top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Come funzionano i servizi segreti : dalla tradizione dello spionaggio alle guerre non convenzionali del prossimo futuro / Aldo Giannuli
Come funzionano i servizi segreti : dalla tradizione dello spionaggio alle guerre non convenzionali del prossimo futuro / Aldo Giannuli
Autore Giannuli, Aldo <1952- >
Pubbl/distr/stampa [Milano] : Ponte alle Grazie, 2013
Descrizione fisica 410 p. ; 21 cm
Disciplina 327.12
Collana Saggi
Soggetto non controllato Servizi segreti
ISBN 978-88-6220-870-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione ita
Record Nr. UNINA-990009883330403321
Giannuli, Aldo <1952- >  
[Milano] : Ponte alle Grazie, 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Conoscere il nemico : apparati di intelligence e modelli culturali nella storia contemporanea / a cura di Paolo Ferrari, Alessandro Massignani
Conoscere il nemico : apparati di intelligence e modelli culturali nella storia contemporanea / a cura di Paolo Ferrari, Alessandro Massignani
Pubbl/distr/stampa Milano : FrancoAngeli, 2010
Descrizione fisica 528 p. ; 23 cm
Disciplina 327.12
Collana Storia
Soggetto non controllato Spionaggio e controspionaggio
ISBN 978-88-568-1761-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione ita
Record Nr. UNINA-990009555840403321
Milano : FrancoAngeli, 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Counterintelligence for corporate environments . Volume 1 How to protect information and business integrity in the modern world / / Dylan van Genderen
Counterintelligence for corporate environments . Volume 1 How to protect information and business integrity in the modern world / / Dylan van Genderen
Autore van Genderen Dylan
Pubbl/distr/stampa New York, NY : , : Business Expert Press, , [2018]
Descrizione fisica 1 online resource (131 pages)
Disciplina 327.12
Soggetto topico Intelligence service
Soggetto genere / forma Electronic books.
ISBN 1-947441-66-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910468008103321
van Genderen Dylan  
New York, NY : , : Business Expert Press, , [2018]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Counterintelligence for corporate environments . Volume 1 How to protect information and business integrity in the modern world / / Dylan van Genderen
Counterintelligence for corporate environments . Volume 1 How to protect information and business integrity in the modern world / / Dylan van Genderen
Autore van Genderen Dylan
Pubbl/distr/stampa New York, NY : , : Business Expert Press, , [2018]
Descrizione fisica 1 online resource (131 pages)
Disciplina 327.12
Soggetto topico Intelligence service
ISBN 1-947441-66-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910795199403321
van Genderen Dylan  
New York, NY : , : Business Expert Press, , [2018]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Counterintelligence for corporate environments . Volume 1 How to protect information and business integrity in the modern world / / Dylan van Genderen
Counterintelligence for corporate environments . Volume 1 How to protect information and business integrity in the modern world / / Dylan van Genderen
Autore van Genderen Dylan
Pubbl/distr/stampa New York, NY : , : Business Expert Press, , [2018]
Descrizione fisica 1 online resource (131 pages)
Disciplina 327.12
Soggetto topico Intelligence service
ISBN 1-947441-66-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910816596403321
van Genderen Dylan  
New York, NY : , : Business Expert Press, , [2018]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Crippling Leviathan : How Foreign Subversion Weakens the State / / Melissa M. Lee
Crippling Leviathan : How Foreign Subversion Weakens the State / / Melissa M. Lee
Autore Lee Melissa M.
Pubbl/distr/stampa Ithaca, NY : , : Cornell University Press, , [2020]
Descrizione fisica 1 online resource (1 online resource)
Disciplina 327.12
Soggetto topico International relations
Legitimacy of governments
State, The
Authority
Sovereignty, Violation of
Subversive activities
Political stability
Soggetto genere / forma Electronic books.
Soggetto non controllato Statebuilding, Political development, State capacity, Foreign Intervention, Subversion, State Development
ISBN 1-5017-4837-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Frontmatter -- Contents -- Acknowledgments -- Introduction: The International Dimensions of State Weakness -- 1. The State of State Authority -- 2. The Strategy of Foreign Subversion -- 3. Hostile Neighbors, Weak Peripheries -- 4. The Roots of Subversion -- 5. Undermining State Authority in the Philippines -- 6. Undermining State Authority in Cambodia -- Conclusion: The Leviathan, Crippled -- Appendix: Data and Statistics -- Notes -- References -- Author Index -- Subject Index
Record Nr. UNINA-9910554223903321
Lee Melissa M.  
Ithaca, NY : , : Cornell University Press, , [2020]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber reconnaissance, surveillance, and defense / / Robert Shimonski ; John Zenir, contributing editor ; Allison Bishop, technical editor
Cyber reconnaissance, surveillance, and defense / / Robert Shimonski ; John Zenir, contributing editor ; Allison Bishop, technical editor
Autore Shimonski Robert
Edizione [1st edition]
Pubbl/distr/stampa Waltham, Massachusetts : , : Syngress, , 2015
Descrizione fisica 1 online resource (258 p.)
Disciplina 327.12
Soggetto topico Electronic intelligence
Internet in espionage
Cyber intelligence (Computer security)
Internet - Security measures
Computer crimes
Soggetto genere / forma Electronic books.
ISBN 0-12-801468-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright Page; Dedication; Contents; About the Authors; Acknowledgments; Introduction; Chapter 1 - Digital Reconnaissance and Surveillance; Digital Reconnaissance and Surveillance; Art and History of Spying; Threat of Digital Reconnaissance and Surveillance; Threat Landscape; Why Spy?; NSA and Edward Snowden; Public Trust; Cybercrime; Why Spy? Motivation; What Is to Gain? Reward; Digital Forensics; Who Spies?; Professional Roles; Hackers (White, Gray, and Black); Digital Forensics Examiner; Cyber Intelligence Analyst; Cyber Security Engineer; Penetration Tester
Private InvestigatorLaw Enforcement; Legal and Ethical Principles; Ethics; The Law; Surveillance and Cybercrime Sample Law; Summary; Chapter 2 - Information Gathering; Information Gathering; Am I Being Spied On?; How Private Is Your Life?; Examples of Privacy Invasion; How to Gather Information; Information Gathering Tools; Online Reconnaissance; The Internet Threat; Search Engines; Phishing; Tracking; Social Media; Scanning, Sniffing, and Mapping; Wired and Wireless; Infrastructure; Mobile Device Threat; Data Threat (Metadata); Physical Reconnaissance; Tailing and Stalking
Social EngineeringTapping; Legal and Ethical Concerns; Summary; Chapter 3 - Social Engineering; Social Engineering; Am I Being Spied On?; Scam Example; How to Gather Information; Dumpster Diving; Shoulder Surfing; Phishing; Social Engineering Toolkit; Bugging and Recording; Mitigation of Social Engineering; Mitigate Attack; Information Privacy; Legal and Ethical Concerns; More Legal Issues; Summary; Chapter 4 - Mobile Phone Tracking; Phone Tracking; Mobile Phones; Apple iPhone; Google Android; Windows Phone; Blackberry; Phone Tracking; Malicious Tracking; Tracking for Reconnaissance
Location-Based ServicesTracking a SIM; Global Positioning System and Geolocation; Google Mapping; Legal and Ethical Concerns; Summary; Chapter 5 - Physical Device Tracking; Physical Tracking; Device fingerprint; Tracking for Reconnaissance Today; Application Installation Versus Physical Device; Physical Device Tracking; Safe Devices Used Against You; Location Tracking and Wearable Technology; Legal and Ethical Concerns; Summary; Chapter 6 - Web Camera and Video Tracking; Camera Tracking; Tracking examples; Security Surveillance Systems (Private Home)
Security Surveillance Systems (Businesses)Security Surveillance Systems (Public); Satellite Surveillance Systems; PC devices and webcams; Creepware; Mobile Devices; Gaming Consoles; Legal and Ethical Concerns; Summary; Chapter 7 - Data Capture and Exploitation; Data Threat; Data Theft and Surveillance; Basic Data Capture Techniques; Data at Rest; Malware Protection; DLP Software; Firewall Systems; Removable Media; Encryption Protection; Data in Motion; Sniffers; Skimmers; Digital Forensics; Devices and Applications; Legal and Ethical Concerns; Summary; Chapter 8 - Protection Methods
Protect Yourself!
Record Nr. UNINA-9910460221703321
Shimonski Robert  
Waltham, Massachusetts : , : Syngress, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber reconnaissance, surveillance, and defense / / Robert Shimonski ; John Zenir, contributing editor ; Allison Bishop, technical editor
Cyber reconnaissance, surveillance, and defense / / Robert Shimonski ; John Zenir, contributing editor ; Allison Bishop, technical editor
Autore Shimonski Robert
Edizione [1st edition]
Pubbl/distr/stampa Waltham, Massachusetts : , : Syngress, , 2015
Descrizione fisica 1 online resource (258 p.)
Disciplina 327.12
Soggetto topico Electronic intelligence
Internet in espionage
Cyber intelligence (Computer security)
Internet - Security measures
Computer crimes
ISBN 0-12-801468-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright Page; Dedication; Contents; About the Authors; Acknowledgments; Introduction; Chapter 1 - Digital Reconnaissance and Surveillance; Digital Reconnaissance and Surveillance; Art and History of Spying; Threat of Digital Reconnaissance and Surveillance; Threat Landscape; Why Spy?; NSA and Edward Snowden; Public Trust; Cybercrime; Why Spy? Motivation; What Is to Gain? Reward; Digital Forensics; Who Spies?; Professional Roles; Hackers (White, Gray, and Black); Digital Forensics Examiner; Cyber Intelligence Analyst; Cyber Security Engineer; Penetration Tester
Private InvestigatorLaw Enforcement; Legal and Ethical Principles; Ethics; The Law; Surveillance and Cybercrime Sample Law; Summary; Chapter 2 - Information Gathering; Information Gathering; Am I Being Spied On?; How Private Is Your Life?; Examples of Privacy Invasion; How to Gather Information; Information Gathering Tools; Online Reconnaissance; The Internet Threat; Search Engines; Phishing; Tracking; Social Media; Scanning, Sniffing, and Mapping; Wired and Wireless; Infrastructure; Mobile Device Threat; Data Threat (Metadata); Physical Reconnaissance; Tailing and Stalking
Social EngineeringTapping; Legal and Ethical Concerns; Summary; Chapter 3 - Social Engineering; Social Engineering; Am I Being Spied On?; Scam Example; How to Gather Information; Dumpster Diving; Shoulder Surfing; Phishing; Social Engineering Toolkit; Bugging and Recording; Mitigation of Social Engineering; Mitigate Attack; Information Privacy; Legal and Ethical Concerns; More Legal Issues; Summary; Chapter 4 - Mobile Phone Tracking; Phone Tracking; Mobile Phones; Apple iPhone; Google Android; Windows Phone; Blackberry; Phone Tracking; Malicious Tracking; Tracking for Reconnaissance
Location-Based ServicesTracking a SIM; Global Positioning System and Geolocation; Google Mapping; Legal and Ethical Concerns; Summary; Chapter 5 - Physical Device Tracking; Physical Tracking; Device fingerprint; Tracking for Reconnaissance Today; Application Installation Versus Physical Device; Physical Device Tracking; Safe Devices Used Against You; Location Tracking and Wearable Technology; Legal and Ethical Concerns; Summary; Chapter 6 - Web Camera and Video Tracking; Camera Tracking; Tracking examples; Security Surveillance Systems (Private Home)
Security Surveillance Systems (Businesses)Security Surveillance Systems (Public); Satellite Surveillance Systems; PC devices and webcams; Creepware; Mobile Devices; Gaming Consoles; Legal and Ethical Concerns; Summary; Chapter 7 - Data Capture and Exploitation; Data Threat; Data Theft and Surveillance; Basic Data Capture Techniques; Data at Rest; Malware Protection; DLP Software; Firewall Systems; Removable Media; Encryption Protection; Data in Motion; Sniffers; Skimmers; Digital Forensics; Devices and Applications; Legal and Ethical Concerns; Summary; Chapter 8 - Protection Methods
Protect Yourself!
Record Nr. UNINA-9910787012103321
Shimonski Robert  
Waltham, Massachusetts : , : Syngress, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber reconnaissance, surveillance, and defense / / Robert Shimonski ; John Zenir, contributing editor ; Allison Bishop, technical editor
Cyber reconnaissance, surveillance, and defense / / Robert Shimonski ; John Zenir, contributing editor ; Allison Bishop, technical editor
Autore Shimonski Robert
Edizione [1st edition]
Pubbl/distr/stampa Waltham, Massachusetts : , : Syngress, , 2015
Descrizione fisica 1 online resource (258 p.)
Disciplina 327.12
Soggetto topico Electronic intelligence
Internet in espionage
Cyber intelligence (Computer security)
Internet - Security measures
Computer crimes
ISBN 0-12-801468-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright Page; Dedication; Contents; About the Authors; Acknowledgments; Introduction; Chapter 1 - Digital Reconnaissance and Surveillance; Digital Reconnaissance and Surveillance; Art and History of Spying; Threat of Digital Reconnaissance and Surveillance; Threat Landscape; Why Spy?; NSA and Edward Snowden; Public Trust; Cybercrime; Why Spy? Motivation; What Is to Gain? Reward; Digital Forensics; Who Spies?; Professional Roles; Hackers (White, Gray, and Black); Digital Forensics Examiner; Cyber Intelligence Analyst; Cyber Security Engineer; Penetration Tester
Private InvestigatorLaw Enforcement; Legal and Ethical Principles; Ethics; The Law; Surveillance and Cybercrime Sample Law; Summary; Chapter 2 - Information Gathering; Information Gathering; Am I Being Spied On?; How Private Is Your Life?; Examples of Privacy Invasion; How to Gather Information; Information Gathering Tools; Online Reconnaissance; The Internet Threat; Search Engines; Phishing; Tracking; Social Media; Scanning, Sniffing, and Mapping; Wired and Wireless; Infrastructure; Mobile Device Threat; Data Threat (Metadata); Physical Reconnaissance; Tailing and Stalking
Social EngineeringTapping; Legal and Ethical Concerns; Summary; Chapter 3 - Social Engineering; Social Engineering; Am I Being Spied On?; Scam Example; How to Gather Information; Dumpster Diving; Shoulder Surfing; Phishing; Social Engineering Toolkit; Bugging and Recording; Mitigation of Social Engineering; Mitigate Attack; Information Privacy; Legal and Ethical Concerns; More Legal Issues; Summary; Chapter 4 - Mobile Phone Tracking; Phone Tracking; Mobile Phones; Apple iPhone; Google Android; Windows Phone; Blackberry; Phone Tracking; Malicious Tracking; Tracking for Reconnaissance
Location-Based ServicesTracking a SIM; Global Positioning System and Geolocation; Google Mapping; Legal and Ethical Concerns; Summary; Chapter 5 - Physical Device Tracking; Physical Tracking; Device fingerprint; Tracking for Reconnaissance Today; Application Installation Versus Physical Device; Physical Device Tracking; Safe Devices Used Against You; Location Tracking and Wearable Technology; Legal and Ethical Concerns; Summary; Chapter 6 - Web Camera and Video Tracking; Camera Tracking; Tracking examples; Security Surveillance Systems (Private Home)
Security Surveillance Systems (Businesses)Security Surveillance Systems (Public); Satellite Surveillance Systems; PC devices and webcams; Creepware; Mobile Devices; Gaming Consoles; Legal and Ethical Concerns; Summary; Chapter 7 - Data Capture and Exploitation; Data Threat; Data Theft and Surveillance; Basic Data Capture Techniques; Data at Rest; Malware Protection; DLP Software; Firewall Systems; Removable Media; Encryption Protection; Data in Motion; Sniffers; Skimmers; Digital Forensics; Devices and Applications; Legal and Ethical Concerns; Summary; Chapter 8 - Protection Methods
Protect Yourself!
Record Nr. UNINA-9910829064003321
Shimonski Robert  
Waltham, Massachusetts : , : Syngress, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
DNI releases budget figure for National Intelligence Program
DNI releases budget figure for National Intelligence Program
Pubbl/distr/stampa Washington, D.C. : , : Office of the Director of National Intelligence, Public Affairs Office, , 2007-
Descrizione fisica 1 online resource (volumes)
Disciplina 327.12
Collana ODNI news release
Soggetto topico Intelligence service - United States - Finance
Expenditures, Public
Intelligence service - Finance
Formato Materiale a stampa
Livello bibliografico Periodico
Lingua di pubblicazione eng
Altri titoli varianti Director of National Intelligence releases budget figure for National Intelligence Program
DNI releases budget figure for ... National Intelligence Program
DNI releases fiscal year 2011 appropriated budget figure for the National Intelligence Program
DNI releases appropriated budget figure for ... National Intelligence Program
Record Nr. UNINA-9910708688503321
Washington, D.C. : , : Office of the Director of National Intelligence, Public Affairs Office, , 2007-
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui