Cloud computing [[electronic resource] ] : an overview of the technology and the issues facing American innovators : hearing before the Subcommittee on Intellectual Property, Competition, and the Internet of the Committee on the Judiciary, House of Representatives, One Hundred Twelfth Congress, second session, July 25, 2012 |
Pubbl/distr/stampa | Washington : , : U.S. G.P.O., , 2012 |
Descrizione fisica | 1 online resource (iv, 152 pages) : illustrations |
Soggetto topico |
Cloud computing
Cloud computing - Security measures - United States Computer security - Standards Electronic information resources - Access control Web services - Security measures - United States Computer networks - Security measures - United States Data protection - United States |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Cloud computing |
Record Nr. | UNINA-9910702143403321 |
Washington : , : U.S. G.P.O., , 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Ensuring the integrity, accessibility, and stewardship of research data in the digital age [[electronic resource] /] / Committee on Ensuring the Utility and Integrity of Research Data in a Digital Age, Committee on Science, Engineering, and Public Policy |
Pubbl/distr/stampa | Washington, DC, : National Academies Press, c2009 |
Descrizione fisica | xvi, 162 p |
Disciplina | 001.40285/58 |
Soggetto topico |
Research - Technological innovations
Information technology - Scientific applications Electronic information resources - Management - United States Electronic information resources - Access control |
Soggetto genere / forma | Electronic books. |
ISBN |
1-282-43717-8
9786612437175 0-309-13685-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910458811403321 |
Washington, DC, : National Academies Press, c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Ensuring the integrity, accessibility, and stewardship of research data in the digital age [[electronic resource] /] / Committee on Ensuring the Utility and Integrity of Research Data in a Digital Age, Committee on Science, Engineering, and Public Policy |
Pubbl/distr/stampa | Washington, DC, : National Academies Press, c2009 |
Descrizione fisica | xvi, 162 p |
Disciplina | 001.40285/58 |
Soggetto topico |
Research - Technological innovations
Information technology - Scientific applications Electronic information resources - Management - United States Electronic information resources - Access control |
ISBN |
0-309-14782-4
1-282-43717-8 9786612437175 0-309-13685-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Research data in the digital age -- Ensuring the integrity of research data -- Ensuring access to research data -- Promoting the stewardship of research data -- Defining roles and responsibilities. |
Record Nr. | UNINA-9910792340203321 |
Washington, DC, : National Academies Press, c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Ensuring the integrity, accessibility, and stewardship of research data in the digital age / / Committee on Ensuring the Utility and Integrity of Research Data in a Digital Age, Committee on Science, Engineering, and Public Policy |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Washington, DC, : National Academies Press, c2009 |
Descrizione fisica | xvi, 162 p |
Disciplina | 001.40285/58 |
Soggetto topico |
Research - Technological innovations
Information technology - Scientific applications Electronic information resources - Management - United States Electronic information resources - Access control |
ISBN |
0-309-14782-4
1-282-43717-8 9786612437175 0-309-13685-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Research data in the digital age -- Ensuring the integrity of research data -- Ensuring access to research data -- Promoting the stewardship of research data -- Defining roles and responsibilities. |
Record Nr. | UNINA-9910816963603321 |
Washington, DC, : National Academies Press, c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Journal of open access to law |
Pubbl/distr/stampa | Ithaca, NY : , : Legal Information Institute, Cornell Law School, , [2013]- |
Disciplina | 070.5 |
Soggetto topico |
Legal literature - Publishing
Open access publishing Law Law - Electronic information resources - Access control Law - Electronic information resources Electronic information resources - Access control |
Soggetto genere / forma |
Periodicals.
Law reviews. |
Soggetto non controllato | Book Studies & Arts |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Altri titoli varianti |
JOAL
J. Open Access L. |
Record Nr. | UNINA-9910134009003321 |
Ithaca, NY : , : Legal Information Institute, Cornell Law School, , [2013]- | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Managing risk and information security : protect to enable / / Malcolm W Harkins |
Autore | Harkins Malcolm |
Edizione | [Second edition.] |
Pubbl/distr/stampa | [Place of publication not identified] : , : Apress Open, , [2016] |
Descrizione fisica | 1 online resource (1 volume) : illustrations |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Electronic information resources - Access control |
ISBN | 1-4842-1456-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Contents at a Glance -- Contents -- Foreword -- Praise for the second edition of Managing Risk and Information Security -- About the Author -- Acknowledgments -- Preface -- Chapter 1: Introduction -- Protect to Enable® -- Building Trust -- Keeping the Company Legal: The Regulatory Flood -- Privacy: Protecting Personal Information -- Personalization vs. Privacy -- Financial Regulations -- E-Discovery -- Expanding Scope of Regulation -- The Rapid Proliferation of Information, Devices, and Things -- The Changing Threat Landscape -- Stealthy Malware -- Nine Irrefutable Laws of Information Risk -- A New Approach to Managing Risk -- Chapter 2: The Misperception of Risk -- The Subjectivity of Risk Perception -- How Employees Misperceive Risk -- The Lure of the Shiny Bauble -- How Security Professionals Misperceive Risk -- Security and Privacy -- How Decision Makers Misperceive Risk -- How to Mitigate the Misperception of Risk -- Uncovering New Perspectives During Risk Assessments -- Communication Is Essential -- Building Credibility -- Chapter 3: Governance and Internal Partnerships: How to Sense, Interpret, and Act on Risk -- Information Risk Governance -- Finding the Right Governance Structure -- Building Internal Partnerships -- Legal -- Privacy -- Litigation -- Intellectual Property -- Contracts -- Financial Compliance -- Legal Specialists Within Business Groups -- Human Resources -- Setting Employee Expectations in Security Policies -- Employee Communications -- Investigations -- Finance -- Sarbanes-Oxley Compliance -- Working with Business Groups -- Internal Audit -- Corporate Risk Management -- Privacy -- Corporate Security -- Business Group Managers -- Conclusion -- Chapter 4: External Partnerships: The Power of Sharing Information -- The Value of External Partnerships -- External Partnerships: Types and Tiers -- 1:1 Partnerships.
Communities -- Community Characteristics -- Community Goals -- Sharing Information about Threats and Vulnerabilities -- Sharing Best Practices and Benchmarking -- Influencing Regulations and Standards -- Corporate Citizenship -- Conclusion -- Chapter 5: People Are the Perimeter -- The Shifting Perimeter -- Compliance or Commitment? -- Examining the Risks -- Adjusting Behavior -- A Model for Improving Security Awareness -- Broadening the Awareness Model -- The Security Benefits of Personal Use -- Roundabouts and Stop Signs -- The Technology Professional -- Insider Threats -- Deter -- Detect -- Discipline -- Finding the Balance -- Chapter 6: Emerging Threats and Vulnerabilities: Reality and Rhetoric -- Structured Methods for Identifying Threat Trends -- The Product Life Cycle Model -- Understanding Threat Agents -- Playing War Games -- Trends That Span the Threat Landscape -- Trust Is an Attack Surface -- Barriers to Entry Are Crumbling -- The Rise of Edge Case Insecurity -- The Enemy Knows the System -- Key Threat Activity Areas -- The Industry of Malware -- The Web Expands to the Internet of Things -- Smartphones -- Web Applications -- Conclusion -- Chapter 7: A New Security Architecture to Improve Business Agility -- The 9 Box of Controls, Business Trends, and Architecture Requirements -- 9 Box of Controls -- IT Consumerization -- New Business Needs -- Cloud Computing -- Changing Threat Landscape -- Privacy and Regulatory Requirements -- New Architecture -- Trust Calculation -- Source Score -- Destination Score -- Available Controls -- Calculating Trust -- Security Zones -- Untrusted Zones -- Selective Zones -- Trusted Zones -- Balanced Controls -- Users, Data, and the Internet of Things: The New Perimeters -- Data Perimeter -- User Perimeter -- Internet of Things -- Conclusion -- Chapter 8: Looking to the Future: Emerging Security Capabilities. Internet of Things -- Consistent User Experience Across Devices -- Cloud Computing -- Big Data Analytics -- Artificial Intelligence -- Business Benefits and Risks -- New Security Capabilities -- Baseline Security -- Protected Environments -- Encryption -- Hardware Acceleration -- Enhanced Recovery -- AI-Based Security and Automation -- Context-Aware Security -- Cloud Security and Context Awareness -- Security Analytics and Data Protection -- Conclusion -- Chapter 9: Corporate Social Responsibility: The Ethics of Managing Information Risk -- The Expanding Scope of Corporate Social Responsibility -- The Evolution of Technology and Its Impact -- Maintaining Society's Trust -- The Ethics of Managing Information Risk -- Conclusion -- Chapter 10: The 21st Century CISO -- Chief Trust Officer -- The Z-Shaped Individual -- Foundational Skills -- Becoming a Storyteller -- Fear Is Junk Food -- Accentuating the Positive -- Demonstrating the Reality of Risk -- The CISO's Sixth Sense -- Taking Action at the Speed of Trust -- The CISO as a Leader -- Learning from Other Business Leaders -- Voicing Our Values -- Discussing Information Risk at Board Level -- Conclusion -- Chapter 11: Performance Coaching -- How to Use the Tables -- Independence and Initiative -- Efficiency and Effectiveness -- Commitment -- Professionalism -- Discipline -- Teamwork -- Problem-Solving -- Communication -- Listening -- Style -- Clarity -- Goal-Setting -- Conclusion -- Appendix A -- Index. |
Record Nr. | UNINA-9910280812803321 |
Harkins Malcolm | ||
[Place of publication not identified] : , : Apress Open, , [2016] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Managing risk in information systems / / Darril Gibson |
Autore | Gibson Darril |
Edizione | [Second edition.] |
Pubbl/distr/stampa | Burlington, Massachusetts : , : Jones & Bartlett Learning, , 2015 |
Descrizione fisica | 1 online resource (548 pages) : illustrations |
Disciplina | 005.8 |
Collana | Jones & Bartlett Learning Information Systems Security & Assurance Series |
Soggetto topico |
Computer security
Electronic information resources - Access control |
ISBN | 1-284-05596-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Pt. 1. Risk management business challenges -- Risk management fundamentals -- Managing risk : threats, vulnerabilities, and exploits -- Maintaining compliance -- Developing a risk management plan -- pt. 2. Mitigating risk -- Defining risk assessment approaches -- Performing a risk assessment -- Identifying assets and activities to be protected -- Identifying and analyzing threats, vulnerabilities, and exploits -- Identifying and analyzing risk mitigation security controls -- Planning risk mitigation throughout your organization -- Turning your risk assessment into a risk mitigation plan -- pt 3. Risk mitigation plans -- Mitigating risk with a business impact analysis -- Mitigating risk with a business continuity plan -- Mitigating risk with a disaster recovery plan -- Mitigating risk with a computer incident response team plan. |
Record Nr. | UNINA-9910165026703321 |
Gibson Darril | ||
Burlington, Massachusetts : , : Jones & Bartlett Learning, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Penetration tester's open source toolkit [[electronic resource] /] / Johnny Long ... [et al.] ; foreword by Max Moser |
Pubbl/distr/stampa | Rockland, MA, : Syngress Pub., 2006 |
Descrizione fisica | 1 online resource (736 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | LongJohnny |
Soggetto topico |
Computer hackers
Computer networks - Security measures Computer security Electronic information resources - Access control |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-03556-4
0-08-048952-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910450482603321 |
Rockland, MA, : Syngress Pub., 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Penetration tester's open source toolkit [[electronic resource] /] / Johnny Long ... [et al.] ; foreword by Max Moser |
Pubbl/distr/stampa | Rockland, MA, : Syngress Pub., 2006 |
Descrizione fisica | 1 online resource (736 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | LongJohnny |
Soggetto topico |
Computer hackers
Computer networks - Security measures Computer security Electronic information resources - Access control |
ISBN |
1-281-03556-4
0-08-048952-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910783753503321 |
Rockland, MA, : Syngress Pub., 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Penetration tester's open source toolkit / / Johnny Long ... [et al.] ; foreword by Max Moser |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Rockland, MA, : Syngress Pub., 2006 |
Descrizione fisica | 1 online resource (736 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | LongJohnny |
Soggetto topico |
Computer hackers
Computer networks - Security measures Computer security Electronic information resources - Access control |
ISBN |
1-281-03556-4
0-08-048952-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Pentester's open source toolkit |
Record Nr. | UNINA-9910817584603321 |
Rockland, MA, : Syngress Pub., 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|