Aggiustare il mondo. La vita, il processo e l’eredità dell’hacker Aaron Swartz |
Autore | Ziccardi Giovanni |
Pubbl/distr/stampa | Milano, : Milano University Press, 2022 |
Soggetto topico | Biography & True Stories |
Soggetto non controllato |
Aaron Swartz
Open Access Hacking Creative Commons Computer crimes Open culture |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | ita |
Record Nr. | UNINA-9910910489303321 |
Ziccardi Giovanni | ||
Milano, : Milano University Press, 2022 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Combating spyware : H.R. 29, the SPY Act : hearing before the Committee on Energy and Commerce, House of Representatives, One Hundred Ninth Congress, first session, January 26, 2005 |
Descrizione fisica | 1 online resource (iii, 71 p.) : ill |
Soggetto topico |
Spyware (Computer software) - Law and legislation - United States
Computer crimes - United States Privacy, Right of - United States |
Soggetto non controllato |
Computer crimes
Privacy, right of Spyware (computer software) Computer networks True crime Law Computers |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Combating spyware |
Record Nr. | UNINA-9910693942303321 |
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber security : private-sector efforts addressing cyber threats : hearing before the Subcommittee on Commerce, Trade, and Consumer Protection, Committee on Energy and Commerce, House of Representatives, One Hundred Seventh Congress, first session, November 15, 2001 |
Descrizione fisica | 1 online resource (iii, 65 p.) |
Soggetto topico |
Computer security - United States
Database security - United States Cyberterrorism - United States - Prevention Computer crimes - United States - Prevention |
Soggetto non controllato |
Computer security
Computer crimes Computers True crime |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Cyber security |
Record Nr. | UNINA-9910689403903321 |
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber Security Enhancement Act of 2001 : hearing before the Subcommittee on Crime of the Committee on the Judiciary, House of Representatives, One Hundred Seventh Congress, second session on H.R. 3482, February 12, 2002 |
Pubbl/distr/stampa | : Washington : U.S. G.P.O. |
Descrizione fisica | 1 online resource (iii, 70 p.) |
Soggetto topico |
Computer security - United States
Cyberterrorism - United States - Prevention Computer crimes - United States - Prevention |
Soggetto non controllato |
Computer security
Computer crimes Computers True crime |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Cyber Security Enhancement Act of 2001 |
Record Nr. | UNINA-9910689741403321 |
: Washington : U.S. G.P.O. | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber security research and development : hearing before the Committee on Science, House of Representatives, One Hundred Eighth Congress, first session, May 14, 2003 |
Descrizione fisica | 1 online resource (iv, 112 p.) |
Soggetto topico |
Computer security - United States
Cyberterrorism - United States - Prevention Computer networks - Security measures - United States |
Soggetto non controllato |
Computer security
Computer crimes Computer networks Computers True crime |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Cyber security research and development |
Record Nr. | UNINA-9910689629803321 |
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cybercrime : can a small business protect itself? : forum before the Committee on Small Business, United States Senate, One Hundred Sixth Congress, second session, March 9, 2000 |
Descrizione fisica | 1 online resource (68 p.) : ill |
Soggetto topico |
Computer crimes - Economic aspects - United States
Small business - Security measures - United States Electronic commerce - United States |
Soggetto non controllato |
Computer crimes
Small business Electronic commerce True crime Business & economics |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Cybercrime |
Record Nr. | UNINA-9910689321903321 |
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The DHS infrastructure protection division : public-private partnerships to secure critical infrastructures : hearing before the Subcommittee on Infrastructure and Border Security and Subcommittee on Cybersecurity, Science, and Research and Development of the Select Committee on Homeland Security, House of Representatives, One Hundred Eighth Congress, second session, April 21, 2004 |
Descrizione fisica | 1 online resource (vi, 102 p.) |
Soggetto topico |
Computer security - Government policy - United States
Computer networks - Security measures - Government policy - United States Public-private sector cooperation - United States Cyberterrorism - United States - Prevention |
Soggetto non controllato |
United States
Computer networks Public-private sector cooperation Computer crimes Political science Computers Business & economics True crime |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | DHS infrastructure protection division |
Record Nr. | UNINA-9910693906603321 |
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Digital forensics : an academic introduction / / edited by Andre Arnes |
Pubbl/distr/stampa | Hoboken, New Jersey ; ; Chichester, England : , : Wiley, , 2018 |
Descrizione fisica | 1 online resource (373 pages) : illustrations, tables |
Disciplina | 363.25/968 |
Soggetto non controllato |
Computer crimes
Computer security Electronic discovery (Law) Forensic sciences Electronic books |
ISBN |
1-119-26241-0
1-119-26240-2 1-119-26244-5 |
Classificazione | MED030000 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Machine generated contents note: Preface List of Figures List of Tables List of Examples List of Definitions List of Abbreviations 1 Introduction 1 1.1 Forensic Science 1 1.2 Digital Forensics 4 1.3 Digital Evidence 7 1.4 Further Reading 9 1.5 Chapter Overview 10 1.6 Comments on Citation And Notation 11 2 The Digital Forensics Process 11 2.1 Introduction 12 2.2 The Identification Phase 16 2.3 The Collection Phase 24 2.4 The Examination Phase 35 2.5 The Analysis Phase 42 2.6 The Presentation Phase 47 2.7 Summary 50 2.8 Exercises 51 3 Cybercrime Law 54 3.1 Introduction 54 3.2 The International Legal Framework of Cybercrime Law 57 3.3 Digital Crime - Substantive Criminal Law 79 3.4 Investigation Methods for Collecting Digital Evidence 99 3.5 International Cooperation in Order to Collect Digital Evidence 113 3.6 Summary 119 3.7 Exercises 120 4 Digital Forensic Readiness 122 4.1 Introduction 122 4.2 Definition 122 4.3 Law Enforcement vs. Enterprise Digital Forensic Readiness 123 4.4 Why? - Rationale for Digital Forensic Readiness 124 4.5 Frameworks, Standards and Methodologies 129 4.6 Becoming "Digital Forensic" Ready 132 4.7 Enterprise Digital Forensic Readiness 133 4.8 Considerations for Law Enforcement 152 4.9 Summary 152 4.10 Exercises 153 5 Computer Forensics 154 5.1 Introduction 154 5.2 Evidence Collection 155 5.3 Examination 160 5.4 Analysis 198 5.5 Summary 201 5.6 Exercises 202 6 Mobile and Embedded Forensics 204 6.1 Introduction 205 6.2 Collection Phase 223 6.3 Examination Phase 260 6.4 Reverse Engineering and Analysis of Applications 281 6.5 Summary 285 6.6 Exercises 286 7 Internet Forensics 288 7.1 Introduction 288 7.2 Computer Networking 289 7.3 Layers of Network Abstraction 290 7.4 The Internet 291 7.5 Tracing Information on The Internet 302 7.6 Collection Phase - Local Acquisition 308 7.7 Collection Phase - Network Acquisition 312 7.8 Collection Phase - Remote Acquisition 314 7.9 Other Considerations 318 7.10 The Examination and Analysis Phases 320 7.11 Summary 326 7.12 Exercises 326 8 Challenges in Digital Forensics 328 8.1 Computational Forensics 328 8.2 Automation and Standardization 331 8.3 Research Agenda 332 8.4 Summary 332 9 Educational Guide 334 9.1 Teacher's Guide 334 9.2 Student´S Guide 335 9.3 Summary 339 About The Authors 340 Index 354. |
Record Nr. | UNINA-9910270867403321 |
Hoboken, New Jersey ; ; Chichester, England : , : Wiley, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Digital forensics : an academic introduction / / edited by Andre Arnes |
Pubbl/distr/stampa | Hoboken, New Jersey ; ; Chichester, England : , : Wiley, , 2018 |
Descrizione fisica | 1 online resource (373 pages) : illustrations, tables |
Disciplina | 363.25/968 |
Soggetto non controllato |
Computer crimes
Computer security Electronic discovery (Law) Forensic sciences Electronic books |
ISBN |
1-119-26241-0
1-119-26240-2 1-119-26244-5 |
Classificazione | MED030000 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Machine generated contents note: Preface List of Figures List of Tables List of Examples List of Definitions List of Abbreviations 1 Introduction 1 1.1 Forensic Science 1 1.2 Digital Forensics 4 1.3 Digital Evidence 7 1.4 Further Reading 9 1.5 Chapter Overview 10 1.6 Comments on Citation And Notation 11 2 The Digital Forensics Process 11 2.1 Introduction 12 2.2 The Identification Phase 16 2.3 The Collection Phase 24 2.4 The Examination Phase 35 2.5 The Analysis Phase 42 2.6 The Presentation Phase 47 2.7 Summary 50 2.8 Exercises 51 3 Cybercrime Law 54 3.1 Introduction 54 3.2 The International Legal Framework of Cybercrime Law 57 3.3 Digital Crime - Substantive Criminal Law 79 3.4 Investigation Methods for Collecting Digital Evidence 99 3.5 International Cooperation in Order to Collect Digital Evidence 113 3.6 Summary 119 3.7 Exercises 120 4 Digital Forensic Readiness 122 4.1 Introduction 122 4.2 Definition 122 4.3 Law Enforcement vs. Enterprise Digital Forensic Readiness 123 4.4 Why? - Rationale for Digital Forensic Readiness 124 4.5 Frameworks, Standards and Methodologies 129 4.6 Becoming "Digital Forensic" Ready 132 4.7 Enterprise Digital Forensic Readiness 133 4.8 Considerations for Law Enforcement 152 4.9 Summary 152 4.10 Exercises 153 5 Computer Forensics 154 5.1 Introduction 154 5.2 Evidence Collection 155 5.3 Examination 160 5.4 Analysis 198 5.5 Summary 201 5.6 Exercises 202 6 Mobile and Embedded Forensics 204 6.1 Introduction 205 6.2 Collection Phase 223 6.3 Examination Phase 260 6.4 Reverse Engineering and Analysis of Applications 281 6.5 Summary 285 6.6 Exercises 286 7 Internet Forensics 288 7.1 Introduction 288 7.2 Computer Networking 289 7.3 Layers of Network Abstraction 290 7.4 The Internet 291 7.5 Tracing Information on The Internet 302 7.6 Collection Phase - Local Acquisition 308 7.7 Collection Phase - Network Acquisition 312 7.8 Collection Phase - Remote Acquisition 314 7.9 Other Considerations 318 7.10 The Examination and Analysis Phases 320 7.11 Summary 326 7.12 Exercises 326 8 Challenges in Digital Forensics 328 8.1 Computational Forensics 328 8.2 Automation and Standardization 331 8.3 Research Agenda 332 8.4 Summary 332 9 Educational Guide 334 9.1 Teacher's Guide 334 9.2 Student´S Guide 335 9.3 Summary 339 About The Authors 340 Index 354. |
Record Nr. | UNINA-9910830954103321 |
Hoboken, New Jersey ; ; Chichester, England : , : Wiley, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Electronic Communications Privacy Act of 2000, Digital Privacy Act of 2000, and Notice of Electronic Monitoring Act : hearing before the Subcommittee on the Constitution of the Committee on the Judiciary, House of Representatives, One Hundred Sixth Congress, second session, on H.R. 5018, H.R. 4987, and H.R. 4908, September 6, 2000 |
Descrizione fisica | 1 online resource (iv, 101 p.) |
Soggetto topico |
Telecommunication - Law and legislation - United States
Privacy, Right of - United States Disclosure of information - Law and legislation - United States Computer crimes - United States Eavesdropping - United States Electronic monitoring in the workplace - Law and legislation - United States |
Soggetto non controllato |
Telecommunication
Privacy, right of Disclosure of information Computer crimes Eavesdropping Law Social science |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Electronic Communications Privacy Act of 2000, Digital Privacy Act of 2000, and Notice of Electronic Monitoring Act |
Record Nr. | UNINA-9910689486903321 |
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|