Guidance for securing Microsoft Windows XP for IT Professionals : a NIST security configuration checklist : recommendations of the National Institute of Standards and Technology / / Murugia Souppaya, Karen Kent, Paul M. Johnson |
Autore | Souppaya Murugiah |
Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2005 |
Descrizione fisica | 1 online resource |
Altri autori (Persone) |
JohnsonPaul M
KentKaren |
Collana | NIST special publication |
Soggetto non controllato |
Anti-virus
Authentication Computer security COTS Encryption Firewall Hardening IPsec Lockdown Malware Microsoft Operating system Security checklist Security configuration Security controls Security policy Security templates Spyware Threats W |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Guidance for securing Microsoft Windows XP for IT Professionals |
Record Nr. | UNINA-9910711179703321 |
Souppaya Murugiah
![]() |
||
Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2005 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Part 1. / Sheng Wen, Albert Zomaya, Laurence T. Yang editors |
Pubbl/distr/stampa | Cham, : Springer, 2020 |
Descrizione fisica | xxii, 715 p. : ill. ; 24 cm |
Soggetto topico |
68-XX - Computer science [MSC 2020]
00B25 - Proceedings of conferences of miscellaneous specific interest [MSC 2020] 68Wxx - Algorithms in computer science [MSC 2020] |
Soggetto non controllato |
Artificial Intelligence
Authentication Cloud Computing Computer Networks Computer architecture Computer crime Cryptography Data communication systems Data mining databases Distributed algorithms Distributed architectures Distributed computing models Massively parallel systems Parallel algorithms Parallel and distributed DBMSs Parallel computing models Systems security Testing with distributed systems Testing with parallel systems |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Titolo uniforme | |
Record Nr. | UNISOB-VAN0248652 |
Cham, : Springer, 2020 | ||
![]() | ||
Lo trovi qui: Univ. Suor Orsola Benincasa | ||
|
Part 1. / Sheng Wen, Albert Zomaya, Laurence T. Yang editors |
Pubbl/distr/stampa | Cham, : Springer, 2020 |
Descrizione fisica | xxii, 715 p. : ill. ; 24 cm |
Soggetto topico |
68-XX - Computer science [MSC 2020]
00B25 - Proceedings of conferences of miscellaneous specific interest [MSC 2020] 68Wxx - Algorithms in computer science [MSC 2020] |
Soggetto non controllato |
Artificial Intelligence
Authentication Cloud Computing Computer Networks Computer architecture Computer crime Cryptography Data communication systems Data mining databases Distributed algorithms Distributed architectures Distributed computing models Massively parallel systems Parallel algorithms Parallel and distributed DBMSs Parallel computing models Systems security Testing with distributed systems Testing with parallel systems |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Titolo uniforme | |
Record Nr. | UNICAMPANIA-VAN0248652 |
Cham, : Springer, 2020 | ||
![]() | ||
Lo trovi qui: Univ. Vanvitelli | ||
|
Recommendation for block cipher modes of operation [[electronic resource] ] : the CCM mode for authentication and confidentiality / / Morris Dworkin |
Autore | Dworkin Morris |
Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, , [2004] |
Descrizione fisica | iv, 21 pages : digital, PDF file |
Altri autori (Persone) | DworkinM. J |
Collana | NIST special publication ;Computer security |
Soggetto topico |
Computer security - Standards - United States
Authentication - Standards Data encryption (Computer science) |
Soggetto non controllato |
Authenticated encryption
Authentication Block cipher Confidentiality Cryptography Encryption Information security Message authentication code Mode of operation |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Recommendation for block cipher modes of operation |
Record Nr. | UNINA-9910695294003321 |
Dworkin Morris
![]() |
||
Gaithersburg, MD : , : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, , [2004] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Security solutions and applied cryptography in smart grid communications / / Mohamed Amine Ferrag and Ahmed Ahmim, editors |
Autore | Ferrag Mohamed Amine <1987-> |
Pubbl/distr/stampa | Hershey PA : , : Information Science Reference, , [2017] |
Descrizione fisica | PDFs (463 pages) : illustrations |
Disciplina | 621.31 |
Collana | Advances in information security, privacy, and ethics (AISPE) book series |
Soggetto topico |
Smart power grids - Security measures
Cryptography |
Soggetto non controllato |
Authentication
Infrequent pattern Identification Intrusion detection System Photovoltaic systems Renewable energy Smart meters Threat detection |
ISBN | 1-5225-1830-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Vulnerabilities and threats in smart grid communication networks / Yona Lopes [and 6 others] -- Security issues of communication networks in smart grid / Gurbakshish Singh Toor, Maode Ma -- Denial of service attack on protocols for smart grid communications / Swapnoneel Roy -- Detecting synchronization signal jamming attacks for cybersecurity in cyber-physical energy grid systems / Danda B. Rawat, Brycent A. Chatfield -- Privacy-preserving aggregation in the smart grid / Georgios Karopoulos, Christoforos Ntantogian, Christos Xenakis -- Analytical study on privacy attack models in privacy preserving data publishing / Sowmyarani C. N., Dayananda P. -- Authentication of smart grid: the case for using Merkle trees / Melesio Calderón Muñoz, Melody Moh -- Secure interoperability in cyber-physical systems / Cristina Alcaraz, Javier Lopez -- Novel intrusion detection mechanism with low overhead for SCADA systems / Leandros Maglaras [and 3 others] -- A study on M2M (machine to machine) system and communication: its security, threats, and intrusion detection system / Rami Haidar Ahmad, Al-Sakib Khan Pathan -- Infrequent pattern identification in SCADA systems using unsupervised learning / Mohiuddin Ahmed -- CYRAN: a hybrid cyber range for testing security on ICS/SCADA systems / Bil Hallaq [and 5 others] -- A key management scheme for secure communications based on smart grid requirements (KMS-CL-SG) / Bashar Alohali [and 3 others] --
Modelling software-defined wireless sensor network architectures for smart grid neighborhood area networks / Nazmus S. Nafi, Khandakar Ahmed, Mark A. Gregory -- Smart energy and cost optimization for hybrid micro-grids: PV/ wind/ battery/ diesel generator control / Imene Yahyaoui [and 3 others] -- Feasibility study of renewable energy integrated electric vehicle charging infrastructure / Azhar Ul-Haq, Marium Azhar -- Enabling publish/subscribe communication for on-the-move electric vehicle charging management / Yue Cao, Tong Wang, Yunfeng Wang -- Smart control strategy for small-scale photovoltaic systems connected to single-phase grids: active and reactive powers control / Imene Yahyaoui, Fernando Tadeo, Marcelo Eduardo Vieira Segatto. |
Record Nr. | UNINA-9910154880103321 |
Ferrag Mohamed Amine <1987->
![]() |
||
Hershey PA : , : Information Science Reference, , [2017] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|