top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Essential computer security [[electronic resource] ] : everyone's guide to e-mail, internet, and wireless security / / Tony Bradley, Harlan Carvey
Essential computer security [[electronic resource] ] : everyone's guide to e-mail, internet, and wireless security / / Tony Bradley, Harlan Carvey
Autore Bradley Tony
Edizione [1st edition]
Pubbl/distr/stampa Rockland, MA, : Syngress Publishing, c2006
Descrizione fisica 1 online resource (321 p.)
Disciplina 005.8
Altri autori (Persone) CarveyHarlan A
Soggetto topico Computer security
Computers - Access control - Passwords
Electronic mail systems - Security measures
Firewalls (Computer security)
Internet - Security measures
Spam filtering (Electronic mail)
Spyware (Computer software)
Soggetto genere / forma Electronic books.
ISBN 1-281-07186-2
9786611071868
0-08-050589-9
1-59749-159-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Essential Computer Security; Copyright Page; Contents; Foreword; Introduction; Part I: Bare Essentials; Chapter 1. Basic Windows Security; Introduction; Why Do You Need to Be Secure?; Why Are You at Risk?; Summary; Additional Resources; Chapter 2. Passwords; Introduction; Password Power; Password Cracking; Storing Your Passwords; One Super-Powerful Password; Summary; Additional Resources; Chapter 3. Viruses, Worms, and Other Malware; Introduction; Malware Terms; The History of Malware; Chapter 4. Patching; Introduction; Patch Terminology; Why Should I Patch?
How Do I Know What to Patch?Summary; Additional Resources; Summary; Additional Resources; Part II: More Essential Security; Chapter 5. Perimeter Security; Introduction; From Moats and Bridges to Firewalls and Filters; Firewalls; Intrusion Detection and Prevention; Summary; Additional Resources; Chapter 6. E-mail Safety; Introduction; The Evolution of E-mail; E-mail Security Concerns; Summary; Additional Resources; Chapter 7. Web Surfing Privacy and Safety; Introduction; The Revolutionary World Wide Web; Web Security Concerns; Summary; Additional Resources; Chapter 8. Wireless Network Security
IntroductionThe Basics of Wireless Networks; Basic Wireless Network Security Measures; Additional Hotspot Security Measures; Summary; Additional Resources; Chapter 9. Spyware and Adware; Introduction; What Is Adware?; What Is Spyware?; Getting Rid of Spyware; Summary; Additional Resources; Part III: Testing and Maintenance; Chapter 10. Keeping Things Secure; Introduction; General PC Maintenance; Patches and Updates; Windows XP Security Center; Summary; Additional Resources; Chapter 11. When Disaster Strikes; Introduction; Check the Event Logs; Enable Security Auditing
Review Your Firewall LogsScan Your Computer; Restore Your System; Start from Scratch; Restore Your Data; Call In the Pros; Summary; Additional Resources; Chapter 12. Microsoft Alternatives: Inside the Linux Desktop . .; Introduction; Common Desktop Environments; The X Window System and Window Managers; E-mail and Personal Information Management Clients; Sylpheed; Essential Information; E-mail and PIM Software; Migrating Mail; Web Browsers; Office Application Suites; Running Windows Applications on Linux; Summary; Additional Resources; Part IV: Security Resources .
Appendix A. Essential Network CommunicationsIntroduction; Computer Protocols; Communication Ports; TCP and UDP Protocols; Understanding IP Addresses and DNS; Managing IP Addresses; Firewalls; Appendix B. Case Study: SOHO (Five Computers, Printer, Servers, etc.); Introduction; Employing a Firewall in a SOHO Environment; Introducing the SOHO Firewall Case Study; Designing the SOHO Firewall; Summary; Solutions Fast Track; Frequently Asked Questions; Appendix C. Glossary of Technology and Terminology; Index
Record Nr. UNINA-9910450902803321
Bradley Tony  
Rockland, MA, : Syngress Publishing, c2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Essential computer security [[electronic resource] ] : everyone's guide to e-mail, internet, and wireless security / / Tony Bradley, Harlan Carvey
Essential computer security [[electronic resource] ] : everyone's guide to e-mail, internet, and wireless security / / Tony Bradley, Harlan Carvey
Autore Bradley Tony
Edizione [1st edition]
Pubbl/distr/stampa Rockland, MA, : Syngress Publishing, c2006
Descrizione fisica 1 online resource (321 p.)
Disciplina 005.8
Altri autori (Persone) CarveyHarlan A
Soggetto topico Computer security
Computers - Access control - Passwords
Electronic mail systems - Security measures
Firewalls (Computer security)
Internet - Security measures
Spam filtering (Electronic mail)
Spyware (Computer software)
ISBN 1-281-07186-2
9786611071868
0-08-050589-9
1-59749-159-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Essential Computer Security; Copyright Page; Contents; Foreword; Introduction; Part I: Bare Essentials; Chapter 1. Basic Windows Security; Introduction; Why Do You Need to Be Secure?; Why Are You at Risk?; Summary; Additional Resources; Chapter 2. Passwords; Introduction; Password Power; Password Cracking; Storing Your Passwords; One Super-Powerful Password; Summary; Additional Resources; Chapter 3. Viruses, Worms, and Other Malware; Introduction; Malware Terms; The History of Malware; Chapter 4. Patching; Introduction; Patch Terminology; Why Should I Patch?
How Do I Know What to Patch?Summary; Additional Resources; Summary; Additional Resources; Part II: More Essential Security; Chapter 5. Perimeter Security; Introduction; From Moats and Bridges to Firewalls and Filters; Firewalls; Intrusion Detection and Prevention; Summary; Additional Resources; Chapter 6. E-mail Safety; Introduction; The Evolution of E-mail; E-mail Security Concerns; Summary; Additional Resources; Chapter 7. Web Surfing Privacy and Safety; Introduction; The Revolutionary World Wide Web; Web Security Concerns; Summary; Additional Resources; Chapter 8. Wireless Network Security
IntroductionThe Basics of Wireless Networks; Basic Wireless Network Security Measures; Additional Hotspot Security Measures; Summary; Additional Resources; Chapter 9. Spyware and Adware; Introduction; What Is Adware?; What Is Spyware?; Getting Rid of Spyware; Summary; Additional Resources; Part III: Testing and Maintenance; Chapter 10. Keeping Things Secure; Introduction; General PC Maintenance; Patches and Updates; Windows XP Security Center; Summary; Additional Resources; Chapter 11. When Disaster Strikes; Introduction; Check the Event Logs; Enable Security Auditing
Review Your Firewall LogsScan Your Computer; Restore Your System; Start from Scratch; Restore Your Data; Call In the Pros; Summary; Additional Resources; Chapter 12. Microsoft Alternatives: Inside the Linux Desktop . .; Introduction; Common Desktop Environments; The X Window System and Window Managers; E-mail and Personal Information Management Clients; Sylpheed; Essential Information; E-mail and PIM Software; Migrating Mail; Web Browsers; Office Application Suites; Running Windows Applications on Linux; Summary; Additional Resources; Part IV: Security Resources .
Appendix A. Essential Network CommunicationsIntroduction; Computer Protocols; Communication Ports; TCP and UDP Protocols; Understanding IP Addresses and DNS; Managing IP Addresses; Firewalls; Appendix B. Case Study: SOHO (Five Computers, Printer, Servers, etc.); Introduction; Employing a Firewall in a SOHO Environment; Introducing the SOHO Firewall Case Study; Designing the SOHO Firewall; Summary; Solutions Fast Track; Frequently Asked Questions; Appendix C. Glossary of Technology and Terminology; Index
Record Nr. UNINA-9910784273303321
Bradley Tony  
Rockland, MA, : Syngress Publishing, c2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Fast software encryption : 6th International Workshop, FSE'99, Rome, Italy, March 1999, proceedings / / edited by Lars Knudsen
Fast software encryption : 6th International Workshop, FSE'99, Rome, Italy, March 1999, proceedings / / edited by Lars Knudsen
Edizione [1st ed. 1999.]
Pubbl/distr/stampa Berlin, Germany ; ; New York, New York : , : Springer, , [1999]
Descrizione fisica 1 online resource (VIII, 324 p.)
Disciplina 005.82
Collana Lecture notes in computer science
Soggetto topico Computers - Access control - Passwords
ISBN 3-540-48519-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Advanced Encryption Standard -- Improved Analysis of Some Simplified Variants of RC6 -- Linear Cryptanalysis of RC5 and RC6 -- A Revised Version of CRYPTON: CRYPTON V1.0 -- Attack on Six Rounds of CRYPTON -- On the Security of the 128-bit Block Cipher DEAL -- Cryptanalysis of a Reduced Version of the Block Cipher E2 -- On the Decorrelated Fast Cipher (DFC) and Its Theory -- Remotely Keyed Encryption -- Scramble All, Encrypt Small -- Accelerated Remotely Keyed Encryption -- Analysis of Block Ciphers I -- Miss in the Middle Attacks on IDEA and Khufu -- Mod n Cryptanalysis, with Applications against RC5P and M6 -- The Boomerang Attack -- Miscellaneous -- Towards Making Luby-Rackoff Ciphers Optimal and Practical -- A New Characterization of Almost Bent Functions -- Imprimitive Permutation Groups and Trapdoors in Iterated Block Ciphers -- Modes of Operation -- On the Security of Double and 2-Key Triple Modes of Operation -- On the Construction of Variable-Input-Length Ciphers -- Analysis of Block Ciphers II -- Slide Attacks -- On the Security of CS-Cipher -- Interpolation Attacks of the Block Cipher: SNAKE -- Stream Ciphers -- High-Speed Pseudorandom Number Generation with Small Memory -- SOBER Cryptanalysis.
Record Nr. UNISA-996465732603316
Berlin, Germany ; ; New York, New York : , : Springer, , [1999]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Fast software encryption : 4th International Workshop, FSE'97, Haifa, Israel, January 20-22, 1997 : proceedings / / Eli Biham, ed
Fast software encryption : 4th International Workshop, FSE'97, Haifa, Israel, January 20-22, 1997 : proceedings / / Eli Biham, ed
Edizione [1st ed. 1997.]
Pubbl/distr/stampa Berlin, Germany ; ; New York, New York : , : Springer, , [1997]
Descrizione fisica 1 online resource (IX, 299 p.)
Disciplina 005.8/2
Collana Lecture Notes in Computer Science
Soggetto topico Computers - Access control - Passwords
ISBN 3-540-69243-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto ?2 cryptanalysis of the SEAL encryption algorithm -- Partitioning cryptanalysis -- The interpolation attack on block ciphers -- Best differential characteristic search of FEAL -- New block encryption algorithm MISTY -- The design of the ICE encryption algorithm -- Advanced Encryption Standard -- TWOPRIME: A fast stream ciphering algorithm -- On nonlinear filter generators -- Chameleon — A new kind of stream cipher -- Improving linear cryptanalysis of LOKI91 by probabilistic counting method -- Cryptanalysis of Ladder-DES -- A family of trapdoor ciphers -- The block cipher Square -- XMX: A firmware-oriented block cipher based on modular multiplications -- MMH: Software message authentication in the Gbit/second rates -- Fast message authentication using efficient polynomial evaluation -- Reinventing the travois: Encryption/MAC in 30 ROM bytes -- All-or-nothing encryption and the package transform -- On the security of remotely keyed encryption -- Sliding encryption: A cryptographic tool for mobile agents -- Fast software encryption: Designing encryption algorithms for optimal software speed on the Intel Pentium processor -- A fast new DES implementation in software -- Optimizing a fast stream cipher for VLIW, SIMD, and superscalar processors.
Record Nr. UNISA-996466134903316
Berlin, Germany ; ; New York, New York : , : Springer, , [1997]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Instant Java password and authentication security / / Fernando Mayoral
Instant Java password and authentication security / / Fernando Mayoral
Autore Mayoral Fernando
Pubbl/distr/stampa Birmingham : , : Packt Publishing, , 2013
Descrizione fisica 1 online resource (38 p.)
Soggetto topico Computer security
Computers - Access control - Passwords
Soggetto genere / forma Electronic books.
ISBN 1-84969-777-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910453495403321
Mayoral Fernando  
Birmingham : , : Packt Publishing, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Instant Java password and authentication security / / Fernando Mayoral
Instant Java password and authentication security / / Fernando Mayoral
Autore Mayoral Fernando
Pubbl/distr/stampa Birmingham : , : Packt Publishing, , 2013
Descrizione fisica 1 online resource (38 p.)
Soggetto topico Computer security
Computers - Access control - Passwords
ISBN 1-84969-777-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910790847003321
Mayoral Fernando  
Birmingham : , : Packt Publishing, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Instant Java password and authentication security / / Fernando Mayoral
Instant Java password and authentication security / / Fernando Mayoral
Autore Mayoral Fernando
Edizione [1st ed.]
Pubbl/distr/stampa Birmingham : , : Packt Publishing, , 2013
Descrizione fisica 1 online resource (38 p.)
Disciplina 005.2762
Soggetto topico Computer security
Computers - Access control - Passwords
ISBN 9781849697774
1849697779
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Instant Java Password and Authentication Security -- Instant Java Password and Authentication Security -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Support files, eBooks, discount offers and more -- Why Subscribe? -- Free Access for Packt account holders -- Preface -- What this book covers -- What you need for this book -- Who this book is for -- Conventions -- Reader feedback -- Customer support -- Downloading the example code -- Errata -- Piracy -- Questions -- 1. Instant Java Password and Authentication Security -- Creating a simple hash (Simple) -- How to do it... -- How it works... -- There's more... -- Password recovery -- Creating a strong hash (Simple) -- How to do it... -- How it works... -- There's more... -- Adding salt to a hash (Intermediate) -- How to do it... -- How it works... -- There's more... -- Crazy hashing and salting -- Creating a secure hash (Advanced) -- How to do it... -- How it works... -- There's more... -- Overview -- Rounding up... -- More Info: Hyper Text Transfer Protocol Secure (HTTPS).
Record Nr. UNINA-9910969949003321
Mayoral Fernando  
Birmingham : , : Packt Publishing, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Measuring the usability and security of permuted passwords on mobile platforms / / Kristen K. Greene; John Kelsey; Joshua M. Franklin
Measuring the usability and security of permuted passwords on mobile platforms / / Kristen K. Greene; John Kelsey; Joshua M. Franklin
Autore Greene Kristen K
Pubbl/distr/stampa Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2016
Descrizione fisica 1 online resource (65 pages) : illustrations (color)
Altri autori (Persone) FranklinJoshua M
GreeneKristen K
KelseyJohn
Collana NISTIR
Soggetto topico Computers - Access control - Passwords
Mobile communication systems
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910709596603321
Greene Kristen K  
Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Password / / Martin Paul Eve
Password / / Martin Paul Eve
Autore Eve Martin Paul <1986->
Pubbl/distr/stampa London, England : , : Bloomsbury Academic, , 2020
Descrizione fisica 1 online resource (126 pages) : illustrations, graphs
Disciplina 005.8
Collana Object lessons : a book series about the hidden lives of ordinary things
Soggetto topico Identification
Passing (Identity)
Authentication
Security systems
Computers - Access control - Passwords
Literary theory
ISBN 1-5013-1488-2
1-5013-1489-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro; Title Page; Copyright Page; Contents; Introduction: Passwords and their limits; Chapter 1 Who Goes There? : Militaries, Mortality and Passwords; Passwords, militaries and classical civilizations; Enigma: Complexity, calculation, making and breaking; Disclosure, militaries and the law; Chapter 2 Special Characters: Passwords in Literature and Religion; Passwords, myth and magic; Harry Potter and the two-factor authentication device; The Word; Chapter 3 P455w0rd5 and the Digital Era; Cryptographic hash functions; Fearful asymmetry; Biometrics; Chapter 4 Identity.
Record Nr. UNINA-9910597144003321
Eve Martin Paul <1986->  
London, England : , : Bloomsbury Academic, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Password protection 101 [[electronic resource]]
Password protection 101 [[electronic resource]]
Pubbl/distr/stampa [Washington, D.C.] : , : National Infrastructure Protection Center, , [2001?]
Soggetto topico Computers - Access control - Passwords
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910691613103321
[Washington, D.C.] : , : National Infrastructure Protection Center, , [2001?]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui