Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies / / Ira Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor |
Autore | Winkler Ira |
Edizione | [1st edition] |
Pubbl/distr/stampa | Cambridge, MA : , : Syngress, , [2017] |
Descrizione fisica | 1 online resource (xvii, 241 pages) |
Disciplina | 005.8 |
Collana | Gale eBooks |
Soggetto topico |
Computer networks - Security measures
Computer security Hacking |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | What is advanced persistent security? -- Cyberwarfare concepts -- What is proaction? -- Risk management -- How to hack computers -- Threat -- Adversary infrastructure -- Governance -- Vulnerabilities to address -- Countermeasures -- Security culture -- What is threat intelligence? -- What is detection? -- Detection deficit disorder -- The human intrusion detection system -- Kill chain analysis -- Setting reaction strategy -- Incident response and investigations -- Know yourself -- Know your adversaries -- Define your strategy -- Determining the appropriate countermeasures -- Advanced persistent security. |
Record Nr. | UNINA-9910583064103321 |
Winkler Ira | ||
Cambridge, MA : , : Syngress, , [2017] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber-securing the vote : ensuring the integrity of the U.S. election system : hearing before the Committee on Oversight and Government Reform, House of Representatives, One Hundred Fifteenth Congress, second session, July 24, 2018 |
Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2018 |
Descrizione fisica | 1 online resource (iii, 137 pages) : illustrations |
Soggetto topico |
Voting - Computer networks - Security measures - United States
Hacking - United States - Prevention Cyberterrorism - United States - Prevention Intergovernmental cooperation - United States Hacking - Russia (Federation) Cyberterrorism - Russia (Federation) Information warfare - Russia (Federation) Presidents - United States - Election - 2016 Governmental investigations - United States Customer services Cyberterrorism Cyberterrorism - Prevention Governmental investigations Hacking Information warfare Intergovernmental cooperation Presidents - Election |
Soggetto genere / forma | Legislative hearings. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Cyber-securing the vote |
Record Nr. | UNINA-9910711791103321 |
Washington : , : U.S. Government Publishing Office, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Essential skills for hackers / / Kevin Cardwell ; contributing editor, Henry Dalziel |
Autore | Cardwell Kevin |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Syngress, , 2016 |
Descrizione fisica | 1 online resource (43 p.) |
Disciplina | 005.8 |
Soggetto topico |
Hacking
Computer security Computer networks - Access control Computer networks - Security measures |
ISBN |
0-12-804755-0
0-12-805111-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Title page; Table of Contents; Copyright; About the Authors; Introduction; Chapter 1. Network Protocols; Abstract; Chapter 2. Packet Headers; Abstract; Chapter 3. Analyzed Traffic; Abstract; Conclusion |
Record Nr. | UNINA-9910797983703321 |
Cardwell Kevin | ||
Waltham, Massachusetts : , : Syngress, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Essential skills for hackers / / Kevin Cardwell ; contributing editor, Henry Dalziel |
Autore | Cardwell Kevin |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Syngress, , 2016 |
Descrizione fisica | 1 online resource (43 p.) |
Disciplina | 005.8 |
Soggetto topico |
Hacking
Computer security Computer networks - Access control Computer networks - Security measures |
ISBN |
0-12-804755-0
0-12-805111-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Title page; Table of Contents; Copyright; About the Authors; Introduction; Chapter 1. Network Protocols; Abstract; Chapter 2. Packet Headers; Abstract; Chapter 3. Analyzed Traffic; Abstract; Conclusion |
Record Nr. | UNINA-9910809573303321 |
Cardwell Kevin | ||
Waltham, Massachusetts : , : Syngress, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Hackathons / / Kerry Hinton |
Autore | Hinton Kerry |
Edizione | [First edition.] |
Pubbl/distr/stampa | New York : , : Rosen Central, , 2017 |
Descrizione fisica | 1 online resource (48 pages) : color illustrations |
Disciplina | 005 |
Collana | Digital and information literacy |
Soggetto topico |
Computer programming
Hacking Interdisciplinary research Contests |
ISBN | 1-5081-7325-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | From hacking to hackathons -- Basic hackathon purpose & structure -- Types of hackathons -- Hackathons & you: get involved -- The future of hackathons. |
Record Nr. | UNINA-9910158644503321 |
Hinton Kerry | ||
New York : , : Rosen Central, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Hacking multifactor authentication / / Roger A. Grimes |
Autore | Grimes Roger A. |
Pubbl/distr/stampa | Indianapolis, Indiana : , : Wiley, , [2021] |
Descrizione fisica | 1 online resource |
Disciplina | 005.8 |
Soggetto topico |
Hacking
Hackers Cryptography Computers - Access control - Testing Computer networks - Security measures Computer security |
ISBN |
1-119-65080-1
1-119-67235-X 1-119-67234-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Introduction -- Who This Book Is For -- What Is Covered in This Book? -- MFA Is Good -- How to Contact Wiley or the Author -- Part I Introduction -- Chapter 1 Logon Problems -- It's Bad Out There -- The Problem with Passwords -- Password Basics -- Identity -- The Password -- Password Registration -- Password Complexity -- Password Storage -- Password Authentication -- Password Policies -- Passwords Will Be with Us for a While -- Password Problems and Attacks -- Password Guessing
Password Hash Cracking -- Password Stealing -- Passwords in Plain View -- Just Ask for It -- Password Hacking Defenses -- MFA Riding to the Rescue? -- Summary -- Chapter 2 Authentication Basics -- Authentication Life Cycle -- Identity -- Authentication -- Authorization -- Accounting/Auditing -- Standards -- Laws of Identity -- Authentication Problems in the Real World -- Summary -- Chapter 3 Types of Authentication -- Personal Recognition -- Knowledge-Based Authentication -- Passwords -- PINS -- Solving Puzzles -- Password Managers -- Single Sign-Ons and Proxies -- Cryptography -- Encryption Public Key Infrastructure -- Hashing -- Hardware Tokens -- One-Time Password Devices -- Physical Connection Devices -- Wireless -- Phone-Based -- Voice Authentication -- Phone Apps -- SMS -- Biometrics -- FIDO -- Federated Identities and APIs -- OAuth -- APIs -- Contextual/Adaptive -- Less Popular Methods -- Voiceover Radio -- Paper-Based -- Summary -- Chapter 4 Usability vs. Security -- What Does Usability Mean? -- We Don't Really Want the Best Security -- Security Isn't Usually Binary -- Too Secure -- Seven-Factor MFA -- Moving ATM Keypad Numbers -- Not as Worried as You Think About Hacking Unhackable Fallacy -- Unbreakable Oracle -- DJB -- Unhackable Quantum Cryptography -- We Are Reactive Sheep -- Security Theater -- Security by Obscurity -- MFA Will Cause Slowdowns -- MFA Will Cause Downtime -- No MFA Solution Works Everywhere -- Summary -- Part II Hacking MFA -- Chapter 5 Hacking MFA in General -- MFA Dependency Components -- Enrollment -- User -- Devices/Hardware -- Software -- API -- Authentication Factors -- Authentication Secrets Store -- Cryptography -- Technology -- Transmission/Network Channel -- Namespace -- Supporting Infrastructure -- Relying Party Federation/Proxies -- Alternate Authentication Methods/Recovery -- Migrations -- Deprovision -- MFA Component Conclusion -- Main Hacking Methods -- Technical Attacks -- Human Element -- Physical -- Two or More Hacking Methods Used -- "You Didn't Hack the MFA!" -- How MFA Vulnerabilities Are Found -- Threat Modeling -- Code Review -- Fuzz Testing -- Penetration Testing -- Vulnerability Scanning -- Human Testing -- Accidents -- Summary -- Chapter 6 Access Control Token Tricks -- Access Token Basics -- Access Control Token General Hacks -- Token Reproduction/Guessing -- Token Theft |
Record Nr. | UNINA-9910677231703321 |
Grimes Roger A. | ||
Indianapolis, Indiana : , : Wiley, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Hacking the hacker / / Roger A Grimes |
Autore | Grimes Roger A. |
Edizione | [1st edition] |
Pubbl/distr/stampa | Indianapolis, Indiana : , : Wiley, , 2017 |
Descrizione fisica | 1 online resource (323 pages) : illustrations |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Hacking |
ISBN |
1-119-39626-3
1-119-39623-9 1-119-39622-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | What type of hacker are you? -- How hackers hack -- Profile: Bruce Schneier -- Social engineering -- Profile: Kevin Mitnick -- Software vulnerabilities -- Profile: Michael Howard -- Profile: Gary McGraw -- Malware -- Profile: Susan Bradley -- Profile: Mark Russinovich -- Cryptography -- Profile: Martin Hellman -- Intrusion detection/APTs -- Profile: Dr. Dorothy E. Denning -- Profile: Michael Dubinsky -- Firewalls -- Profile: William Cheskwick -- Honeypots -- Profile: Lance Spitzner -- Password hacking -- Profile: Dr. Cormac Herley -- Wireless hacking -- Profile: Thomas d'Otreppe de Bouvette -- Penetration testing -- Profile: Aaron Higbee -- Profile: Benild Joseph -- DDoS attacks -- Profile: Brian Krebs -- Secure OS -- Profile: Joanna Rutkowska -- Profile: Aaron Margosis -- Network attacks -- Profile: Laura Chappell -- IoT hacking -- Profile: Dr. Charlie Miller -- Policy and strategy -- Profile: Jing de Jong-Chen -- Threat modeling -- Profile: Adam Shostack -- Computer security education -- Profile: Stephen Northcutt -- Privacy -- Profile: Eva Galperin -- Patching -- Profile: Window Snyder -- Writing as a career -- Profile: Fahmida Y. Rashid -- Guide for parents with young hackers -- Hacker code of ethics. |
Record Nr. | UNINA-9910271016503321 |
Grimes Roger A. | ||
Indianapolis, Indiana : , : Wiley, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Hacking wireless access points : cracking, tracking, and signal jacking / / Jennifer Ann Kurtz, Information Assurance Affiliate Faculty at Regis University ; Richard Kaczmarek, technical editor |
Autore | Kurtz Jennifer Ann |
Edizione | [1st edition] |
Pubbl/distr/stampa | Cambridge, MA : , : Syngress, , [2017] |
Descrizione fisica | 1 online resource (xv, 155 pages) : illustrations (some color) |
Disciplina | 004.1675068 |
Collana | Gale eBooks |
Soggetto topico |
Wireless LANs - Security measures
Hacking Computer security |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | chapter 1. Wireless technology overview -- chapter 2. Wireless adoption -- chapter 3. Blurred edges : fixed and mobile wireless access points -- chapter 4. Hacks against individuals -- chapter 5. WAPs in commercial and industrial contexts -- chapter 6. WAPs in medical environments -- chapter 7. Hacking wireless access points : governmental context -- chapter 8. Noncivilian government context -- chapter 9. Summary and call to action. |
Record Nr. | UNINA-9910583387903321 |
Kurtz Jennifer Ann | ||
Cambridge, MA : , : Syngress, , [2017] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Hands on Hacking / / Matthew Hickey, Jennifer Arcuri |
Autore | Hickey Matthew |
Pubbl/distr/stampa | Indianapolis, Indiana : , : John Wiley and Sons, , 2020 |
Disciplina | 005.8 |
Soggetto topico |
Penetration testing (Computer security)
Computer networks - Security measures Hacking |
ISBN |
1-119-56151-5
1-119-56148-5 1-119-56150-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910555160603321 |
Hickey Matthew | ||
Indianapolis, Indiana : , : John Wiley and Sons, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Hands on Hacking / / Matthew Hickey, Jennifer Arcuri |
Autore | Hickey Matthew |
Pubbl/distr/stampa | Indianapolis, Indiana : , : John Wiley and Sons, , 2020 |
Disciplina | 005.8 |
Soggetto topico |
Penetration testing (Computer security)
Computer networks - Security measures Hacking |
ISBN |
1-119-56151-5
1-119-56148-5 1-119-56150-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910819597303321 |
Hickey Matthew | ||
Indianapolis, Indiana : , : John Wiley and Sons, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|