.. Annual International Conference on Privacy, Security and Trust |
Pubbl/distr/stampa | Piscataway, NJ : , : IEEE |
Disciplina | 004 |
Soggetto topico |
Information technology - Security measures
Internet - Access control Privacy, Right of Data protection Computers - Access control Electronic commerce - Security measures |
Soggetto genere / forma | Conference papers and proceedings. |
ISSN | 2643-4202 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Altri titoli varianti |
PST
Privacy, Security and Trust, PST, Annual Conference on |
Record Nr. | UNINA-9910626006403321 |
Piscataway, NJ : , : IEEE | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
.. Annual International Conference on Privacy, Security and Trust |
Pubbl/distr/stampa | Piscataway, NJ : , : IEEE |
Disciplina | 004 |
Soggetto topico |
Information technology - Security measures
Internet - Access control Privacy, Right of Data protection Computers - Access control Electronic commerce - Security measures |
Soggetto genere / forma | Conference papers and proceedings. |
ISSN | 2643-4202 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Altri titoli varianti |
PST
Privacy, Security and Trust, PST, Annual Conference on |
Record Nr. | UNISA-996581477403316 |
Piscataway, NJ : , : IEEE | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
10 don'ts on your digital devices [[e-book] ] : the non-techie's survival guide to cyber security and privacy / / Daniel G. Bachrach, Eric J. Rzeszut |
Autore | Bachrach Daniel G |
Pubbl/distr/stampa | [New York, NY] : , : Apress, , [2014] |
Descrizione fisica | 1 online resource (xxvi, 150 pages) : illustrations |
Disciplina |
004
005.82 |
Soggetto topico |
Data protection
Data encryption (Computer science) |
ISBN | 1-4842-0367-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Contents; Introduction; Chapter 1: Don't Get Phished; A Closer Look at "Phishing"; "Target"-ed Phishing; Other Forms; What Should You Do?; Additional Reading; Chapter 2: Don't Give Up Your Passwords; Where Did Passwords Come From?; Password Threats and New Solutions; Alternatives to the "Simple" Password: Biometrics and Two-Factor Authentication; Bigger Can Be Better. . .; Mix It Up; Protecting Passwords; What Should You Do?; Additional Reading; Chapter 3: Don't Get Lost in "The Cloud "; What Is "The Cloud"?; Cloud Controversy and Risks; Formalizing an Informal Relationship; Data Breaches
Not Just for Storage AnymoreReliability; Accessibility; What Should You Do?; Additional Reading; Chapter 4: Don't Look for a Free Lunch; Software-Consider the Source; Issues with Warez; Hidden Agenda; Lesser Threats; How to Protect Yourself; Additional Reading; Chapter 5: Don't Do Secure Things from Insecure Places; Background: Wireless Networking at Home, at Work, and on the Road; Home Sweet Home. . .; Back at the Office. . .; On the Road Again. . .; Encryption Standards; VPN; Workplace Security, on the Road; Extra Layers of Protection; Other Uses for VPNs; Additional Reading Chapter 6: Don't Let the Snoops InWho Are the "Snoops"?; Boundless Informant; PRISM; Tempora; MUSCULAR; FASCIA; Dishfire; Optic Nerve; So, Who Else Is Snooping?; For-Profit Corporations; Employers; Where Your Data Are…; Data on the Move; Taking an Active Role in Protecting Your Data; Data at Rest; Additional Reading; Chapter 7: Don't Be Careless with Your Phone; Mobility in the 21st Century; When It's the Employee's Device, but the Company's Resources-BYOD; When It's the Company's Device, but Used at the Employee's Discretion-COPE; Know Your Rights; Physically Securing Your Phone Start Me Up-but Not Without a PasswordWhen a Password Isn't Enough; Losing (and Finding!) the Key to Your Digital Life; Mobile Law; Insecure Background Wireless Networks; Don't Trust a Wireless Network Based on Its Name; Don't Trust Your Phone to Connect for You; Bluetooth Hacking; Malware Apps; Operating System Updates; Additional Reading; Chapter 8: Don't Use Dinosaurs; Software: It Has an Expiration Date; The "Good Old Days" of Software; New Software for a New Era; Don't Forget About Mobile Apps; Windows XP; Not Just Windows; Not Just Operating Systems; Not Just Desktops and Laptops What Can You Do?Additional Reading; Chapter 9: Don't Trust Anyone Over . . . Anything; What Is Social Engineering?; Keep Your Eye on the Ball; Hooking the Phish; Social Engineering via Social Networking; Knowledge Is Power; Big Companies, Big Problems; Ransomware; In-Person Tricks; Not Your Mother's Kind of Tailgating; How to Combat Social Engineering; Additional Reading; Chapter 10: Don't Forget the Physical; Physical Security: An Overview; Physical Security at Home; Letting Outsiders In; Removing Temptation; Don't Blanket the Neighborhood with Wi-Fi; Physical Security at Work Limit Your Paper (or Whiteboard) Trails |
Altri titoli varianti | Ten don'ts on your digital devices |
Record Nr. | UNINA-9910300464403321 |
Bachrach Daniel G
![]() |
||
[New York, NY] : , : Apress, , [2014] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
1986 IEEE Symposium on Security and Privacy : 7-9 April 1986 |
Pubbl/distr/stampa | New York : , : IEEE, , 2014 |
Descrizione fisica | 1 online resource (223 pages) |
Soggetto topico |
Computers - Access control
Data protection Privacy, Right of |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996212309703316 |
New York : , : IEEE, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
1987 IEEE Symposium on Security and Privacy : 27-29 April 1987 |
Pubbl/distr/stampa | New York : , : IEEE, , 2014 |
Descrizione fisica | 1 online resource (235 pages) |
Soggetto topico |
Computers - Access control
Data protection Privacy, Right of |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996212308603316 |
New York : , : IEEE, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
1994 Symposium On Research In Security and Privacy |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE Computer Society Press, 1994 |
Descrizione fisica | 1 online resource (256 pages) |
Disciplina | 005.8 |
Soggetto topico |
Data protection
Privacy, Right of |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996206154103316 |
[Place of publication not identified], : IEEE Computer Society Press, 1994 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
2005 Workshop of the 1st Intl Conference on Security and Privacy for Emerging Areas in Communication Networks : SECURECOMM : Athens, Greece, 5-9 September, 2005 |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE, 2005 |
Soggetto topico |
Wireless communication systems - Security measures
Computer networks - Security measures Computer crimes - Investigation Data protection Privacy, Right of Electrical & Computer Engineering Engineering & Applied Sciences Telecommunications |
ISBN | 1-5386-0091-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996207533203316 |
[Place of publication not identified], : IEEE, 2005 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
2005 Workshop of the 1st Intl Conference on Security and Privacy for Emerging Areas in Communication Networks : SECURECOMM : Athens, Greece, 5-9 September, 2005 |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE, 2005 |
Soggetto topico |
Wireless communication systems - Security measures
Computer networks - Security measures Computer crimes - Investigation Data protection Privacy, Right of Electrical & Computer Engineering Engineering & Applied Sciences Telecommunications |
ISBN | 1-5386-0091-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910145613903321 |
[Place of publication not identified], : IEEE, 2005 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing : (IIH-MSP 2006) : proceedings ; 18-20 December, 2006, Pasadena, California, USA |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE Computer Society, 2006 |
Disciplina | 005.8 |
Soggetto topico |
Computer security - Security measures
Computer networks Cryptography Digital watermarking Data protection Engineering & Applied Sciences Computer Science |
ISBN | 1-5090-9149-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996199008303316 |
[Place of publication not identified], : IEEE Computer Society, 2006 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing : (IIH-MSP 2006) : proceedings ; 18-20 December, 2006, Pasadena, California, USA |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE Computer Society, 2006 |
Disciplina | 005.8 |
Soggetto topico |
Computer security - Security measures
Computer networks Cryptography Digital watermarking Data protection Engineering & Applied Sciences Computer Science |
ISBN | 1-5090-9149-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910142716203321 |
[Place of publication not identified], : IEEE Computer Society, 2006 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|