top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Applied cybersecurity & internet governance
Applied cybersecurity & internet governance
Pubbl/distr/stampa Warsaw, Poland : , : NASK National Research Institute, , [2022]-
Descrizione fisica 1 online resource
Soggetto topico Cyber intelligence (Computer security)
Cyberspace - Security measures
Computer crimes
ISSN 2956-4395
Formato Materiale a stampa
Livello bibliografico Periodico
Lingua di pubblicazione eng
Altri titoli varianti Applied cybersecurity and internet governance
ACIG
Record Nr. UNISA-996511170803316
Warsaw, Poland : , : NASK National Research Institute, , [2022]-
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Applied cybersecurity & internet governance
Applied cybersecurity & internet governance
Pubbl/distr/stampa Warsaw, Poland : , : NASK National Research Institute, , [2022]-
Descrizione fisica 1 online resource
Soggetto topico Cyber intelligence (Computer security)
Cyberspace - Security measures
Computer crimes
ISSN 2956-4395
Formato Materiale a stampa
Livello bibliografico Periodico
Lingua di pubblicazione eng
Altri titoli varianti Applied cybersecurity and internet governance
ACIG
Record Nr. UNINA-9910648568203321
Warsaw, Poland : , : NASK National Research Institute, , [2022]-
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Assessing the state of federal cybersecurity risk determination : hearing before the Subcommittee on Cybersecurity and Infrastructure Protection of the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, second session, July 25, 2018
Assessing the state of federal cybersecurity risk determination : hearing before the Subcommittee on Cybersecurity and Infrastructure Protection of the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, second session, July 25, 2018
Pubbl/distr/stampa Washington : , : U.S. Government Publishing Office, , 2019
Descrizione fisica 1 online resource (iii, 36 pages) : illustration
Soggetto topico Administrative agencies - Computer networks - Security measures - United States
Electronic government information - Access control - United States
Cyber intelligence (Computer security) - United States
Computer security - United States
Risk assessment - United States
Computer security
Cyber intelligence (Computer security)
Electronic government information - Access control
Risk assessment
Soggetto genere / forma Legislative hearings.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Assessing the state of federal cybersecurity risk determination
Record Nr. UNINA-9910711959703321
Washington : , : U.S. Government Publishing Office, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Beyond convergence: world without order / / edited by Hilary Matfess and Michael Miklaucic
Beyond convergence: world without order / / edited by Hilary Matfess and Michael Miklaucic
Pubbl/distr/stampa Washington, D.C. : , : Center for Complex Operations, Institute for National Security Studies, National Defense University, , 2016
Descrizione fisica 1 online resource (xviii, 397 pages) : illustrations
Soggetto topico Transnational crime - Communication systems
Transborder data flow - Security measures
Computer networks - Security measures
Information warfare
Cyberspace operations (Military science)
Computer security
Transnational crime - Social networks
Sovereignty - Social networks
Cyberterrorism - Prevention
Cyber intelligence (Computer security)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Beyond convergence
Record Nr. UNINA-9910707976603321
Washington, D.C. : , : Center for Complex Operations, Institute for National Security Studies, National Defense University, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Building an International Cybersecurity Regime : Multistakeholder Diplomacy / / Ian Johnstone, Arun Sukumar, and Joel Trachtman, editors
Building an International Cybersecurity Regime : Multistakeholder Diplomacy / / Ian Johnstone, Arun Sukumar, and Joel Trachtman, editors
Edizione [First edition.]
Pubbl/distr/stampa Northampton : , : Edward Elgar Publishing, , 2023
Descrizione fisica 1 online resource (282 pages)
Disciplina 005.8026
Collana Elgar International Law and Technology Series
Soggetto topico Computer security - Law and legislation
Cyber intelligence (Computer security)
Internet - Law and legislation
ISBN 1-03-530154-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Matter -- Copyright -- Contents -- Contributors -- PART I Introduction -- 1. Building cybersecurity through multistakeholder diplomacy: Politics, processes, and prospects -- PART II Thematic issues -- 2. The geopolitics of multistakeholder cyber diplomacy: A comparative analysis -- 3. Multistakeholder characteristics of past and ongoing cybersecurity norms processes -- 4. Developing multistakeholder structures for cybersecurity norms: Learning from experience -- 5. Implementing cybersecurity norms: The design of international institutions -- PART III Country perspectives -- 6. U.S. multistakeholder engagement in cyber stability issues -- 7. Russia's participation in multistakeholder diplomacy for cybersecurity norms -- 8. Rethinking Chinese multistakeholder governance of cybersecurity -- 9. India's "passive" multistakeholder cyber diplomacy -- 10. Brazil and multistakeholder diplomacy for the Internet: Past achievements, current challenges and the road ahead -- 11. Taking stock of Estonia's multistakeholder cyber diplomacy -- PART IV Conclusion -- 12. The way ahead for multistakeholder cyber diplomacy -- Index.
Record Nr. UNINA-9910746595003321
Northampton : , : Edward Elgar Publishing, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
China and international law in cyberspace / / Kimberly Hsu, with Craig Murray
China and international law in cyberspace / / Kimberly Hsu, with Craig Murray
Autore Hsu Kimberly
Pubbl/distr/stampa [Washington, D.C.] : , : U.S.-China Economic and Security Review Commission, , 2014
Descrizione fisica 1 online resource (10 pages)
Collana U.S. China Economic and Security Review Commission staff report
Soggetto topico Cyberspace - Government policy - China
Internet - Political aspects - China
Internet - Law and legislation - China
Cyber intelligence (Computer security) - China
Cyber intelligence (Computer security)
Cyberspace - Government policy
Internet - Political aspects
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910716923603321
Hsu Kimberly  
[Washington, D.C.] : , : U.S.-China Economic and Security Review Commission, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
COMPUSOFT : international journal of advanced computer technology
COMPUSOFT : international journal of advanced computer technology
Pubbl/distr/stampa [India] : , : COMPUSOFT, , 2012-
Descrizione fisica 1 online resource
Soggetto topico Computer science
Computer networks
Telecommunication
Cyber intelligence (Computer security)
Soggetto genere / forma Periodicals.
Formato Materiale a stampa
Livello bibliografico Periodico
Lingua di pubblicazione eng
Altri titoli varianti International journal of advanced computer technology
IJACT
Record Nr. UNISA-996336735403316
[India] : , : COMPUSOFT, , 2012-
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
COMPUSOFT : international journal of advanced computer technology
COMPUSOFT : international journal of advanced computer technology
Pubbl/distr/stampa [India] : , : COMPUSOFT, , 2012-
Descrizione fisica 1 online resource
Soggetto topico Computer science
Computer networks
Telecommunication
Cyber intelligence (Computer security)
Soggetto genere / forma Periodicals.
Formato Materiale a stampa
Livello bibliografico Periodico
Lingua di pubblicazione eng
Altri titoli varianti International journal of advanced computer technology
IJACT
Record Nr. UNINA-9910894103303321
[India] : , : COMPUSOFT, , 2012-
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber reconnaissance, surveillance, and defense / / Robert Shimonski ; John Zenir, contributing editor ; Allison Bishop, technical editor
Cyber reconnaissance, surveillance, and defense / / Robert Shimonski ; John Zenir, contributing editor ; Allison Bishop, technical editor
Autore Shimonski Robert
Edizione [1st edition]
Pubbl/distr/stampa Waltham, Massachusetts : , : Syngress, , 2015
Descrizione fisica 1 online resource (258 p.)
Disciplina 327.12
Soggetto topico Electronic intelligence
Internet in espionage
Cyber intelligence (Computer security)
Internet - Security measures
Computer crimes
Soggetto genere / forma Electronic books.
ISBN 0-12-801468-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright Page; Dedication; Contents; About the Authors; Acknowledgments; Introduction; Chapter 1 - Digital Reconnaissance and Surveillance; Digital Reconnaissance and Surveillance; Art and History of Spying; Threat of Digital Reconnaissance and Surveillance; Threat Landscape; Why Spy?; NSA and Edward Snowden; Public Trust; Cybercrime; Why Spy? Motivation; What Is to Gain? Reward; Digital Forensics; Who Spies?; Professional Roles; Hackers (White, Gray, and Black); Digital Forensics Examiner; Cyber Intelligence Analyst; Cyber Security Engineer; Penetration Tester
Private InvestigatorLaw Enforcement; Legal and Ethical Principles; Ethics; The Law; Surveillance and Cybercrime Sample Law; Summary; Chapter 2 - Information Gathering; Information Gathering; Am I Being Spied On?; How Private Is Your Life?; Examples of Privacy Invasion; How to Gather Information; Information Gathering Tools; Online Reconnaissance; The Internet Threat; Search Engines; Phishing; Tracking; Social Media; Scanning, Sniffing, and Mapping; Wired and Wireless; Infrastructure; Mobile Device Threat; Data Threat (Metadata); Physical Reconnaissance; Tailing and Stalking
Social EngineeringTapping; Legal and Ethical Concerns; Summary; Chapter 3 - Social Engineering; Social Engineering; Am I Being Spied On?; Scam Example; How to Gather Information; Dumpster Diving; Shoulder Surfing; Phishing; Social Engineering Toolkit; Bugging and Recording; Mitigation of Social Engineering; Mitigate Attack; Information Privacy; Legal and Ethical Concerns; More Legal Issues; Summary; Chapter 4 - Mobile Phone Tracking; Phone Tracking; Mobile Phones; Apple iPhone; Google Android; Windows Phone; Blackberry; Phone Tracking; Malicious Tracking; Tracking for Reconnaissance
Location-Based ServicesTracking a SIM; Global Positioning System and Geolocation; Google Mapping; Legal and Ethical Concerns; Summary; Chapter 5 - Physical Device Tracking; Physical Tracking; Device fingerprint; Tracking for Reconnaissance Today; Application Installation Versus Physical Device; Physical Device Tracking; Safe Devices Used Against You; Location Tracking and Wearable Technology; Legal and Ethical Concerns; Summary; Chapter 6 - Web Camera and Video Tracking; Camera Tracking; Tracking examples; Security Surveillance Systems (Private Home)
Security Surveillance Systems (Businesses)Security Surveillance Systems (Public); Satellite Surveillance Systems; PC devices and webcams; Creepware; Mobile Devices; Gaming Consoles; Legal and Ethical Concerns; Summary; Chapter 7 - Data Capture and Exploitation; Data Threat; Data Theft and Surveillance; Basic Data Capture Techniques; Data at Rest; Malware Protection; DLP Software; Firewall Systems; Removable Media; Encryption Protection; Data in Motion; Sniffers; Skimmers; Digital Forensics; Devices and Applications; Legal and Ethical Concerns; Summary; Chapter 8 - Protection Methods
Protect Yourself!
Record Nr. UNINA-9910460221703321
Shimonski Robert  
Waltham, Massachusetts : , : Syngress, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber reconnaissance, surveillance, and defense / / Robert Shimonski ; John Zenir, contributing editor ; Allison Bishop, technical editor
Cyber reconnaissance, surveillance, and defense / / Robert Shimonski ; John Zenir, contributing editor ; Allison Bishop, technical editor
Autore Shimonski Robert
Edizione [1st edition]
Pubbl/distr/stampa Waltham, Massachusetts : , : Syngress, , 2015
Descrizione fisica 1 online resource (258 p.)
Disciplina 327.12
Soggetto topico Electronic intelligence
Internet in espionage
Cyber intelligence (Computer security)
Internet - Security measures
Computer crimes
ISBN 0-12-801468-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright Page; Dedication; Contents; About the Authors; Acknowledgments; Introduction; Chapter 1 - Digital Reconnaissance and Surveillance; Digital Reconnaissance and Surveillance; Art and History of Spying; Threat of Digital Reconnaissance and Surveillance; Threat Landscape; Why Spy?; NSA and Edward Snowden; Public Trust; Cybercrime; Why Spy? Motivation; What Is to Gain? Reward; Digital Forensics; Who Spies?; Professional Roles; Hackers (White, Gray, and Black); Digital Forensics Examiner; Cyber Intelligence Analyst; Cyber Security Engineer; Penetration Tester
Private InvestigatorLaw Enforcement; Legal and Ethical Principles; Ethics; The Law; Surveillance and Cybercrime Sample Law; Summary; Chapter 2 - Information Gathering; Information Gathering; Am I Being Spied On?; How Private Is Your Life?; Examples of Privacy Invasion; How to Gather Information; Information Gathering Tools; Online Reconnaissance; The Internet Threat; Search Engines; Phishing; Tracking; Social Media; Scanning, Sniffing, and Mapping; Wired and Wireless; Infrastructure; Mobile Device Threat; Data Threat (Metadata); Physical Reconnaissance; Tailing and Stalking
Social EngineeringTapping; Legal and Ethical Concerns; Summary; Chapter 3 - Social Engineering; Social Engineering; Am I Being Spied On?; Scam Example; How to Gather Information; Dumpster Diving; Shoulder Surfing; Phishing; Social Engineering Toolkit; Bugging and Recording; Mitigation of Social Engineering; Mitigate Attack; Information Privacy; Legal and Ethical Concerns; More Legal Issues; Summary; Chapter 4 - Mobile Phone Tracking; Phone Tracking; Mobile Phones; Apple iPhone; Google Android; Windows Phone; Blackberry; Phone Tracking; Malicious Tracking; Tracking for Reconnaissance
Location-Based ServicesTracking a SIM; Global Positioning System and Geolocation; Google Mapping; Legal and Ethical Concerns; Summary; Chapter 5 - Physical Device Tracking; Physical Tracking; Device fingerprint; Tracking for Reconnaissance Today; Application Installation Versus Physical Device; Physical Device Tracking; Safe Devices Used Against You; Location Tracking and Wearable Technology; Legal and Ethical Concerns; Summary; Chapter 6 - Web Camera and Video Tracking; Camera Tracking; Tracking examples; Security Surveillance Systems (Private Home)
Security Surveillance Systems (Businesses)Security Surveillance Systems (Public); Satellite Surveillance Systems; PC devices and webcams; Creepware; Mobile Devices; Gaming Consoles; Legal and Ethical Concerns; Summary; Chapter 7 - Data Capture and Exploitation; Data Threat; Data Theft and Surveillance; Basic Data Capture Techniques; Data at Rest; Malware Protection; DLP Software; Firewall Systems; Removable Media; Encryption Protection; Data in Motion; Sniffers; Skimmers; Digital Forensics; Devices and Applications; Legal and Ethical Concerns; Summary; Chapter 8 - Protection Methods
Protect Yourself!
Record Nr. UNINA-9910787012103321
Shimonski Robert  
Waltham, Massachusetts : , : Syngress, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui