Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies / / Ira Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor
| Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies / / Ira Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor |
| Autore | Winkler Ira |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Cambridge, MA : , : Syngress, , [2017] |
| Descrizione fisica | 1 online resource (xvii, 241 pages) |
| Disciplina | 005.8 |
| Collana | Gale eBooks |
| Soggetto topico |
Computer networks - Security measures
Computer security Hacking |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | What is advanced persistent security? -- Cyberwarfare concepts -- What is proaction? -- Risk management -- How to hack computers -- Threat -- Adversary infrastructure -- Governance -- Vulnerabilities to address -- Countermeasures -- Security culture -- What is threat intelligence? -- What is detection? -- Detection deficit disorder -- The human intrusion detection system -- Kill chain analysis -- Setting reaction strategy -- Incident response and investigations -- Know yourself -- Know your adversaries -- Define your strategy -- Determining the appropriate countermeasures -- Advanced persistent security. |
| Record Nr. | UNINA-9910583064103321 |
Winkler Ira
|
||
| Cambridge, MA : , : Syngress, , [2017] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Bases de Hacking : um guia de iniciantes ao hacking ético e aos testes de penetração
| Bases de Hacking : um guia de iniciantes ao hacking ético e aos testes de penetração |
| Autore | Wilson Adidas |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Chicago : , : Adidas Wilson, , 2021 |
| Descrizione fisica | 1 online resource (78 pages) |
| Altri autori (Persone) | CorreiaAntónio |
| Soggetto topico |
Hacking
Computer security |
| ISBN |
9781071582923
1071582925 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | por |
| Nota di contenuto | Intro -- Página do Título -- Página dos Direitos Autorais -- Bases de Hacking -- Tabela de conteúdos -- Introdução -- Capítulo 1 | Ataques de phishing -- Capítulo 2 | Ameaça Persistente Avançada (APT) -- Capítulo 3 | Testes de penetração -- Capítulo 4 | Contra-Hacking: Salvador ou Vigilante? -- Capítulo 5 | Hacking Ético -- Capítulo 6 | Os passos que os Hackers tomam para executar um ciberataque bem-sucedido -- Capítulo 7 | Resposta a Incidentes -- Capítulo 8 | DNSSEC -- Capítulo 9 | Ataques de scripts de site cruzados refletidos (XSS) -- Capítulo 10 | Deteção de Intrusão e Prevenção de Intrusão -- Capítulo 11 | Varredura de Ping -- Capítulo 12 | Roubo de link -- Capítulo 13 | Engenharia social -- Capítulo 14 | PCI DSS -- Capítulo 15 | Ataques de backdoor -- Capítulo 16 | ISO/IEC 27001 -- Capítulo 17 | Tipos de malware -- Capítulo 18 | Segurança da Internet das Coisas -- Capítulo 19 | Roubo do Servidor de Nome de Domínio (DNS) -- Capítulo 20 | Ataque de Forjamento do Pedido entre sites (CSRF) -- Capítulo 21 | Injeção de Consulta de Linguagem Estruturada (SQL) -- Capítulo 22 | Spoofing de DNS -- Capítulo 23 | Ferramentas de Hacking Ético -- Capítulo 24 | Scrapping da Web -- Capítulo 25 | Ataque de Homem no Meio (MITM) -- Capítulo 26 | Phishing Direcionado -- Capítulo 27 | Rootkit -- Capítulo 28 | Inclusão Remota de Ficheiro (RFI) -- Capítulo 29 | Malware publicitário -- Capítulo 30 | Avaliação da Vulnerabilidade -- Capítulo 31 | Exploit de Zero-Day -- Capítulo 32 | Gestão de falhas -- Capítulo 33 | Segurança de Aplicações Web -- Conclusão -- Referências. |
| Record Nr. | UNINA-9910963237303321 |
Wilson Adidas
|
||
| Chicago : , : Adidas Wilson, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cyber-securing the vote : ensuring the integrity of the U.S. election system : hearing before the Committee on Oversight and Government Reform, House of Representatives, One Hundred Fifteenth Congress, second session, July 24, 2018
| Cyber-securing the vote : ensuring the integrity of the U.S. election system : hearing before the Committee on Oversight and Government Reform, House of Representatives, One Hundred Fifteenth Congress, second session, July 24, 2018 |
| Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2018 |
| Descrizione fisica | 1 online resource (iii, 137 pages) : illustrations |
| Soggetto topico |
Voting - Computer networks - Security measures - United States
Hacking - United States - Prevention Cyberterrorism - United States - Prevention Intergovernmental cooperation - United States Hacking - Russia (Federation) Cyberterrorism - Russia (Federation) Information warfare - Russia (Federation) Presidents - United States - Election - 2016 Governmental investigations - United States Customer services Cyberterrorism Cyberterrorism - Prevention Governmental investigations Hacking Information warfare Intergovernmental cooperation Presidents - Election |
| Soggetto genere / forma | Legislative hearings. |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Cyber-securing the vote |
| Record Nr. | UNINA-9910711791103321 |
| Washington : , : U.S. Government Publishing Office, , 2018 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Essential skills for hackers / / Kevin Cardwell ; contributing editor, Henry Dalziel
| Essential skills for hackers / / Kevin Cardwell ; contributing editor, Henry Dalziel |
| Autore | Cardwell Kevin |
| Pubbl/distr/stampa | Waltham, Massachusetts : , : Syngress, , 2016 |
| Descrizione fisica | 1 online resource (43 p.) |
| Disciplina | 005.8 |
| Soggetto topico |
Hacking
Computer security Computer networks - Access control Computer networks - Security measures |
| ISBN |
0-12-804755-0
0-12-805111-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Title page; Table of Contents; Copyright; About the Authors; Introduction; Chapter 1. Network Protocols; Abstract; Chapter 2. Packet Headers; Abstract; Chapter 3. Analyzed Traffic; Abstract; Conclusion |
| Record Nr. | UNINA-9910797983703321 |
Cardwell Kevin
|
||
| Waltham, Massachusetts : , : Syngress, , 2016 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Essential skills for hackers / / Kevin Cardwell ; contributing editor, Henry Dalziel
| Essential skills for hackers / / Kevin Cardwell ; contributing editor, Henry Dalziel |
| Autore | Cardwell Kevin |
| Pubbl/distr/stampa | Waltham, Massachusetts : , : Syngress, , 2016 |
| Descrizione fisica | 1 online resource (43 p.) |
| Disciplina | 005.8 |
| Soggetto topico |
Hacking
Computer security Computer networks - Access control Computer networks - Security measures |
| ISBN |
0-12-804755-0
0-12-805111-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Title page; Table of Contents; Copyright; About the Authors; Introduction; Chapter 1. Network Protocols; Abstract; Chapter 2. Packet Headers; Abstract; Chapter 3. Analyzed Traffic; Abstract; Conclusion |
| Record Nr. | UNINA-9910809573303321 |
Cardwell Kevin
|
||
| Waltham, Massachusetts : , : Syngress, , 2016 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Hackathons / / Kerry Hinton
| Hackathons / / Kerry Hinton |
| Autore | Hinton Kerry |
| Edizione | [First edition.] |
| Pubbl/distr/stampa | New York : , : Rosen Central, , 2017 |
| Descrizione fisica | 1 online resource (48 pages) : color illustrations |
| Disciplina | 005 |
| Collana | Digital and information literacy |
| Soggetto topico |
Computer programming
Hacking Interdisciplinary research Contests |
| ISBN | 1-5081-7325-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | From hacking to hackathons -- Basic hackathon purpose & structure -- Types of hackathons -- Hackathons & you: get involved -- The future of hackathons. |
| Record Nr. | UNINA-9910158644503321 |
Hinton Kerry
|
||
| New York : , : Rosen Central, , 2017 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Hacking multifactor authentication / / Roger A. Grimes
| Hacking multifactor authentication / / Roger A. Grimes |
| Autore | Grimes Roger A. |
| Pubbl/distr/stampa | Indianapolis, Indiana : , : Wiley, , [2021] |
| Descrizione fisica | 1 online resource |
| Disciplina | 005.8 |
| Soggetto topico |
Hacking
Hackers Cryptography Computers - Access control - Testing Computer networks - Security measures Computer security |
| ISBN |
1-119-65080-1
1-119-67235-X 1-119-67234-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Introduction -- Who This Book Is For -- What Is Covered in This Book? -- MFA Is Good -- How to Contact Wiley or the Author -- Part I Introduction -- Chapter 1 Logon Problems -- It's Bad Out There -- The Problem with Passwords -- Password Basics -- Identity -- The Password -- Password Registration -- Password Complexity -- Password Storage -- Password Authentication -- Password Policies -- Passwords Will Be with Us for a While -- Password Problems and Attacks -- Password Guessing
Password Hash Cracking -- Password Stealing -- Passwords in Plain View -- Just Ask for It -- Password Hacking Defenses -- MFA Riding to the Rescue? -- Summary -- Chapter 2 Authentication Basics -- Authentication Life Cycle -- Identity -- Authentication -- Authorization -- Accounting/Auditing -- Standards -- Laws of Identity -- Authentication Problems in the Real World -- Summary -- Chapter 3 Types of Authentication -- Personal Recognition -- Knowledge-Based Authentication -- Passwords -- PINS -- Solving Puzzles -- Password Managers -- Single Sign-Ons and Proxies -- Cryptography -- Encryption Public Key Infrastructure -- Hashing -- Hardware Tokens -- One-Time Password Devices -- Physical Connection Devices -- Wireless -- Phone-Based -- Voice Authentication -- Phone Apps -- SMS -- Biometrics -- FIDO -- Federated Identities and APIs -- OAuth -- APIs -- Contextual/Adaptive -- Less Popular Methods -- Voiceover Radio -- Paper-Based -- Summary -- Chapter 4 Usability vs. Security -- What Does Usability Mean? -- We Don't Really Want the Best Security -- Security Isn't Usually Binary -- Too Secure -- Seven-Factor MFA -- Moving ATM Keypad Numbers -- Not as Worried as You Think About Hacking Unhackable Fallacy -- Unbreakable Oracle -- DJB -- Unhackable Quantum Cryptography -- We Are Reactive Sheep -- Security Theater -- Security by Obscurity -- MFA Will Cause Slowdowns -- MFA Will Cause Downtime -- No MFA Solution Works Everywhere -- Summary -- Part II Hacking MFA -- Chapter 5 Hacking MFA in General -- MFA Dependency Components -- Enrollment -- User -- Devices/Hardware -- Software -- API -- Authentication Factors -- Authentication Secrets Store -- Cryptography -- Technology -- Transmission/Network Channel -- Namespace -- Supporting Infrastructure -- Relying Party Federation/Proxies -- Alternate Authentication Methods/Recovery -- Migrations -- Deprovision -- MFA Component Conclusion -- Main Hacking Methods -- Technical Attacks -- Human Element -- Physical -- Two or More Hacking Methods Used -- "You Didn't Hack the MFA!" -- How MFA Vulnerabilities Are Found -- Threat Modeling -- Code Review -- Fuzz Testing -- Penetration Testing -- Vulnerability Scanning -- Human Testing -- Accidents -- Summary -- Chapter 6 Access Control Token Tricks -- Access Token Basics -- Access Control Token General Hacks -- Token Reproduction/Guessing -- Token Theft |
| Record Nr. | UNINA-9910677231703321 |
Grimes Roger A.
|
||
| Indianapolis, Indiana : , : Wiley, , [2021] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Hacking the hacker / / Roger A Grimes
| Hacking the hacker / / Roger A Grimes |
| Autore | Grimes Roger A. |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Indianapolis, Indiana : , : Wiley, , 2017 |
| Descrizione fisica | 1 online resource (323 pages) : illustrations |
| Disciplina | 005.8 |
| Soggetto topico |
Computer security
Hacking |
| ISBN |
1-119-39626-3
1-119-39623-9 1-119-39622-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | What type of hacker are you? -- How hackers hack -- Profile: Bruce Schneier -- Social engineering -- Profile: Kevin Mitnick -- Software vulnerabilities -- Profile: Michael Howard -- Profile: Gary McGraw -- Malware -- Profile: Susan Bradley -- Profile: Mark Russinovich -- Cryptography -- Profile: Martin Hellman -- Intrusion detection/APTs -- Profile: Dr. Dorothy E. Denning -- Profile: Michael Dubinsky -- Firewalls -- Profile: William Cheskwick -- Honeypots -- Profile: Lance Spitzner -- Password hacking -- Profile: Dr. Cormac Herley -- Wireless hacking -- Profile: Thomas d'Otreppe de Bouvette -- Penetration testing -- Profile: Aaron Higbee -- Profile: Benild Joseph -- DDoS attacks -- Profile: Brian Krebs -- Secure OS -- Profile: Joanna Rutkowska -- Profile: Aaron Margosis -- Network attacks -- Profile: Laura Chappell -- IoT hacking -- Profile: Dr. Charlie Miller -- Policy and strategy -- Profile: Jing de Jong-Chen -- Threat modeling -- Profile: Adam Shostack -- Computer security education -- Profile: Stephen Northcutt -- Privacy -- Profile: Eva Galperin -- Patching -- Profile: Window Snyder -- Writing as a career -- Profile: Fahmida Y. Rashid -- Guide for parents with young hackers -- Hacker code of ethics. |
| Record Nr. | UNINA-9910271016503321 |
Grimes Roger A.
|
||
| Indianapolis, Indiana : , : Wiley, , 2017 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Hacking wireless access points : cracking, tracking, and signal jacking / / Jennifer Ann Kurtz, Information Assurance Affiliate Faculty at Regis University ; Richard Kaczmarek, technical editor
| Hacking wireless access points : cracking, tracking, and signal jacking / / Jennifer Ann Kurtz, Information Assurance Affiliate Faculty at Regis University ; Richard Kaczmarek, technical editor |
| Autore | Kurtz Jennifer Ann |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Cambridge, MA : , : Syngress, , [2017] |
| Descrizione fisica | 1 online resource (xv, 155 pages) : illustrations (some color) |
| Disciplina | 004.1675068 |
| Collana | Gale eBooks |
| Soggetto topico |
Wireless LANs - Security measures
Hacking Computer security |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | chapter 1. Wireless technology overview -- chapter 2. Wireless adoption -- chapter 3. Blurred edges : fixed and mobile wireless access points -- chapter 4. Hacks against individuals -- chapter 5. WAPs in commercial and industrial contexts -- chapter 6. WAPs in medical environments -- chapter 7. Hacking wireless access points : governmental context -- chapter 8. Noncivilian government context -- chapter 9. Summary and call to action. |
| Record Nr. | UNINA-9910583387903321 |
Kurtz Jennifer Ann
|
||
| Cambridge, MA : , : Syngress, , [2017] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Hands on Hacking / / Matthew Hickey, Jennifer Arcuri
| Hands on Hacking / / Matthew Hickey, Jennifer Arcuri |
| Autore | Hickey Matthew |
| Pubbl/distr/stampa | Indianapolis, Indiana : , : John Wiley and Sons, , 2020 |
| Disciplina | 005.8 |
| Soggetto topico |
Penetration testing (Computer security)
Computer networks - Security measures Hacking |
| ISBN |
1-119-56151-5
1-119-56148-5 1-119-56150-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910555160603321 |
Hickey Matthew
|
||
| Indianapolis, Indiana : , : John Wiley and Sons, , 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||