Come funzionano i servizi segreti : dalla tradizione dello spionaggio alle guerre non convenzionali del prossimo futuro / Aldo Giannuli |
Autore | Giannuli, Aldo <1952- > |
Pubbl/distr/stampa | [Milano] : Ponte alle Grazie, 2013 |
Descrizione fisica | 410 p. ; 21 cm |
Disciplina | 327.12 |
Collana | Saggi |
Soggetto non controllato | Servizi segreti |
ISBN | 978-88-6220-870-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | ita |
Record Nr. | UNINA-990009883330403321 |
Giannuli, Aldo <1952- > | ||
[Milano] : Ponte alle Grazie, 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Conoscere il nemico : apparati di intelligence e modelli culturali nella storia contemporanea / a cura di Paolo Ferrari, Alessandro Massignani |
Pubbl/distr/stampa | Milano : FrancoAngeli, 2010 |
Descrizione fisica | 528 p. ; 23 cm |
Disciplina | 327.12 |
Collana | Storia |
Soggetto non controllato | Spionaggio e controspionaggio |
ISBN | 978-88-568-1761-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | ita |
Record Nr. | UNINA-990009555840403321 |
Milano : FrancoAngeli, 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Counterintelligence for corporate environments . Volume 1 How to protect information and business integrity in the modern world / / Dylan van Genderen |
Autore | van Genderen Dylan |
Pubbl/distr/stampa | New York, NY : , : Business Expert Press, , [2018] |
Descrizione fisica | 1 online resource (131 pages) |
Disciplina | 327.12 |
Soggetto topico | Intelligence service |
Soggetto genere / forma | Electronic books. |
ISBN | 1-947441-66-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910468008103321 |
van Genderen Dylan | ||
New York, NY : , : Business Expert Press, , [2018] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Counterintelligence for corporate environments . Volume 1 How to protect information and business integrity in the modern world / / Dylan van Genderen |
Autore | van Genderen Dylan |
Pubbl/distr/stampa | New York, NY : , : Business Expert Press, , [2018] |
Descrizione fisica | 1 online resource (131 pages) |
Disciplina | 327.12 |
Soggetto topico | Intelligence service |
ISBN | 1-947441-66-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910795199403321 |
van Genderen Dylan | ||
New York, NY : , : Business Expert Press, , [2018] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Counterintelligence for corporate environments . Volume 1 How to protect information and business integrity in the modern world / / Dylan van Genderen |
Autore | van Genderen Dylan |
Pubbl/distr/stampa | New York, NY : , : Business Expert Press, , [2018] |
Descrizione fisica | 1 online resource (131 pages) |
Disciplina | 327.12 |
Soggetto topico | Intelligence service |
ISBN | 1-947441-66-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910816596403321 |
van Genderen Dylan | ||
New York, NY : , : Business Expert Press, , [2018] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Crippling Leviathan : How Foreign Subversion Weakens the State / / Melissa M. Lee |
Autore | Lee Melissa M. |
Pubbl/distr/stampa | Ithaca, NY : , : Cornell University Press, , [2020] |
Descrizione fisica | 1 online resource (1 online resource) |
Disciplina | 327.12 |
Soggetto topico |
International relations
Legitimacy of governments State, The Authority Sovereignty, Violation of Subversive activities Political stability |
Soggetto genere / forma | Electronic books. |
Soggetto non controllato | Statebuilding, Political development, State capacity, Foreign Intervention, Subversion, State Development |
ISBN | 1-5017-4837-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Frontmatter -- Contents -- Acknowledgments -- Introduction: The International Dimensions of State Weakness -- 1. The State of State Authority -- 2. The Strategy of Foreign Subversion -- 3. Hostile Neighbors, Weak Peripheries -- 4. The Roots of Subversion -- 5. Undermining State Authority in the Philippines -- 6. Undermining State Authority in Cambodia -- Conclusion: The Leviathan, Crippled -- Appendix: Data and Statistics -- Notes -- References -- Author Index -- Subject Index |
Record Nr. | UNINA-9910554223903321 |
Lee Melissa M. | ||
Ithaca, NY : , : Cornell University Press, , [2020] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber reconnaissance, surveillance, and defense / / Robert Shimonski ; John Zenir, contributing editor ; Allison Bishop, technical editor |
Autore | Shimonski Robert |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Syngress, , 2015 |
Descrizione fisica | 1 online resource (258 p.) |
Disciplina | 327.12 |
Soggetto topico |
Electronic intelligence
Internet in espionage Cyber intelligence (Computer security) Internet - Security measures Computer crimes |
Soggetto genere / forma | Electronic books. |
ISBN | 0-12-801468-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright Page; Dedication; Contents; About the Authors; Acknowledgments; Introduction; Chapter 1 - Digital Reconnaissance and Surveillance; Digital Reconnaissance and Surveillance; Art and History of Spying; Threat of Digital Reconnaissance and Surveillance; Threat Landscape; Why Spy?; NSA and Edward Snowden; Public Trust; Cybercrime; Why Spy? Motivation; What Is to Gain? Reward; Digital Forensics; Who Spies?; Professional Roles; Hackers (White, Gray, and Black); Digital Forensics Examiner; Cyber Intelligence Analyst; Cyber Security Engineer; Penetration Tester
Private InvestigatorLaw Enforcement; Legal and Ethical Principles; Ethics; The Law; Surveillance and Cybercrime Sample Law; Summary; Chapter 2 - Information Gathering; Information Gathering; Am I Being Spied On?; How Private Is Your Life?; Examples of Privacy Invasion; How to Gather Information; Information Gathering Tools; Online Reconnaissance; The Internet Threat; Search Engines; Phishing; Tracking; Social Media; Scanning, Sniffing, and Mapping; Wired and Wireless; Infrastructure; Mobile Device Threat; Data Threat (Metadata); Physical Reconnaissance; Tailing and Stalking Social EngineeringTapping; Legal and Ethical Concerns; Summary; Chapter 3 - Social Engineering; Social Engineering; Am I Being Spied On?; Scam Example; How to Gather Information; Dumpster Diving; Shoulder Surfing; Phishing; Social Engineering Toolkit; Bugging and Recording; Mitigation of Social Engineering; Mitigate Attack; Information Privacy; Legal and Ethical Concerns; More Legal Issues; Summary; Chapter 4 - Mobile Phone Tracking; Phone Tracking; Mobile Phones; Apple iPhone; Google Android; Windows Phone; Blackberry; Phone Tracking; Malicious Tracking; Tracking for Reconnaissance Location-Based ServicesTracking a SIM; Global Positioning System and Geolocation; Google Mapping; Legal and Ethical Concerns; Summary; Chapter 5 - Physical Device Tracking; Physical Tracking; Device fingerprint; Tracking for Reconnaissance Today; Application Installation Versus Physical Device; Physical Device Tracking; Safe Devices Used Against You; Location Tracking and Wearable Technology; Legal and Ethical Concerns; Summary; Chapter 6 - Web Camera and Video Tracking; Camera Tracking; Tracking examples; Security Surveillance Systems (Private Home) Security Surveillance Systems (Businesses)Security Surveillance Systems (Public); Satellite Surveillance Systems; PC devices and webcams; Creepware; Mobile Devices; Gaming Consoles; Legal and Ethical Concerns; Summary; Chapter 7 - Data Capture and Exploitation; Data Threat; Data Theft and Surveillance; Basic Data Capture Techniques; Data at Rest; Malware Protection; DLP Software; Firewall Systems; Removable Media; Encryption Protection; Data in Motion; Sniffers; Skimmers; Digital Forensics; Devices and Applications; Legal and Ethical Concerns; Summary; Chapter 8 - Protection Methods Protect Yourself! |
Record Nr. | UNINA-9910460221703321 |
Shimonski Robert | ||
Waltham, Massachusetts : , : Syngress, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber reconnaissance, surveillance, and defense / / Robert Shimonski ; John Zenir, contributing editor ; Allison Bishop, technical editor |
Autore | Shimonski Robert |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Syngress, , 2015 |
Descrizione fisica | 1 online resource (258 p.) |
Disciplina | 327.12 |
Soggetto topico |
Electronic intelligence
Internet in espionage Cyber intelligence (Computer security) Internet - Security measures Computer crimes |
ISBN | 0-12-801468-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright Page; Dedication; Contents; About the Authors; Acknowledgments; Introduction; Chapter 1 - Digital Reconnaissance and Surveillance; Digital Reconnaissance and Surveillance; Art and History of Spying; Threat of Digital Reconnaissance and Surveillance; Threat Landscape; Why Spy?; NSA and Edward Snowden; Public Trust; Cybercrime; Why Spy? Motivation; What Is to Gain? Reward; Digital Forensics; Who Spies?; Professional Roles; Hackers (White, Gray, and Black); Digital Forensics Examiner; Cyber Intelligence Analyst; Cyber Security Engineer; Penetration Tester
Private InvestigatorLaw Enforcement; Legal and Ethical Principles; Ethics; The Law; Surveillance and Cybercrime Sample Law; Summary; Chapter 2 - Information Gathering; Information Gathering; Am I Being Spied On?; How Private Is Your Life?; Examples of Privacy Invasion; How to Gather Information; Information Gathering Tools; Online Reconnaissance; The Internet Threat; Search Engines; Phishing; Tracking; Social Media; Scanning, Sniffing, and Mapping; Wired and Wireless; Infrastructure; Mobile Device Threat; Data Threat (Metadata); Physical Reconnaissance; Tailing and Stalking Social EngineeringTapping; Legal and Ethical Concerns; Summary; Chapter 3 - Social Engineering; Social Engineering; Am I Being Spied On?; Scam Example; How to Gather Information; Dumpster Diving; Shoulder Surfing; Phishing; Social Engineering Toolkit; Bugging and Recording; Mitigation of Social Engineering; Mitigate Attack; Information Privacy; Legal and Ethical Concerns; More Legal Issues; Summary; Chapter 4 - Mobile Phone Tracking; Phone Tracking; Mobile Phones; Apple iPhone; Google Android; Windows Phone; Blackberry; Phone Tracking; Malicious Tracking; Tracking for Reconnaissance Location-Based ServicesTracking a SIM; Global Positioning System and Geolocation; Google Mapping; Legal and Ethical Concerns; Summary; Chapter 5 - Physical Device Tracking; Physical Tracking; Device fingerprint; Tracking for Reconnaissance Today; Application Installation Versus Physical Device; Physical Device Tracking; Safe Devices Used Against You; Location Tracking and Wearable Technology; Legal and Ethical Concerns; Summary; Chapter 6 - Web Camera and Video Tracking; Camera Tracking; Tracking examples; Security Surveillance Systems (Private Home) Security Surveillance Systems (Businesses)Security Surveillance Systems (Public); Satellite Surveillance Systems; PC devices and webcams; Creepware; Mobile Devices; Gaming Consoles; Legal and Ethical Concerns; Summary; Chapter 7 - Data Capture and Exploitation; Data Threat; Data Theft and Surveillance; Basic Data Capture Techniques; Data at Rest; Malware Protection; DLP Software; Firewall Systems; Removable Media; Encryption Protection; Data in Motion; Sniffers; Skimmers; Digital Forensics; Devices and Applications; Legal and Ethical Concerns; Summary; Chapter 8 - Protection Methods Protect Yourself! |
Record Nr. | UNINA-9910787012103321 |
Shimonski Robert | ||
Waltham, Massachusetts : , : Syngress, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber reconnaissance, surveillance, and defense / / Robert Shimonski ; John Zenir, contributing editor ; Allison Bishop, technical editor |
Autore | Shimonski Robert |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Syngress, , 2015 |
Descrizione fisica | 1 online resource (258 p.) |
Disciplina | 327.12 |
Soggetto topico |
Electronic intelligence
Internet in espionage Cyber intelligence (Computer security) Internet - Security measures Computer crimes |
ISBN | 0-12-801468-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright Page; Dedication; Contents; About the Authors; Acknowledgments; Introduction; Chapter 1 - Digital Reconnaissance and Surveillance; Digital Reconnaissance and Surveillance; Art and History of Spying; Threat of Digital Reconnaissance and Surveillance; Threat Landscape; Why Spy?; NSA and Edward Snowden; Public Trust; Cybercrime; Why Spy? Motivation; What Is to Gain? Reward; Digital Forensics; Who Spies?; Professional Roles; Hackers (White, Gray, and Black); Digital Forensics Examiner; Cyber Intelligence Analyst; Cyber Security Engineer; Penetration Tester
Private InvestigatorLaw Enforcement; Legal and Ethical Principles; Ethics; The Law; Surveillance and Cybercrime Sample Law; Summary; Chapter 2 - Information Gathering; Information Gathering; Am I Being Spied On?; How Private Is Your Life?; Examples of Privacy Invasion; How to Gather Information; Information Gathering Tools; Online Reconnaissance; The Internet Threat; Search Engines; Phishing; Tracking; Social Media; Scanning, Sniffing, and Mapping; Wired and Wireless; Infrastructure; Mobile Device Threat; Data Threat (Metadata); Physical Reconnaissance; Tailing and Stalking Social EngineeringTapping; Legal and Ethical Concerns; Summary; Chapter 3 - Social Engineering; Social Engineering; Am I Being Spied On?; Scam Example; How to Gather Information; Dumpster Diving; Shoulder Surfing; Phishing; Social Engineering Toolkit; Bugging and Recording; Mitigation of Social Engineering; Mitigate Attack; Information Privacy; Legal and Ethical Concerns; More Legal Issues; Summary; Chapter 4 - Mobile Phone Tracking; Phone Tracking; Mobile Phones; Apple iPhone; Google Android; Windows Phone; Blackberry; Phone Tracking; Malicious Tracking; Tracking for Reconnaissance Location-Based ServicesTracking a SIM; Global Positioning System and Geolocation; Google Mapping; Legal and Ethical Concerns; Summary; Chapter 5 - Physical Device Tracking; Physical Tracking; Device fingerprint; Tracking for Reconnaissance Today; Application Installation Versus Physical Device; Physical Device Tracking; Safe Devices Used Against You; Location Tracking and Wearable Technology; Legal and Ethical Concerns; Summary; Chapter 6 - Web Camera and Video Tracking; Camera Tracking; Tracking examples; Security Surveillance Systems (Private Home) Security Surveillance Systems (Businesses)Security Surveillance Systems (Public); Satellite Surveillance Systems; PC devices and webcams; Creepware; Mobile Devices; Gaming Consoles; Legal and Ethical Concerns; Summary; Chapter 7 - Data Capture and Exploitation; Data Threat; Data Theft and Surveillance; Basic Data Capture Techniques; Data at Rest; Malware Protection; DLP Software; Firewall Systems; Removable Media; Encryption Protection; Data in Motion; Sniffers; Skimmers; Digital Forensics; Devices and Applications; Legal and Ethical Concerns; Summary; Chapter 8 - Protection Methods Protect Yourself! |
Record Nr. | UNINA-9910829064003321 |
Shimonski Robert | ||
Waltham, Massachusetts : , : Syngress, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
DNI releases budget figure for National Intelligence Program |
Pubbl/distr/stampa | Washington, D.C. : , : Office of the Director of National Intelligence, Public Affairs Office, , 2007- |
Descrizione fisica | 1 online resource (volumes) |
Disciplina | 327.12 |
Collana | ODNI news release |
Soggetto topico |
Intelligence service - United States - Finance
Expenditures, Public Intelligence service - Finance |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Altri titoli varianti |
Director of National Intelligence releases budget figure for National Intelligence Program
DNI releases budget figure for ... National Intelligence Program DNI releases fiscal year 2011 appropriated budget figure for the National Intelligence Program DNI releases appropriated budget figure for ... National Intelligence Program |
Record Nr. | UNINA-9910708688503321 |
Washington, D.C. : , : Office of the Director of National Intelligence, Public Affairs Office, , 2007- | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|