Essential computer security [[electronic resource] ] : everyone's guide to e-mail, internet, and wireless security / / Tony Bradley, Harlan Carvey
| Essential computer security [[electronic resource] ] : everyone's guide to e-mail, internet, and wireless security / / Tony Bradley, Harlan Carvey |
| Autore | Bradley Tony |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Rockland, MA, : Syngress Publishing, c2006 |
| Descrizione fisica | 1 online resource (321 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) | CarveyHarlan A |
| Soggetto topico |
Computer security
Computers - Access control - Passwords Electronic mail systems - Security measures Firewalls (Computer security) Internet - Security measures Spam filtering (Electronic mail) Spyware (Computer software) |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-281-07186-2
9786611071868 0-08-050589-9 1-59749-159-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Front Cover; Essential Computer Security; Copyright Page; Contents; Foreword; Introduction; Part I: Bare Essentials; Chapter 1. Basic Windows Security; Introduction; Why Do You Need to Be Secure?; Why Are You at Risk?; Summary; Additional Resources; Chapter 2. Passwords; Introduction; Password Power; Password Cracking; Storing Your Passwords; One Super-Powerful Password; Summary; Additional Resources; Chapter 3. Viruses, Worms, and Other Malware; Introduction; Malware Terms; The History of Malware; Chapter 4. Patching; Introduction; Patch Terminology; Why Should I Patch?
How Do I Know What to Patch?Summary; Additional Resources; Summary; Additional Resources; Part II: More Essential Security; Chapter 5. Perimeter Security; Introduction; From Moats and Bridges to Firewalls and Filters; Firewalls; Intrusion Detection and Prevention; Summary; Additional Resources; Chapter 6. E-mail Safety; Introduction; The Evolution of E-mail; E-mail Security Concerns; Summary; Additional Resources; Chapter 7. Web Surfing Privacy and Safety; Introduction; The Revolutionary World Wide Web; Web Security Concerns; Summary; Additional Resources; Chapter 8. Wireless Network Security IntroductionThe Basics of Wireless Networks; Basic Wireless Network Security Measures; Additional Hotspot Security Measures; Summary; Additional Resources; Chapter 9. Spyware and Adware; Introduction; What Is Adware?; What Is Spyware?; Getting Rid of Spyware; Summary; Additional Resources; Part III: Testing and Maintenance; Chapter 10. Keeping Things Secure; Introduction; General PC Maintenance; Patches and Updates; Windows XP Security Center; Summary; Additional Resources; Chapter 11. When Disaster Strikes; Introduction; Check the Event Logs; Enable Security Auditing Review Your Firewall LogsScan Your Computer; Restore Your System; Start from Scratch; Restore Your Data; Call In the Pros; Summary; Additional Resources; Chapter 12. Microsoft Alternatives: Inside the Linux Desktop . .; Introduction; Common Desktop Environments; The X Window System and Window Managers; E-mail and Personal Information Management Clients; Sylpheed; Essential Information; E-mail and PIM Software; Migrating Mail; Web Browsers; Office Application Suites; Running Windows Applications on Linux; Summary; Additional Resources; Part IV: Security Resources . Appendix A. Essential Network CommunicationsIntroduction; Computer Protocols; Communication Ports; TCP and UDP Protocols; Understanding IP Addresses and DNS; Managing IP Addresses; Firewalls; Appendix B. Case Study: SOHO (Five Computers, Printer, Servers, etc.); Introduction; Employing a Firewall in a SOHO Environment; Introducing the SOHO Firewall Case Study; Designing the SOHO Firewall; Summary; Solutions Fast Track; Frequently Asked Questions; Appendix C. Glossary of Technology and Terminology; Index |
| Record Nr. | UNINA-9910450902803321 |
Bradley Tony
|
||
| Rockland, MA, : Syngress Publishing, c2006 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Essential computer security [[electronic resource] ] : everyone's guide to e-mail, internet, and wireless security / / Tony Bradley, Harlan Carvey
| Essential computer security [[electronic resource] ] : everyone's guide to e-mail, internet, and wireless security / / Tony Bradley, Harlan Carvey |
| Autore | Bradley Tony |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Rockland, MA, : Syngress Publishing, c2006 |
| Descrizione fisica | 1 online resource (321 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) | CarveyHarlan A |
| Soggetto topico |
Computer security
Computers - Access control - Passwords Electronic mail systems - Security measures Firewalls (Computer security) Internet - Security measures Spam filtering (Electronic mail) Spyware (Computer software) |
| ISBN |
1-281-07186-2
9786611071868 0-08-050589-9 1-59749-159-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Front Cover; Essential Computer Security; Copyright Page; Contents; Foreword; Introduction; Part I: Bare Essentials; Chapter 1. Basic Windows Security; Introduction; Why Do You Need to Be Secure?; Why Are You at Risk?; Summary; Additional Resources; Chapter 2. Passwords; Introduction; Password Power; Password Cracking; Storing Your Passwords; One Super-Powerful Password; Summary; Additional Resources; Chapter 3. Viruses, Worms, and Other Malware; Introduction; Malware Terms; The History of Malware; Chapter 4. Patching; Introduction; Patch Terminology; Why Should I Patch?
How Do I Know What to Patch?Summary; Additional Resources; Summary; Additional Resources; Part II: More Essential Security; Chapter 5. Perimeter Security; Introduction; From Moats and Bridges to Firewalls and Filters; Firewalls; Intrusion Detection and Prevention; Summary; Additional Resources; Chapter 6. E-mail Safety; Introduction; The Evolution of E-mail; E-mail Security Concerns; Summary; Additional Resources; Chapter 7. Web Surfing Privacy and Safety; Introduction; The Revolutionary World Wide Web; Web Security Concerns; Summary; Additional Resources; Chapter 8. Wireless Network Security IntroductionThe Basics of Wireless Networks; Basic Wireless Network Security Measures; Additional Hotspot Security Measures; Summary; Additional Resources; Chapter 9. Spyware and Adware; Introduction; What Is Adware?; What Is Spyware?; Getting Rid of Spyware; Summary; Additional Resources; Part III: Testing and Maintenance; Chapter 10. Keeping Things Secure; Introduction; General PC Maintenance; Patches and Updates; Windows XP Security Center; Summary; Additional Resources; Chapter 11. When Disaster Strikes; Introduction; Check the Event Logs; Enable Security Auditing Review Your Firewall LogsScan Your Computer; Restore Your System; Start from Scratch; Restore Your Data; Call In the Pros; Summary; Additional Resources; Chapter 12. Microsoft Alternatives: Inside the Linux Desktop . .; Introduction; Common Desktop Environments; The X Window System and Window Managers; E-mail and Personal Information Management Clients; Sylpheed; Essential Information; E-mail and PIM Software; Migrating Mail; Web Browsers; Office Application Suites; Running Windows Applications on Linux; Summary; Additional Resources; Part IV: Security Resources . Appendix A. Essential Network CommunicationsIntroduction; Computer Protocols; Communication Ports; TCP and UDP Protocols; Understanding IP Addresses and DNS; Managing IP Addresses; Firewalls; Appendix B. Case Study: SOHO (Five Computers, Printer, Servers, etc.); Introduction; Employing a Firewall in a SOHO Environment; Introducing the SOHO Firewall Case Study; Designing the SOHO Firewall; Summary; Solutions Fast Track; Frequently Asked Questions; Appendix C. Glossary of Technology and Terminology; Index |
| Record Nr. | UNINA-9910784273303321 |
Bradley Tony
|
||
| Rockland, MA, : Syngress Publishing, c2006 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Fast software encryption : 6th International Workshop, FSE'99, Rome, Italy, March 1999, proceedings / / edited by Lars Knudsen
| Fast software encryption : 6th International Workshop, FSE'99, Rome, Italy, March 1999, proceedings / / edited by Lars Knudsen |
| Edizione | [1st ed. 1999.] |
| Pubbl/distr/stampa | Berlin, Germany ; ; New York, New York : , : Springer, , [1999] |
| Descrizione fisica | 1 online resource (VIII, 324 p.) |
| Disciplina | 005.82 |
| Collana | Lecture notes in computer science |
| Soggetto topico | Computers - Access control - Passwords |
| ISBN | 3-540-48519-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Advanced Encryption Standard -- Improved Analysis of Some Simplified Variants of RC6 -- Linear Cryptanalysis of RC5 and RC6 -- A Revised Version of CRYPTON: CRYPTON V1.0 -- Attack on Six Rounds of CRYPTON -- On the Security of the 128-bit Block Cipher DEAL -- Cryptanalysis of a Reduced Version of the Block Cipher E2 -- On the Decorrelated Fast Cipher (DFC) and Its Theory -- Remotely Keyed Encryption -- Scramble All, Encrypt Small -- Accelerated Remotely Keyed Encryption -- Analysis of Block Ciphers I -- Miss in the Middle Attacks on IDEA and Khufu -- Mod n Cryptanalysis, with Applications against RC5P and M6 -- The Boomerang Attack -- Miscellaneous -- Towards Making Luby-Rackoff Ciphers Optimal and Practical -- A New Characterization of Almost Bent Functions -- Imprimitive Permutation Groups and Trapdoors in Iterated Block Ciphers -- Modes of Operation -- On the Security of Double and 2-Key Triple Modes of Operation -- On the Construction of Variable-Input-Length Ciphers -- Analysis of Block Ciphers II -- Slide Attacks -- On the Security of CS-Cipher -- Interpolation Attacks of the Block Cipher: SNAKE -- Stream Ciphers -- High-Speed Pseudorandom Number Generation with Small Memory -- SOBER Cryptanalysis. |
| Record Nr. | UNISA-996465732603316 |
| Berlin, Germany ; ; New York, New York : , : Springer, , [1999] | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Fast software encryption : 4th International Workshop, FSE'97, Haifa, Israel, January 20-22, 1997 : proceedings / / Eli Biham, ed
| Fast software encryption : 4th International Workshop, FSE'97, Haifa, Israel, January 20-22, 1997 : proceedings / / Eli Biham, ed |
| Edizione | [1st ed. 1997.] |
| Pubbl/distr/stampa | Berlin, Germany ; ; New York, New York : , : Springer, , [1997] |
| Descrizione fisica | 1 online resource (IX, 299 p.) |
| Disciplina | 005.8/2 |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico | Computers - Access control - Passwords |
| ISBN | 3-540-69243-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | ?2 cryptanalysis of the SEAL encryption algorithm -- Partitioning cryptanalysis -- The interpolation attack on block ciphers -- Best differential characteristic search of FEAL -- New block encryption algorithm MISTY -- The design of the ICE encryption algorithm -- Advanced Encryption Standard -- TWOPRIME: A fast stream ciphering algorithm -- On nonlinear filter generators -- Chameleon — A new kind of stream cipher -- Improving linear cryptanalysis of LOKI91 by probabilistic counting method -- Cryptanalysis of Ladder-DES -- A family of trapdoor ciphers -- The block cipher Square -- XMX: A firmware-oriented block cipher based on modular multiplications -- MMH: Software message authentication in the Gbit/second rates -- Fast message authentication using efficient polynomial evaluation -- Reinventing the travois: Encryption/MAC in 30 ROM bytes -- All-or-nothing encryption and the package transform -- On the security of remotely keyed encryption -- Sliding encryption: A cryptographic tool for mobile agents -- Fast software encryption: Designing encryption algorithms for optimal software speed on the Intel Pentium processor -- A fast new DES implementation in software -- Optimizing a fast stream cipher for VLIW, SIMD, and superscalar processors. |
| Record Nr. | UNISA-996466134903316 |
| Berlin, Germany ; ; New York, New York : , : Springer, , [1997] | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Instant Java password and authentication security / / Fernando Mayoral
| Instant Java password and authentication security / / Fernando Mayoral |
| Autore | Mayoral Fernando |
| Pubbl/distr/stampa | Birmingham : , : Packt Publishing, , 2013 |
| Descrizione fisica | 1 online resource (38 p.) |
| Soggetto topico |
Computer security
Computers - Access control - Passwords |
| Soggetto genere / forma | Electronic books. |
| ISBN | 1-84969-777-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910453495403321 |
Mayoral Fernando
|
||
| Birmingham : , : Packt Publishing, , 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Instant Java password and authentication security / / Fernando Mayoral
| Instant Java password and authentication security / / Fernando Mayoral |
| Autore | Mayoral Fernando |
| Pubbl/distr/stampa | Birmingham : , : Packt Publishing, , 2013 |
| Descrizione fisica | 1 online resource (38 p.) |
| Soggetto topico |
Computer security
Computers - Access control - Passwords |
| ISBN | 1-84969-777-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910790847003321 |
Mayoral Fernando
|
||
| Birmingham : , : Packt Publishing, , 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Instant Java password and authentication security / / Fernando Mayoral
| Instant Java password and authentication security / / Fernando Mayoral |
| Autore | Mayoral Fernando |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Birmingham : , : Packt Publishing, , 2013 |
| Descrizione fisica | 1 online resource (38 p.) |
| Disciplina | 005.2762 |
| Soggetto topico |
Computer security
Computers - Access control - Passwords |
| ISBN |
9781849697774
1849697779 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Intro -- Instant Java Password and Authentication Security -- Instant Java Password and Authentication Security -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Support files, eBooks, discount offers and more -- Why Subscribe? -- Free Access for Packt account holders -- Preface -- What this book covers -- What you need for this book -- Who this book is for -- Conventions -- Reader feedback -- Customer support -- Downloading the example code -- Errata -- Piracy -- Questions -- 1. Instant Java Password and Authentication Security -- Creating a simple hash (Simple) -- How to do it... -- How it works... -- There's more... -- Password recovery -- Creating a strong hash (Simple) -- How to do it... -- How it works... -- There's more... -- Adding salt to a hash (Intermediate) -- How to do it... -- How it works... -- There's more... -- Crazy hashing and salting -- Creating a secure hash (Advanced) -- How to do it... -- How it works... -- There's more... -- Overview -- Rounding up... -- More Info: Hyper Text Transfer Protocol Secure (HTTPS). |
| Record Nr. | UNINA-9910969949003321 |
Mayoral Fernando
|
||
| Birmingham : , : Packt Publishing, , 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Measuring the usability and security of permuted passwords on mobile platforms / / Kristen K. Greene; John Kelsey; Joshua M. Franklin
| Measuring the usability and security of permuted passwords on mobile platforms / / Kristen K. Greene; John Kelsey; Joshua M. Franklin |
| Autore | Greene Kristen K |
| Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2016 |
| Descrizione fisica | 1 online resource (65 pages) : illustrations (color) |
| Altri autori (Persone) |
FranklinJoshua M
GreeneKristen K KelseyJohn |
| Collana | NISTIR |
| Soggetto topico |
Computers - Access control - Passwords
Mobile communication systems |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910709596603321 |
Greene Kristen K
|
||
| Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2016 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Password / / Martin Paul Eve
| Password / / Martin Paul Eve |
| Autore | Eve Martin Paul <1986-> |
| Pubbl/distr/stampa | London, England : , : Bloomsbury Academic, , 2020 |
| Descrizione fisica | 1 online resource (126 pages) : illustrations, graphs |
| Disciplina | 005.8 |
| Collana | Object lessons : a book series about the hidden lives of ordinary things |
| Soggetto topico |
Identification
Passing (Identity) Authentication Security systems Computers - Access control - Passwords Literary theory |
| ISBN |
1-5013-1488-2
1-5013-1489-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Intro; Title Page; Copyright Page; Contents; Introduction: Passwords and their limits; Chapter 1 Who Goes There? : Militaries, Mortality and Passwords; Passwords, militaries and classical civilizations; Enigma: Complexity, calculation, making and breaking; Disclosure, militaries and the law; Chapter 2 Special Characters: Passwords in Literature and Religion; Passwords, myth and magic; Harry Potter and the two-factor authentication device; The Word; Chapter 3 P455w0rd5 and the Digital Era; Cryptographic hash functions; Fearful asymmetry; Biometrics; Chapter 4 Identity. |
| Record Nr. | UNINA-9910597144003321 |
Eve Martin Paul <1986->
|
||
| London, England : , : Bloomsbury Academic, , 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Password protection 101 [[electronic resource]]
| Password protection 101 [[electronic resource]] |
| Pubbl/distr/stampa | [Washington, D.C.] : , : National Infrastructure Protection Center, , [2001?] |
| Soggetto topico | Computers - Access control - Passwords |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910691613103321 |
| [Washington, D.C.] : , : National Infrastructure Protection Center, , [2001?] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||