top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Hack proofing ColdFusion [[electronic resource] /] / Greg Meyer ... [et al.]
Hack proofing ColdFusion [[electronic resource] /] / Greg Meyer ... [et al.]
Pubbl/distr/stampa Rockland, Mass., : Syngress Publishing, Inc., c2002
Descrizione fisica 1 online resource (545 p.)
Disciplina 005.75/8
Soggetto topico Computer networks - Security measures
Computer security
Database design
World Wide Web - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-281-05256-6
9786611052560
0-08-047809-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1928994776.pdf; 1928994776.pdf; Cover; Table of Contents; Foreword; Chapter 1 Thinking Like a Hacker; Chapter 2 Securing Your ColdFusion Development; Chapter 3 Securing Your ColdFusion Tags; Chapter 4 Securing Your ColdFusion Applications; Chapter 5 The ColdFusion Development System; Chapter 6 Configuring ColdFusion Server Security; Chapter 7 Securing the ColdFusion Server after Installation; Chapter 8 Securing Windows and IIS; Chapter 9 Securing Solaris, Linux, and Apache; Chapter 10 Database Security; Chapter 11 Securing Your ColdFusion Applications Using Third-Party Tools
Chapter 12 Security Features in ColdFusion MXIndex; Related Titles
Record Nr. UNINA-9910455224103321
Rockland, Mass., : Syngress Publishing, Inc., c2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Hack proofing ColdFusion [[electronic resource] /] / Greg Meyer ... [et al.]
Hack proofing ColdFusion [[electronic resource] /] / Greg Meyer ... [et al.]
Pubbl/distr/stampa Rockland, Mass., : Syngress Publishing, Inc., c2002
Descrizione fisica 1 online resource (545 p.)
Disciplina 005.75/8
Soggetto topico Computer networks - Security measures
Computer security
Database design
World Wide Web - Security measures
ISBN 1-281-05256-6
9786611052560
0-08-047809-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1928994776.pdf; 1928994776.pdf; Cover; Table of Contents; Foreword; Chapter 1 Thinking Like a Hacker; Chapter 2 Securing Your ColdFusion Development; Chapter 3 Securing Your ColdFusion Tags; Chapter 4 Securing Your ColdFusion Applications; Chapter 5 The ColdFusion Development System; Chapter 6 Configuring ColdFusion Server Security; Chapter 7 Securing the ColdFusion Server after Installation; Chapter 8 Securing Windows and IIS; Chapter 9 Securing Solaris, Linux, and Apache; Chapter 10 Database Security; Chapter 11 Securing Your ColdFusion Applications Using Third-Party Tools
Chapter 12 Security Features in ColdFusion MXIndex; Related Titles
Record Nr. UNINA-9910779970203321
Rockland, Mass., : Syngress Publishing, Inc., c2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Hack proofing ColdFusion / / Greg Meyer ... [et al.]
Hack proofing ColdFusion / / Greg Meyer ... [et al.]
Edizione [1st ed.]
Pubbl/distr/stampa Rockland, Mass., : Syngress Publishing, Inc., c2002
Descrizione fisica 1 online resource (545 p.)
Disciplina 005.75/8
Soggetto topico Computer networks - Security measures
Computer security
Database design
World Wide Web - Security measures
ISBN 1-281-05256-6
9786611052560
0-08-047809-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1928994776.pdf; 1928994776.pdf; Cover; Table of Contents; Foreword; Chapter 1 Thinking Like a Hacker; Chapter 2 Securing Your ColdFusion Development; Chapter 3 Securing Your ColdFusion Tags; Chapter 4 Securing Your ColdFusion Applications; Chapter 5 The ColdFusion Development System; Chapter 6 Configuring ColdFusion Server Security; Chapter 7 Securing the ColdFusion Server after Installation; Chapter 8 Securing Windows and IIS; Chapter 9 Securing Solaris, Linux, and Apache; Chapter 10 Database Security; Chapter 11 Securing Your ColdFusion Applications Using Third-Party Tools
Chapter 12 Security Features in ColdFusion MXIndex; Related Titles
Altri titoli varianti Hackproofing ColdFusion
Record Nr. UNINA-9910812184203321
Rockland, Mass., : Syngress Publishing, Inc., c2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
How to attack and defend your website / / Henry Dalziel
How to attack and defend your website / / Henry Dalziel
Autore Dalziel Henry
Edizione [1st edition]
Pubbl/distr/stampa Waltham, Massachusetts : , : Syngress, , 2015
Descrizione fisica 1 online resource (1 volume) : illustrations
Disciplina 005.8
Soggetto topico Internet - Security measures
Web servers - Security measures
World Wide Web - Security measures
Soggetto genere / forma Electronic books.
ISBN 0-12-802732-0
0-12-802754-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910463790403321
Dalziel Henry  
Waltham, Massachusetts : , : Syngress, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
How to attack and defend your website / / Henry Dalziel
How to attack and defend your website / / Henry Dalziel
Autore Dalziel Henry
Edizione [1st edition]
Pubbl/distr/stampa Waltham, Massachusetts : , : Syngress, , 2015
Descrizione fisica 1 online resource (1 volume) : illustrations
Disciplina 005.8
Soggetto topico Internet - Security measures
Web servers - Security measures
World Wide Web - Security measures
ISBN 0-12-802732-0
0-12-802754-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910788201303321
Dalziel Henry  
Waltham, Massachusetts : , : Syngress, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
How to attack and defend your website / / Henry Dalziel
How to attack and defend your website / / Henry Dalziel
Autore Dalziel Henry
Edizione [1st edition]
Pubbl/distr/stampa Waltham, Massachusetts : , : Syngress, , 2015
Descrizione fisica 1 online resource (1 volume) : illustrations
Disciplina 005.8
Soggetto topico Internet - Security measures
Web servers - Security measures
World Wide Web - Security measures
ISBN 0-12-802732-0
0-12-802754-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910821974303321
Dalziel Henry  
Waltham, Massachusetts : , : Syngress, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Implementing SSL/TLS using cryptography and PKI [[electronic resource] /] / Joshua Davies
Implementing SSL/TLS using cryptography and PKI [[electronic resource] /] / Joshua Davies
Autore Davies Joshua Dennis
Edizione [1st ed.]
Pubbl/distr/stampa Indianapolis, Ind., : Wiley Pub., Inc, 2011
Descrizione fisica 1 online resource (697 p.)
Disciplina 005.8
Soggetto topico Computer networks - Security measures
World Wide Web - Security measures
Computer network protocols
ISBN 1-283-02725-9
9786613027252
1-118-25579-8
1-118-03877-0
1-118-03875-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Implementing SSL/TLS Using Cryptography and PKI; Contents; Introduction; Chapter 1: Understanding Internet Security; What Are Secure Sockets?; "Insecure" Communications: Understanding the HTTP Protocol; Implementing an HTTP Client; Adding Support for HTTP Proxies; Reliable Transmission of Binary Data with Base64 Encoding; Implementing an HTTP Server; Roadmap for the Rest of This Book; Chapter 2: Protecting Against Eavesdroppers with Symmetric Cryptography; Understanding Block Cipher Cryptography Algorithms; Implementing the Data Encryption Standard (DES) Algorithm; DES Initial Permutation
DES Key ScheduleDES Expansion Function; DES Decryption; Padding and Chaining in Block Cipher Algorithms; Using the Triple-DES Encryption Algorithm to Increase Key Length; Faster Encryption with the Advanced Encryption Standard (AES) Algorithm; AES Key Schedule Computation; AES Encryption; Other Block Cipher Algorithms; Understanding Stream Cipher Algorithms; Understanding and Implementing the RC4 Algorithm; Converting a Block Cipher to a Stream Cipher: The OFB and COUNTER Block-Chaining Modes; Chapter 3: Secure Key Exchange over an Insecure Medium with Public Key Cryptography
Understanding the Theory Behind the RSA AlgorithmPerforming Arbitrary Precision Binary Math to Implement Public-Key Cryptography; Implementing Large-Number Addition; Implementing Large-Number Subtraction; Implementing Large-Number Division; Comparing Large Numbers; Optimizing for Modulo Arithmetic; Using Modulus Operations to Efficiently Compute Discrete Logarithms in a Finite Field; Encryption and Decryption with RSA; Encrypting with RSA; Decrypting with RSA; Encrypting a Plaintext Message; Decrypting an RSA-Encrypted Message; Testing RSA Encryption and Decryption
Getting More Security per Key Bit: Elliptic Curve CryptographyHow Elliptic Curve Cryptography Relies on Modular Inversions; Using the Euclidean Algorithm to compute Greatest Common Denominators; Computing Modular Inversions with the Extended Euclidean Algorithm; Adding Negative Number Support to the Huge Number Library; Supporting Negative Remainders; Making ECC Work with Whole Integers: Elliptic-Curve Cryptography over Fp; Reimplementing Diffie-Hellman to Use ECC Primitives; Why Elliptic-Curve Cryptography?; Chapter 4: Authenticating Communications Using Digital Signatures
Using Message Digests to Create Secure Document SurrogatesImplementing the MD5 Digest Algorithm; Understanding MD5; A Secure Hashing Example; Securely Hashing a Single Block of Data; MD5 Vulnerabilities; Increasing Collision Resistance with the SHA-1 Digest Algorithm; Understanding SHA-1 Block Computation; Understanding the SHA-1 Input Processing Function; Understanding SHA-1 Finalization; Even More Collision Resistance with the SHA-256 Digest Algorithm; Preventing Replay Attacks with the HMAC Keyed-Hash Algorithm; Implementing a Secure HMAC Algorithm; Completing the HMAC Operation
Creating Updateable Hash Functions
Record Nr. UNINA-9910141045803321
Davies Joshua Dennis  
Indianapolis, Ind., : Wiley Pub., Inc, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Implementing SSL/TLS using cryptography and PKI / / Joshua Davies
Implementing SSL/TLS using cryptography and PKI / / Joshua Davies
Autore Davies Joshua Dennis
Edizione [1st ed.]
Pubbl/distr/stampa Indianapolis, Ind., : Wiley Pub., Inc, 2011
Descrizione fisica 1 online resource (697 p.)
Disciplina 005.8
Soggetto topico Computer networks - Security measures
World Wide Web - Security measures
Computer network protocols
ISBN 1-283-02725-9
9786613027252
1-118-25579-8
1-118-03877-0
1-118-03875-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Implementing SSL/TLS Using Cryptography and PKI; Contents; Introduction; Chapter 1: Understanding Internet Security; What Are Secure Sockets?; "Insecure" Communications: Understanding the HTTP Protocol; Implementing an HTTP Client; Adding Support for HTTP Proxies; Reliable Transmission of Binary Data with Base64 Encoding; Implementing an HTTP Server; Roadmap for the Rest of This Book; Chapter 2: Protecting Against Eavesdroppers with Symmetric Cryptography; Understanding Block Cipher Cryptography Algorithms; Implementing the Data Encryption Standard (DES) Algorithm; DES Initial Permutation
DES Key ScheduleDES Expansion Function; DES Decryption; Padding and Chaining in Block Cipher Algorithms; Using the Triple-DES Encryption Algorithm to Increase Key Length; Faster Encryption with the Advanced Encryption Standard (AES) Algorithm; AES Key Schedule Computation; AES Encryption; Other Block Cipher Algorithms; Understanding Stream Cipher Algorithms; Understanding and Implementing the RC4 Algorithm; Converting a Block Cipher to a Stream Cipher: The OFB and COUNTER Block-Chaining Modes; Chapter 3: Secure Key Exchange over an Insecure Medium with Public Key Cryptography
Understanding the Theory Behind the RSA AlgorithmPerforming Arbitrary Precision Binary Math to Implement Public-Key Cryptography; Implementing Large-Number Addition; Implementing Large-Number Subtraction; Implementing Large-Number Division; Comparing Large Numbers; Optimizing for Modulo Arithmetic; Using Modulus Operations to Efficiently Compute Discrete Logarithms in a Finite Field; Encryption and Decryption with RSA; Encrypting with RSA; Decrypting with RSA; Encrypting a Plaintext Message; Decrypting an RSA-Encrypted Message; Testing RSA Encryption and Decryption
Getting More Security per Key Bit: Elliptic Curve CryptographyHow Elliptic Curve Cryptography Relies on Modular Inversions; Using the Euclidean Algorithm to compute Greatest Common Denominators; Computing Modular Inversions with the Extended Euclidean Algorithm; Adding Negative Number Support to the Huge Number Library; Supporting Negative Remainders; Making ECC Work with Whole Integers: Elliptic-Curve Cryptography over Fp; Reimplementing Diffie-Hellman to Use ECC Primitives; Why Elliptic-Curve Cryptography?; Chapter 4: Authenticating Communications Using Digital Signatures
Using Message Digests to Create Secure Document SurrogatesImplementing the MD5 Digest Algorithm; Understanding MD5; A Secure Hashing Example; Securely Hashing a Single Block of Data; MD5 Vulnerabilities; Increasing Collision Resistance with the SHA-1 Digest Algorithm; Understanding SHA-1 Block Computation; Understanding the SHA-1 Input Processing Function; Understanding SHA-1 Finalization; Even More Collision Resistance with the SHA-256 Digest Algorithm; Preventing Replay Attacks with the HMAC Keyed-Hash Algorithm; Implementing a Secure HMAC Algorithm; Completing the HMAC Operation
Creating Updateable Hash Functions
Record Nr. UNINA-9910814482003321
Davies Joshua Dennis  
Indianapolis, Ind., : Wiley Pub., Inc, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Innocent code [[electronic resource] ] : a security wake-up call for Web programmers / / Sverre H. Huseby
Innocent code [[electronic resource] ] : a security wake-up call for Web programmers / / Sverre H. Huseby
Autore Huseby Sverre H
Pubbl/distr/stampa New York, : John Wiley & Sons, c2004
Descrizione fisica 1 online resource (248 p.)
Disciplina 005.8
Soggetto topico Computer security
Computer networks - Security measures
World Wide Web - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-280-27073-X
9786610270736
0-470-85747-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents; Foreword; Acknowledgments; Introduction; 0.1 The Rules; 0.2 The Examples; 0.3 The Chapters; 0.4 What is Not in This Book?; 0.5 A Note from the Author; 0.6 Feedback; 1 The Basics; 1.1 HTTP; 1.1.1 Requests and responses; 1.1.2 The Referer header; 1.1.3 Caching; 1.1.4 Cookies; 1.2 Sessions; 1.2.1 Session hijacking; 1.3 HTTPS; 1.4 Summary; 1.5 Do You Want to Know More?; 2 Passing Data to Subsystems; 2.1 SQL Injection; 2.1.1 Examples, examples and then some; 2.1.2 Using error messages to fetch information; 2.1.3 Avoiding SQL injection; 2.2 Shell Command Injection; 2.2.1 Examples
2.2.2 Avoiding shell command injection2.3 Talking to Programs Written in C/C++; 2.3.1 Example; 2.4 The Evil Eval; 2.5 Solving Metacharacter Problems; 2.5.1 Multi-level interpretation; 2.5.2 Architecture; 2.5.3 Defense in depth; 2.6 Summary; 3 User Input; 3.1 What is Input Anyway?; 3.1.1 The invisible security barrier; 3.1.2 Language peculiarities: totally unexpected input; 3.2 Validating Input; 3.2.1 Whitelisting vs. blacklisting; 3.3 Handling Invalid Input; 3.3.1 Logging; 3.4 The Dangers of Client-side Validation; 3.5 Authorization Problems; 3.5.1 Indirect access to data
3.5.2 Passing too much to the client3.5.3 Missing authorization tests; 3.5.4 Authorization by obscurity; 3.6 Protecting server-generated input; 3.7 Summary; 4 Output Handling: The Cross-site Scripting Problem; 4.1 Examples; 4.1.1 Session hijacking; 4.1.2 Text modification; 4.1.3 Socially engineered Cross-site Scripting; 4.1.4 Theft of passwords; 4.1.5 Too short for scripts?; 4.2 The Problem; 4.3 The Solution; 4.3.1 HTML encoding; 4.3.2 Selective tag filtering; 4.3.3 Program design; 4.4 Browser Character Sets; 4.5 Summary; 4.6 Do You Want to Know More?; 5 Web Trojans; 5.1 Examples
5.2 The Problem5.3 A Solution; 5.4 Summary; 6 Passwords and Other Secrets; 6.1 Crypto-Stuff; 6.1.1 Symmetric encryption; 6.1.2 Asymmetric encryption; 6.1.3 Message digests; 6.1.4 Digital signatures; 6.1.5 Public key certificates; 6.2 Password-based Authentication; 6.2.1 On clear-text passwords; 6.2.2 Lost passwords; 6.2.3 Cracking hashed passwords; 6.2.4 Remember me?; 6.3 Secret Identifiers; 6.4 Secret Leakage; 6.4.1 GET request leakage; 6.4.2 Missing encryption; 6.5 Availability of Server-side Code; 6.5.1 Insecure file names; 6.5.2 System software bugs; 6.6 Summary
6.7 Do You Want to Know More?7 Enemies of Secure Code; 7.1 Ignorance; 7.2 Mess; 7.3 Deadlines; 7.4 Salesmen; 7.5 Closing Remarks; 7.6 Do You Want to Know More?; 8 Summary of Rules for Secure Coding; Appendix A: Bugs in the Web Server; Appendix B: Packet Sniffing; B.1 Teach Yourself TCP/IP in Four Minutes; B.2 Sniffing the Packets; B.3 Man-In-The-Middle Attacks; B.4 MITM with HTTPS; B.5 Summary; B.6 Do You Want to Know More?; Appendix C: Sending HTML Formatted E-mails with a Forged Sender Address; Appendix D: More Information; D.1 Mailing Lists; D.2 OWASP; Acronyms; References; Index; A; B; C
D
Record Nr. UNINA-9910449879703321
Huseby Sverre H  
New York, : John Wiley & Sons, c2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Innocent code [[electronic resource] ] : a security wake-up call for Web programmers / / Sverre H. Huseby
Innocent code [[electronic resource] ] : a security wake-up call for Web programmers / / Sverre H. Huseby
Autore Huseby Sverre H
Pubbl/distr/stampa New York, : John Wiley & Sons, c2004
Descrizione fisica 1 online resource (248 p.)
Disciplina 005.8
Soggetto topico Computer security
Computer networks - Security measures
World Wide Web - Security measures
ISBN 1-280-27073-X
9786610270736
0-470-85747-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents; Foreword; Acknowledgments; Introduction; 0.1 The Rules; 0.2 The Examples; 0.3 The Chapters; 0.4 What is Not in This Book?; 0.5 A Note from the Author; 0.6 Feedback; 1 The Basics; 1.1 HTTP; 1.1.1 Requests and responses; 1.1.2 The Referer header; 1.1.3 Caching; 1.1.4 Cookies; 1.2 Sessions; 1.2.1 Session hijacking; 1.3 HTTPS; 1.4 Summary; 1.5 Do You Want to Know More?; 2 Passing Data to Subsystems; 2.1 SQL Injection; 2.1.1 Examples, examples and then some; 2.1.2 Using error messages to fetch information; 2.1.3 Avoiding SQL injection; 2.2 Shell Command Injection; 2.2.1 Examples
2.2.2 Avoiding shell command injection2.3 Talking to Programs Written in C/C++; 2.3.1 Example; 2.4 The Evil Eval; 2.5 Solving Metacharacter Problems; 2.5.1 Multi-level interpretation; 2.5.2 Architecture; 2.5.3 Defense in depth; 2.6 Summary; 3 User Input; 3.1 What is Input Anyway?; 3.1.1 The invisible security barrier; 3.1.2 Language peculiarities: totally unexpected input; 3.2 Validating Input; 3.2.1 Whitelisting vs. blacklisting; 3.3 Handling Invalid Input; 3.3.1 Logging; 3.4 The Dangers of Client-side Validation; 3.5 Authorization Problems; 3.5.1 Indirect access to data
3.5.2 Passing too much to the client3.5.3 Missing authorization tests; 3.5.4 Authorization by obscurity; 3.6 Protecting server-generated input; 3.7 Summary; 4 Output Handling: The Cross-site Scripting Problem; 4.1 Examples; 4.1.1 Session hijacking; 4.1.2 Text modification; 4.1.3 Socially engineered Cross-site Scripting; 4.1.4 Theft of passwords; 4.1.5 Too short for scripts?; 4.2 The Problem; 4.3 The Solution; 4.3.1 HTML encoding; 4.3.2 Selective tag filtering; 4.3.3 Program design; 4.4 Browser Character Sets; 4.5 Summary; 4.6 Do You Want to Know More?; 5 Web Trojans; 5.1 Examples
5.2 The Problem5.3 A Solution; 5.4 Summary; 6 Passwords and Other Secrets; 6.1 Crypto-Stuff; 6.1.1 Symmetric encryption; 6.1.2 Asymmetric encryption; 6.1.3 Message digests; 6.1.4 Digital signatures; 6.1.5 Public key certificates; 6.2 Password-based Authentication; 6.2.1 On clear-text passwords; 6.2.2 Lost passwords; 6.2.3 Cracking hashed passwords; 6.2.4 Remember me?; 6.3 Secret Identifiers; 6.4 Secret Leakage; 6.4.1 GET request leakage; 6.4.2 Missing encryption; 6.5 Availability of Server-side Code; 6.5.1 Insecure file names; 6.5.2 System software bugs; 6.6 Summary
6.7 Do You Want to Know More?7 Enemies of Secure Code; 7.1 Ignorance; 7.2 Mess; 7.3 Deadlines; 7.4 Salesmen; 7.5 Closing Remarks; 7.6 Do You Want to Know More?; 8 Summary of Rules for Secure Coding; Appendix A: Bugs in the Web Server; Appendix B: Packet Sniffing; B.1 Teach Yourself TCP/IP in Four Minutes; B.2 Sniffing the Packets; B.3 Man-In-The-Middle Attacks; B.4 MITM with HTTPS; B.5 Summary; B.6 Do You Want to Know More?; Appendix C: Sending HTML Formatted E-mails with a Forged Sender Address; Appendix D: More Information; D.1 Mailing Lists; D.2 OWASP; Acronyms; References; Index; A; B; C
D
Record Nr. UNINA-9910783400003321
Huseby Sverre H  
New York, : John Wiley & Sons, c2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui