top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
The CEH prep guide [[electronic resource] ] : the comprehensive guide to certified ethical hacking / / Ronald L. Krutz, Russell Dean Vines
The CEH prep guide [[electronic resource] ] : the comprehensive guide to certified ethical hacking / / Ronald L. Krutz, Russell Dean Vines
Autore Krutz Ronald L. <1938->
Pubbl/distr/stampa Indianapolis, IN, : Wiley, c2007
Descrizione fisica 1 online resource (770 p.)
Disciplina 004.16
005.8
Altri autori (Persone) VinesRussell Dean <1952->
Soggetto topico Computer security - Testing - Examinations
Computer networks - Security measures - Examinations
Computer networks - Examinations
Computer hackers
Soggetto genere / forma Electronic books.
ISBN 1-280-97384-6
9786610973842
0-470-23138-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking; About the Authors; Credits; Contents; Foreword; Acknowledgments; Introduction; Exam Eligibility; Part I: The Business and Legal Issues of Ethical Hacking; Chapter 1: Introduction to Ethical Hacking; Terminology; Hacking History; Ethical Hacking Objectives and Motivations; Steps in Malicious Hacking; Hacker and Ethical Hacker Characteristics and Operations; Related Types of Computer Crime; Assessment Questions; Chapter 2: Legality and Ethics; Law and Legal Systems; Computer Crime Penalties; Ethics; Assessment Questions
Chapter 3: Penetration Testing for BusinessPenetration Testing from a Business Perspective; Justification of Penetration Testing through Risk Analysis; Management Responsibilities in Risk Analysis Relating to Penetration Testing; Assessment Questions; Part II: The Pre-Attack Phases; Chapter 4: Footprinting; Gathering Information; Locating the Network Range; Assessment Questions; Chapter 5: Scanning; Identifying Active Machines; Identifying Open Ports and Available Services; War Dialing; War Driving and War Walking; Fingerprinting; Mapping the Network; Assessment Questions
Chapter 6: EnumeratingProtection Rings; Windows Architecture; Windows Security Elements; Enumerating Techniques for Windows; Countermeasures; Assessment Questions; Part III: Attack Techniques and Tools; Chapter 7 System Hacking Techniques; Password Guessing; Privilege Escalation; Password Cracking; Covering Tracks; Countermeasures; Assessment Questions; Chapter 8: Trojans, Backdoors, and Sniffers; Trojans and Backdoors; Sniffers; Assessment Questions; Chapter 9: Denial of Service Attacks and Session Hijacking; Denial of Service/Distributed Denial of Service (DoS/DDoS); Session Hijacking
Assessment QuestionsChapter 10: Penetration Testing Steps; Penetration Testing Overview; Legal and Ethical Implications; The Three Pretest Phases; Penetration Testing Tools and Techniques; Wireless Network Penetration Testing; Social Engineering; Intrusion Detection System (IDS); Assessment Questions; Chapter 11: Linux Hacking Tools; Linux History; Scanning Networks with Linux Tools; Linux Hacking Tools; Linux Rootkits; Linux Security Tools; Assessment Questions; Chapter 12: Social Engineering and Physical Security; Social Engineering; Physical Security; Assessment Questions
Part IV: Web Server and Database AttacksChapter 13: Web Server Hacking and Web Application Vulnerabilities; Web Server Hacking; Web Application Vulnerabilities; Countermeasures; Assessment Questions; Chapter 14:SQL Injection Vulnerabilities; SQL Injection Testing and Attacks; SQL Injection Prevention and Remediation; Automated SQL Injection Tools; Assessment Questions; Chapter 15: Cryptography; Symmetric Key Cryptography; Public Key Cryptosystems; Public Key Certificates; Cryptanalysis; Managing Encryption Keys; Email Security; Electronic Transaction Security; Wireless Security
Disk Encryption
Record Nr. UNINA-9910458294803321
Krutz Ronald L. <1938->  
Indianapolis, IN, : Wiley, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The CEH prep guide [[electronic resource] ] : the comprehensive guide to certified ethical hacking / / Ronald L. Krutz, Russell Dean Vines
The CEH prep guide [[electronic resource] ] : the comprehensive guide to certified ethical hacking / / Ronald L. Krutz, Russell Dean Vines
Autore Krutz Ronald L. <1938->
Pubbl/distr/stampa Indianapolis, IN, : Wiley, c2007
Descrizione fisica 1 online resource (770 p.)
Disciplina 004.16
005.8
Altri autori (Persone) VinesRussell Dean <1952->
Soggetto topico Computer security - Testing - Examinations
Computer networks - Security measures - Examinations
Computer networks - Examinations
Computer hackers
ISBN 1-280-97384-6
9786610973842
0-470-23138-6
Classificazione 54.89
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking; About the Authors; Credits; Contents; Foreword; Acknowledgments; Introduction; Exam Eligibility; Part I: The Business and Legal Issues of Ethical Hacking; Chapter 1: Introduction to Ethical Hacking; Terminology; Hacking History; Ethical Hacking Objectives and Motivations; Steps in Malicious Hacking; Hacker and Ethical Hacker Characteristics and Operations; Related Types of Computer Crime; Assessment Questions; Chapter 2: Legality and Ethics; Law and Legal Systems; Computer Crime Penalties; Ethics; Assessment Questions
Chapter 3: Penetration Testing for BusinessPenetration Testing from a Business Perspective; Justification of Penetration Testing through Risk Analysis; Management Responsibilities in Risk Analysis Relating to Penetration Testing; Assessment Questions; Part II: The Pre-Attack Phases; Chapter 4: Footprinting; Gathering Information; Locating the Network Range; Assessment Questions; Chapter 5: Scanning; Identifying Active Machines; Identifying Open Ports and Available Services; War Dialing; War Driving and War Walking; Fingerprinting; Mapping the Network; Assessment Questions
Chapter 6: EnumeratingProtection Rings; Windows Architecture; Windows Security Elements; Enumerating Techniques for Windows; Countermeasures; Assessment Questions; Part III: Attack Techniques and Tools; Chapter 7 System Hacking Techniques; Password Guessing; Privilege Escalation; Password Cracking; Covering Tracks; Countermeasures; Assessment Questions; Chapter 8: Trojans, Backdoors, and Sniffers; Trojans and Backdoors; Sniffers; Assessment Questions; Chapter 9: Denial of Service Attacks and Session Hijacking; Denial of Service/Distributed Denial of Service (DoS/DDoS); Session Hijacking
Assessment QuestionsChapter 10: Penetration Testing Steps; Penetration Testing Overview; Legal and Ethical Implications; The Three Pretest Phases; Penetration Testing Tools and Techniques; Wireless Network Penetration Testing; Social Engineering; Intrusion Detection System (IDS); Assessment Questions; Chapter 11: Linux Hacking Tools; Linux History; Scanning Networks with Linux Tools; Linux Hacking Tools; Linux Rootkits; Linux Security Tools; Assessment Questions; Chapter 12: Social Engineering and Physical Security; Social Engineering; Physical Security; Assessment Questions
Part IV: Web Server and Database AttacksChapter 13: Web Server Hacking and Web Application Vulnerabilities; Web Server Hacking; Web Application Vulnerabilities; Countermeasures; Assessment Questions; Chapter 14:SQL Injection Vulnerabilities; SQL Injection Testing and Attacks; SQL Injection Prevention and Remediation; Automated SQL Injection Tools; Assessment Questions; Chapter 15: Cryptography; Symmetric Key Cryptography; Public Key Cryptosystems; Public Key Certificates; Cryptanalysis; Managing Encryption Keys; Email Security; Electronic Transaction Security; Wireless Security
Disk Encryption
Record Nr. UNINA-9910784790303321
Krutz Ronald L. <1938->  
Indianapolis, IN, : Wiley, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The CEH prep guide : the comprehensive guide to certified ethical hacking / / Ronald L. Krutz, Russell Dean Vines
The CEH prep guide : the comprehensive guide to certified ethical hacking / / Ronald L. Krutz, Russell Dean Vines
Autore Krutz Ronald L. <1938->
Edizione [1st ed.]
Pubbl/distr/stampa Indianapolis, IN, : Wiley, c2007
Descrizione fisica 1 online resource (770 p.)
Disciplina 004.16
005.8
Altri autori (Persone) VinesRussell Dean <1952->
Soggetto topico Computer security - Testing - Examinations
Computer networks - Security measures - Examinations
Computer networks - Examinations
Computer hackers
ISBN 1-280-97384-6
9786610973842
0-470-23138-6
Classificazione 54.89
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking; About the Authors; Credits; Contents; Foreword; Acknowledgments; Introduction; Exam Eligibility; Part I: The Business and Legal Issues of Ethical Hacking; Chapter 1: Introduction to Ethical Hacking; Terminology; Hacking History; Ethical Hacking Objectives and Motivations; Steps in Malicious Hacking; Hacker and Ethical Hacker Characteristics and Operations; Related Types of Computer Crime; Assessment Questions; Chapter 2: Legality and Ethics; Law and Legal Systems; Computer Crime Penalties; Ethics; Assessment Questions
Chapter 3: Penetration Testing for BusinessPenetration Testing from a Business Perspective; Justification of Penetration Testing through Risk Analysis; Management Responsibilities in Risk Analysis Relating to Penetration Testing; Assessment Questions; Part II: The Pre-Attack Phases; Chapter 4: Footprinting; Gathering Information; Locating the Network Range; Assessment Questions; Chapter 5: Scanning; Identifying Active Machines; Identifying Open Ports and Available Services; War Dialing; War Driving and War Walking; Fingerprinting; Mapping the Network; Assessment Questions
Chapter 6: EnumeratingProtection Rings; Windows Architecture; Windows Security Elements; Enumerating Techniques for Windows; Countermeasures; Assessment Questions; Part III: Attack Techniques and Tools; Chapter 7 System Hacking Techniques; Password Guessing; Privilege Escalation; Password Cracking; Covering Tracks; Countermeasures; Assessment Questions; Chapter 8: Trojans, Backdoors, and Sniffers; Trojans and Backdoors; Sniffers; Assessment Questions; Chapter 9: Denial of Service Attacks and Session Hijacking; Denial of Service/Distributed Denial of Service (DoS/DDoS); Session Hijacking
Assessment QuestionsChapter 10: Penetration Testing Steps; Penetration Testing Overview; Legal and Ethical Implications; The Three Pretest Phases; Penetration Testing Tools and Techniques; Wireless Network Penetration Testing; Social Engineering; Intrusion Detection System (IDS); Assessment Questions; Chapter 11: Linux Hacking Tools; Linux History; Scanning Networks with Linux Tools; Linux Hacking Tools; Linux Rootkits; Linux Security Tools; Assessment Questions; Chapter 12: Social Engineering and Physical Security; Social Engineering; Physical Security; Assessment Questions
Part IV: Web Server and Database AttacksChapter 13: Web Server Hacking and Web Application Vulnerabilities; Web Server Hacking; Web Application Vulnerabilities; Countermeasures; Assessment Questions; Chapter 14:SQL Injection Vulnerabilities; SQL Injection Testing and Attacks; SQL Injection Prevention and Remediation; Automated SQL Injection Tools; Assessment Questions; Chapter 15: Cryptography; Symmetric Key Cryptography; Public Key Cryptosystems; Public Key Certificates; Cryptanalysis; Managing Encryption Keys; Email Security; Electronic Transaction Security; Wireless Security
Disk Encryption
Altri titoli varianti Comprehensive guide to certified ethical hacking
Record Nr. UNINA-9910813170803321
Krutz Ronald L. <1938->  
Indianapolis, IN, : Wiley, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cloud computing [[electronic resource] ] : moving IT out of the office
Cloud computing [[electronic resource] ] : moving IT out of the office
Edizione [1st edition]
Pubbl/distr/stampa Swindon, GBR, : British Informatics Society Ltd., 2012
Descrizione fisica 1 online resource (59 p.)
Disciplina 004.16
Soggetto topico Cloud computing - Economic aspects
Information technology - Management
Soggetto genere / forma Electronic books.
ISBN 1-78017-131-5
1-78017-130-7
1-78017-132-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto section 1. What is the cloud? -- section 2. The case for the cloud -- section 3. Moving to the cloud -- section 4. Changing the IT infrastructure -- section 5. Security in the cloud.
Record Nr. UNINA-9910453549803321
Swindon, GBR, : British Informatics Society Ltd., 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cloud computing [[electronic resource] ] : moving IT out of the office
Cloud computing [[electronic resource] ] : moving IT out of the office
Edizione [1st edition]
Pubbl/distr/stampa Swindon, GBR, : British Informatics Society Ltd., 2012
Descrizione fisica 1 online resource (59 p.)
Disciplina 004.16
Soggetto topico Cloud computing - Economic aspects
Information technology - Management
ISBN 1-78017-131-5
1-78017-130-7
1-78017-132-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto section 1. What is the cloud? -- section 2. The case for the cloud -- section 3. Moving to the cloud -- section 4. Changing the IT infrastructure -- section 5. Security in the cloud.
Record Nr. UNINA-9910790808203321
Swindon, GBR, : British Informatics Society Ltd., 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cloud computing [[electronic resource] ] : moving IT out of the office
Cloud computing [[electronic resource] ] : moving IT out of the office
Edizione [1st edition]
Pubbl/distr/stampa Swindon, GBR, : British Informatics Society Ltd., 2012
Descrizione fisica 1 online resource (59 p.)
Disciplina 004.16
Soggetto topico Cloud computing - Economic aspects
Information technology - Management
ISBN 1-78017-131-5
1-78017-130-7
1-78017-132-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto section 1. What is the cloud? -- section 2. The case for the cloud -- section 3. Moving to the cloud -- section 4. Changing the IT infrastructure -- section 5. Security in the cloud.
Record Nr. UNINA-9910819280903321
Swindon, GBR, : British Informatics Society Ltd., 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CODASPY'20 : proceedings of the Tenth ACM Conference on Data and Application Security and Privacy : March 16-18, 2020, New Orleans, LA, USA / / general chairs, Vassil Rouseev, Bhavani Thuraisingham
CODASPY'20 : proceedings of the Tenth ACM Conference on Data and Application Security and Privacy : March 16-18, 2020, New Orleans, LA, USA / / general chairs, Vassil Rouseev, Bhavani Thuraisingham
Pubbl/distr/stampa New York : , : Association for Computing Machinery, , 2020
Descrizione fisica 1 online resource (392 pages) : illustrations
Disciplina 004.16
Collana ACM conferences
Soggetto topico Application software - Security measures
Computer security
Data protection
Online social networks - Security measures
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910412317203321
New York : , : Association for Computing Machinery, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Coding iPhone apps for kids : a playful introduction to swift / Gloria Winquist and Matt McCarthy
Coding iPhone apps for kids : a playful introduction to swift / Gloria Winquist and Matt McCarthy
Autore Winquist, Gloria
Pubbl/distr/stampa San Francisco, : No Starch Press, 2017
Descrizione fisica XXI, 312 p. : ill. color. ; 24 cm
Disciplina 004.16
Altri autori (Persone) McCarthy, Matt
Soggetto topico Telefoni cellulari - Programmazione - Linguaggio Swift
Microelaboratori - Programmazione - Linguaggio Swift
ISBN 1593277563
9781593277567
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISANNIO-NAP0775395
Winquist, Gloria  
San Francisco, : No Starch Press, 2017
Materiale a stampa
Lo trovi qui: Univ. del Sannio
Opac: Controlla la disponibilità qui
Communication in Critical Embedded Systems : First Workshop, WoCCES 2013, Brasília, Brazil, May, 10, 2013, Second Workshop, WoCCES 2014, Florianópolis, Brazil, May 9, 2014, Third Workshop, WoCCES 2015, Vitória, Brazil, May 22, 2015, 4th Workshop, WoCCES 2016, Salvador, Brazil, June 3, 2016, Revised Selected Papers / / edited by Kalinka Branco, Alex Pinto, Daniel Pigatto
Communication in Critical Embedded Systems : First Workshop, WoCCES 2013, Brasília, Brazil, May, 10, 2013, Second Workshop, WoCCES 2014, Florianópolis, Brazil, May 9, 2014, Third Workshop, WoCCES 2015, Vitória, Brazil, May 22, 2015, 4th Workshop, WoCCES 2016, Salvador, Brazil, June 3, 2016, Revised Selected Papers / / edited by Kalinka Branco, Alex Pinto, Daniel Pigatto
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XV, 131 p. 68 illus.)
Disciplina 004.16
Collana Communications in Computer and Information Science
Soggetto topico Mobile computing
Multimedia information systems
Computer organization
Mobile Computing
Multimedia Information Systems
Computer Systems Organization and Communication Networks
ISBN 3-319-61403-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Distributed Algorithms -- Hardware and Software Architectures -- Integration of High Availability Clusters and Grids with Embedded Systems -- Media Access Control (MAC), cognitive radios and directional antennas -- Communication Group -- Mobile and Embedded Computing -- Middleware and Web Services -- Interaction between sensors and Mobile Robots -- GPU -- FPGA -- Fly by Wireless -- P2P, Mobile and Ad-Hoc Networks -- Safety and Certification -- Security -- Sensor and Vehicular Networks -- Unmanned systems (UAVs, UGVs).
Record Nr. UNINA-9910254811003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Companion of the 2018 ACM Conference on Computer Supported Cooperative Work and Social Computing / / Vanessa Evers, Association for Computing Machinery-Digital Library
Companion of the 2018 ACM Conference on Computer Supported Cooperative Work and Social Computing / / Vanessa Evers, Association for Computing Machinery-Digital Library
Autore Evers Vanessa
Pubbl/distr/stampa New York, New York : , : ACM, , [2018]
Descrizione fisica 1 online resource (495 pages)
Disciplina 004.16
Collana ACM Conferences.
Soggetto topico Microcomputer workstations
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910375700203321
Evers Vanessa  
New York, New York : , : ACM, , [2018]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui

Data di pubblicazione

Altro...