BSN : 2019 IEEE 16th International Conference on Wearable and Implantable Body Sensor Networks : 2019 conference proceedings : University of Illinois at Chicago, Chicago, Illinois, USA : May 19-22, 2019 / / Institute of Electrical and Electronics Engineers |
Pubbl/distr/stampa | Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2019 |
Descrizione fisica | 1 online resource (100 pages) |
Disciplina | 004.16 |
Soggetto topico |
Wearable computers
Biosensors |
ISBN | 1-5386-7477-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910330951803321 |
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
BSN : 2019 IEEE 16th International Conference on Wearable and Implantable Body Sensor Networks : 2019 conference proceedings : University of Illinois at Chicago, Chicago, Illinois, USA : May 19-22, 2019 / / Institute of Electrical and Electronics Engineers |
Pubbl/distr/stampa | Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2019 |
Descrizione fisica | 1 online resource (100 pages) |
Disciplina | 004.16 |
Soggetto topico |
Wearable computers
Biosensors |
ISBN | 1-5386-7477-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996575620603316 |
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
BuildSys '15 : proceedings of the 2nd ACM International Conference on Embedded Systems for Energy-Efficient Buildings : November 4-5, 2015, Seoul, South Korea / / sponsored by ACM SIGARCH [and five others] |
Pubbl/distr/stampa | New York : , : ACM, , 2015 |
Descrizione fisica | 1 online resource (250 pages) |
Disciplina | 004.16 |
Soggetto topico |
Embedded computer systems
Intelligent buildings Buildings - Energy conservation - Data processing |
ISBN | 1-4503-3981-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti |
BuildSys '15 : proceedings of the 2nd Association for Computing Machinery International Conference on Embedded Systems for Energy-Efficient Buildings : November 4-5, 2015, Seoul, South Korea
Proceedings of the 2nd ACM International Conference on Embedded Systems for Energy-Efficient Built Environments Proceedings of the 2nd Association for Computing Machinery International Conference on Embedded Systems for Energy-Efficient Built Environments |
Record Nr. | UNINA-9910376548303321 |
New York : , : ACM, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
CASE : 2016 seventh Argentine Symposium and Conference on Embedded Systems : regular papers : August 10th-12th, 2016, School of Engineering, University of Buenos Aires, Buenos Aires, Argentina / / Institute of Electrical and Electronics Engineers ; editors, Maximiliano Antonelli [and 5 others] |
Pubbl/distr/stampa | Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2016 |
Descrizione fisica | 1 online resource (ii, 43 pages) |
Disciplina | 004.16 |
Soggetto topico | Embedded computer systems |
ISBN | 987-46297-0-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910332520103321 |
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
CASE : 2016 seventh Argentine Symposium and Conference on Embedded Systems : regular papers : August 10th-12th, 2016, School of Engineering, University of Buenos Aires, Buenos Aires, Argentina / / Institute of Electrical and Electronics Engineers ; editors, Maximiliano Antonelli [and 5 others] |
Pubbl/distr/stampa | Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2016 |
Descrizione fisica | 1 online resource (ii, 43 pages) |
Disciplina | 004.16 |
Soggetto topico | Embedded computer systems |
ISBN | 987-46297-0-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996575620403316 |
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
The Case of the iPad : Mobile Literacies in Education / / edited by Cathy Burnett, Guy Merchant, Alyson Simpson, Maureen Walsh |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (271 pages) |
Disciplina | 004.16 |
Soggetto topico |
Literacy
Learning, Psychology of Educational technology Instructional Psychology Digital Education and Educational Technology |
ISBN |
9789811043642
9811043647 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1 The Case of the iPad -- 2 The fluid materiality of tablets: Examining 'the iPad multiple' in a primary classroom -- 3 Russian dolls and three forms of capital: Ecological and sociological perspectives on parents' engagement with young children's tablet use -- 4 Chasing literacies across action texts and augmented realities: E-books, animated apps and Pokemon Go -- 5 Multimodel layering: Students learning with iPads in Primary school classrooms -- 6 The new digital divide: Digital technology policies and provision in Canada and Australia -- 7 Slate-enabled literacy practices in a FutureSchool@Singapore classroom -- 8 Apps and Autodidacts: Wayfaring and emplaced thinking on iPads -- 9 Game 2 Engage: Using iPads to mediate and develop social relationships in college learning -- 10 The affordances of touchscreen tablets and digital cameras as tools for young children's multimodal, multilingual composing -- 11 Personalised story-making on the iPad: Opportunities for developing the Self and buildingCloseness with others -- 12 Children's engagement with iPads in Early Years classrooms: Exploring peer cultures and transforming practices -- 13 Collaborative and dialogic meaning-making: How children engage and immerse in the storyworld of a mobile game -- 14 Relational methodologies for mobile literacies: Intra-action, rhythm, and atmosphere -- 15 Hands, fingers and iPads -- 16 Mobile literacies in education: Moving from the Word to the World. |
Record Nr. | UNINA-9910255116103321 |
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
CASES : 2017 International Conference on Compilers, Architecture and Synthesis for Embedded Systems |
Pubbl/distr/stampa | New York : , : ACM, , 2017 |
Descrizione fisica | 1 online resource (51 pages) |
Disciplina | 004.16 |
Soggetto topico |
Embedded computer systems
Compilers (Computer programs) Computer architecture |
ISBN | 1-4503-5184-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910228956003321 |
New York : , : ACM, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
CASES : 2017 International Conference on Compilers, Architecture and Synthesis for Embedded Systems |
Pubbl/distr/stampa | New York : , : ACM, , 2017 |
Descrizione fisica | 1 online resource (51 pages) |
Disciplina | 004.16 |
Soggetto topico |
Embedded computer systems
Compilers (Computer programs) Computer architecture |
ISBN | 1-4503-5184-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996279680403316 |
New York : , : ACM, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
The CEH prep guide [[electronic resource] ] : the comprehensive guide to certified ethical hacking / / Ronald L. Krutz, Russell Dean Vines |
Autore | Krutz Ronald L. <1938-> |
Pubbl/distr/stampa | Indianapolis, IN, : Wiley, c2007 |
Descrizione fisica | 1 online resource (770 p.) |
Disciplina |
004.16
005.8 |
Altri autori (Persone) | VinesRussell Dean <1952-> |
Soggetto topico |
Computer security - Testing - Examinations
Computer networks - Security measures - Examinations Computer networks - Examinations Computer hackers |
Soggetto genere / forma | Electronic books. |
ISBN |
1-280-97384-6
9786610973842 0-470-23138-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking; About the Authors; Credits; Contents; Foreword; Acknowledgments; Introduction; Exam Eligibility; Part I: The Business and Legal Issues of Ethical Hacking; Chapter 1: Introduction to Ethical Hacking; Terminology; Hacking History; Ethical Hacking Objectives and Motivations; Steps in Malicious Hacking; Hacker and Ethical Hacker Characteristics and Operations; Related Types of Computer Crime; Assessment Questions; Chapter 2: Legality and Ethics; Law and Legal Systems; Computer Crime Penalties; Ethics; Assessment Questions
Chapter 3: Penetration Testing for BusinessPenetration Testing from a Business Perspective; Justification of Penetration Testing through Risk Analysis; Management Responsibilities in Risk Analysis Relating to Penetration Testing; Assessment Questions; Part II: The Pre-Attack Phases; Chapter 4: Footprinting; Gathering Information; Locating the Network Range; Assessment Questions; Chapter 5: Scanning; Identifying Active Machines; Identifying Open Ports and Available Services; War Dialing; War Driving and War Walking; Fingerprinting; Mapping the Network; Assessment Questions Chapter 6: EnumeratingProtection Rings; Windows Architecture; Windows Security Elements; Enumerating Techniques for Windows; Countermeasures; Assessment Questions; Part III: Attack Techniques and Tools; Chapter 7 System Hacking Techniques; Password Guessing; Privilege Escalation; Password Cracking; Covering Tracks; Countermeasures; Assessment Questions; Chapter 8: Trojans, Backdoors, and Sniffers; Trojans and Backdoors; Sniffers; Assessment Questions; Chapter 9: Denial of Service Attacks and Session Hijacking; Denial of Service/Distributed Denial of Service (DoS/DDoS); Session Hijacking Assessment QuestionsChapter 10: Penetration Testing Steps; Penetration Testing Overview; Legal and Ethical Implications; The Three Pretest Phases; Penetration Testing Tools and Techniques; Wireless Network Penetration Testing; Social Engineering; Intrusion Detection System (IDS); Assessment Questions; Chapter 11: Linux Hacking Tools; Linux History; Scanning Networks with Linux Tools; Linux Hacking Tools; Linux Rootkits; Linux Security Tools; Assessment Questions; Chapter 12: Social Engineering and Physical Security; Social Engineering; Physical Security; Assessment Questions Part IV: Web Server and Database AttacksChapter 13: Web Server Hacking and Web Application Vulnerabilities; Web Server Hacking; Web Application Vulnerabilities; Countermeasures; Assessment Questions; Chapter 14:SQL Injection Vulnerabilities; SQL Injection Testing and Attacks; SQL Injection Prevention and Remediation; Automated SQL Injection Tools; Assessment Questions; Chapter 15: Cryptography; Symmetric Key Cryptography; Public Key Cryptosystems; Public Key Certificates; Cryptanalysis; Managing Encryption Keys; Email Security; Electronic Transaction Security; Wireless Security Disk Encryption |
Record Nr. | UNINA-9910458294803321 |
Krutz Ronald L. <1938->
![]() |
||
Indianapolis, IN, : Wiley, c2007 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
The CEH prep guide [[electronic resource] ] : the comprehensive guide to certified ethical hacking / / Ronald L. Krutz, Russell Dean Vines |
Autore | Krutz Ronald L. <1938-> |
Pubbl/distr/stampa | Indianapolis, IN, : Wiley, c2007 |
Descrizione fisica | 1 online resource (770 p.) |
Disciplina |
004.16
005.8 |
Altri autori (Persone) | VinesRussell Dean <1952-> |
Soggetto topico |
Computer security - Testing - Examinations
Computer networks - Security measures - Examinations Computer networks - Examinations Computer hackers |
ISBN |
1-280-97384-6
9786610973842 0-470-23138-6 |
Classificazione | 54.89 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking; About the Authors; Credits; Contents; Foreword; Acknowledgments; Introduction; Exam Eligibility; Part I: The Business and Legal Issues of Ethical Hacking; Chapter 1: Introduction to Ethical Hacking; Terminology; Hacking History; Ethical Hacking Objectives and Motivations; Steps in Malicious Hacking; Hacker and Ethical Hacker Characteristics and Operations; Related Types of Computer Crime; Assessment Questions; Chapter 2: Legality and Ethics; Law and Legal Systems; Computer Crime Penalties; Ethics; Assessment Questions
Chapter 3: Penetration Testing for BusinessPenetration Testing from a Business Perspective; Justification of Penetration Testing through Risk Analysis; Management Responsibilities in Risk Analysis Relating to Penetration Testing; Assessment Questions; Part II: The Pre-Attack Phases; Chapter 4: Footprinting; Gathering Information; Locating the Network Range; Assessment Questions; Chapter 5: Scanning; Identifying Active Machines; Identifying Open Ports and Available Services; War Dialing; War Driving and War Walking; Fingerprinting; Mapping the Network; Assessment Questions Chapter 6: EnumeratingProtection Rings; Windows Architecture; Windows Security Elements; Enumerating Techniques for Windows; Countermeasures; Assessment Questions; Part III: Attack Techniques and Tools; Chapter 7 System Hacking Techniques; Password Guessing; Privilege Escalation; Password Cracking; Covering Tracks; Countermeasures; Assessment Questions; Chapter 8: Trojans, Backdoors, and Sniffers; Trojans and Backdoors; Sniffers; Assessment Questions; Chapter 9: Denial of Service Attacks and Session Hijacking; Denial of Service/Distributed Denial of Service (DoS/DDoS); Session Hijacking Assessment QuestionsChapter 10: Penetration Testing Steps; Penetration Testing Overview; Legal and Ethical Implications; The Three Pretest Phases; Penetration Testing Tools and Techniques; Wireless Network Penetration Testing; Social Engineering; Intrusion Detection System (IDS); Assessment Questions; Chapter 11: Linux Hacking Tools; Linux History; Scanning Networks with Linux Tools; Linux Hacking Tools; Linux Rootkits; Linux Security Tools; Assessment Questions; Chapter 12: Social Engineering and Physical Security; Social Engineering; Physical Security; Assessment Questions Part IV: Web Server and Database AttacksChapter 13: Web Server Hacking and Web Application Vulnerabilities; Web Server Hacking; Web Application Vulnerabilities; Countermeasures; Assessment Questions; Chapter 14:SQL Injection Vulnerabilities; SQL Injection Testing and Attacks; SQL Injection Prevention and Remediation; Automated SQL Injection Tools; Assessment Questions; Chapter 15: Cryptography; Symmetric Key Cryptography; Public Key Cryptosystems; Public Key Certificates; Cryptanalysis; Managing Encryption Keys; Email Security; Electronic Transaction Security; Wireless Security Disk Encryption |
Record Nr. | UNINA-9910784790303321 |
Krutz Ronald L. <1938->
![]() |
||
Indianapolis, IN, : Wiley, c2007 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|