Applied cybersecurity & internet governance
| Applied cybersecurity & internet governance |
| Pubbl/distr/stampa | Warsaw, Poland : , : NASK National Research Institute, , [2022]- |
| Descrizione fisica | 1 online resource |
| Soggetto topico |
Cyber intelligence (Computer security)
Cyberspace - Security measures Computer crimes |
| ISSN | 2956-4395 |
| Formato | Materiale a stampa |
| Livello bibliografico | Periodico |
| Lingua di pubblicazione | eng |
| Altri titoli varianti |
Applied cybersecurity and internet governance
ACIG |
| Record Nr. | UNISA-996511170803316 |
| Warsaw, Poland : , : NASK National Research Institute, , [2022]- | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Applied cybersecurity & internet governance
| Applied cybersecurity & internet governance |
| Pubbl/distr/stampa | Warsaw, Poland : , : NASK National Research Institute, , [2022]- |
| Descrizione fisica | 1 online resource |
| Soggetto topico |
Cyber intelligence (Computer security)
Cyberspace - Security measures Computer crimes |
| ISSN | 2956-4395 |
| Formato | Materiale a stampa |
| Livello bibliografico | Periodico |
| Lingua di pubblicazione | eng |
| Altri titoli varianti |
Applied cybersecurity and internet governance
ACIG |
| Record Nr. | UNINA-9910648568203321 |
| Warsaw, Poland : , : NASK National Research Institute, , [2022]- | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The Art of Cyber Threat Intelligence : A Comprehensive Understanding / / by Crawford Thomas
| The Art of Cyber Threat Intelligence : A Comprehensive Understanding / / by Crawford Thomas |
| Autore | Thomas Crawford |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2025 |
| Descrizione fisica | 1 online resource (215 pages) |
| Disciplina | 005.8 |
| Collana | Professional and Applied Computing Series |
| Soggetto topico |
Computer security
Cyber intelligence (Computer security) |
| ISBN | 979-88-6881-739-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1. Understanding the Cyber Landscape -- Chapter 2. Understanding the Business -- Chapter 3. Create the Vectors - Threat First - Actor Second -- Chapter 4. Geopolitics -- Chapter 5. Fraud -- Chapter 6. Spheres of Influence -- Chapter 7. Fusion -- Chapter 8. PIRs (Priority Intelligence Requirements)- Chapter 9. Intelligence Collection Plans (ICPs) -- Chapter 10. RFIs (Requests for Information) -- Chapter 11. Vendors -- Chapter 12. Intelligence Sources -- Chapter 13. Internal Control Data -- Chapter 14. Intelligence Sharing -- Chapter 15. The Cyber Criminal -- Chapter 16. Scenarios for Testing -- Chapter 17. End to End Process -- Chapter 18. Heat Maps -- Chapter 19. Inherent Threat vs. Residual Risk -- Chapter 20. AI Emerging Technology -- Chapter 21. The Attack Surface -- Chapter 22. The MITRE ATT&CK Framework in Cyber Threat Intelligence -- Chapter 23. The Stakeholders -- Chapter 24: Intelligence Report Writing – The CTI Output -- Chapter 25: Intelligence Maturity – Balancing Growth with Purpose -- Chapter 26: The Near Future – What Else is Going On -- Chapter 27: Final Thoughts of Significance: Lessons Beyond the Page. |
| Record Nr. | UNINA-9911049107903321 |
Thomas Crawford
|
||
| Berkeley, CA : , : Apress : , : Imprint : Apress, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Assessing the state of federal cybersecurity risk determination : hearing before the Subcommittee on Cybersecurity and Infrastructure Protection of the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, second session, July 25, 2018
| Assessing the state of federal cybersecurity risk determination : hearing before the Subcommittee on Cybersecurity and Infrastructure Protection of the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, second session, July 25, 2018 |
| Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2019 |
| Descrizione fisica | 1 online resource (iii, 36 pages) : illustration |
| Soggetto topico |
Administrative agencies - Computer networks - Security measures - United States
Electronic government information - Access control - United States Cyber intelligence (Computer security) - United States Computer security - United States Risk assessment - United States Computer security Cyber intelligence (Computer security) Electronic government information - Access control Risk assessment |
| Soggetto genere / forma | Legislative hearings. |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Assessing the state of federal cybersecurity risk determination |
| Record Nr. | UNINA-9910711959703321 |
| Washington : , : U.S. Government Publishing Office, , 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Beyond convergence: world without order / / edited by Hilary Matfess and Michael Miklaucic
| Beyond convergence: world without order / / edited by Hilary Matfess and Michael Miklaucic |
| Pubbl/distr/stampa | Washington, D.C. : , : Center for Complex Operations, Institute for National Security Studies, National Defense University, , 2016 |
| Descrizione fisica | 1 online resource (xviii, 397 pages) : illustrations |
| Soggetto topico |
Transnational crime - Communication systems
Transborder data flow - Security measures Computer networks - Security measures Information warfare Cyberspace operations (Military science) Computer security Transnational crime - Social networks Sovereignty - Social networks Cyberterrorism - Prevention Cyber intelligence (Computer security) |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Beyond convergence |
| Record Nr. | UNINA-9910707976603321 |
| Washington, D.C. : , : Center for Complex Operations, Institute for National Security Studies, National Defense University, , 2016 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Building an International Cybersecurity Regime : Multistakeholder Diplomacy / / Ian Johnstone, Arun Sukumar, and Joel Trachtman, editors
| Building an International Cybersecurity Regime : Multistakeholder Diplomacy / / Ian Johnstone, Arun Sukumar, and Joel Trachtman, editors |
| Edizione | [First edition.] |
| Pubbl/distr/stampa | Northampton : , : Edward Elgar Publishing, , 2023 |
| Descrizione fisica | 1 online resource (282 pages) |
| Disciplina | 005.8026 |
| Collana | Elgar International Law and Technology Series |
| Soggetto topico |
Computer security - Law and legislation
Cyber intelligence (Computer security) Internet - Law and legislation |
| ISBN | 1-03-530154-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Front Matter -- Copyright -- Contents -- Contributors -- PART I Introduction -- 1. Building cybersecurity through multistakeholder diplomacy: Politics, processes, and prospects -- PART II Thematic issues -- 2. The geopolitics of multistakeholder cyber diplomacy: A comparative analysis -- 3. Multistakeholder characteristics of past and ongoing cybersecurity norms processes -- 4. Developing multistakeholder structures for cybersecurity norms: Learning from experience -- 5. Implementing cybersecurity norms: The design of international institutions -- PART III Country perspectives -- 6. U.S. multistakeholder engagement in cyber stability issues -- 7. Russia's participation in multistakeholder diplomacy for cybersecurity norms -- 8. Rethinking Chinese multistakeholder governance of cybersecurity -- 9. India's "passive" multistakeholder cyber diplomacy -- 10. Brazil and multistakeholder diplomacy for the Internet: Past achievements, current challenges and the road ahead -- 11. Taking stock of Estonia's multistakeholder cyber diplomacy -- PART IV Conclusion -- 12. The way ahead for multistakeholder cyber diplomacy -- Index. |
| Record Nr. | UNINA-9910746595003321 |
| Northampton : , : Edward Elgar Publishing, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
China and international law in cyberspace / / Kimberly Hsu, with Craig Murray
| China and international law in cyberspace / / Kimberly Hsu, with Craig Murray |
| Autore | Hsu Kimberly |
| Pubbl/distr/stampa | [Washington, D.C.] : , : U.S.-China Economic and Security Review Commission, , 2014 |
| Descrizione fisica | 1 online resource (10 pages) |
| Collana | U.S. China Economic and Security Review Commission staff report |
| Soggetto topico |
Cyberspace - Government policy - China
Internet - Political aspects - China Internet - Law and legislation - China Cyber intelligence (Computer security) - China Cyber intelligence (Computer security) Cyberspace - Government policy Internet - Political aspects |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910716923603321 |
Hsu Kimberly
|
||
| [Washington, D.C.] : , : U.S.-China Economic and Security Review Commission, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
COMPUSOFT : international journal of advanced computer technology
| COMPUSOFT : international journal of advanced computer technology |
| Pubbl/distr/stampa | [India] : , : COMPUSOFT, , 2012- |
| Descrizione fisica | 1 online resource |
| Soggetto topico |
Computer science
Computer networks Telecommunication Cyber intelligence (Computer security) |
| Soggetto genere / forma | Periodicals. |
| Formato | Materiale a stampa |
| Livello bibliografico | Periodico |
| Lingua di pubblicazione | eng |
| Altri titoli varianti |
International journal of advanced computer technology
IJACT |
| Record Nr. | UNISA-996336735403316 |
| [India] : , : COMPUSOFT, , 2012- | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
COMPUSOFT : international journal of advanced computer technology
| COMPUSOFT : international journal of advanced computer technology |
| Pubbl/distr/stampa | [India] : , : COMPUSOFT, , 2012- |
| Descrizione fisica | 1 online resource |
| Soggetto topico |
Computer science
Computer networks Telecommunication Cyber intelligence (Computer security) |
| Soggetto genere / forma | Periodicals. |
| Formato | Materiale a stampa |
| Livello bibliografico | Periodico |
| Lingua di pubblicazione | eng |
| Altri titoli varianti |
International journal of advanced computer technology
IJACT |
| Record Nr. | UNINA-9910894103303321 |
| [India] : , : COMPUSOFT, , 2012- | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cyber recon : my life in cyber espionage and ransomware negotiation / / Kurtis Minder
| Cyber recon : my life in cyber espionage and ransomware negotiation / / Kurtis Minder |
| Autore | Minder Kurtis |
| Pubbl/distr/stampa | Hoboken, New Jersey : , : John Wiley & Songs, Inc., , [2025] |
| Descrizione fisica | 1 online resource |
| Disciplina | 005.8 |
| Soggetto topico |
Computer crimes
Cyber intelligence (Computer security) Internet in espionage |
| ISBN |
1394334621
9781394334629 1394334648 9781394334643 1394334613 9781394334612 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9911020247903321 |
Minder Kurtis
|
||
| Hoboken, New Jersey : , : John Wiley & Songs, Inc., , [2025] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||