top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Academic and legal implications of VA's data loss : hearing before the Committee on Veterans' Affairs, House of Representatives, One Hundred Ninth Congress, second session, June 22, 2006
Academic and legal implications of VA's data loss : hearing before the Committee on Veterans' Affairs, House of Representatives, One Hundred Ninth Congress, second session, June 22, 2006
Descrizione fisica 1 online resource (2 p.)
Soggetto topico Data protection - United States
Computer security - United States
Soggetto non controllato Data protection
Computer security
National security
Computers
Political science
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Academic and legal implications of VA's data loss
Record Nr. UNINA-9910694383903321
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Algebraic design theory and Hadamard matrices : ADTHM, Lethbridge, Alberta, Canada, july 2014 / Charles J. Colbourn editor
Algebraic design theory and Hadamard matrices : ADTHM, Lethbridge, Alberta, Canada, july 2014 / Charles J. Colbourn editor
Pubbl/distr/stampa [Cham], : Springer, 2015
Descrizione fisica XI, 259 p. : ill. ; 24 cm
Soggetto topico 05B05 - Combinatorial aspects of block designs [MSC 2020]
20J06 - Cohomology of groups [MSC 2020]
05C50 - Graphs and linear algebra (matrices, eigenvalues, etc.) [MSC 2020]
05A05 - Permutations, words, matrices [MSC 2020]
05B40 - Combinatorial aspects of packing and covering [MSC 2020]
05E30 - Association schemes, strongly regular graphs [MSC 2020]
20B25 - Finite automorphism groups of algebraic, geometric, or combinatorial structures [MSC 2020]
05B20 - Combinatorial aspects of matrices (incidence, Hadamard, etc.) [MSC 2020]
06A07 - Combinatorics of partially ordered sets [MSC 2020]
15B34 - Boolean and Hadamard matrices [MSC 2020]
Soggetto non controllato Algebraic design theory
Coding theory
Combinatorics
Computer security
Hadamard matrices
Information and communication, circuits
Matrix theory
Quantum Information Theory
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Titolo uniforme
Record Nr. UNICAMPANIA-VAN0113503
[Cham], : Springer, 2015
Materiale a stampa
Lo trovi qui: Univ. Vanvitelli
Opac: Controlla la disponibilità qui
Assessing data security : preventing breaches and protecting sensitive information : hearing before the Committee on Financial Services, U.S. House of Representatives, One Hundred Ninth Congress, first session, May 4, 2005
Assessing data security : preventing breaches and protecting sensitive information : hearing before the Committee on Financial Services, U.S. House of Representatives, One Hundred Ninth Congress, first session, May 4, 2005
Descrizione fisica 1 online resource (iii, 118 p.)
Soggetto topico Computer security - United States
Data protection - United States
Identity theft - United States - Prevention
Soggetto non controllato Computer security
Data protection
Identity theft
Computers
Social science
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Assessing data security
Record Nr. UNINA-9910694101303321
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Automated tools for testing computer system vulnerability / / W. Timothy Polk
Automated tools for testing computer system vulnerability / / W. Timothy Polk
Autore Polk W. Timothy
Pubbl/distr/stampa Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 1992
Descrizione fisica 1 online resource
Altri autori (Persone) PolkW. Timothy
Collana NIST special publication
Soggetto non controllato Change detection
Computer security
Configuration review
Identification of vulnerabilities
Secure audit
Trojan horse detection
Vulnerability testing
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910711180503321
Polk W. Timothy  
Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 1992
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Bibliography of selected computer security publications : January 1980-October 1989 / / Lawrence E. Bassham III
Bibliography of selected computer security publications : January 1980-October 1989 / / Lawrence E. Bassham III
Autore Bassham Lawrence E
Pubbl/distr/stampa Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 1990
Descrizione fisica 1 online resource
Altri autori (Persone) BasshamLawrence E
Collana NIST special publication
Soggetto non controllato Access controls
Auditing
Bibliography
Communications security
Computer crime
Computer security
Confidentiality
Cryptography
Disaster recovery
Integrity
Privacy
Risk management
Trusted computing base
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Bibliography of selected computer security publications
Record Nr. UNINA-9910711180903321
Bassham Lawrence E  
Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 1990
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Border Gateway Protocol security [[electronic resource] ] : recommendations of the National Institute of Standards and Technology / / Rick Kuhn, Kotikalapudi Sriram, Doug Montgomery
Border Gateway Protocol security [[electronic resource] ] : recommendations of the National Institute of Standards and Technology / / Rick Kuhn, Kotikalapudi Sriram, Doug Montgomery
Autore Kuhn D. Richard
Edizione [Draft.]
Pubbl/distr/stampa Gaithersburg, MD : , : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, , [2006]
Descrizione fisica 57 unnumbered pages : digital, PDF file
Altri autori (Persone) SriramKotikalapudi
MontgomeryDoug (Computer scientist)
Collana NIST special publication ;Computer security
Soggetto topico BGP (Computer network protocol) - Security measures - Standards - United States
Routers (Computer networks) - Security measures - Standards - United States
Soggetto non controllato BGP
Border Gateway Protocol
Computer security
Routers
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Border Gateway Protocol security
Record Nr. UNINA-9910696900303321
Kuhn D. Richard  
Gaithersburg, MD : , : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, , [2006]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Challenges in Cybersecurity and Privacy : the European Research Landscape / / edited by Jorge Bernal Bernabe and Antonio Skarmeta
Challenges in Cybersecurity and Privacy : the European Research Landscape / / edited by Jorge Bernal Bernabe and Antonio Skarmeta
Autore Bernabe Jorge Bernal
Pubbl/distr/stampa Taylor & Francis, 2019
Descrizione fisica 1 online resource (xli, 328 pages) : illustrations
Disciplina 323.448
Soggetto topico Computer security
Computer crimes - Prevention
Privacy, Right of
Soggetto non controllato Computer security
Online safety and behaviour
ISBN 1-00-333749-X
1-000-79218-8
1-003-33749-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1.Introducing the European Research Landscape on Cybersecurity and Privacy 2. Key Innovations in ANASTACIA: Advanced Networked Agents for Security and Trust Assessment in CPS / IOT Architectures 3. Statistical analysis and economic models for enhancing cyber-security in SAINT 4. The YAKSHA project 5. The FORTIKA edge solution for Automating SMEs Security 6. CYBECO: Supporting cyber-insurance from a behavioural choice perspective 7. Cyber Threat Intelligence from European-wide sensor network in SISSDEN 8. CIPSEC- Enhancing Critical Infrastructure Protection with innovative SECurity framework 9. A cybersecurity situational awareness and information sharing solution for local public administrations based on advanced big data analysis: The CS-AWARE project 10. Complex project to develop real tools for fighting counter terrorism: Real-time Early Detection and Alert System for Online Terrorist Content based on Natural Language Processing, Social Network Analysis, Artificial Intelligence and Complex Event 11. TRUESSEC: Trustworthiness Label Recommendations 12. An overview on ARIES: Reliable European Identity Ecosystem 13. The LIGHTest Project: Overview, Reference Architecture and Trust Scheme Publication Authority 14. Secure and Privacy-Preserving Identity and Access Management in CREDENTIAL 15. FutureTrust -- Future Trust Services for Trustworthy Global Transactions 16. LEPS. Leveraging eID in the Private Sector
Record Nr. UNINA-9910632994203321
Bernabe Jorge Bernal  
Taylor & Francis, 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computation, cryptography, and network security / Nicholas J. Daras, Michael Th. Rassias editors
Computation, cryptography, and network security / Nicholas J. Daras, Michael Th. Rassias editors
Pubbl/distr/stampa [Cham], : Springer, 2015
Descrizione fisica IX, 756 p. : ill. ; 24 cm
Soggetto topico 26D15 - Inequalities for sums, series and integrals [MSC 2020]
44A10 - Laplace transform [MSC 2020]
45Pxx - Integral operators [MSC 2020]
94C30 - Applications of design theory to circuits and networks [MSC 2020]
68R10 - Graph theory (including graph drawing) in computer science [MSC 2020]
03D25 - Recursively (computably) enumerable sets and degrees [MSC 2020]
46E30 - Spaces of measurable functions (Lp-spaces, Orlicz spaces, Köthe function spaces, Lorentz spaces, rearrangement invariant spaces, ideal spaces, etc) [MSC 2020]
47G10 - Integral operators [MSC 2020]
31A10 - Integral representations, integral operators, integral equations methods in two dimensions [MSC 2020]
11U05 - Decidability (number-theoretic aspects) [MSC 2020]
47A07 - Forms (bilinear, sesquilinear, multilinear) [MSC 2020]
91B26 - Auctions, bargaining, bidding and selling, and other market models [MSC 2020]
Soggetto non controllato Biometrics
Computer security
Cryptanalysis
Cryptosystems
Elliptic curves
Quantum Cryptography
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Titolo uniforme
Record Nr. UNICAMPANIA-VAN0113538
[Cham], : Springer, 2015
Materiale a stampa
Lo trovi qui: Univ. Vanvitelli
Opac: Controlla la disponibilità qui
Computer security considerations in federal procurements : a guide for procurement initiators, contracting officers, and computer security officials / / Barbara Guttman
Computer security considerations in federal procurements : a guide for procurement initiators, contracting officers, and computer security officials / / Barbara Guttman
Autore Guttman Barbara
Pubbl/distr/stampa Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 1992
Descrizione fisica 1 online resource
Altri autori (Persone) GuttmanBarbara
Collana NIST special publication
Soggetto non controllato Acquisition
Assurance
Computer security
Procurement
Requirements analysis
Risk analysis
Specifications
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Computer security considerations in federal procurements
Record Nr. UNINA-9910711180703321
Guttman Barbara  
Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 1992
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer security in the federal government : how do the agencies rate? : hearing before the Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations of the Committee on Government Reform, House of Representatives, One Hundred Seventh Congress, first session, November 9, 2001
Computer security in the federal government : how do the agencies rate? : hearing before the Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations of the Committee on Government Reform, House of Representatives, One Hundred Seventh Congress, first session, November 9, 2001
Descrizione fisica 1 online resource (iii, 70 p.) : ill
Soggetto topico Computer security - United States
Electronic data processing departments - Security measures - United States
Administrative agencies - Data processing - Security measures - United States
Executive departments - Data processing - Security measures - United States
Soggetto non controllato Computer security
Electronic data processing departments
Administrative agencies
Executive departments
Computers
Political science
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Computer security in the federal government
Record Nr. UNINA-9910689527903321
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui