2006 IEEE Symposium on Security and Privacy : (S & P 2006) : proceedings : 21-24 May, 2006, Berkeley/Oakland, California |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE Computer Society, 2006 |
Soggetto topico |
Computers - Access control
Telecommunication - Security measures |
ISBN | 1-5090-9835-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996197570203316 |
[Place of publication not identified], : IEEE Computer Society, 2006 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
2006 IEEE Symposium on Security and Privacy : (S & P 2006) : proceedings : 21-24 May, 2006, Berkeley/Oakland, California |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE Computer Society, 2006 |
Soggetto topico |
Computers - Access control
Telecommunication - Security measures |
ISBN | 1-5090-9835-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910145617403321 |
[Place of publication not identified], : IEEE Computer Society, 2006 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Aerospace Computer Security Applications 4th Conference, 1988: Proceedings |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE Computer Society Press, 1988 |
Descrizione fisica | 1 online resource (452 pages) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Database security Telecommunication - Security measures |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996215152303316 |
[Place of publication not identified], : IEEE Computer Society Press, 1988 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Applied cryptography [[electronic resource] ] : protocols, algorithms, and source code in C / / Bruce Schneier |
Autore | Schneier Bruce <1963-> |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | New York, : J. Wiley & Sons, c1996 |
Descrizione fisica | 1 online resource (1 v.) : ill |
Disciplina | 005.8/2 |
Soggetto topico |
Computer security
Telecommunication - Security measures Cryptography |
ISBN | 1-119-18347-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910145768303321 |
Schneier Bruce <1963->
![]() |
||
New York, : J. Wiley & Sons, c1996 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Applied cryptography [[electronic resource] ] : protocols, algorithms, and source code in C / / Bruce Schneier |
Autore | Schneier Bruce <1963-> |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | New York, : J. Wiley & Sons, c1996 |
Descrizione fisica | 1 online resource (1 v.) : ill |
Disciplina | 005.8/2 |
Soggetto topico |
Computer security
Telecommunication - Security measures Cryptography |
ISBN | 1-119-18347-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910831079103321 |
Schneier Bruce <1963->
![]() |
||
New York, : J. Wiley & Sons, c1996 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Applied cryptography : protocols, algorithms, and source code in C / / Bruce Schneier |
Autore | Schneier Bruce <1963-> |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | New York, : J. Wiley & Sons, c1996 |
Descrizione fisica | 1 online resource (1 v.) : ill |
Disciplina | 005.8/2 |
Soggetto topico |
Computer security
Telecommunication - Security measures Cryptography |
ISBN | 1-119-18347-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910841500903321 |
Schneier Bruce <1963->
![]() |
||
New York, : J. Wiley & Sons, c1996 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Communication system security / / by Lidong Chen and Guang Gong |
Autore | Chen Lidong |
Edizione | [1st edition] |
Pubbl/distr/stampa | Boca Raton, FL : , : Chapman and Hall/CRC, an imprint of Taylor and Francis, , 2012 |
Descrizione fisica | 1 online resource (738 p.) |
Disciplina | 621.389/28 |
Collana |
Chapman & Hall/CRC Cryptography and Network Security
A Chapman & Hall Book |
Soggetto topico | Telecommunication - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN |
0-429-09429-9
1-4398-4036-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Contents; Preface; Acknowledgments; 1. Introduction; I. Practical Cryptography Primitives; 2. Pseudorandom Sequence Generators; 3. Design of Stream Ciphers; 4. Design of Block Ciphers, Hash Functions, and MAC; 5. Public-Key Cryptographic Algorithms; II. Security Mechanisms and Protocols; 6. Security Infrastructure; 7. Establish Protected Communications; 8. Network Security Protocols; III. Wireless Security; 9. Network Access Authentication; 10. Wireless Network Security; 11. Security for Mobility; 12. Broadcast and Multicast Key Distribution and Authentication
IV. System Security13. Trusted Platform; 14. Physical-Layer Security; 15. Spread-Spectrum Techniques for Anti-Jamming-Attacks; APPENDICES; A. Computations in Finite Fields; B. Some Mathematical Formulae; C. Signals and Spectra in Physical Layer |
Record Nr. | UNINA-9910465186903321 |
Chen Lidong
![]() |
||
Boca Raton, FL : , : Chapman and Hall/CRC, an imprint of Taylor and Francis, , 2012 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Communication system security / / by Lidong Chen and Guang Gong |
Autore | Chen Lidong |
Edizione | [1st edition] |
Pubbl/distr/stampa | Boca Raton, FL : , : Chapman and Hall/CRC, an imprint of Taylor and Francis, , 2012 |
Descrizione fisica | 1 online resource (738 p.) |
Disciplina | 621.389/28 |
Collana |
Chapman & Hall/CRC Cryptography and Network Security
A Chapman & Hall Book |
Soggetto topico | Telecommunication - Security measures |
ISBN |
0-429-09429-9
1-4398-4036-9 |
Classificazione | COM046000COM083000TEC061000 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Contents; Preface; Acknowledgments; 1. Introduction; I. Practical Cryptography Primitives; 2. Pseudorandom Sequence Generators; 3. Design of Stream Ciphers; 4. Design of Block Ciphers, Hash Functions, and MAC; 5. Public-Key Cryptographic Algorithms; II. Security Mechanisms and Protocols; 6. Security Infrastructure; 7. Establish Protected Communications; 8. Network Security Protocols; III. Wireless Security; 9. Network Access Authentication; 10. Wireless Network Security; 11. Security for Mobility; 12. Broadcast and Multicast Key Distribution and Authentication
IV. System Security13. Trusted Platform; 14. Physical-Layer Security; 15. Spread-Spectrum Techniques for Anti-Jamming-Attacks; APPENDICES; A. Computations in Finite Fields; B. Some Mathematical Formulae; C. Signals and Spectra in Physical Layer |
Record Nr. | UNINA-9910792138303321 |
Chen Lidong
![]() |
||
Boca Raton, FL : , : Chapman and Hall/CRC, an imprint of Taylor and Francis, , 2012 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Communication system security / / by Lidong Chen and Guang Gong |
Autore | Chen Lidong |
Edizione | [1st edition] |
Pubbl/distr/stampa | Boca Raton, FL : , : Chapman and Hall/CRC, an imprint of Taylor and Francis, , 2012 |
Descrizione fisica | 1 online resource (738 p.) |
Disciplina | 621.389/28 |
Collana |
Chapman & Hall/CRC Cryptography and Network Security
A Chapman & Hall Book |
Soggetto topico | Telecommunication - Security measures |
ISBN |
0-429-09429-9
1-4398-4036-9 |
Classificazione | COM046000COM083000TEC061000 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Contents; Preface; Acknowledgments; 1. Introduction; I. Practical Cryptography Primitives; 2. Pseudorandom Sequence Generators; 3. Design of Stream Ciphers; 4. Design of Block Ciphers, Hash Functions, and MAC; 5. Public-Key Cryptographic Algorithms; II. Security Mechanisms and Protocols; 6. Security Infrastructure; 7. Establish Protected Communications; 8. Network Security Protocols; III. Wireless Security; 9. Network Access Authentication; 10. Wireless Network Security; 11. Security for Mobility; 12. Broadcast and Multicast Key Distribution and Authentication
IV. System Security13. Trusted Platform; 14. Physical-Layer Security; 15. Spread-Spectrum Techniques for Anti-Jamming-Attacks; APPENDICES; A. Computations in Finite Fields; B. Some Mathematical Formulae; C. Signals and Spectra in Physical Layer |
Record Nr. | UNINA-9910819329103321 |
Chen Lidong
![]() |
||
Boca Raton, FL : , : Chapman and Hall/CRC, an imprint of Taylor and Francis, , 2012 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Critical infrastructure protection: CISA should assess the effectiveness of its actions to support the communications sector : report to congressional addressees |
Pubbl/distr/stampa | [Washington, D.C.] : , : United States Government Accountability Office, , 2021 |
Descrizione fisica | 1 online resource (ii, 38 pages) : color illustrations |
Soggetto topico |
Telecommunication - Security measures - United States
Broadcasting - Security measures - United States Artificial satellites in telecommunication - Security measures - United States Broadband communication systems - Security measures - United States Emergency management - United States Infrastructure (Economics) - Security measures - United States Emergency management Telecommunication - Security measures |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Critical infrastructure protection |
Record Nr. | UNINA-9910717292203321 |
[Washington, D.C.] : , : United States Government Accountability Office, , 2021 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|