... IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)
| ... IEEE International Conference on Identity, Security and Behavior Analysis (ISBA) |
| Pubbl/distr/stampa | [Piscataway, NJ] : , : [IEEE] |
| Disciplina | 006.248 |
| Soggetto topico |
Biometric identification
Data encryption (Computer science) Pattern recognition systems |
| Soggetto genere / forma | Conference papers and proceedings. |
| ISSN | 2640-0790 |
| Formato | Materiale a stampa |
| Livello bibliografico | Periodico |
| Lingua di pubblicazione | eng |
| Altri titoli varianti |
Identity, Security and Behavior Analysis (ISBA), ... IEEE International Conference on
ISBA |
| Record Nr. | UNINA-9910626129303321 |
| [Piscataway, NJ] : , : [IEEE] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
... IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)
| ... IEEE International Conference on Identity, Security and Behavior Analysis (ISBA) |
| Pubbl/distr/stampa | [Piscataway, NJ] : , : [IEEE] |
| Disciplina | 006.248 |
| Soggetto topico |
Biometric identification
Data encryption (Computer science) Pattern recognition systems |
| Soggetto genere / forma | Conference papers and proceedings. |
| ISSN | 2640-0790 |
| Formato | Materiale a stampa |
| Livello bibliografico | Periodico |
| Lingua di pubblicazione | eng |
| Altri titoli varianti |
Identity, Security and Behavior Analysis (ISBA), ... IEEE International Conference on
ISBA |
| Record Nr. | UNISA-996581543103316 |
| [Piscataway, NJ] : , : [IEEE] | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacy / / Daniel G. Bachrach, Eric J. Rzeszut
| 10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacy / / Daniel G. Bachrach, Eric J. Rzeszut |
| Autore | Bachrach Daniel G |
| Pubbl/distr/stampa | [New York, NY] : , : Apress, , [2014] |
| Descrizione fisica | 1 online resource (xxvi, 150 pages) : illustrations |
| Disciplina |
004
005.82 |
| Soggetto topico |
Data protection
Data encryption (Computer science) |
| ISBN |
9781484203675
1484203674 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Contents; Introduction; Chapter 1: Don't Get Phished; A Closer Look at "Phishing"; "Target"-ed Phishing; Other Forms; What Should You Do?; Additional Reading; Chapter 2: Don't Give Up Your Passwords; Where Did Passwords Come From?; Password Threats and New Solutions; Alternatives to the "Simple" Password: Biometrics and Two-Factor Authentication; Bigger Can Be Better. . .; Mix It Up; Protecting Passwords; What Should You Do?; Additional Reading; Chapter 3: Don't Get Lost in "The Cloud "; What Is "The Cloud"?; Cloud Controversy and Risks; Formalizing an Informal Relationship; Data Breaches
Not Just for Storage AnymoreReliability; Accessibility; What Should You Do?; Additional Reading; Chapter 4: Don't Look for a Free Lunch; Software-Consider the Source; Issues with Warez; Hidden Agenda; Lesser Threats; How to Protect Yourself; Additional Reading; Chapter 5: Don't Do Secure Things from Insecure Places; Background: Wireless Networking at Home, at Work, and on the Road; Home Sweet Home. . .; Back at the Office. . .; On the Road Again. . .; Encryption Standards; VPN; Workplace Security, on the Road; Extra Layers of Protection; Other Uses for VPNs; Additional Reading Chapter 6: Don't Let the Snoops InWho Are the "Snoops"?; Boundless Informant; PRISM; Tempora; MUSCULAR; FASCIA; Dishfire; Optic Nerve; So, Who Else Is Snooping?; For-Profit Corporations; Employers; Where Your Data Are…; Data on the Move; Taking an Active Role in Protecting Your Data; Data at Rest; Additional Reading; Chapter 7: Don't Be Careless with Your Phone; Mobility in the 21st Century; When It's the Employee's Device, but the Company's Resources-BYOD; When It's the Company's Device, but Used at the Employee's Discretion-COPE; Know Your Rights; Physically Securing Your Phone Start Me Up-but Not Without a PasswordWhen a Password Isn't Enough; Losing (and Finding!) the Key to Your Digital Life; Mobile Law; Insecure Background Wireless Networks; Don't Trust a Wireless Network Based on Its Name; Don't Trust Your Phone to Connect for You; Bluetooth Hacking; Malware Apps; Operating System Updates; Additional Reading; Chapter 8: Don't Use Dinosaurs; Software: It Has an Expiration Date; The "Good Old Days" of Software; New Software for a New Era; Don't Forget About Mobile Apps; Windows XP; Not Just Windows; Not Just Operating Systems; Not Just Desktops and Laptops What Can You Do?Additional Reading; Chapter 9: Don't Trust Anyone Over . . . Anything; What Is Social Engineering?; Keep Your Eye on the Ball; Hooking the Phish; Social Engineering via Social Networking; Knowledge Is Power; Big Companies, Big Problems; Ransomware; In-Person Tricks; Not Your Mother's Kind of Tailgating; How to Combat Social Engineering; Additional Reading; Chapter 10: Don't Forget the Physical; Physical Security: An Overview; Physical Security at Home; Letting Outsiders In; Removing Temptation; Don't Blanket the Neighborhood with Wi-Fi; Physical Security at Work Limit Your Paper (or Whiteboard) Trails |
| Altri titoli varianti | Ten don'ts on your digital devices |
| Record Nr. | UNINA-9910300464403321 |
Bachrach Daniel G
|
||
| [New York, NY] : , : Apress, , [2014] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
1980 IEEE Symposium on Security and Privacy : 14-16 April 1980
| 1980 IEEE Symposium on Security and Privacy : 14-16 April 1980 |
| Pubbl/distr/stampa | New York : , : IEEE, , 2014 |
| Descrizione fisica | 1 online resource (145 pages) |
| Soggetto topico |
Computer security
Computers - Access control Data encryption (Computer science) |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996212313103316 |
| New York : , : IEEE, , 2014 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
1981 IEEE Symposium on Security and Privacy : 27-29 April 1981
| 1981 IEEE Symposium on Security and Privacy : 27-29 April 1981 |
| Pubbl/distr/stampa | New York : , : IEEE, , 2014 |
| Descrizione fisica | 1 online resource (162 pages) |
| Soggetto topico |
Computer security
Computers - Access control Data encryption (Computer science) |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996212312703316 |
| New York : , : IEEE, , 2014 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
1982 IEEE Symposium on Security and Privacy : 26-28 April 1982
| 1982 IEEE Symposium on Security and Privacy : 26-28 April 1982 |
| Pubbl/distr/stampa | New York : , : IEEE, , 2014 |
| Descrizione fisica | 1 online resource (156 pages) |
| Soggetto topico |
Computer security
Computers - Access control Data encryption (Computer science) |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996212312303316 |
| New York : , : IEEE, , 2014 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
1983 IEEE Symposium on Security and Privacy : 25-27 April 1983
| 1983 IEEE Symposium on Security and Privacy : 25-27 April 1983 |
| Pubbl/distr/stampa | New York : , : IEEE, , 2014 |
| Descrizione fisica | 1 online resource (161 pages) |
| Soggetto topico |
Computer security
Computers - Access control Data encryption (Computer science) |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996212311803316 |
| New York : , : IEEE, , 2014 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
1984 IEEE Symposium on Security and Privacy : April 29, 1984-May 2, 1984
| 1984 IEEE Symposium on Security and Privacy : April 29, 1984-May 2, 1984 |
| Pubbl/distr/stampa | New York : , : IEEE, , 2014 |
| Descrizione fisica | 1 online resource (204 pages) |
| Soggetto topico |
Computer security
Computers - Access control Data encryption (Computer science) |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996212310603316 |
| New York : , : IEEE, , 2014 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
1985 IEEE Symposium on Security and Privacy : 22-24 April 1985
| 1985 IEEE Symposium on Security and Privacy : 22-24 April 1985 |
| Pubbl/distr/stampa | New York : , : IEEE, , 2014 |
| Descrizione fisica | 1 online resource (224 pages) |
| Soggetto topico |
Computer security
Computers - Access control Data encryption (Computer science) |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996212310103316 |
| New York : , : IEEE, , 2014 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
2006 2nd International Conference on Distributed Frameworks for Multimedia Applications
| 2006 2nd International Conference on Distributed Frameworks for Multimedia Applications |
| Pubbl/distr/stampa | [Place of publication not identified], : I E E E, 2006 |
| Descrizione fisica | 1 online resource (various pagings) : illustrations (some color) |
| Disciplina | 004.36 |
| Soggetto topico |
Electronic data processing - Distributed processing
Data encryption (Computer science) |
| ISBN | 1-5090-9477-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996216893503316 |
| [Place of publication not identified], : I E E E, 2006 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||