Applied cybersecurity & internet governance
| Applied cybersecurity & internet governance |
| Pubbl/distr/stampa | Warsaw, Poland : , : NASK National Research Institute, , [2022]- |
| Descrizione fisica | 1 online resource |
| Soggetto topico |
Cyber intelligence (Computer security)
Cyberspace - Security measures Computer crimes |
| ISSN | 2956-4395 |
| Formato | Materiale a stampa |
| Livello bibliografico | Periodico |
| Lingua di pubblicazione | eng |
| Altri titoli varianti |
Applied cybersecurity and internet governance
ACIG |
| Record Nr. | UNISA-996511170803316 |
| Warsaw, Poland : , : NASK National Research Institute, , [2022]- | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Applied cybersecurity & internet governance
| Applied cybersecurity & internet governance |
| Pubbl/distr/stampa | Warsaw, Poland : , : NASK National Research Institute, , [2022]- |
| Descrizione fisica | 1 online resource |
| Soggetto topico |
Cyber intelligence (Computer security)
Cyberspace - Security measures Computer crimes |
| ISSN | 2956-4395 |
| Formato | Materiale a stampa |
| Livello bibliografico | Periodico |
| Lingua di pubblicazione | eng |
| Altri titoli varianti |
Applied cybersecurity and internet governance
ACIG |
| Record Nr. | UNINA-9910648568203321 |
| Warsaw, Poland : , : NASK National Research Institute, , [2022]- | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Assessing the state of federal cybersecurity risk determination : hearing before the Subcommittee on Cybersecurity and Infrastructure Protection of the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, second session, July 25, 2018
| Assessing the state of federal cybersecurity risk determination : hearing before the Subcommittee on Cybersecurity and Infrastructure Protection of the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, second session, July 25, 2018 |
| Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2019 |
| Descrizione fisica | 1 online resource (iii, 36 pages) : illustration |
| Soggetto topico |
Administrative agencies - Computer networks - Security measures - United States
Electronic government information - Access control - United States Cyber intelligence (Computer security) - United States Computer security - United States Risk assessment - United States Computer security Cyber intelligence (Computer security) Electronic government information - Access control Risk assessment |
| Soggetto genere / forma | Legislative hearings. |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Assessing the state of federal cybersecurity risk determination |
| Record Nr. | UNINA-9910711959703321 |
| Washington : , : U.S. Government Publishing Office, , 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Beyond convergence: world without order / / edited by Hilary Matfess and Michael Miklaucic
| Beyond convergence: world without order / / edited by Hilary Matfess and Michael Miklaucic |
| Pubbl/distr/stampa | Washington, D.C. : , : Center for Complex Operations, Institute for National Security Studies, National Defense University, , 2016 |
| Descrizione fisica | 1 online resource (xviii, 397 pages) : illustrations |
| Soggetto topico |
Transnational crime - Communication systems
Transborder data flow - Security measures Computer networks - Security measures Information warfare Cyberspace operations (Military science) Computer security Transnational crime - Social networks Sovereignty - Social networks Cyberterrorism - Prevention Cyber intelligence (Computer security) |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Beyond convergence |
| Record Nr. | UNINA-9910707976603321 |
| Washington, D.C. : , : Center for Complex Operations, Institute for National Security Studies, National Defense University, , 2016 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Building an International Cybersecurity Regime : Multistakeholder Diplomacy / / Ian Johnstone, Arun Sukumar, and Joel Trachtman, editors
| Building an International Cybersecurity Regime : Multistakeholder Diplomacy / / Ian Johnstone, Arun Sukumar, and Joel Trachtman, editors |
| Edizione | [First edition.] |
| Pubbl/distr/stampa | Northampton : , : Edward Elgar Publishing, , 2023 |
| Descrizione fisica | 1 online resource (282 pages) |
| Disciplina | 005.8026 |
| Collana | Elgar International Law and Technology Series |
| Soggetto topico |
Computer security - Law and legislation
Cyber intelligence (Computer security) Internet - Law and legislation |
| ISBN | 1-03-530154-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Front Matter -- Copyright -- Contents -- Contributors -- PART I Introduction -- 1. Building cybersecurity through multistakeholder diplomacy: Politics, processes, and prospects -- PART II Thematic issues -- 2. The geopolitics of multistakeholder cyber diplomacy: A comparative analysis -- 3. Multistakeholder characteristics of past and ongoing cybersecurity norms processes -- 4. Developing multistakeholder structures for cybersecurity norms: Learning from experience -- 5. Implementing cybersecurity norms: The design of international institutions -- PART III Country perspectives -- 6. U.S. multistakeholder engagement in cyber stability issues -- 7. Russia's participation in multistakeholder diplomacy for cybersecurity norms -- 8. Rethinking Chinese multistakeholder governance of cybersecurity -- 9. India's "passive" multistakeholder cyber diplomacy -- 10. Brazil and multistakeholder diplomacy for the Internet: Past achievements, current challenges and the road ahead -- 11. Taking stock of Estonia's multistakeholder cyber diplomacy -- PART IV Conclusion -- 12. The way ahead for multistakeholder cyber diplomacy -- Index. |
| Record Nr. | UNINA-9910746595003321 |
| Northampton : , : Edward Elgar Publishing, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
China and international law in cyberspace / / Kimberly Hsu, with Craig Murray
| China and international law in cyberspace / / Kimberly Hsu, with Craig Murray |
| Autore | Hsu Kimberly |
| Pubbl/distr/stampa | [Washington, D.C.] : , : U.S.-China Economic and Security Review Commission, , 2014 |
| Descrizione fisica | 1 online resource (10 pages) |
| Collana | U.S. China Economic and Security Review Commission staff report |
| Soggetto topico |
Cyberspace - Government policy - China
Internet - Political aspects - China Internet - Law and legislation - China Cyber intelligence (Computer security) - China Cyber intelligence (Computer security) Cyberspace - Government policy Internet - Political aspects |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910716923603321 |
Hsu Kimberly
|
||
| [Washington, D.C.] : , : U.S.-China Economic and Security Review Commission, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
COMPUSOFT : international journal of advanced computer technology
| COMPUSOFT : international journal of advanced computer technology |
| Pubbl/distr/stampa | [India] : , : COMPUSOFT, , 2012- |
| Descrizione fisica | 1 online resource |
| Soggetto topico |
Computer science
Computer networks Telecommunication Cyber intelligence (Computer security) |
| Soggetto genere / forma | Periodicals. |
| Formato | Materiale a stampa |
| Livello bibliografico | Periodico |
| Lingua di pubblicazione | eng |
| Altri titoli varianti |
International journal of advanced computer technology
IJACT |
| Record Nr. | UNISA-996336735403316 |
| [India] : , : COMPUSOFT, , 2012- | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
COMPUSOFT : international journal of advanced computer technology
| COMPUSOFT : international journal of advanced computer technology |
| Pubbl/distr/stampa | [India] : , : COMPUSOFT, , 2012- |
| Descrizione fisica | 1 online resource |
| Soggetto topico |
Computer science
Computer networks Telecommunication Cyber intelligence (Computer security) |
| Soggetto genere / forma | Periodicals. |
| Formato | Materiale a stampa |
| Livello bibliografico | Periodico |
| Lingua di pubblicazione | eng |
| Altri titoli varianti |
International journal of advanced computer technology
IJACT |
| Record Nr. | UNINA-9910894103303321 |
| [India] : , : COMPUSOFT, , 2012- | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cyber recon : my life in cyber espionage and ransomware negotiation / / Kurtis Minder
| Cyber recon : my life in cyber espionage and ransomware negotiation / / Kurtis Minder |
| Autore | Minder Kurtis |
| Pubbl/distr/stampa | Hoboken, New Jersey : , : John Wiley & Songs, Inc., , [2025] |
| Descrizione fisica | 1 online resource |
| Disciplina | 005.8 |
| Soggetto topico |
Computer crimes
Cyber intelligence (Computer security) Internet in espionage |
| ISBN |
1394334621
9781394334629 1394334648 9781394334643 1394334613 9781394334612 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9911020247903321 |
Minder Kurtis
|
||
| Hoboken, New Jersey : , : John Wiley & Songs, Inc., , [2025] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cyber reconnaissance, surveillance, and defense / / Robert Shimonski ; John Zenir, contributing editor ; Allison Bishop, technical editor
| Cyber reconnaissance, surveillance, and defense / / Robert Shimonski ; John Zenir, contributing editor ; Allison Bishop, technical editor |
| Autore | Shimonski Robert |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Waltham, Massachusetts : , : Syngress, , 2015 |
| Descrizione fisica | 1 online resource (258 p.) |
| Disciplina | 327.12 |
| Soggetto topico |
Electronic intelligence
Internet in espionage Cyber intelligence (Computer security) Internet - Security measures Computer crimes |
| Soggetto genere / forma | Electronic books. |
| ISBN | 0-12-801468-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Title Page; Copyright Page; Dedication; Contents; About the Authors; Acknowledgments; Introduction; Chapter 1 - Digital Reconnaissance and Surveillance; Digital Reconnaissance and Surveillance; Art and History of Spying; Threat of Digital Reconnaissance and Surveillance; Threat Landscape; Why Spy?; NSA and Edward Snowden; Public Trust; Cybercrime; Why Spy? Motivation; What Is to Gain? Reward; Digital Forensics; Who Spies?; Professional Roles; Hackers (White, Gray, and Black); Digital Forensics Examiner; Cyber Intelligence Analyst; Cyber Security Engineer; Penetration Tester
Private InvestigatorLaw Enforcement; Legal and Ethical Principles; Ethics; The Law; Surveillance and Cybercrime Sample Law; Summary; Chapter 2 - Information Gathering; Information Gathering; Am I Being Spied On?; How Private Is Your Life?; Examples of Privacy Invasion; How to Gather Information; Information Gathering Tools; Online Reconnaissance; The Internet Threat; Search Engines; Phishing; Tracking; Social Media; Scanning, Sniffing, and Mapping; Wired and Wireless; Infrastructure; Mobile Device Threat; Data Threat (Metadata); Physical Reconnaissance; Tailing and Stalking Social EngineeringTapping; Legal and Ethical Concerns; Summary; Chapter 3 - Social Engineering; Social Engineering; Am I Being Spied On?; Scam Example; How to Gather Information; Dumpster Diving; Shoulder Surfing; Phishing; Social Engineering Toolkit; Bugging and Recording; Mitigation of Social Engineering; Mitigate Attack; Information Privacy; Legal and Ethical Concerns; More Legal Issues; Summary; Chapter 4 - Mobile Phone Tracking; Phone Tracking; Mobile Phones; Apple iPhone; Google Android; Windows Phone; Blackberry; Phone Tracking; Malicious Tracking; Tracking for Reconnaissance Location-Based ServicesTracking a SIM; Global Positioning System and Geolocation; Google Mapping; Legal and Ethical Concerns; Summary; Chapter 5 - Physical Device Tracking; Physical Tracking; Device fingerprint; Tracking for Reconnaissance Today; Application Installation Versus Physical Device; Physical Device Tracking; Safe Devices Used Against You; Location Tracking and Wearable Technology; Legal and Ethical Concerns; Summary; Chapter 6 - Web Camera and Video Tracking; Camera Tracking; Tracking examples; Security Surveillance Systems (Private Home) Security Surveillance Systems (Businesses)Security Surveillance Systems (Public); Satellite Surveillance Systems; PC devices and webcams; Creepware; Mobile Devices; Gaming Consoles; Legal and Ethical Concerns; Summary; Chapter 7 - Data Capture and Exploitation; Data Threat; Data Theft and Surveillance; Basic Data Capture Techniques; Data at Rest; Malware Protection; DLP Software; Firewall Systems; Removable Media; Encryption Protection; Data in Motion; Sniffers; Skimmers; Digital Forensics; Devices and Applications; Legal and Ethical Concerns; Summary; Chapter 8 - Protection Methods Protect Yourself! |
| Record Nr. | UNINA-9910460221703321 |
Shimonski Robert
|
||
| Waltham, Massachusetts : , : Syngress, , 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||