The best damn firewall book period [electronic resource] / Thomas W. Shinder ... [et al.] ; Anne Carasik-Henmi, technical editor
| The best damn firewall book period [electronic resource] / Thomas W. Shinder ... [et al.] ; Anne Carasik-Henmi, technical editor |
| Pubbl/distr/stampa | Rockland, MA : Syngress, c2003 |
| Descrizione fisica | xxxiv, 1293 p. : ill. ; 25 cm. |
| Disciplina | 005.8 |
| Altri autori (Persone) |
Shinder, Thomas W.
Carasik, Anne H. |
| Soggetto topico |
Firewalls (Computer security)
Computer security - Computer programs |
| Soggetto genere / forma | Electronic books. |
| ISBN |
9781931836906
1931836906 |
| Formato | Risorse elettroniche |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISALENTO-991003258869707536 |
| Rockland, MA : Syngress, c2003 | ||
| Lo trovi qui: Univ. del Salento | ||
| ||
Check Point Next Generation with application intelligence security administration [electronic resource] / Chris Tobkin ; Daniel Kligerman, editor
| Check Point Next Generation with application intelligence security administration [electronic resource] / Chris Tobkin ; Daniel Kligerman, editor |
| Autore | Tobkin, Chris. |
| Pubbl/distr/stampa | Rockland, MA : Syngress, c2004 |
| Descrizione fisica | xxiv, 599 p. : ill. ; 24 cm. |
| Disciplina | 005.8 |
| Altri autori (Persone) | Kligerman, Daniel |
| Soggetto topico |
Computer networks - Security measures - Computer programs
Computer security - Computer programs Firewalls (Computer security) |
| Soggetto genere / forma | Electronic books. |
| ISBN |
9781932266894
1932266895 |
| Formato | Risorse elettroniche |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISALENTO-991003260859707536 |
Tobkin, Chris.
|
||
| Rockland, MA : Syngress, c2004 | ||
| Lo trovi qui: Univ. del Salento | ||
| ||
Check Point NG VPN-1/Firewall-1 [[electronic resource] ] : advanced configuration and troubleshooting / / Jim Noble ...[et. a.]
| Check Point NG VPN-1/Firewall-1 [[electronic resource] ] : advanced configuration and troubleshooting / / Jim Noble ...[et. a.] |
| Pubbl/distr/stampa | Rockland, Mass., : Syngress, 2003 |
| Descrizione fisica | 1 online resource (641 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) | NobleJim |
| Soggetto topico |
Computer security - Computer programs
Firewalls (Computer security) Computer networks - Security measures - Computer programs |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-281-05620-0
9786611056209 0-08-047646-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Contents; Foreword; Chapter 1 FW-1 NG Operational Changes; Chapter 2 Smart Clients; Chapter 3 Advanced Authentication; Chapter 4 Advanced VPN Concepts; Chapter 5 Advanced VPN Client Installations; Chapter 6 High Availability and Clustering; Chapter 7 SecurePlatform; Chapter 8 SmartCenter Management Server, High Availability and Failover, and SMART Clients; Chapter 9 Integration and Configuration of CVP / UFP; Chapter 10 SecureClient Packaging Tool; Chapter 11 SmartDefense; Chapter 12 SmartUpdate; Chapter 13 Performance Pack; Chapter 14 UserAuthority; Chapter 15 Firewall Troubleshooting
IndexRelated Titles |
| Record Nr. | UNINA-9910455463403321 |
| Rockland, Mass., : Syngress, 2003 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Check Point NG VPN-1/Firewall-1 [electronic resource] : advanced configuration and troubleshooting / Jim Noble ...[et. a.].
| Check Point NG VPN-1/Firewall-1 [electronic resource] : advanced configuration and troubleshooting / Jim Noble ...[et. a.]. |
| Pubbl/distr/stampa | Rockland, Mass. : Syngress, 2003 |
| Descrizione fisica | xxxi, 606 p. |
| Disciplina | 005.8 |
| Altri autori (Persone) | Noble, Jim.author |
| Soggetto topico |
Computer security - Computer programs
Firewalls (Computer security) Computer networks - Security measures - Computer programs |
| Soggetto genere / forma | Electronic books. |
| ISBN |
9781931836975
1931836973 |
| Formato | Risorse elettroniche |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISALENTO-991003259239707536 |
| Rockland, Mass. : Syngress, 2003 | ||
| Lo trovi qui: Univ. del Salento | ||
| ||
Check Point NG VPN-1/Firewall-1 [[electronic resource] ] : advanced configuration and troubleshooting / / Jim Noble ...[et. a.]
| Check Point NG VPN-1/Firewall-1 [[electronic resource] ] : advanced configuration and troubleshooting / / Jim Noble ...[et. a.] |
| Pubbl/distr/stampa | Rockland, Mass., : Syngress, 2003 |
| Descrizione fisica | 1 online resource (641 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) | NobleJim |
| Soggetto topico |
Computer security - Computer programs
Firewalls (Computer security) Computer networks - Security measures - Computer programs |
| ISBN |
1-281-05620-0
9786611056209 0-08-047646-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Contents; Foreword; Chapter 1 FW-1 NG Operational Changes; Chapter 2 Smart Clients; Chapter 3 Advanced Authentication; Chapter 4 Advanced VPN Concepts; Chapter 5 Advanced VPN Client Installations; Chapter 6 High Availability and Clustering; Chapter 7 SecurePlatform; Chapter 8 SmartCenter Management Server, High Availability and Failover, and SMART Clients; Chapter 9 Integration and Configuration of CVP / UFP; Chapter 10 SecureClient Packaging Tool; Chapter 11 SmartDefense; Chapter 12 SmartUpdate; Chapter 13 Performance Pack; Chapter 14 UserAuthority; Chapter 15 Firewall Troubleshooting
IndexRelated Titles |
| Record Nr. | UNINA-9910780122603321 |
| Rockland, Mass., : Syngress, 2003 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Configuring Check Point NGX VPN-1/FireWall-1 [[electronic resource] /] / Robert Stephens ... [et al.] ; foreword by Dameon D. Welch-Abernathy
| Configuring Check Point NGX VPN-1/FireWall-1 [[electronic resource] /] / Robert Stephens ... [et al.] ; foreword by Dameon D. Welch-Abernathy |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Rockland, Mass., : Syngress Pub., c2005 |
| Descrizione fisica | 1 online resource (656 p.) |
| Disciplina | 005.8 |
| Soggetto topico |
Computer networks - Security measures - Computer programs
Computer security - Computer programs Extranets (Computer networks) Firewalls (Computer security) |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-281-03557-2
9786611035570 0-08-048856-0 1-4237-5429-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Contents; Foreword; Chapter 1 Introduction to Firewalls and VPN-1/FireWall-1; Chapter 2 What's New in NGX; Chapter 3 Installing Check Point NGX; Chapter 4 Upgrading to NGX; Chapter 5 SmartDashboard and SmartPortal; Chapter 6 SmartView Tracker; Chapter 7 SmartDefense and Web Intelligence; Chapter 8 Network Address Translation; Chapter 9 Authentication; Chapter 10 Content Security and OPSEC; Chapter 11 VPN; Chapter 12 SecuRemote, SecureClient, and Integrity; Chapter 13 SmartUpdate; Chapter 14 SecurePlatform; Chapter 15 Monitoring Tools; Chapter 16 Enabling Voice-over-IP Traffic; Index
Related Titles |
| Altri titoli varianti | Check Point NGX VPN-1/FireWall-1 |
| Record Nr. | UNINA-9910450471203321 |
| Rockland, Mass., : Syngress Pub., c2005 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Configuring Check Point NGX VPN-1/FireWall-1 [[electronic resource] /] / Robert Stephens ... [et al.] ; foreword by Dameon D. Welch-Abernathy
| Configuring Check Point NGX VPN-1/FireWall-1 [[electronic resource] /] / Robert Stephens ... [et al.] ; foreword by Dameon D. Welch-Abernathy |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Rockland, Mass., : Syngress Pub., c2005 |
| Descrizione fisica | 1 online resource (656 p.) |
| Disciplina | 005.8 |
| Soggetto topico |
Computer networks - Security measures - Computer programs
Computer security - Computer programs Extranets (Computer networks) Firewalls (Computer security) |
| ISBN |
1-281-03557-2
9786611035570 0-08-048856-0 1-4237-5429-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Contents; Foreword; Chapter 1 Introduction to Firewalls and VPN-1/FireWall-1; Chapter 2 What's New in NGX; Chapter 3 Installing Check Point NGX; Chapter 4 Upgrading to NGX; Chapter 5 SmartDashboard and SmartPortal; Chapter 6 SmartView Tracker; Chapter 7 SmartDefense and Web Intelligence; Chapter 8 Network Address Translation; Chapter 9 Authentication; Chapter 10 Content Security and OPSEC; Chapter 11 VPN; Chapter 12 SecuRemote, SecureClient, and Integrity; Chapter 13 SmartUpdate; Chapter 14 SecurePlatform; Chapter 15 Monitoring Tools; Chapter 16 Enabling Voice-over-IP Traffic; Index
Related Titles |
| Altri titoli varianti | Check Point NGX VPN-1/FireWall-1 |
| Record Nr. | UNINA-9910783745003321 |
| Rockland, Mass., : Syngress Pub., c2005 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Data exfiltration threats and prevention techniques : machine learning and memory-based data security / / Zahir Tari [and three others]
| Data exfiltration threats and prevention techniques : machine learning and memory-based data security / / Zahir Tari [and three others] |
| Autore | Tari Zahir <1961-> |
| Pubbl/distr/stampa | Hoboken, NJ : , : John Wiley & Sons, Inc., , [2023] |
| Descrizione fisica | 1 online resource (291 pages) |
| Disciplina | 005.88 |
| Soggetto topico |
Computer networks - Security measures - Computer programs
Computer security - Computer programs Information filtering systems Malware (Computer software) |
| ISBN |
1-119-89890-0
1-119-89888-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910829929303321 |
Tari Zahir <1961->
|
||
| Hoboken, NJ : , : John Wiley & Sons, Inc., , [2023] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Detect, protect, dis-infect [[electronic resource] ] : consumers online face wide choices in security products
| Detect, protect, dis-infect [[electronic resource] ] : consumers online face wide choices in security products |
| Pubbl/distr/stampa | [Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer & Business Education, , [2004] |
| Descrizione fisica | 2 unnumbered pages : digital, PDF file |
| Collana | FTC consumer alert |
| Soggetto topico |
Microcomputers - Security measures - Computer programs
Computer security - Computer programs |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Detect, protect, dis-infect |
| Record Nr. | UNINA-9910696143703321 |
| [Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer & Business Education, , [2004] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Hardware-based computer security techniques to defeat hackers [[electronic resource] ] : from biometrics to quantum cryptography / / Roger Dube
| Hardware-based computer security techniques to defeat hackers [[electronic resource] ] : from biometrics to quantum cryptography / / Roger Dube |
| Autore | Dube Roger |
| Pubbl/distr/stampa | Hoboken, N.J., : Wiley, c2008 |
| Descrizione fisica | 1 online resource (254 p.) |
| Disciplina | 005.8 |
| Soggetto topico |
Computer security - Equipment and supplies
Computer security - Computer programs Computer input-output equipment Computer crimes - Prevention |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-281-83706-7
9786611837068 0-470-42549-0 0-470-42547-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Hardware-Based Computer Security Techniques to Defeat Hackers; CONTENTS; 1 THE ELEMENTS OF COMPUTER SECURITY; Cryptography; Symmetric Key Cryptography; Asymmetric Key Cryptography; Passwords and Keys; Password/Key Strength; Password/Key Storage and Theft; Passwords and Authentication; Something You Know; Something You Have; Something You Are; Random-Number Generators; Pseudo-Random-Number Generators (PRGs); Hardware-Based Random-Number Generators; Hybrid Hardware/Software Random-Number Generators; Key Generation; Security and the Internet; References; 2 CRYPTOGRAPHY APPROACHES AND ATTACKS
Symmetric Key CryptographyOne-Time Pad; DES and Triple DES; International Data-Encryption Algorithm; Rivest Cipher 4; Blowfish; Advanced Encryption Standard; Quantum Cryptography; Hash Algorithms; The Birthday Paradox and Hash Algorithms; References; 3 KEY GENERATION AND DISTRIBUTION APPROACHES AND ATTACKS; Key Generation; Software Key Generation; Hardware Key Generation; Noise-Based Approaches; Noisy Diodes and Resistors; Radio-Frequency Sources; Brownian-Motion Devices; Quantum Devices; Nuclear Decay Devices; Optical Devices; Other Hardware Sources of Randomness; Key Distribution Key Distribution for Software-Based PRGsKey Distribution; Key Storage; Key Use; Key Distribution for Hardware-Based RNGs; Creation of RNGs; Initialization of RNGs; Distribution of RNGs; Key Storage and Use; Minimizing Hardware Attack Risks; References; 4 THE QUALITIES OF WORKABLE SECURITY SOLUTIONS; Secure Coprocessors; Attack Vectors; Techniques for Creating Strong Coprocessors; Secure Bootstrap Loading; Protection of the Bootstrap Process; Secure Memory Management; Protection of Memory Management; Trusted Platform Module; TPM Attack Vectors; LaGrande (Trusted Execution Technology) Video ProtectionInput Devices; Memory Protection; Trusted Execution Technology Attack Vectors; Field-Programmable Gate Array; Hardware-Based Authentication; Person Authentication Using Biometrics; Fingerprint Scanners; Voiceprints; Iris Scans; Palm Prints; Radio-Frequency IDs; Hardware Based RNGs; Hardware Token Authenticators; References; 5 SECURE COPROCESSORS; The Need for Secure Coprocessors; Physical Security; Initialization; Usability Accessibility and Security; Support and Upgrades; Anticipatory Design; Authentication; References; 6 SECURE BOOTSTRAP LOADING The Need for Secure Bootstrap LoadingImplementation; Hardware Firmware and Software; The Trusted Computing Base; Concluding Remarks; The Benefits of Secure Bootstrapping; References; 7 SECURE MEMORY MANAGEMENT AND TRUSTED EXECUTION TECHNOLOGY; The Need for Secure Memory Management; Buffer Overflows; Memory Pointer Attacks; The Impact of Memory-Management Attacks; Minimizing Memory-Management Attacks; Platform-Design Considerations; Trusted Execution Technology; Protected Execution; Protected Storage; Protected Input; Protected Graphics; Environment Authentication and Protected Launch Domain Manager |
| Record Nr. | UNINA-9910144113703321 |
Dube Roger
|
||
| Hoboken, N.J., : Wiley, c2008 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||