top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
802.1X-2020 - IEEE Standard for Local and Metropolitan Area Networks : Port-Based Network Access Control / / IEEE
802.1X-2020 - IEEE Standard for Local and Metropolitan Area Networks : Port-Based Network Access Control / / IEEE
Pubbl/distr/stampa New York. : , : IEEE, , 2020
Descrizione fisica 1 online resource (289 pages)
Disciplina 004.68
Soggetto topico Local area networks (Computer networks) - Standards
Metropolitan area networks (Computer networks) - Standards
IEEE Standards
Computer networks - Security measures - Standards
Access control
Authorization
Media Access Protocol
Authentication
Security
ISBN 1-5044-6440-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti IEEE 802.1X-2020 Standard
IEEE Standard for Local and Metropolitan Area Networks
Record Nr. UNINA-9910389743803321
New York. : , : IEEE, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
802.1X-2020 - IEEE Standard for Local and Metropolitan Area Networks : Port-Based Network Access Control / / IEEE
802.1X-2020 - IEEE Standard for Local and Metropolitan Area Networks : Port-Based Network Access Control / / IEEE
Pubbl/distr/stampa New York. : , : IEEE, , 2020
Descrizione fisica 1 online resource (289 pages)
Disciplina 004.68
Soggetto topico Local area networks (Computer networks) - Standards
Metropolitan area networks (Computer networks) - Standards
IEEE Standards
Computer networks - Security measures - Standards
Access control
Authorization
Media Access Protocol
Authentication
Security
ISBN 1-5044-6440-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti IEEE 802.1X-2020 Standard
IEEE Standard for Local and Metropolitan Area Networks
Record Nr. UNISA-996574711503316
New York. : , : IEEE, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Application security in the ISO 27001:2013 environment / / Vinod Vasudevan [and five others]
Application security in the ISO 27001:2013 environment / / Vinod Vasudevan [and five others]
Autore Vasudevan Vinod
Edizione [Second edition.]
Pubbl/distr/stampa Ely Cambridgeshire : , : IT Governance Publishing, , 2015
Descrizione fisica 1 online resource (254 pages) : illustrations
Disciplina 005.8
Soggetto topico Data protection - Standards
Computer security
Computer networks - Security measures - Standards
Information technology - Standards
Computer software - Reliability
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title; Copyright; Preface; About The Authors; Acknowledgements; Contents; Chapter 1: Introduction To The International Information Security Standards Iso27001 And Iso27002; Chapter 2: The Iso27001 Implementation Project; Chapter 3: Risk Assessment; Chapter 4: Introduction To Application Security Theats; Chapter 5: Application Security And Iso27001; Chapter 6: Attacks On Applications; Chapter 7: Secure Development Lifecycle; Chapter 8: Threat Profiling And Security Testing; Chapter 9: Secure Coding Guidelines; Itg Resources.
Record Nr. UNINA-9910798238503321
Vasudevan Vinod  
Ely Cambridgeshire : , : IT Governance Publishing, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Application security in the ISO 27001:2013 environment / / Vinod Vasudevan [and five others]
Application security in the ISO 27001:2013 environment / / Vinod Vasudevan [and five others]
Autore Vasudevan Vinod
Edizione [Second edition.]
Pubbl/distr/stampa Ely Cambridgeshire : , : IT Governance Publishing, , 2015
Descrizione fisica 1 online resource (254 pages) : illustrations
Disciplina 005.8
Soggetto topico Data protection - Standards
Computer security
Computer networks - Security measures - Standards
Information technology - Standards
Computer software - Reliability
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title; Copyright; Preface; About The Authors; Acknowledgements; Contents; Chapter 1: Introduction To The International Information Security Standards Iso27001 And Iso27002; Chapter 2: The Iso27001 Implementation Project; Chapter 3: Risk Assessment; Chapter 4: Introduction To Application Security Theats; Chapter 5: Application Security And Iso27001; Chapter 6: Attacks On Applications; Chapter 7: Secure Development Lifecycle; Chapter 8: Threat Profiling And Security Testing; Chapter 9: Secure Coding Guidelines; Itg Resources.
Record Nr. UNINA-9910827160103321
Vasudevan Vinod  
Ely Cambridgeshire : , : IT Governance Publishing, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber risks for business professionals [[electronic resource] ] : a management guide / / Rupert Kendrick
Cyber risks for business professionals [[electronic resource] ] : a management guide / / Rupert Kendrick
Autore Kendrick Rupert
Edizione [1st edition]
Pubbl/distr/stampa Ely, : IT Governance Pub., 2010
Descrizione fisica 1 online resource (305 p.)
Disciplina 005.8
Soggetto topico Computer crimes - Prevention
Cyberterrorism - Prevention
Computer networks - Security measures - Standards
Computer networks - Security measures - Quality control
Internet - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-84928-143-2
1-283-00641-3
9786613006417
1-84928-093-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto PART 1 - IDENTIFYING CYBER RISKS; CHAPTER 1: SETTING THE SCENE; CHAPTER 2: TECHNOLOGY RISKS; CHAPTER 3: LEGAL COMPLIANCE RISKS; CHAPTER 4: OPERATIONAL RISKS; PART 2 - RISK MANAGEMENT STRATEGIES; CHAPTER 5: THE NEED FOR GOVERNANCE; CHAPTER 6: ASSESSING RISK; CHAPTER 7: RISK MANAGEMENT STRATEGIES; PART 3 - CYBER RISK SOLUTIONS; CHAPTER 8: TECHNOLOGY SOLUTIONS; CHAPTER 9: COMPLIANCE SOLUTIONS; CHAPTER 10: OPERATIONAL SOLUTIONS; CHAPTER 11: THE CYBERSECURE ENTITY
Record Nr. UNINA-9910460411703321
Kendrick Rupert  
Ely, : IT Governance Pub., 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyberwar, cyberterror, cybercrime [[electronic resource] ] : a guide to the role of standards in an environment of change and danger / / Julie E. Mehan
Cyberwar, cyberterror, cybercrime [[electronic resource] ] : a guide to the role of standards in an environment of change and danger / / Julie E. Mehan
Autore Mehan Julie E
Edizione [1st edition]
Pubbl/distr/stampa Ely, : IT Governance Pub., 2008
Descrizione fisica 1 online resource (281 p.)
Disciplina 005.802/18
Soggetto topico Computer crimes - Prevention
Cyberterrorism - Prevention
Computer networks - Security measures - Standards
Computer networks - Security measures - Quality control
Internet - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-282-26359-5
9786612263590
1-905356-48-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto INTRODUCTION; CHAPTER 1: WHAT TECHNOLOGY GIVETH IT TAKETH AWAY; CHAPTER 2: CYBERATTACK: IT'S A DANGEROUS WORLD FOR INFORMATION SYSTEMS; CHAPTER 3: THE HUMAN FACTOR: THE UNDERRATED THREAT; CHAPTER 4: TRANSITION FROM AN ENVIRONMENT OF 'FUD' TO A STANDARDS-BASED ENVIRONMENT; CHAPTER 5: ESTABLISHING A CULTURE OF CYBERSECURITY; CHAPTER 6: INCREASING INTERNATIONALISM: GOVERNANCE, LAWS, AND ETHICS; CHAPTER 7: STANDARDS: WHAT ARE THEY AND WHY SHOULD WE CARE?; CHAPTER 8: FROM CYBERWAR TO CYBERDEFENCE: APPLYING STANDARDS IN AN ENVIRONMENT OF CHANGE AND DANGER
CHAPTER 9: CONCLUSION: WHERE DO WE GO FROM HERE?APPENDIX 1: GAP ANALYSIS AREAS OF INTEREST; APPENDIX 2: STANDARDS CROSSWALK; DEFINITIONS; ACRONYMS; INDEX
Record Nr. UNINA-9910455517103321
Mehan Julie E  
Ely, : IT Governance Pub., 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyberwar, cyberterror, cybercrime [[electronic resource] ] : a guide to the role of standards in an environment of change and danger / / Julie E. Mehan
Cyberwar, cyberterror, cybercrime [[electronic resource] ] : a guide to the role of standards in an environment of change and danger / / Julie E. Mehan
Autore Mehan Julie E
Edizione [1st edition]
Pubbl/distr/stampa Ely, : IT Governance Pub., 2008
Descrizione fisica 1 online resource (281 p.)
Disciplina 005.802/18
Soggetto topico Computer crimes - Prevention
Cyberterrorism - Prevention
Computer networks - Security measures - Standards
Computer networks - Security measures - Quality control
Internet - Security measures
ISBN 1-282-26359-5
9786612263590
1-905356-48-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto INTRODUCTION; CHAPTER 1: WHAT TECHNOLOGY GIVETH IT TAKETH AWAY; CHAPTER 2: CYBERATTACK: IT'S A DANGEROUS WORLD FOR INFORMATION SYSTEMS; CHAPTER 3: THE HUMAN FACTOR: THE UNDERRATED THREAT; CHAPTER 4: TRANSITION FROM AN ENVIRONMENT OF 'FUD' TO A STANDARDS-BASED ENVIRONMENT; CHAPTER 5: ESTABLISHING A CULTURE OF CYBERSECURITY; CHAPTER 6: INCREASING INTERNATIONALISM: GOVERNANCE, LAWS, AND ETHICS; CHAPTER 7: STANDARDS: WHAT ARE THEY AND WHY SHOULD WE CARE?; CHAPTER 8: FROM CYBERWAR TO CYBERDEFENCE: APPLYING STANDARDS IN AN ENVIRONMENT OF CHANGE AND DANGER
CHAPTER 9: CONCLUSION: WHERE DO WE GO FROM HERE?APPENDIX 1: GAP ANALYSIS AREAS OF INTEREST; APPENDIX 2: STANDARDS CROSSWALK; DEFINITIONS; ACRONYMS; INDEX
Record Nr. UNINA-9910778085203321
Mehan Julie E  
Ely, : IT Governance Pub., 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyberwar, cyberterror, cybercrime [[electronic resource] ] : a guide to the role of standards in an environment of change and danger / / Julie E. Mehan
Cyberwar, cyberterror, cybercrime [[electronic resource] ] : a guide to the role of standards in an environment of change and danger / / Julie E. Mehan
Autore Mehan Julie E
Edizione [1st edition]
Pubbl/distr/stampa Ely, : IT Governance Pub., 2008
Descrizione fisica 1 online resource (281 p.)
Disciplina 005.802/18
Soggetto topico Computer crimes - Prevention
Cyberterrorism - Prevention
Computer networks - Security measures - Standards
Computer networks - Security measures - Quality control
Internet - Security measures
ISBN 1-282-26359-5
9786612263590
1-905356-48-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto INTRODUCTION; CHAPTER 1: WHAT TECHNOLOGY GIVETH IT TAKETH AWAY; CHAPTER 2: CYBERATTACK: IT'S A DANGEROUS WORLD FOR INFORMATION SYSTEMS; CHAPTER 3: THE HUMAN FACTOR: THE UNDERRATED THREAT; CHAPTER 4: TRANSITION FROM AN ENVIRONMENT OF 'FUD' TO A STANDARDS-BASED ENVIRONMENT; CHAPTER 5: ESTABLISHING A CULTURE OF CYBERSECURITY; CHAPTER 6: INCREASING INTERNATIONALISM: GOVERNANCE, LAWS, AND ETHICS; CHAPTER 7: STANDARDS: WHAT ARE THEY AND WHY SHOULD WE CARE?; CHAPTER 8: FROM CYBERWAR TO CYBERDEFENCE: APPLYING STANDARDS IN AN ENVIRONMENT OF CHANGE AND DANGER
CHAPTER 9: CONCLUSION: WHERE DO WE GO FROM HERE?APPENDIX 1: GAP ANALYSIS AREAS OF INTEREST; APPENDIX 2: STANDARDS CROSSWALK; DEFINITIONS; ACRONYMS; INDEX
Record Nr. UNINA-9910813916903321
Mehan Julie E  
Ely, : IT Governance Pub., 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CyberWar, CyberTerror, CyberCrime and CyberActivism : an in-depth guide to the role of standards in cybersecurity environment / / Dr. Julie E. Mehan
CyberWar, CyberTerror, CyberCrime and CyberActivism : an in-depth guide to the role of standards in cybersecurity environment / / Dr. Julie E. Mehan
Autore Mehan Julie E.
Edizione [2nd ed.]
Pubbl/distr/stampa [Cambridge, England] : , : IT Governance Publishing, , 2014
Descrizione fisica 1 online resource (352 p.)
Disciplina 658.478
Soggetto topico Computer crimes - Prevention
Cyberterrorism - Prevention
Computer networks - Security measures - Standards
Soggetto genere / forma Electronic books.
ISBN 1-84928-572-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title; Copyright; Preface; About the Author; Contents; Introduction; Chapter 1: Technology Is a Double-Edged Sword; From the printing press to the information age; The 'dark side of high tech'; Chapter 2: Cyber Attack: It's A Dangerous World for Information Systems; Cyberwar; Cyberterror; Cybercrime; CyberEspionage (and Information Exfiltration) - It's midnight; do you know where your data is?; Social Media - an opportunity and a challenge; Supply Chain (In-) security; The blended threat; The asymmetric effects of cyber attacks; Porous perimeters, compromisable software - or both?
If we know about the vulnerabilities, why are exploits still successful?Chapter 3: The Human Factor: The Underrated Threat; Are people the problem?; Who are the attackers?; Most likely forms of attack; Sometimes it's just human error; People can also be the solution!; Chapter 4: Transition from an Environment of 'FUD' to a Standards-Based Environment; Chapter 5: Establishing a Culture of Cybersecurity; Chapter 6: Increasing Internationalism: Governance, Laws, and Ethics; Information globalism equals increased exposure; Following the lead of good governance; The proliferation of laws
Ethics in an information society and a minimum standard of due care in cybersecurityCybersecurity and privacy; Chapter 7: Standards: What Are They and Why Should We Care?; What are standards?; How and by whom are standards developed?; The importance of terminology; Standards-based process improvement; Focus on consensus-based cybersecurity; Standards provide a level playing-field for co-ordination and co-operation; If standards are so good, then why is it so hard?; Chapter 8: From Reaction to Proaction: Applying Standards in an Environment of Change and Danger
Moving beyond compliance and reactionA quick look at relevant standards; Take four steps forward; The future is 'ROSI'; Making the case for cybersecurity assurance; Chapter 9: Conclusion: Where Do We Go From Here?; Cybersecurity program roadmap; Appendix 1: Gap Analysis Areas of Interest; Appendix 2: Standards Crosswalk; Definitions; Acronyms; Index; A; B; C; D; E; F; G; H; I; J; K; L; M; N; O; P; Q; R; S; T; U; V; W; X; Y; ITG Resources
Record Nr. UNINA-9910459843303321
Mehan Julie E.  
[Cambridge, England] : , : IT Governance Publishing, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CyberWar, CyberTerror, CyberCrime and CyberActivism : an in-depth guide to the role of standards in cybersecurity environment / / Dr. Julie E. Mehan
CyberWar, CyberTerror, CyberCrime and CyberActivism : an in-depth guide to the role of standards in cybersecurity environment / / Dr. Julie E. Mehan
Autore Mehan Julie E.
Edizione [2nd ed.]
Pubbl/distr/stampa [Cambridge, England] : , : IT Governance Publishing, , 2014
Descrizione fisica 1 online resource (352 p.)
Disciplina 658.478
Soggetto topico Computer crimes - Prevention
Cyberterrorism - Prevention
Computer networks - Security measures - Standards
ISBN 1-84928-572-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title; Copyright; Preface; About the Author; Contents; Introduction; Chapter 1: Technology Is a Double-Edged Sword; From the printing press to the information age; The 'dark side of high tech'; Chapter 2: Cyber Attack: It's A Dangerous World for Information Systems; Cyberwar; Cyberterror; Cybercrime; CyberEspionage (and Information Exfiltration) - It's midnight; do you know where your data is?; Social Media - an opportunity and a challenge; Supply Chain (In-) security; The blended threat; The asymmetric effects of cyber attacks; Porous perimeters, compromisable software - or both?
If we know about the vulnerabilities, why are exploits still successful?Chapter 3: The Human Factor: The Underrated Threat; Are people the problem?; Who are the attackers?; Most likely forms of attack; Sometimes it's just human error; People can also be the solution!; Chapter 4: Transition from an Environment of 'FUD' to a Standards-Based Environment; Chapter 5: Establishing a Culture of Cybersecurity; Chapter 6: Increasing Internationalism: Governance, Laws, and Ethics; Information globalism equals increased exposure; Following the lead of good governance; The proliferation of laws
Ethics in an information society and a minimum standard of due care in cybersecurityCybersecurity and privacy; Chapter 7: Standards: What Are They and Why Should We Care?; What are standards?; How and by whom are standards developed?; The importance of terminology; Standards-based process improvement; Focus on consensus-based cybersecurity; Standards provide a level playing-field for co-ordination and co-operation; If standards are so good, then why is it so hard?; Chapter 8: From Reaction to Proaction: Applying Standards in an Environment of Change and Danger
Moving beyond compliance and reactionA quick look at relevant standards; Take four steps forward; The future is 'ROSI'; Making the case for cybersecurity assurance; Chapter 9: Conclusion: Where Do We Go From Here?; Cybersecurity program roadmap; Appendix 1: Gap Analysis Areas of Interest; Appendix 2: Standards Crosswalk; Definitions; Acronyms; Index; A; B; C; D; E; F; G; H; I; J; K; L; M; N; O; P; Q; R; S; T; U; V; W; X; Y; ITG Resources
Record Nr. UNINA-9910787048803321
Mehan Julie E.  
[Cambridge, England] : , : IT Governance Publishing, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui