Applied cybersecurity & internet governance |
Pubbl/distr/stampa | Warsaw, Poland : , : NASK National Research Institute, , [2022]- |
Descrizione fisica | 1 online resource |
Soggetto topico |
Cyber intelligence (Computer security)
Cyberspace - Security measures Computer crimes |
ISSN | 2956-4395 |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Altri titoli varianti |
Applied cybersecurity and internet governance
ACIG |
Record Nr. | UNISA-996511170803316 |
Warsaw, Poland : , : NASK National Research Institute, , [2022]- | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Applied cybersecurity & internet governance |
Pubbl/distr/stampa | Warsaw, Poland : , : NASK National Research Institute, , [2022]- |
Descrizione fisica | 1 online resource |
Soggetto topico |
Cyber intelligence (Computer security)
Cyberspace - Security measures Computer crimes |
ISSN | 2956-4395 |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Altri titoli varianti |
Applied cybersecurity and internet governance
ACIG |
Record Nr. | UNINA-9910648568203321 |
Warsaw, Poland : , : NASK National Research Institute, , [2022]- | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Assessing the state of federal cybersecurity risk determination : hearing before the Subcommittee on Cybersecurity and Infrastructure Protection of the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, second session, July 25, 2018 |
Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2019 |
Descrizione fisica | 1 online resource (iii, 36 pages) : illustration |
Soggetto topico |
Administrative agencies - Computer networks - Security measures - United States
Electronic government information - Access control - United States Cyber intelligence (Computer security) - United States Computer security - United States Risk assessment - United States Computer security Cyber intelligence (Computer security) Electronic government information - Access control Risk assessment |
Soggetto genere / forma | Legislative hearings. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Assessing the state of federal cybersecurity risk determination |
Record Nr. | UNINA-9910711959703321 |
Washington : , : U.S. Government Publishing Office, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Beyond convergence: world without order / / edited by Hilary Matfess and Michael Miklaucic |
Pubbl/distr/stampa | Washington, D.C. : , : Center for Complex Operations, Institute for National Security Studies, National Defense University, , 2016 |
Descrizione fisica | 1 online resource (xviii, 397 pages) : illustrations |
Soggetto topico |
Transnational crime - Communication systems
Transborder data flow - Security measures Computer networks - Security measures Information warfare Cyberspace operations (Military science) Computer security Transnational crime - Social networks Sovereignty - Social networks Cyberterrorism - Prevention Cyber intelligence (Computer security) |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Beyond convergence |
Record Nr. | UNINA-9910707976603321 |
Washington, D.C. : , : Center for Complex Operations, Institute for National Security Studies, National Defense University, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Building an International Cybersecurity Regime : Multistakeholder Diplomacy / / Ian Johnstone, Arun Sukumar, and Joel Trachtman, editors |
Edizione | [First edition.] |
Pubbl/distr/stampa | Northampton : , : Edward Elgar Publishing, , 2023 |
Descrizione fisica | 1 online resource (282 pages) |
Disciplina | 005.8026 |
Collana | Elgar International Law and Technology Series |
Soggetto topico |
Computer security - Law and legislation
Cyber intelligence (Computer security) Internet - Law and legislation |
ISBN | 1-03-530154-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Front Matter -- Copyright -- Contents -- Contributors -- PART I Introduction -- 1. Building cybersecurity through multistakeholder diplomacy: Politics, processes, and prospects -- PART II Thematic issues -- 2. The geopolitics of multistakeholder cyber diplomacy: A comparative analysis -- 3. Multistakeholder characteristics of past and ongoing cybersecurity norms processes -- 4. Developing multistakeholder structures for cybersecurity norms: Learning from experience -- 5. Implementing cybersecurity norms: The design of international institutions -- PART III Country perspectives -- 6. U.S. multistakeholder engagement in cyber stability issues -- 7. Russia's participation in multistakeholder diplomacy for cybersecurity norms -- 8. Rethinking Chinese multistakeholder governance of cybersecurity -- 9. India's "passive" multistakeholder cyber diplomacy -- 10. Brazil and multistakeholder diplomacy for the Internet: Past achievements, current challenges and the road ahead -- 11. Taking stock of Estonia's multistakeholder cyber diplomacy -- PART IV Conclusion -- 12. The way ahead for multistakeholder cyber diplomacy -- Index. |
Record Nr. | UNINA-9910746595003321 |
Northampton : , : Edward Elgar Publishing, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
China and international law in cyberspace / / Kimberly Hsu, with Craig Murray |
Autore | Hsu Kimberly |
Pubbl/distr/stampa | [Washington, D.C.] : , : U.S.-China Economic and Security Review Commission, , 2014 |
Descrizione fisica | 1 online resource (10 pages) |
Collana | U.S. China Economic and Security Review Commission staff report |
Soggetto topico |
Cyberspace - Government policy - China
Internet - Political aspects - China Internet - Law and legislation - China Cyber intelligence (Computer security) - China Cyber intelligence (Computer security) Cyberspace - Government policy Internet - Political aspects |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910716923603321 |
Hsu Kimberly | ||
[Washington, D.C.] : , : U.S.-China Economic and Security Review Commission, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
COMPUSOFT : international journal of advanced computer technology |
Pubbl/distr/stampa | [India] : , : COMPUSOFT, , 2012- |
Descrizione fisica | 1 online resource |
Soggetto topico |
Computer science
Computer networks Telecommunication Cyber intelligence (Computer security) |
Soggetto genere / forma | Periodicals. |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Altri titoli varianti |
International journal of advanced computer technology
IJACT |
Record Nr. | UNISA-996336735403316 |
[India] : , : COMPUSOFT, , 2012- | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
COMPUSOFT : international journal of advanced computer technology |
Pubbl/distr/stampa | [India] : , : COMPUSOFT, , 2012- |
Descrizione fisica | 1 online resource |
Soggetto topico |
Computer science
Computer networks Telecommunication Cyber intelligence (Computer security) |
Soggetto genere / forma | Periodicals. |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Altri titoli varianti |
International journal of advanced computer technology
IJACT |
Record Nr. | UNINA-9910894103303321 |
[India] : , : COMPUSOFT, , 2012- | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber reconnaissance, surveillance, and defense / / Robert Shimonski ; John Zenir, contributing editor ; Allison Bishop, technical editor |
Autore | Shimonski Robert |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Syngress, , 2015 |
Descrizione fisica | 1 online resource (258 p.) |
Disciplina | 327.12 |
Soggetto topico |
Electronic intelligence
Internet in espionage Cyber intelligence (Computer security) Internet - Security measures Computer crimes |
Soggetto genere / forma | Electronic books. |
ISBN | 0-12-801468-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright Page; Dedication; Contents; About the Authors; Acknowledgments; Introduction; Chapter 1 - Digital Reconnaissance and Surveillance; Digital Reconnaissance and Surveillance; Art and History of Spying; Threat of Digital Reconnaissance and Surveillance; Threat Landscape; Why Spy?; NSA and Edward Snowden; Public Trust; Cybercrime; Why Spy? Motivation; What Is to Gain? Reward; Digital Forensics; Who Spies?; Professional Roles; Hackers (White, Gray, and Black); Digital Forensics Examiner; Cyber Intelligence Analyst; Cyber Security Engineer; Penetration Tester
Private InvestigatorLaw Enforcement; Legal and Ethical Principles; Ethics; The Law; Surveillance and Cybercrime Sample Law; Summary; Chapter 2 - Information Gathering; Information Gathering; Am I Being Spied On?; How Private Is Your Life?; Examples of Privacy Invasion; How to Gather Information; Information Gathering Tools; Online Reconnaissance; The Internet Threat; Search Engines; Phishing; Tracking; Social Media; Scanning, Sniffing, and Mapping; Wired and Wireless; Infrastructure; Mobile Device Threat; Data Threat (Metadata); Physical Reconnaissance; Tailing and Stalking Social EngineeringTapping; Legal and Ethical Concerns; Summary; Chapter 3 - Social Engineering; Social Engineering; Am I Being Spied On?; Scam Example; How to Gather Information; Dumpster Diving; Shoulder Surfing; Phishing; Social Engineering Toolkit; Bugging and Recording; Mitigation of Social Engineering; Mitigate Attack; Information Privacy; Legal and Ethical Concerns; More Legal Issues; Summary; Chapter 4 - Mobile Phone Tracking; Phone Tracking; Mobile Phones; Apple iPhone; Google Android; Windows Phone; Blackberry; Phone Tracking; Malicious Tracking; Tracking for Reconnaissance Location-Based ServicesTracking a SIM; Global Positioning System and Geolocation; Google Mapping; Legal and Ethical Concerns; Summary; Chapter 5 - Physical Device Tracking; Physical Tracking; Device fingerprint; Tracking for Reconnaissance Today; Application Installation Versus Physical Device; Physical Device Tracking; Safe Devices Used Against You; Location Tracking and Wearable Technology; Legal and Ethical Concerns; Summary; Chapter 6 - Web Camera and Video Tracking; Camera Tracking; Tracking examples; Security Surveillance Systems (Private Home) Security Surveillance Systems (Businesses)Security Surveillance Systems (Public); Satellite Surveillance Systems; PC devices and webcams; Creepware; Mobile Devices; Gaming Consoles; Legal and Ethical Concerns; Summary; Chapter 7 - Data Capture and Exploitation; Data Threat; Data Theft and Surveillance; Basic Data Capture Techniques; Data at Rest; Malware Protection; DLP Software; Firewall Systems; Removable Media; Encryption Protection; Data in Motion; Sniffers; Skimmers; Digital Forensics; Devices and Applications; Legal and Ethical Concerns; Summary; Chapter 8 - Protection Methods Protect Yourself! |
Record Nr. | UNINA-9910460221703321 |
Shimonski Robert | ||
Waltham, Massachusetts : , : Syngress, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber reconnaissance, surveillance, and defense / / Robert Shimonski ; John Zenir, contributing editor ; Allison Bishop, technical editor |
Autore | Shimonski Robert |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Syngress, , 2015 |
Descrizione fisica | 1 online resource (258 p.) |
Disciplina | 327.12 |
Soggetto topico |
Electronic intelligence
Internet in espionage Cyber intelligence (Computer security) Internet - Security measures Computer crimes |
ISBN | 0-12-801468-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright Page; Dedication; Contents; About the Authors; Acknowledgments; Introduction; Chapter 1 - Digital Reconnaissance and Surveillance; Digital Reconnaissance and Surveillance; Art and History of Spying; Threat of Digital Reconnaissance and Surveillance; Threat Landscape; Why Spy?; NSA and Edward Snowden; Public Trust; Cybercrime; Why Spy? Motivation; What Is to Gain? Reward; Digital Forensics; Who Spies?; Professional Roles; Hackers (White, Gray, and Black); Digital Forensics Examiner; Cyber Intelligence Analyst; Cyber Security Engineer; Penetration Tester
Private InvestigatorLaw Enforcement; Legal and Ethical Principles; Ethics; The Law; Surveillance and Cybercrime Sample Law; Summary; Chapter 2 - Information Gathering; Information Gathering; Am I Being Spied On?; How Private Is Your Life?; Examples of Privacy Invasion; How to Gather Information; Information Gathering Tools; Online Reconnaissance; The Internet Threat; Search Engines; Phishing; Tracking; Social Media; Scanning, Sniffing, and Mapping; Wired and Wireless; Infrastructure; Mobile Device Threat; Data Threat (Metadata); Physical Reconnaissance; Tailing and Stalking Social EngineeringTapping; Legal and Ethical Concerns; Summary; Chapter 3 - Social Engineering; Social Engineering; Am I Being Spied On?; Scam Example; How to Gather Information; Dumpster Diving; Shoulder Surfing; Phishing; Social Engineering Toolkit; Bugging and Recording; Mitigation of Social Engineering; Mitigate Attack; Information Privacy; Legal and Ethical Concerns; More Legal Issues; Summary; Chapter 4 - Mobile Phone Tracking; Phone Tracking; Mobile Phones; Apple iPhone; Google Android; Windows Phone; Blackberry; Phone Tracking; Malicious Tracking; Tracking for Reconnaissance Location-Based ServicesTracking a SIM; Global Positioning System and Geolocation; Google Mapping; Legal and Ethical Concerns; Summary; Chapter 5 - Physical Device Tracking; Physical Tracking; Device fingerprint; Tracking for Reconnaissance Today; Application Installation Versus Physical Device; Physical Device Tracking; Safe Devices Used Against You; Location Tracking and Wearable Technology; Legal and Ethical Concerns; Summary; Chapter 6 - Web Camera and Video Tracking; Camera Tracking; Tracking examples; Security Surveillance Systems (Private Home) Security Surveillance Systems (Businesses)Security Surveillance Systems (Public); Satellite Surveillance Systems; PC devices and webcams; Creepware; Mobile Devices; Gaming Consoles; Legal and Ethical Concerns; Summary; Chapter 7 - Data Capture and Exploitation; Data Threat; Data Theft and Surveillance; Basic Data Capture Techniques; Data at Rest; Malware Protection; DLP Software; Firewall Systems; Removable Media; Encryption Protection; Data in Motion; Sniffers; Skimmers; Digital Forensics; Devices and Applications; Legal and Ethical Concerns; Summary; Chapter 8 - Protection Methods Protect Yourself! |
Record Nr. | UNINA-9910787012103321 |
Shimonski Robert | ||
Waltham, Massachusetts : , : Syngress, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|