2015 International Symposium on Security and Privacy in Social Networks and Big Data : proceedings : 16-18 November 2015, Hangzhou, China / / Institute of Electrical and Electronics Engineers |
Pubbl/distr/stampa | Piscataway, New Jersey : , : IEEE, , [2015] |
Descrizione fisica | 1 online resource (85 pages) : illustrations |
Disciplina | 005.82 |
Soggetto topico |
Data encryption (Computer science)
Online social networks - Security measures Privacy, Right of |
ISBN | 1-4673-8420-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti |
2015 International Symposium on Security and Privacy in Social Networks and Big Data
2015 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec) Security and Privacy in Social Networks and Big Data |
Record Nr. | UNISA-996280948803316 |
Piscataway, New Jersey : , : IEEE, , [2015] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
2015 International Symposium on Security and Privacy in Social Networks and Big Data : proceedings : 16-18 November 2015, Hangzhou, China / / Institute of Electrical and Electronics Engineers |
Pubbl/distr/stampa | Piscataway, New Jersey : , : IEEE, , [2015] |
Descrizione fisica | 1 online resource (85 pages) : illustrations |
Disciplina | 005.82 |
Soggetto topico |
Data encryption (Computer science)
Online social networks - Security measures Privacy, Right of |
ISBN | 1-4673-8420-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti |
2015 International Symposium on Security and Privacy in Social Networks and Big Data
2015 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec) Security and Privacy in Social Networks and Big Data |
Record Nr. | UNINA-9910137400003321 |
Piscataway, New Jersey : , : IEEE, , [2015] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
CODASPY'20 : proceedings of the Tenth ACM Conference on Data and Application Security and Privacy : March 16-18, 2020, New Orleans, LA, USA / / general chairs, Vassil Rouseev, Bhavani Thuraisingham |
Pubbl/distr/stampa | New York : , : Association for Computing Machinery, , 2020 |
Descrizione fisica | 1 online resource (392 pages) : illustrations |
Disciplina | 004.16 |
Collana | ACM conferences |
Soggetto topico |
Application software - Security measures
Computer security Data protection Online social networks - Security measures |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910412317203321 |
New York : , : Association for Computing Machinery, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Facebook : transparency and use of consumer data : hearing before the Committee on Energy and Commerce, House of Representatives, One Hundred Fifteenth Congress, second session, April 11, 2018 |
Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2018 |
Descrizione fisica | 1 online resource (iv, 212 pages) : illustrations |
Altri autori (Persone) | ZuckerbergMark <1984-> |
Soggetto topico |
Online social networks - Security measures
Privacy, Right of Web applications - Moral and ethical aspects Target marketing - Corrupt practices Computer crimes - Prevention Online social networks - Government policy - United States Data protection - Government policy - United States Electronic records - Access control - Government policy - United States Consumer protection - United States |
Soggetto genere / forma | Legislative hearings. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | |
Record Nr. | UNINA-9910711350103321 |
Washington : , : U.S. Government Publishing Office, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Facebook nation : total information awareness / / Newton Lee |
Autore | Lee Newton |
Pubbl/distr/stampa | New York, : Springer, 2013 |
Descrizione fisica | 1 online resource (229 p.) |
Disciplina | 006.754 |
Soggetto topico | Online social networks - Security measures |
ISBN |
1-283-90962-6
1-4614-5308-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | pt. 1. Prologue -- pt. 2. Privacy in the age of big data -- pt. 3. The rise of Facebook nation -- pt. 4. Total information awareness in Facebook nation -- pt. 5. Epilogue. |
Record Nr. | UNINA-9910437604103321 |
Lee Newton | ||
New York, : Springer, 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Facebook-partys und sicherheitsrecht / / Isabel Hohmann |
Autore | Hohmann Isabel |
Pubbl/distr/stampa | Frankfurt, [Germany] : , : Peter Lang GmbH, , 2016 |
Descrizione fisica | 1 online resource (242 pages) |
Disciplina | 006.754 |
Collana | Europäische Hochschulschriften. Reihe II, Rechtswissenschaft,European University Studies. Series II, Law ;Publications Universitaires Européennes. Série II, Droit |
Soggetto topico |
Online social networks - Security measures
Facebook (Electronic resource) - Law and legislation |
ISBN | 3-631-70095-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | ger |
Record Nr. | UNINA-9910136064303321 |
Hohmann Isabel | ||
Frankfurt, [Germany] : , : Peter Lang GmbH, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The five technological forces disrupting security : how social, mobile, cloud and iot are fundamentally changing the practice of physical security / / Steve Van Till |
Autore | Van Till Steve |
Pubbl/distr/stampa | Oxford, England ; ; Cambridge, Massachusetts : , : Butterworth-Heinemann, , 2018 |
Descrizione fisica | 1 online resource (225 pages) |
Disciplina | 005.8 |
Soggetto topico |
Computer networks - Security measures
Computer security Cloud computing - Security measures Online social networks - Security measures Mobile computing - Security measures Big data - Security measures Redes de ordenadores - Medidas de seguridad Medios sociales - Medidas de seguridad Informática en la nube Datos masivos Sistemas de comunicaciones móviles - Medidas de seguridad |
ISBN |
0-12-805096-9
0-12-805095-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910583384803321 |
Van Till Steve | ||
Oxford, England ; ; Cambridge, Massachusetts : , : Butterworth-Heinemann, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Identification of pathogenic social media accounts : from data to intelligence to prediction / / Hamidreza Alvari, Elham Shaabani, Paulo Shakarian |
Autore | Alvari Hamidreza |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (IX, 95 p. 25 illus., 19 illus. in color.) |
Disciplina | 006.754 |
Collana | SpringerBriefs in Computer Science |
Soggetto topico |
Online social networks - Security measures
Computer networks - Security measures |
ISBN | 3-030-61431-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910483351703321 |
Alvari Hamidreza | ||
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Identification of pathogenic social media accounts : from data to intelligence to prediction / / Hamidreza Alvari, Elham Shaabani, Paulo Shakarian |
Autore | Alvari Hamidreza |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (IX, 95 p. 25 illus., 19 illus. in color.) |
Disciplina | 006.754 |
Collana | SpringerBriefs in Computer Science |
Soggetto topico |
Online social networks - Security measures
Computer networks - Security measures |
ISBN | 3-030-61431-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996464517003316 |
Alvari Hamidreza | ||
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Internet security : how to defend against attackers on the Web / / Mike Harwood |
Autore | Harwood Mike |
Edizione | [Second edition.] |
Pubbl/distr/stampa | Burlington, MA : , : Jones & Bartlett Learning, , [2016] |
Descrizione fisica | 1 online resource (1 volume) : illustrations |
Disciplina | 302.30285 |
Altri autori (Persone) | HarwoodMike |
Collana | Jones & Bartlett Learning Information systems security & assurance series |
Soggetto topico |
Online social networks - Security measures
Application software - Security measures Internet - Security measures World Wide Web - Security measures |
ISBN | 1-284-09064-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover -- Title Page -- Copyright -- Contents -- Preface -- Acknowledgments -- Part One Evolution of Computing, Risks, and Social Networking -- Chapter 1 From Mainframe to Client/Server to World Wide Web -- The Evolution of Data Processing -- Understanding Data, Data Processing, and Information -- 1900s and Rapid Growth -- Mainframe Computers -- Client/Server Computing -- Distributed Computing on a Network -- Transformation of Brick-and-Mortar Businesses to E-commerce Businesses -- E-commerce Today -- The World Wide Web Revolution -- Pre-Internet Era -- Groupware and Gopher -- Emergence of the World Wide Web -- The Changing States of the World Wide Web -- Web 1.0 -- Web 2.0 -- Web 3.0 -- Introducing the Internet of Things (IoT) -- Cloud Computing and Virtualization -- Cloud Computing -- Virtualization -- Chapter Summary -- key concepts and terms -- Chapter 1 Assessment -- Chapter 2 Security Considerations for Small Businesses -- The Evolution of Business from Brick and Mortar to the Web -- E-commerce: A Brick-and-Mortar Model -- Customer-Focused E-commerce -- Emerging Trend: Distributed E-commerce -- The Process of Transformation into an E-business -- Managing and Security the Customer Life Cycle -- Highly Available and Secure Web Site Hosting -- E-commerce and Enhanced Customer-Service Delivery -- One-Way Communication -- Limited Two-Way Communication -- Full Two-Way Communication -- E-businesss with Integrated Applications -- Risks, Threats, and Vulnerabilities for Business Web Sites -- Connecting to the Internet Means Connecting to the Outside World -- The Risks of Handling Revenues Online -- Credit, Charge, and Debit Cards -- Electronic Cash and Wallets -- Vulnerabilities of Web-Enabled Applications -- Managing the Risks Inherent in Unsecure Systems -- System and Protocol Security -- Securing IP Communications.
Managing Application and Coding Security -- Using Service Packs -- Telecommuting and Secure Access for Remote Employees -- Chapter Summary -- Key Concepts and Terms -- Chapter 2 Assessment -- Chapter 3 Security Considerations for Home and Personal Online Use -- Common Security Terms and Threats -- Social Engineering -- Phishing -- Identity Theft -- Malware and Ransomware -- Cookies -- Securing Common Online Activities -- Banking and Investing -- Shopping Online -- Social Networking -- Online Gaming -- Protecting Against E-mail Scams -- The OWASP Top 10 Privacy Risks Project -- 1. Web Application Vulnerabilities -- 2. Operator-Sided Data Leakage -- 3. Insufficient Data Breach Response -- 4. Insufficient Deletion of Personal Data -- 5. Non-transparent Policies, Terms, and Conditions -- 6. Collection of Data Not Required for the Primary Purpose -- 7. Sharing of Data with Third Party -- 8. Outdated Personal Data -- 9. Missing or Insufficient Session Expiration -- 10. Unsecure Data Transfer -- Chapter Summary -- Key Concepts and Terms -- Chapter 3 Assessment -- Part Two Secure Web-Enabled Application Deployment and Social Networking -- Chapter 4 Mitigating Risk When Connecting to the Internet -- Threats When Connecting to the Internet -- Risks and Threats -- Vulnerabilities and Exploits -- Perpetrators -- Web Site Hosting -- External Web Hosting -- Internal Web Hosting -- Domain Name Server -- The Seven Domains of a Typical IT Infrastructure -- Protecting Networks in the LAN-to-WAN Domain -- Perimeter Defense Strategies -- Firewalls -- Demilitarized Zones (DMZs) -- Proxy Servers -- Intrusion Detection Systems and Intrusion Protection Systems -- Best Practices for Connecting to the Internet -- Chapter Summary -- Key Concepts and Terms -- Chapter 4 Assessment -- Chapter 5 Mitigating Web Site Risks, Threats, and Vulnerabilities. Who Is Coming to Your Web Site? -- Whom Do You Want to Come to Your Web Site? -- Accepting User Input on Your Web Site -- Forums -- Web Site Feedback Forms -- Online Surveys -- The Open Web Application Security Project Top 10 Threats -- 1. Injection -- 2. Broken Authentication and Session Management -- 3. Cross-Site Scripting (XSS) -- 4. Unsecure Direct Object References -- 5. Security Misconfigurations -- 6. Sensitive Data Exposure -- 7. Missing Function Level Access Control -- 8. Cross-Site Request Forgery (CSRF) -- 9. Using Components with Known Vulnerabilities -- 10. Unvalidated Redirects and Forwards -- Additional Web Threats Not in the Top 10 -- Malicious File Execution -- Information Leakage and Improper Error Handling -- Unsecure Cryptographic Storage -- Unsecure Communications -- Failure to Restrict URL Access -- Best Practices for Mitigating Known Web Application Risks, Threats, and Vulnerabilities -- Chapter Summary -- Key Concepts and Terms -- Chapter 5 assessment -- Chapter 6 Introducing the Web Application Security Consortium (WASC) -- The Threats to Web Application Security -- Common Web Site Attacks -- Abuse of Functionality -- Brute-Force Attacks -- Buffer Overflow -- Content Spoofing -- Credential/Session Prediction -- Cross-Site Scripting -- Cross-Site Request Forgery -- Denial of Service -- Fingerprinting -- Format String -- HTTP Response Smuggling -- HTTP Response Splitting -- HTTP Request Smuggling -- HTTP Request Splitting -- Integer Overflows -- LDAP Injection -- Mail Command Injection -- Null Byte Injection -- OS Commanding -- Path Traversal -- Predictable Resource Location -- Remote File Inclusion (RFI) -- Routing Detour -- Session Fixation -- SOAP Array Abuse -- SSI Injection -- SQL Injection -- URL Redirector Abuse -- XPath Injection -- XML Attribute Blowup -- XML External Entities -- XML Entity Expansion -- XML Injection. XQuery Injection -- Common Web Site Weaknesses -- Application Misconfiguration -- Directory Indexing -- Improper File System Permissions -- Improper Input Handling -- Improper Output Handling -- Information Leakage -- Unsecure Indexing -- Insufficient Anti-Automation -- Insufficient Authentication -- Insufficient Authorization -- Insufficient Password Recovery -- Insufficient Process Validation -- Insufficient Session Expiration -- Insufficient Transport Layer Protection -- Server Misconfiguration -- Best Practices for Mitigating Web Attacks -- Best Practices for Mitigating Weaknesses -- Chapter Summary -- Key Concepts and Terms -- Chapter 6 Assessment -- Chapter 7 Securing Web Applications -- When Your Application Requires User Input into Your Web Site -- Get to Know Your Syntax with Request for Comments (RFC) -- Technologies and Systems Used to Make a Complete Functional Web Site -- Hypertext Markup Language (HTML) -- Common Gateway Interface (CGI) Script -- JavaScripting -- SQL Database Back-End -- Your Development Process and the Software Development Life Cycle (SDLC) -- Designing a Layered Security Strategy for Web Sites and Web Applications -- Incorporating Security Requirements Within the SDLC -- Systems Analysis Stage -- Designing Stage -- Implementation Stage -- Testing Stage -- Acceptance and Deployment Stage -- Maintenance -- Using Secure and Unsecure Protocols -- How Secure Sockets Layer Works -- SSL Encryption and Hash Protocols -- Selecting an Appropriate Access Control Solution -- Discretionary Access Control -- Mandatory Access Control -- Rule-Based Access Control -- Role-Based Access Control -- Create Access Controls That Are Commensurate with the Level of Sensitivity of Data Access or Input -- Best Practices for Securing Web Applications -- Chapter Summary -- Key Concepts and Terms -- Chapter 7 assessment. Chapter 8 Mitigating Web Application Vulnerabilities -- Causes of Web Application Vulnerabilities -- Authentication -- Input Validation -- Session Management -- Vulnerabilities Are Caused by Non-Secure Code in Software Applications -- Developing Policies to Mitigate Vulnerabilities -- Implementing Secure Coding Best Practices -- Incorporating HTML Secure Coding Standards and Techniques -- Incorporating JavaScript Secure Coding Standards and Techniques -- Incorporating CGI Form and SQL Database Access Secure Coding Standards and Techniques -- SQL Database Security -- Implementing Software Development Configuration Management and Revision-Level Tracking -- Revision-Level Tracking -- Best Practices for Mitigating Web Application Vulnerabilities -- Chapter Summary -- Key Concepts and Terms -- Chapter 8 assessment -- Chapter 9 Maintaining PCI DSS Compliance for E-commerce Web Sites -- Credit Card Transaction Processing -- Batch Processing -- Real-Time Processing -- What Is the Payment Card Industry Data Security Standard? -- If PCI DSS Is Not a Law, Why Do You Need to Be in Compliance? -- Designing and Building Your E-commerce Web Site with PCI DSS in Mind -- What Does a PCI DSS Security Assessment Entail? -- Scope of Assessment -- Instructions and Content for Report on Compliance -- Detailed PCI DSS Requirements and Security Assessment Procedures -- Security Assessment Marking Procedure -- Best Practices to Mitigate Risk for E-commerce Web Sites with PCI DSS Compliance -- Build and Maintain a Secure Network -- Protect Cardholder Data -- Maintain a Vulnerability Management Program -- Implement Strong Access Control Measures -- Regularly Monitor and Test Networks -- Maintain an Information Security Policy -- Chapter Summary -- Key Concepts and Terms -- Chapter 9 Assessment -- Chapter 10 Testing and Quality Assurance for Production Web Sites. Development and Production Software Environments. |
Record Nr. | UNINA-9910164016003321 |
Harwood Mike | ||
Burlington, MA : , : Jones & Bartlett Learning, , [2016] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|