top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Aggiustare il mondo. La vita, il processo e l’eredità dell’hacker Aaron Swartz
Aggiustare il mondo. La vita, il processo e l’eredità dell’hacker Aaron Swartz
Autore Ziccardi Giovanni
Pubbl/distr/stampa Milano, : Milano University Press, 2022
Soggetto topico Biography & True Stories
Soggetto non controllato Aaron Swartz
Open Access
Hacking
Creative Commons
Computer crimes
Open culture
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione ita
Record Nr. UNINA-9910910489303321
Ziccardi Giovanni  
Milano, : Milano University Press, 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Hacker 5.0 / Stuart McClure, Joel Scambray, George Kurtz
Hacker 5.0 / Stuart McClure, Joel Scambray, George Kurtz
Autore McClure, Stuart
Pubbl/distr/stampa Milano : Apogeo, c2005
Descrizione fisica xxv, 670 p. : ill. ; 24 cm
Disciplina 005.8
Altri autori (Persone) Scambray, Joel
Kurtz, George
Soggetto non controllato Hacking
Sicurezza dei dati
Misure di sicurezza
ISBN 88-503-2362-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione ita
Record Nr. UNINA-990008297610403321
McClure, Stuart  
Milano : Apogeo, c2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The human factor of cybercrime / / edited by Rutger Leukfeldt and Thomas J. Holt
The human factor of cybercrime / / edited by Rutger Leukfeldt and Thomas J. Holt
Pubbl/distr/stampa Abingdon, Oxon ; ; New York, NY : , : Routledge, , 2020
Descrizione fisica 1 online resource (xvi, 432 pages)
Disciplina 364.168
Collana Routledge studies in crime and society
Soggetto topico Computer crimes - Social aspects
Soggetto non controllato Big Data
Cyber Security
Cybercriminal networks
Dark Web
Digital Society
Digital markets
Hacking
ISBN 0-429-86417-5
0-429-46059-7
0-429-86418-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto It ain't what it is, its the way that they do it? Why we still don't understand cybercrime / Mike McGuire -- Contributions of criminological theory to the understanding of cybercrime offending and victimization / Adam Bossler -- The open and dark web : facilitating cybercrime and technology-enabled offenses / Claudia Flamand and David Décary-Hétu -- Predictors of cybercrime victimization : causal effects or biased associations? / Steve van de Weijer -- Virtual danger : an overview of interpersonal cybercrimes / Jordana Navarro -- Sexual violence in digital society : understanding the human and technosocial factors / Anastasia Powell, Asher Flynn and Nicola Henry -- Cybercrime subcultures : Contextualizing offenders and the nature of the offense / Thomas J. Holt -- On social engineering / Kevin Steinmetz, Richard Goe and Alexandra Pimentel -- Contrasting cyber-dependent and traditional offenders : a comparison on criminological explanations and potential prevention methods / Marleen Weulen Kranenbarg -- Financial cybercrimes and situational crime prevention / Rutger Leukfeldt and Jurjen Jansen -- Modelling cybercrime development : the case of Vietnam / Jonathan Lusthaus -- Humanising the cybercriminal : markets, forums and the carding subculture / Craig Webber and Michael Yip -- The roles of 'old' and 'new' media tools and technologies in the facilitation of violent extremism and terrorism / Ryan Scrivens and Maura Conway -- Child sex abuse images and exploitation materials / Roderic Broadhurst -- Policing cybercrime : responding to the growing problem and considering future solutions / Cassandra Dodge and George Burruss -- Responding to individual fraud : Perspectives of the 'Fraud Justice Network' / Cassandra Cross -- The ecology of cybercrime / Benoît Dupont -- Displacing big data : how criminals cheat the system / Alice Hutchings, Sergio Pastrana and Richard Clayton.
Record Nr. UNINA-9910765404203321
Abingdon, Oxon ; ; New York, NY : , : Routledge, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
IoT security issues / / Alasdair Gilchrist
IoT security issues / / Alasdair Gilchrist
Autore Gilchrist Alasdair
Edizione [First edition.]
Pubbl/distr/stampa Boston, [Massachusetts] ; ; Berlin, [Germany] : , : De G Press, , 2017
Descrizione fisica 1 online resource (274 pages) : illustrations
Disciplina 005.8
Soggetto topico Internet - Security measures
Computer networks - Security measures
Soggetto non controllato Hacking
IPv6
Internet of Things
IoT
Sensors
Vulnerabilities
ISBN 1-5015-0562-9
1-5015-0577-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Frontmatter -- Acknowledgements -- Contents -- Introduction -- Part I: Making Sense of the Hype -- Chapter 1 - The Consumer Internet of Things -- Part II: Security -- Chapter 2 - It's Not Just About the Future -- Chapter 3 - Flawed, Insecure Devices -- Chapter 4 - Securing the Unidentified -- Chapter 5 - Consumer Convenience Trumps Security -- Chapter 6 - Startups Driving the IoT -- Chapter 7 - Cyber-Security and the Customer Experience -- Chapter 8 - Security Requirements for the IoT -- Chapter 9 - Re-engineering the IoT -- Chapter 10 - IoT Production, Security and Strength -- Chapter 11 - Wearable's - A New Developer's Headache -- Chapter 12 - New Surface Threats -- Part III: Architecting the Secure IoT -- Chapter 13 - Designing the Secure IoT -- Chapter 14 - Secure IoT Architecture Patterns -- Chapter 15 - Threat Models -- Part IV: Defending the IoT -- Chapter 16 - Threats, Vulnerabilities and Risks -- Chapter 17 - IoT Security Framework -- Chapter 18 - Secure IoT Design -- Chapter 19 - Utilizing IPv6 Security Features -- Part V: Trust -- Chapter 20 - The IoT of Trust -- Chapter 21 - It's All About the Data -- Chapter 22 - Trusting the Device -- Chapter 23 - Who Can We Trust? -- Part VI: Privacy -- Chapter 24 - Personal Private Information (PIP) -- Chapter 25 - The U.S. and EU Data Privacy Shield -- Part VII: Surveillance, Subterfuge and Sabotage -- Chapter 26 - The Panopticon -- Index
Record Nr. UNINA-9910792540303321
Gilchrist Alasdair  
Boston, [Massachusetts] ; ; Berlin, [Germany] : , : De G Press, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
IoT security issues / / Alasdair Gilchrist
IoT security issues / / Alasdair Gilchrist
Autore Gilchrist Alasdair
Edizione [First edition.]
Pubbl/distr/stampa Boston, [Massachusetts] ; ; Berlin, [Germany] : , : De G Press, , 2017
Descrizione fisica 1 online resource (274 pages) : illustrations
Disciplina 005.8
Soggetto topico Internet - Security measures
Computer networks - Security measures
Soggetto non controllato Hacking
IPv6
Internet of Things
IoT
Sensors
Vulnerabilities
ISBN 1-5015-0562-9
1-5015-0577-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Frontmatter -- Acknowledgements -- Contents -- Introduction -- Part I: Making Sense of the Hype -- Chapter 1 - The Consumer Internet of Things -- Part II: Security -- Chapter 2 - It's Not Just About the Future -- Chapter 3 - Flawed, Insecure Devices -- Chapter 4 - Securing the Unidentified -- Chapter 5 - Consumer Convenience Trumps Security -- Chapter 6 - Startups Driving the IoT -- Chapter 7 - Cyber-Security and the Customer Experience -- Chapter 8 - Security Requirements for the IoT -- Chapter 9 - Re-engineering the IoT -- Chapter 10 - IoT Production, Security and Strength -- Chapter 11 - Wearable's - A New Developer's Headache -- Chapter 12 - New Surface Threats -- Part III: Architecting the Secure IoT -- Chapter 13 - Designing the Secure IoT -- Chapter 14 - Secure IoT Architecture Patterns -- Chapter 15 - Threat Models -- Part IV: Defending the IoT -- Chapter 16 - Threats, Vulnerabilities and Risks -- Chapter 17 - IoT Security Framework -- Chapter 18 - Secure IoT Design -- Chapter 19 - Utilizing IPv6 Security Features -- Part V: Trust -- Chapter 20 - The IoT of Trust -- Chapter 21 - It's All About the Data -- Chapter 22 - Trusting the Device -- Chapter 23 - Who Can We Trust? -- Part VI: Privacy -- Chapter 24 - Personal Private Information (PIP) -- Chapter 25 - The U.S. and EU Data Privacy Shield -- Part VII: Surveillance, Subterfuge and Sabotage -- Chapter 26 - The Panopticon -- Index
Record Nr. UNINA-9910807489703321
Gilchrist Alasdair  
Boston, [Massachusetts] ; ; Berlin, [Germany] : , : De G Press, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Das materielle Computerstrafrecht / / Christian Bergauer
Das materielle Computerstrafrecht / / Christian Bergauer
Autore Bergauer Christian
Pubbl/distr/stampa Jan Sramek Verlag, 2016
Descrizione fisica 1 online resource (xxviii, 669 pages) : digital, PDF file(s)
Disciplina 345.0268
Collana Open Access e-Books
Knowledge Unlatched
IT und Strafrecht
Soggetto topico Computer crimes - Law and legislation - Austria
Denial of service attacks - Law and legislation - Austria
Phishing - Law and legislation - Austria
Cyberstalking - Law and legislation - Austria
Hacking - Law and legislation - Austria
Cyberterrorism - Law and legislation - Austria
Malware (Computer software) - Law and legislation - Austria
Internet pornography - Law and legislation - Austria
Internet fraud - Law and legislation - Austria
Soggetto non controllato Cybercrime
substantive criminal law
malicious software
denial of service-attacks
hacking
Cyber-bullying
Computerkriminalität
Computerstrafrecht
Malware
Datenbeschädigung
Systemschädigungen
Hacking
Cyber-Mobbing
Internet
Tatbestand
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione ger
Record Nr. UNINA-9910137147003321
Bergauer Christian  
Jan Sramek Verlag, 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Profilo hacker : La scienza del criminal profiling applicata al mondo dell'hacking / Raoul Chiesa, Silvio Ciappi
Profilo hacker : La scienza del criminal profiling applicata al mondo dell'hacking / Raoul Chiesa, Silvio Ciappi
Autore Chiesa, Raoul
Pubbl/distr/stampa Milano : Apogeo, c2007
Descrizione fisica xv, 272 p. : ill. ; 21 cm
Disciplina 005.8
Altri autori (Persone) Ciappi, Silvio
Collana Apogeo saggii
Soggetto non controllato Sicurezza dei dati
Misure di sicurezza
Hacking
ISBN 978-88-503-2594-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione ita
Record Nr. UNINA-990008564650403321
Chiesa, Raoul  
Milano : Apogeo, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui