top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies / / Ira Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor
Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies / / Ira Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor
Autore Winkler Ira
Edizione [1st edition]
Pubbl/distr/stampa Cambridge, MA : , : Syngress, , [2017]
Descrizione fisica 1 online resource (xvii, 241 pages)
Disciplina 005.8
Collana Gale eBooks
Soggetto topico Computer networks - Security measures
Computer security
Hacking
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto What is advanced persistent security? -- Cyberwarfare concepts -- What is proaction? -- Risk management -- How to hack computers -- Threat -- Adversary infrastructure -- Governance -- Vulnerabilities to address -- Countermeasures -- Security culture -- What is threat intelligence? -- What is detection? -- Detection deficit disorder -- The human intrusion detection system -- Kill chain analysis -- Setting reaction strategy -- Incident response and investigations -- Know yourself -- Know your adversaries -- Define your strategy -- Determining the appropriate countermeasures -- Advanced persistent security.
Record Nr. UNINA-9910583064103321
Winkler Ira  
Cambridge, MA : , : Syngress, , [2017]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber-securing the vote : ensuring the integrity of the U.S. election system : hearing before the Committee on Oversight and Government Reform, House of Representatives, One Hundred Fifteenth Congress, second session, July 24, 2018
Cyber-securing the vote : ensuring the integrity of the U.S. election system : hearing before the Committee on Oversight and Government Reform, House of Representatives, One Hundred Fifteenth Congress, second session, July 24, 2018
Pubbl/distr/stampa Washington : , : U.S. Government Publishing Office, , 2018
Descrizione fisica 1 online resource (iii, 137 pages) : illustrations
Soggetto topico Voting - Computer networks - Security measures - United States
Hacking - United States - Prevention
Cyberterrorism - United States - Prevention
Intergovernmental cooperation - United States
Hacking - Russia (Federation)
Cyberterrorism - Russia (Federation)
Information warfare - Russia (Federation)
Presidents - United States - Election - 2016
Governmental investigations - United States
Customer services
Cyberterrorism
Cyberterrorism - Prevention
Governmental investigations
Hacking
Information warfare
Intergovernmental cooperation
Presidents - Election
Soggetto genere / forma Legislative hearings.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Cyber-securing the vote
Record Nr. UNINA-9910711791103321
Washington : , : U.S. Government Publishing Office, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Essential skills for hackers / / Kevin Cardwell ; contributing editor, Henry Dalziel
Essential skills for hackers / / Kevin Cardwell ; contributing editor, Henry Dalziel
Autore Cardwell Kevin
Pubbl/distr/stampa Waltham, Massachusetts : , : Syngress, , 2016
Descrizione fisica 1 online resource (43 p.)
Disciplina 005.8
Soggetto topico Hacking
Computer security
Computer networks - Access control
Computer networks - Security measures
ISBN 0-12-804755-0
0-12-805111-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Title page; Table of Contents; Copyright; About the Authors; Introduction; Chapter 1. Network Protocols; Abstract; Chapter 2. Packet Headers; Abstract; Chapter 3. Analyzed Traffic; Abstract; Conclusion
Record Nr. UNINA-9910797983703321
Cardwell Kevin  
Waltham, Massachusetts : , : Syngress, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Essential skills for hackers / / Kevin Cardwell ; contributing editor, Henry Dalziel
Essential skills for hackers / / Kevin Cardwell ; contributing editor, Henry Dalziel
Autore Cardwell Kevin
Pubbl/distr/stampa Waltham, Massachusetts : , : Syngress, , 2016
Descrizione fisica 1 online resource (43 p.)
Disciplina 005.8
Soggetto topico Hacking
Computer security
Computer networks - Access control
Computer networks - Security measures
ISBN 0-12-804755-0
0-12-805111-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Title page; Table of Contents; Copyright; About the Authors; Introduction; Chapter 1. Network Protocols; Abstract; Chapter 2. Packet Headers; Abstract; Chapter 3. Analyzed Traffic; Abstract; Conclusion
Record Nr. UNINA-9910809573303321
Cardwell Kevin  
Waltham, Massachusetts : , : Syngress, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Hackathons / / Kerry Hinton
Hackathons / / Kerry Hinton
Autore Hinton Kerry
Edizione [First edition.]
Pubbl/distr/stampa New York : , : Rosen Central, , 2017
Descrizione fisica 1 online resource (48 pages) : color illustrations
Disciplina 005
Collana Digital and information literacy
Soggetto topico Computer programming
Hacking
Interdisciplinary research
Contests
ISBN 1-5081-7325-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto From hacking to hackathons -- Basic hackathon purpose & structure -- Types of hackathons -- Hackathons & you: get involved -- The future of hackathons.
Record Nr. UNINA-9910158644503321
Hinton Kerry  
New York : , : Rosen Central, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Hacking multifactor authentication / / Roger A. Grimes
Hacking multifactor authentication / / Roger A. Grimes
Autore Grimes Roger A.
Pubbl/distr/stampa Indianapolis, Indiana : , : Wiley, , [2021]
Descrizione fisica 1 online resource
Disciplina 005.8
Soggetto topico Hacking
Hackers
Cryptography
Computers - Access control - Testing
Computer networks - Security measures
Computer security
ISBN 1-119-65080-1
1-119-67235-X
1-119-67234-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Who This Book Is For -- What Is Covered in This Book? -- MFA Is Good -- How to Contact Wiley or the Author -- Part I Introduction -- Chapter 1 Logon Problems -- It's Bad Out There -- The Problem with Passwords -- Password Basics -- Identity -- The Password -- Password Registration -- Password Complexity -- Password Storage -- Password Authentication -- Password Policies -- Passwords Will Be with Us for a While -- Password Problems and Attacks -- Password Guessing
Password Hash Cracking -- Password Stealing -- Passwords in Plain View -- Just Ask for It -- Password Hacking Defenses -- MFA Riding to the Rescue? -- Summary -- Chapter 2 Authentication Basics -- Authentication Life Cycle -- Identity -- Authentication -- Authorization -- Accounting/Auditing -- Standards -- Laws of Identity -- Authentication Problems in the Real World -- Summary -- Chapter 3 Types of Authentication -- Personal Recognition -- Knowledge-Based Authentication -- Passwords -- PINS -- Solving Puzzles -- Password Managers -- Single Sign-Ons and Proxies -- Cryptography -- Encryption
Public Key Infrastructure -- Hashing -- Hardware Tokens -- One-Time Password Devices -- Physical Connection Devices -- Wireless -- Phone-Based -- Voice Authentication -- Phone Apps -- SMS -- Biometrics -- FIDO -- Federated Identities and APIs -- OAuth -- APIs -- Contextual/Adaptive -- Less Popular Methods -- Voiceover Radio -- Paper-Based -- Summary -- Chapter 4 Usability vs. Security -- What Does Usability Mean? -- We Don't Really Want the Best Security -- Security Isn't Usually Binary -- Too Secure -- Seven-Factor MFA -- Moving ATM Keypad Numbers -- Not as Worried as You Think About Hacking
Unhackable Fallacy -- Unbreakable Oracle -- DJB -- Unhackable Quantum Cryptography -- We Are Reactive Sheep -- Security Theater -- Security by Obscurity -- MFA Will Cause Slowdowns -- MFA Will Cause Downtime -- No MFA Solution Works Everywhere -- Summary -- Part II Hacking MFA -- Chapter 5 Hacking MFA in General -- MFA Dependency Components -- Enrollment -- User -- Devices/Hardware -- Software -- API -- Authentication Factors -- Authentication Secrets Store -- Cryptography -- Technology -- Transmission/Network Channel -- Namespace -- Supporting Infrastructure -- Relying Party
Federation/Proxies -- Alternate Authentication Methods/Recovery -- Migrations -- Deprovision -- MFA Component Conclusion -- Main Hacking Methods -- Technical Attacks -- Human Element -- Physical -- Two or More Hacking Methods Used -- "You Didn't Hack the MFA!" -- How MFA Vulnerabilities Are Found -- Threat Modeling -- Code Review -- Fuzz Testing -- Penetration Testing -- Vulnerability Scanning -- Human Testing -- Accidents -- Summary -- Chapter 6 Access Control Token Tricks -- Access Token Basics -- Access Control Token General Hacks -- Token Reproduction/Guessing -- Token Theft
Record Nr. UNINA-9910677231703321
Grimes Roger A.  
Indianapolis, Indiana : , : Wiley, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Hacking the hacker / / Roger A Grimes
Hacking the hacker / / Roger A Grimes
Autore Grimes Roger A.
Edizione [1st edition]
Pubbl/distr/stampa Indianapolis, Indiana : , : Wiley, , 2017
Descrizione fisica 1 online resource (323 pages) : illustrations
Disciplina 005.8
Soggetto topico Computer security
Hacking
ISBN 1-119-39626-3
1-119-39623-9
1-119-39622-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto What type of hacker are you? -- How hackers hack -- Profile: Bruce Schneier -- Social engineering -- Profile: Kevin Mitnick -- Software vulnerabilities -- Profile: Michael Howard -- Profile: Gary McGraw -- Malware -- Profile: Susan Bradley -- Profile: Mark Russinovich -- Cryptography -- Profile: Martin Hellman -- Intrusion detection/APTs -- Profile: Dr. Dorothy E. Denning -- Profile: Michael Dubinsky -- Firewalls -- Profile: William Cheskwick -- Honeypots -- Profile: Lance Spitzner -- Password hacking -- Profile: Dr. Cormac Herley -- Wireless hacking -- Profile: Thomas d'Otreppe de Bouvette -- Penetration testing -- Profile: Aaron Higbee -- Profile: Benild Joseph -- DDoS attacks -- Profile: Brian Krebs -- Secure OS -- Profile: Joanna Rutkowska -- Profile: Aaron Margosis -- Network attacks -- Profile: Laura Chappell -- IoT hacking -- Profile: Dr. Charlie Miller -- Policy and strategy -- Profile: Jing de Jong-Chen -- Threat modeling -- Profile: Adam Shostack -- Computer security education -- Profile: Stephen Northcutt -- Privacy -- Profile: Eva Galperin -- Patching -- Profile: Window Snyder -- Writing as a career -- Profile: Fahmida Y. Rashid -- Guide for parents with young hackers -- Hacker code of ethics.
Record Nr. UNINA-9910271016503321
Grimes Roger A.  
Indianapolis, Indiana : , : Wiley, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Hacking wireless access points : cracking, tracking, and signal jacking / / Jennifer Ann Kurtz, Information Assurance Affiliate Faculty at Regis University ; Richard Kaczmarek, technical editor
Hacking wireless access points : cracking, tracking, and signal jacking / / Jennifer Ann Kurtz, Information Assurance Affiliate Faculty at Regis University ; Richard Kaczmarek, technical editor
Autore Kurtz Jennifer Ann
Edizione [1st edition]
Pubbl/distr/stampa Cambridge, MA : , : Syngress, , [2017]
Descrizione fisica 1 online resource (xv, 155 pages) : illustrations (some color)
Disciplina 004.1675068
Collana Gale eBooks
Soggetto topico Wireless LANs - Security measures
Hacking
Computer security
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto chapter 1. Wireless technology overview -- chapter 2. Wireless adoption -- chapter 3. Blurred edges : fixed and mobile wireless access points -- chapter 4. Hacks against individuals -- chapter 5. WAPs in commercial and industrial contexts -- chapter 6. WAPs in medical environments -- chapter 7. Hacking wireless access points : governmental context -- chapter 8. Noncivilian government context -- chapter 9. Summary and call to action.
Record Nr. UNINA-9910583387903321
Kurtz Jennifer Ann  
Cambridge, MA : , : Syngress, , [2017]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Hands on Hacking / / Matthew Hickey, Jennifer Arcuri
Hands on Hacking / / Matthew Hickey, Jennifer Arcuri
Autore Hickey Matthew
Pubbl/distr/stampa Indianapolis, Indiana : , : John Wiley and Sons, , 2020
Disciplina 005.8
Soggetto topico Penetration testing (Computer security)
Computer networks - Security measures
Hacking
ISBN 1-119-56151-5
1-119-56148-5
1-119-56150-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910555160603321
Hickey Matthew  
Indianapolis, Indiana : , : John Wiley and Sons, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Hands on Hacking / / Matthew Hickey, Jennifer Arcuri
Hands on Hacking / / Matthew Hickey, Jennifer Arcuri
Autore Hickey Matthew
Pubbl/distr/stampa Indianapolis, Indiana : , : John Wiley and Sons, , 2020
Disciplina 005.8
Soggetto topico Penetration testing (Computer security)
Computer networks - Security measures
Hacking
ISBN 1-119-56151-5
1-119-56148-5
1-119-56150-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910819597303321
Hickey Matthew  
Indianapolis, Indiana : , : John Wiley and Sons, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui