information Systems; Cyberwar; Cyberterror; Cybercrime; CyberEspionage (and Information Exfiltration) - It's midnight; do you know where your data is?; Social Media - an opportunity and a challenge; Supply Chain (In-) security; The blended threat; The asymmetric effects of cyber attacks; Porous perimeters, compromisable software - or both?
If we know about the vulnerabilities, why are exploits still successful?Chapter 3: The Human Factor: The Underrated Threat; Are people the problem?; Who are the attackers?; Most likely forms of attack; Sometimes it's just human error; People can also be the solution!; Chapter 4: Transition from an Environment of 'FUD' to a Standards-Based Environment; Chapter 5: Establishing a Culture of Cybersecurity; Chapter 6: Increasing Internationalism: Governance, Laws, and Ethics; Information globalism equals increased exposure; Following the lead of good governance; The proliferation of laws Ethics in an information society and a minimum standard of due care in cybersecurityCybersecurity and privacy; Chapter 7: Standards: What Are They and Why Should We Care?; What are standards?; How and by whom are standards developed?; The importance of terminology; Standards-based process improvement; Focus on consensus-based cybersecurity; Standards provide a level playing-field for co-ordination and co-operation; If standards are so good, then why is it so hard?; Chapter 8: From Reaction to Proaction: Applying Standards in an Environment of Change and Danger Moving beyond compliance and reactionA quick look at relevant standards; Take four steps forward; The future is 'ROSI'; Making the case for cybersecurity assurance; Chapter 9: Conclusion: Where Do We Go From Here?; Cybersecurity program roadmap; Appendix 1: Gap Analysis Areas of Interest; Appendix 2: Standards Crosswalk; Definitions; Acronyms; Index; A; B; C; D; E; F; G; H; I; J; K; L; M; N; O; P; Q; R; S; T; U; V; W; X; Y; ITG Resources |
Record Nr. | UNINA-9910787048803321 |
Mehan Julie E. | ||
[Cambridge, England] : , : IT Governance Publishing, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
CyberWar, CyberTerror, CyberCrime and CyberActivism : an in-depth guide to the role of standards in cybersecurity environment / / Dr. Julie E. Mehan |
Autore | Mehan Julie E. |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | [Cambridge, England] : , : IT Governance Publishing, , 2014 |
Descrizione fisica | 1 online resource (352 p.) |
Disciplina | 658.478 |
Soggetto topico |
Computer crimes - Prevention
Cyberterrorism - Prevention Computer networks - Security measures - Standards |
ISBN | 1-84928-572-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title; Copyright; Preface; About the Author; Contents; Introduction; Chapter 1: Technology Is a Double-Edged Sword; From the printing press to the information age; The 'dark side of high tech'; Chapter 2: Cyber Attack: It's A Dangerous World for Information Systems; Cyberwar; Cyberterror; Cybercrime; CyberEspionage (and Information Exfiltration) - It's midnight; do you know where your data is?; Social Media - an opportunity and a challenge; Supply Chain (In-) security; The blended threat; The asymmetric effects of cyber attacks; Porous perimeters, compromisable software - or both?
If we know about the vulnerabilities, why are exploits still successful?Chapter 3: The Human Factor: The Underrated Threat; Are people the problem?; Who are the attackers?; Most likely forms of attack; Sometimes it's just human error; People can also be the solution!; Chapter 4: Transition from an Environment of 'FUD' to a Standards-Based Environment; Chapter 5: Establishing a Culture of Cybersecurity; Chapter 6: Increasing Internationalism: Governance, Laws, and Ethics; Information globalism equals increased exposure; Following the lead of good governance; The proliferation of laws Ethics in an information society and a minimum standard of due care in cybersecurityCybersecurity and privacy; Chapter 7: Standards: What Are They and Why Should We Care?; What are standards?; How and by whom are standards developed?; The importance of terminology; Standards-based process improvement; Focus on consensus-based cybersecurity; Standards provide a level playing-field for co-ordination and co-operation; If standards are so good, then why is it so hard?; Chapter 8: From Reaction to Proaction: Applying Standards in an Environment of Change and Danger Moving beyond compliance and reactionA quick look at relevant standards; Take four steps forward; The future is 'ROSI'; Making the case for cybersecurity assurance; Chapter 9: Conclusion: Where Do We Go From Here?; Cybersecurity program roadmap; Appendix 1: Gap Analysis Areas of Interest; Appendix 2: Standards Crosswalk; Definitions; Acronyms; Index; A; B; C; D; E; F; G; H; I; J; K; L; M; N; O; P; Q; R; S; T; U; V; W; X; Y; ITG Resources |
Record Nr. | UNINA-9910813108803321 |
Mehan Julie E. | ||
[Cambridge, England] : , : IT Governance Publishing, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|