top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Cloud computing [[electronic resource] ] : an overview of the technology and the issues facing American innovators : hearing before the Subcommittee on Intellectual Property, Competition, and the Internet of the Committee on the Judiciary, House of Representatives, One Hundred Twelfth Congress, second session, July 25, 2012
Cloud computing [[electronic resource] ] : an overview of the technology and the issues facing American innovators : hearing before the Subcommittee on Intellectual Property, Competition, and the Internet of the Committee on the Judiciary, House of Representatives, One Hundred Twelfth Congress, second session, July 25, 2012
Pubbl/distr/stampa Washington : , : U.S. G.P.O., , 2012
Descrizione fisica 1 online resource (iv, 152 pages) : illustrations
Soggetto topico Cloud computing
Cloud computing - Security measures - United States
Computer security - Standards
Electronic information resources - Access control
Web services - Security measures - United States
Computer networks - Security measures - United States
Data protection - United States
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Cloud computing
Record Nr. UNINA-9910702143403321
Washington : , : U.S. G.P.O., , 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Ensuring the integrity, accessibility, and stewardship of research data in the digital age [[electronic resource] /] / Committee on Ensuring the Utility and Integrity of Research Data in a Digital Age, Committee on Science, Engineering, and Public Policy
Ensuring the integrity, accessibility, and stewardship of research data in the digital age [[electronic resource] /] / Committee on Ensuring the Utility and Integrity of Research Data in a Digital Age, Committee on Science, Engineering, and Public Policy
Pubbl/distr/stampa Washington, DC, : National Academies Press, c2009
Descrizione fisica xvi, 162 p
Disciplina 001.40285/58
Soggetto topico Research - Technological innovations
Information technology - Scientific applications
Electronic information resources - Management - United States
Electronic information resources - Access control
Soggetto genere / forma Electronic books.
ISBN 1-282-43717-8
9786612437175
0-309-13685-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910458811403321
Washington, DC, : National Academies Press, c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Ensuring the integrity, accessibility, and stewardship of research data in the digital age [[electronic resource] /] / Committee on Ensuring the Utility and Integrity of Research Data in a Digital Age, Committee on Science, Engineering, and Public Policy
Ensuring the integrity, accessibility, and stewardship of research data in the digital age [[electronic resource] /] / Committee on Ensuring the Utility and Integrity of Research Data in a Digital Age, Committee on Science, Engineering, and Public Policy
Pubbl/distr/stampa Washington, DC, : National Academies Press, c2009
Descrizione fisica xvi, 162 p
Disciplina 001.40285/58
Soggetto topico Research - Technological innovations
Information technology - Scientific applications
Electronic information resources - Management - United States
Electronic information resources - Access control
ISBN 0-309-14782-4
1-282-43717-8
9786612437175
0-309-13685-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Research data in the digital age -- Ensuring the integrity of research data -- Ensuring access to research data -- Promoting the stewardship of research data -- Defining roles and responsibilities.
Record Nr. UNINA-9910792340203321
Washington, DC, : National Academies Press, c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Ensuring the integrity, accessibility, and stewardship of research data in the digital age [[electronic resource] /] / Committee on Ensuring the Utility and Integrity of Research Data in a Digital Age, Committee on Science, Engineering, and Public Policy
Ensuring the integrity, accessibility, and stewardship of research data in the digital age [[electronic resource] /] / Committee on Ensuring the Utility and Integrity of Research Data in a Digital Age, Committee on Science, Engineering, and Public Policy
Edizione [1st ed.]
Pubbl/distr/stampa Washington, DC, : National Academies Press, c2009
Descrizione fisica xvi, 162 p
Disciplina 001.40285/58
Soggetto topico Research - Technological innovations
Information technology - Scientific applications
Electronic information resources - Management - United States
Electronic information resources - Access control
ISBN 0-309-14782-4
1-282-43717-8
9786612437175
0-309-13685-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Research data in the digital age -- Ensuring the integrity of research data -- Ensuring access to research data -- Promoting the stewardship of research data -- Defining roles and responsibilities.
Record Nr. UNINA-9910816963603321
Washington, DC, : National Academies Press, c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Journal of open access to law
Journal of open access to law
Pubbl/distr/stampa Ithaca, NY : , : Legal Information Institute, Cornell Law School, , [2013]-
Disciplina 070.5
Soggetto topico Legal literature - Publishing
Open access publishing
Law
Law - Electronic information resources - Access control
Law - Electronic information resources
Electronic information resources - Access control
Soggetto genere / forma Periodicals.
Law reviews.
Soggetto non controllato Book Studies & Arts
Formato Materiale a stampa
Livello bibliografico Periodico
Lingua di pubblicazione eng
Altri titoli varianti JOAL
J. Open Access L.
Record Nr. UNINA-9910134009003321
Ithaca, NY : , : Legal Information Institute, Cornell Law School, , [2013]-
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Managing risk and information security : protect to enable / / Malcolm W Harkins
Managing risk and information security : protect to enable / / Malcolm W Harkins
Autore Harkins Malcolm
Edizione [Second edition.]
Pubbl/distr/stampa [Place of publication not identified] : , : Apress Open, , [2016]
Descrizione fisica 1 online resource (1 volume) : illustrations
Disciplina 005.8
Soggetto topico Computer security
Electronic information resources - Access control
ISBN 1-4842-1456-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Contents at a Glance -- Contents -- Foreword -- Praise for the second edition of Managing Risk and Information Security -- About the Author -- Acknowledgments -- Preface -- Chapter 1: Introduction -- Protect to Enable® -- Building Trust -- Keeping the Company Legal: The Regulatory Flood -- Privacy: Protecting Personal Information -- Personalization vs. Privacy -- Financial Regulations -- E-Discovery -- Expanding Scope of Regulation -- The Rapid Proliferation of Information, Devices, and Things -- The Changing Threat Landscape -- Stealthy Malware -- Nine Irrefutable Laws of Information Risk -- A New Approach to Managing Risk -- Chapter 2: The Misperception of Risk -- The Subjectivity of Risk Perception -- How Employees Misperceive Risk -- The Lure of the Shiny Bauble -- How Security Professionals Misperceive Risk -- Security and Privacy -- How Decision Makers Misperceive Risk -- How to Mitigate the Misperception of Risk -- Uncovering New Perspectives During Risk Assessments -- Communication Is Essential -- Building Credibility -- Chapter 3: Governance and Internal Partnerships: How to Sense, Interpret, and Act on Risk -- Information Risk Governance -- Finding the Right Governance Structure -- Building Internal Partnerships -- Legal -- Privacy -- Litigation -- Intellectual Property -- Contracts -- Financial Compliance -- Legal Specialists Within Business Groups -- Human Resources -- Setting Employee Expectations in Security Policies -- Employee Communications -- Investigations -- Finance -- Sarbanes-Oxley Compliance -- Working with Business Groups -- Internal Audit -- Corporate Risk Management -- Privacy -- Corporate Security -- Business Group Managers -- Conclusion -- Chapter 4: External Partnerships: The Power of Sharing Information -- The Value of External Partnerships -- External Partnerships: Types and Tiers -- 1:1 Partnerships.
Communities -- Community Characteristics -- Community Goals -- Sharing Information about Threats and Vulnerabilities -- Sharing Best Practices and Benchmarking -- Influencing Regulations and Standards -- Corporate Citizenship -- Conclusion -- Chapter 5: People Are the Perimeter -- The Shifting Perimeter -- Compliance or Commitment? -- Examining the Risks -- Adjusting Behavior -- A Model for Improving Security Awareness -- Broadening the Awareness Model -- The Security Benefits of Personal Use -- Roundabouts and Stop Signs -- The Technology Professional -- Insider Threats -- Deter -- Detect -- Discipline -- Finding the Balance -- Chapter 6: Emerging Threats and Vulnerabilities: Reality and Rhetoric -- Structured Methods for Identifying Threat Trends -- The Product Life Cycle Model -- Understanding Threat Agents -- Playing War Games -- Trends That Span the Threat Landscape -- Trust Is an Attack Surface -- Barriers to Entry Are Crumbling -- The Rise of Edge Case Insecurity -- The Enemy Knows the System -- Key Threat Activity Areas -- The Industry of Malware -- The Web Expands to the Internet of Things -- Smartphones -- Web Applications -- Conclusion -- Chapter 7: A New Security Architecture to Improve Business Agility -- The 9 Box of Controls, Business Trends, and Architecture Requirements -- 9 Box of Controls -- IT Consumerization -- New Business Needs -- Cloud Computing -- Changing Threat Landscape -- Privacy and Regulatory Requirements -- New Architecture -- Trust Calculation -- Source Score -- Destination Score -- Available Controls -- Calculating Trust -- Security Zones -- Untrusted Zones -- Selective Zones -- Trusted Zones -- Balanced Controls -- Users, Data, and the Internet of Things: The New Perimeters -- Data Perimeter -- User Perimeter -- Internet of Things -- Conclusion -- Chapter 8: Looking to the Future: Emerging Security Capabilities.
Internet of Things -- Consistent User Experience Across Devices -- Cloud Computing -- Big Data Analytics -- Artificial Intelligence -- Business Benefits and Risks -- New Security Capabilities -- Baseline Security -- Protected Environments -- Encryption -- Hardware Acceleration -- Enhanced Recovery -- AI-Based Security and Automation -- Context-Aware Security -- Cloud Security and Context Awareness -- Security Analytics and Data Protection -- Conclusion -- Chapter 9: Corporate Social Responsibility: The Ethics of Managing Information Risk -- The Expanding Scope of Corporate Social Responsibility -- The Evolution of Technology and Its Impact -- Maintaining Society's Trust -- The Ethics of Managing Information Risk -- Conclusion -- Chapter 10: The 21st Century CISO -- Chief Trust Officer -- The Z-Shaped Individual -- Foundational Skills -- Becoming a Storyteller -- Fear Is Junk Food -- Accentuating the Positive -- Demonstrating the Reality of Risk -- The CISO's Sixth Sense -- Taking Action at the Speed of Trust -- The CISO as a Leader -- Learning from Other Business Leaders -- Voicing Our Values -- Discussing Information Risk at Board Level -- Conclusion -- Chapter 11: Performance Coaching -- How to Use the Tables -- Independence and Initiative -- Efficiency and Effectiveness -- Commitment -- Professionalism -- Discipline -- Teamwork -- Problem-Solving -- Communication -- Listening -- Style -- Clarity -- Goal-Setting -- Conclusion -- Appendix A -- Index.
Record Nr. UNINA-9910280812803321
Harkins Malcolm  
[Place of publication not identified] : , : Apress Open, , [2016]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Managing risk in information systems / / Darril Gibson
Managing risk in information systems / / Darril Gibson
Autore Gibson Darril
Edizione [Second edition.]
Pubbl/distr/stampa Burlington, Massachusetts : , : Jones & Bartlett Learning, , 2015
Descrizione fisica 1 online resource (548 pages) : illustrations
Disciplina 005.8
Collana Jones & Bartlett Learning Information Systems Security & Assurance Series
Soggetto topico Computer security
Electronic information resources - Access control
ISBN 1-284-05596-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Pt. 1. Risk management business challenges -- Risk management fundamentals -- Managing risk : threats, vulnerabilities, and exploits -- Maintaining compliance -- Developing a risk management plan -- pt. 2. Mitigating risk -- Defining risk assessment approaches -- Performing a risk assessment -- Identifying assets and activities to be protected -- Identifying and analyzing threats, vulnerabilities, and exploits -- Identifying and analyzing risk mitigation security controls -- Planning risk mitigation throughout your organization -- Turning your risk assessment into a risk mitigation plan -- pt 3. Risk mitigation plans -- Mitigating risk with a business impact analysis -- Mitigating risk with a business continuity plan -- Mitigating risk with a disaster recovery plan -- Mitigating risk with a computer incident response team plan.
Record Nr. UNINA-9910165026703321
Gibson Darril  
Burlington, Massachusetts : , : Jones & Bartlett Learning, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Penetration tester's open source toolkit [[electronic resource] /] / Johnny Long ... [et al.] ; foreword by Max Moser
Penetration tester's open source toolkit [[electronic resource] /] / Johnny Long ... [et al.] ; foreword by Max Moser
Pubbl/distr/stampa Rockland, MA, : Syngress Pub., 2006
Descrizione fisica 1 online resource (736 p.)
Disciplina 005.8
Altri autori (Persone) LongJohnny
Soggetto topico Computer hackers
Computer networks - Security measures
Computer security
Electronic information resources - Access control
Soggetto genere / forma Electronic books.
ISBN 1-281-03556-4
0-08-048952-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910450482603321
Rockland, MA, : Syngress Pub., 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Penetration tester's open source toolkit [[electronic resource] /] / Johnny Long ... [et al.] ; foreword by Max Moser
Penetration tester's open source toolkit [[electronic resource] /] / Johnny Long ... [et al.] ; foreword by Max Moser
Pubbl/distr/stampa Rockland, MA, : Syngress Pub., 2006
Descrizione fisica 1 online resource (736 p.)
Disciplina 005.8
Altri autori (Persone) LongJohnny
Soggetto topico Computer hackers
Computer networks - Security measures
Computer security
Electronic information resources - Access control
ISBN 1-281-03556-4
0-08-048952-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910783753503321
Rockland, MA, : Syngress Pub., 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Penetration tester's open source toolkit / / Johnny Long ... [et al.] ; foreword by Max Moser
Penetration tester's open source toolkit / / Johnny Long ... [et al.] ; foreword by Max Moser
Edizione [1st ed.]
Pubbl/distr/stampa Rockland, MA, : Syngress Pub., 2006
Descrizione fisica 1 online resource (736 p.)
Disciplina 005.8
Altri autori (Persone) LongJohnny
Soggetto topico Hackers
Computer networks - Security measures
Computer security
Electronic information resources - Access control
ISBN 1-281-03556-4
0-08-048952-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910817584603321
Rockland, MA, : Syngress Pub., 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui