top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Economics of information security and privacy III / Bruce Schneier, editor
Economics of information security and privacy III / Bruce Schneier, editor
Estensione 1 online resource
Disciplina 005.8
Accesso persona Schneier, Bruce, 1963-
Genere/Forma Electronic books
Congresses
Soggetto non controllato Computer science
Computer network architectures
Computer Communication Networks
Data protection
Economics
Systems and Data Security
Data Structures, Cryptology and Information Theory
Computer Systems Organization and Communication Networks
ISBN 9781461419815
1461419816
1461419808
9781461419808
9781461419851 (eBook)
Classificazione 54.32
54.62
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The Impact of Immediate Disclosure on Attack Diffusion and Volume / Sam Ransbotham and Sabyasachi Mitra -- Where Do All the Attacks Go? / Dinei Florêncio and Cormac Herley -- Sex, Lies and Cyber-Crime Surveys / Dinei Florêncio and Cormac Herley -- The Underground Economy of Fake Antivirus Software / Brett Stone-Gross, Ryan Abman, Richard A. Kemmerer, Christopher Kruegel and Douglas G. Steigerwald, et al. -- The Inconvenient Truth About Web Certificates / Nevena Vratonjic, Julien Freudiger, Vincent Bindschaedler and Jean-Pierre Hubaux -- Resilience of the Internet Interconnection Ecosystem / Chris Hall, Ross Anderson, Richard Clayton, Evangelos Ouzounis and Panagiotis Trimintzios -- Modeling Internet-Scale Policies for Cleaning up Malware / Steven Hofmeyr, Tyler Moore, Stephanie Forrest, Benjamin Edwards and George Stelle -- Fixed Costs, Investment Rigidities, and Risk Aversion in Information Security: A Utility-theoretic Approach / Christos Ioannidis, David Pym and Julian Williams -- Are Home Internet Users Willing to Pay ISPs for Improvements in Cyber Security? / Brent Rowe and Dallas Wood -- Economic Methods and Decision Making by Security Professionals / Adrian Baldwin, Yolanta Beres, Geoffrey B. Duggan, Marco Casassa Mont and Hilary Johnson, et al. -- Real Name Verification Law on the Internet: A Poison or Cure for Privacy? / Daegon Cho -- The Privacy Landscape: Product Differentiation on Data Collection / Sören Preibusch and Joseph Bonneau.
Record Nr. NYU-004624895
Materiale a stampa
Lo trovi qui: New York University
Hacking Exposed (5th Edition)
Hacking Exposed (5th Edition)
Creatore [McClure, Stuart]
Estensione 1 online resource (722 pages)
Disciplina 005.8
Accesso persona Scambray, Joel
Kurtz, George
Genere/Forma Electronic books
ISBN 9780071493666
0071493662
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. NYU-004805520
[McClure, Stuart]  
Materiale a stampa
Lo trovi qui: New York University
IT Convergence and Security 2012
IT Convergence and Security 2012
Creatore [Kim, Kuinam J.]
Estensione 1 online resource (1176 pages).
Disciplina 005.8
Accesso persona Chung, Kyung-Yong
Genere/Forma Electronic books
ISBN 9789400758605
940075860X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. NYU-004626102
[Kim, Kuinam J.]  
Materiale a stampa
Lo trovi qui: New York University
Bio-inspiring cyber security and cloud services : trends and innovations / Aboul Ella Hassanien, (and 3 others), editors
Bio-inspiring cyber security and cloud services : trends and innovations / Aboul Ella Hassanien, (and 3 others), editors
Estensione 1 online resource (xxii, 585 pages) : illustrations (some color).
Disciplina 005.8
Accesso persona Hassanien, Aboul Ella, editor
Genere/Forma Electronic books
Ebook
ISBN 9783662436165
3662436167
3662436159
9783662436158
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Bio-Inspiring in Complex Network Security -- Mobile Ad Hoc networks and Key managements -- Biometrics technology and applications.
Record Nr. NYU-004671183
Materiale a stampa
Lo trovi qui: New York University
Risk Management Framework : a Lab-Based Approach to Securing Information Systems / James Broad ; Aaron (AJ) Mitchneck, Technical Editor
Risk Management Framework : a Lab-Based Approach to Securing Information Systems / James Broad ; Aaron (AJ) Mitchneck, Technical Editor
Creatore [Broad, James, CISSP]
Estensione 1 online resource (xv, 298 pages)
Disciplina 005.8
Genere/Forma Electronic books
ISBN 1299730426
9781299730427
9780124047235
0124047238
9781597499958
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Laws, Regulations, and Guidance -- Integrated Organization-Wide Risk Management -- The Joint Task Force Transformation Initiative -- System Development Life Cycle (SDLC) -- Transitioning from the C & A Process to RMF -- Key Positions and Roles -- Lab Organization -- RMF Phase 1 : Categorize the information System -- RMF Phase 2 : Selecting Security Controls -- RMF Phase 3 : Implementing Security Controls -- RMF Phase 4 : Assess Security Controls -- RMF Phase 5 : Authorizing the Information System -- RMF Phase 6 : Monitoring Security Controls -- The Expansion of the RMF.
Record Nr. NYU-004712135
[Broad, James, CISSP]  
Materiale a stampa
Lo trovi qui: New York University
The total CISSP exam prep book : practice questions, answers, and test taking tips and techniques / Thomas R. Peltier, Patrick D. Howard
The total CISSP exam prep book : practice questions, answers, and test taking tips and techniques / Thomas R. Peltier, Patrick D. Howard
Creatore [Peltier, Thomas R.]
Estensione 1 online resource (xx, 287 pages)
Disciplina 005.8
Accesso persona Howard, Patrick D.
Genere/Forma Electronic books
Study guides
ISBN 1420031449
9781420031447
0203972813
9780203972816
0849313503
9780849313509
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front cover; Contributors; Dedication; Contents; Acknowledgments; Preface; Introduction: Preparing for the CISSP Exam; SECTION I: PRACTIVE STUDY QUESTIONS; Chapter 1. Access Control Systems and Methodology Domain; Chapter 2. Telecommunications and Network Security Domain; Chapter 3. Security Management Pracices Domain; Chapter 4. Applications and System Development Security Domain; Chapter 5. Cryptography Domain; Chapter 6. Security Architecture and Models Domain; Chapter 7. Operations Security Domain; Chapter 8. Business Continuity Planning and Disaster Recovery Planning Domain.
Record Nr. NYU-004682419
[Peltier, Thomas R.]  
Materiale a stampa
Lo trovi qui: New York University
Insider attack and cyber security : beyond the hacker / [edited] by Salvatore J. Stolfo [and others]
Insider attack and cyber security : beyond the hacker / [edited] by Salvatore J. Stolfo [and others]
Estensione 1 online resource (xi, 222 pages) : illustrations.
Disciplina 005.8
Accesso persona Stolfo, Salvatore J. (Salvatore Joseph)
Accesso convegno Workshop on Insider Attack and Cyber Security (1st : 2007 : Washington, D.C.)
Genere/Forma Electronic books
Conference papers and proceedings
ISBN 9780387773223
0387773223
9780387773216
0387773215
1281242357
9781281242358
Classificazione TP393. 08-532
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The insider attack problem nature and scope -- Reflections on the insider threat -- The "big picture" of insider IT sabotage across U.S. critical infrastructures -- Data theft : a prototypical insider threat -- A survey of insider attack detection research -- Naive Bayes as a masquerade detector : addressing a chronic failure -- Towards a virtualization-enabled framework for information traceability (VFIT) -- Reconfigurable tamper-resistant hardware support against insider threats : the trusted ILLIAC approach -- Surviving insider attacks : a call for system experiments -- Preventative directions for insider threat mitigation via access control -- Taking stock and looking forward: an outsider's perspective on the insider threat -- Research challenges for fighting insider threat in the financial services industry -- Hard problems and research challenges concluding remarks.
Record Nr. NYU-004609063
Materiale a stampa
Lo trovi qui: New York University
Network and system security : 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings / Javier Lopez, Xinyi Huang, Ravi Sandhu (eds.).
Network and system security : 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings / Javier Lopez, Xinyi Huang, Ravi Sandhu (eds.).
Creatore [International Conference on Network and System Security (7th : 2013 : Madrid, Spain)]
Estensione 1 online resource.
Disciplina 005.8
Accesso persona López, Javier
Huang, Xinyi
Sandhu, Ravi
Genere/Forma Electronic books
Conference papers and proceedings
Ebook
Congresses
Soggetto non controllato Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Information Systems
Systems and Data Security
Management of Computing and Information Systems
e-Commerce/e-business
ISBN 9783642386312
3642386318
9783642386305
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto NSS 2013 Regular Papers. Network Security: Modeling and Evaluation. Stochastic Traffic Identification for Security Management: eDonkey Protocol as a Case Study / Rafael A. Rodríguez-Gómez, Gabriel Maciá-Fernández, Pedro García-Teodoro -- A Technology Independent Security Gateway for Real-Time Multimedia Communication / Fudong Li, Nathan Clarke, Steven Furnell -- Efficient Attribute Based Access Control Mechanism for Vehicular Ad Hoc Network / Y. Sreenivasa Rao, Ratna Dutta -- Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection / Yuxin Meng, Wenjuan Li, Lam-for Kwok -- Model the Influence of Sybil Nodes in P2P Botnets / Tianzuo Wang [and others] -- Network Security: Security Protocols and Practice. A Novel Security Protocol for Resolving Addresses in the Location/ID Split Architecture / Mahdi Aiash -- The OffPAD: Requirements and Usage / Kent Are Varmedal [and others] -- Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks / Sashi Gurung [and others] -- Using Trusted Platform Modules for Location Assurance in Cloud Networking / Christoph Krauß, Volker Fusenig.
Network Security: Network Attacks and Defense. Tracing Sources of Anonymous Slow Suspicious Activities / Harsha K. Kalutarage [and others] -- Static Analysis for Regular Expression Denial-of-Service Attacks / James Kirrage, Asiri Rathnayake, Hayo Thielecke -- Next-Generation DoS at the Higher Layers: A Study of SMTP Flooding / Gabriel Cartier, Jean-François Cartier, José M. Fernandez -- Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning / Tamas K. Lengyel [and others] -- System Security: Malware and Intrusions. MADS: Malicious Android Applications Detection through String Analysis / Borja Sanz [and others] -- X-TIER: Kernel Module Injection / Sebastian Vogl [and others] -- Leveraging String Kernels for Malware Detection / Jonas Pfoh, Christian Schneider, Claudia Eckert -- Insiders Trapped in the Mirror Reveal Themselves in Social Media / Miltiadis Kandias [and others].
System Security: Applications Security. On Business Logic Vulnerabilities Hunting: The APP_LogGIC Framework / George Stergiopoulos, Bill Tsoumas, Dimitris Gritzalis -- Using the Smart Card Web Server in Secure Branchless Banking / Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis -- Liability for Data Breaches: A Proposal for a Revenue-Based Sanctioning Approach / Maurizio Naldi, Marta Flamini, Giuseppe D'Acquisto -- Efficient and Private Three-Party Publish/Subscribe / Giovanni Di Crescenzo [and others] -- System Security: Security Algorithms and Systems. Marlin: A Fine Grained Randomization Approach to Defend against ROP Attacks / Aditi Gupta [and others] -- Mobile Trusted Agent (MTA): Build User-Based Trust for General-Purpose Computer Platform / Wei Feng [and others] -- Anomaly Detection for Ephemeral Cloud IaaS Virtual Machines / Suaad Alarifi, Stephen Wolthusen -- JShadObf: A JavaScript Obfuscator Based on Multi-Objective Optimization Algorithms / Benoît Bertholon, Sébastien Varrette, Pascal Bouvry.
Cryptographic Algorithms I. Forward Secure Certificateless Proxy Signature Scheme / Jiguo Li, Yanqiong Li, Yichen Zhang -- Leakage-Resilient Zero-Knowledge Proofs of Knowledge for NP / Hongda Li, Qihua Niu, Bei Liang -- On the Security of an Efficient Attribute-Based Signature / Yan Zhang [and others] -- Factoring RSA Modulus with Known Bits from Both p and q: A Lattice Method / Yao Lu, Rui Zhang, Dongdai Lin -- Cryptographic Algorithms II. Performance Prediction Model for Block Ciphers on GPU Architectures / Naoki Nishikawa [and others] -- Threshold-Oriented Optimistic Fair Exchange / Yang Wang [and others] -- Secure Storage and Fuzzy Query over Encrypted Databases / Zheli Liu [and others] -- A Highly Efficient RFID Distance Bounding Protocol without Real-Time PRF Evaluation / Yunhui Zhuang [and others].
Privacy. Privacy Preserving Context Aware Publish Subscribe Systems / Mohamed Nabeel [and others] -- A New Unpredictability-Based RFID Privacy Model / Anjia Yang [and others] -- Privacy-Preserving Multi-party Reconciliation Using Fully Homomorphic Encryption / Florian Weingarten [and others] -- Privacy-Preserving Password-Based Authenticated Key Exchange in the Three-Party Setting / Weijia Wang, Lei Hu, Yong Li -- Key Agreement and Distribution. Light Weight Network Coding Based Key Distribution Scheme for MANETs / Jianwei Liu [and others] Identity-Based Dynamic Authenticated Group Key Agreement Protocol for Space Information Network / Chao Wang [and others] Authentication and Key Agreement Based on Hyper-sphere Using Smart Cards / Shaohua Tang, Lingling Xu -- An Efficient Constant Round ID-Based Group Key Agreement Protocol for Ad Hoc Networks / Elisavet Konstantinou.
NSS 2013 Short Papers. Human Identification with Electroencephalogram (EEG) for the Future Network Security / Xu Huang [and others] Building Better Unsupervised Anomaly Detector with S-Transform / Sirikarn Pukkawanna [and others] Fault-Tolerant Topology Control Based on Artificial Immune Theory in WMNs / Jing Chen [and others] Virtually Reconfigurable Secure Wireless Networks Using Broadcast Tokens / Kannan Karthik On the Use of Key Assignment Schemes in Authentication Protocols / James Alderman, Jason Crampton On the Interactions between Privacy-Preserving, Incentive, and Inference Mechanisms in Participatory Sensing Systems / Idalides J. Vergara-Laurens, Diego Mendez-Chaves, Miguel A. Labrador Security Authentication of AODV Protocols in MANETs / Ahmad Alomari -- Architecture for Trapping Toll Fraud Attacks Using a VoIP Honeynet Approach / Markus Gruber [and others].
Towards a Privacy-Preserving Solution for OSNs / Qiang Tang -- Measuring and Comparing the Protection Quality in Different Operating Systems / Zhihui Han [and others] -- Collusion-Resistant Domain-Specific Pseudonymous Signatures / Julien Bringer, Hervé Chabanne, Alain Patey -- On the Applicability of Time-Driven Cache Attacks on Mobile Devices / Raphael Spreitzer, Thomas Plos -- Ancestor Excludable Hierarchical ID-Based Encryption Revisited / Fan Zhang, Hua Guo, Zhoujun Li -- Think Twice before You Share: Analyzing Privacy Leakage under Privacy Control in Online Social Networks / Yan Li [and others] -- A Dynamic and Multi-layer Reputation Computation Model for Multi-hop Wireless Networks / Jia Hu, Hui Lin, Li Xu -- Distributed and Anonymous Publish-Subscribe / Jörg Daubert [and others] -- Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs / Giovanni Agosta [and others].
NSS 2013 Industrial Track Papers. Combining Dynamic Passive Analysis and Active Fingerprinting for Effective Bot Malware Detection in Virtualized Environments / Shun-Wen Hsiao [and others] -- Filtering Trolling Comments through Collective Classification / Jorge de-la-Peña-Sordo [and others] Security Analysis of Touch Inputted Passwords / Bruno Alves Pereira Botelho, Emilio Tissato Nakamura, Nelson Uto -- A Pairing-Free Identity Based Authentication Framework for Cloud Computing / Dheerendra Mishra, Vinod Kumar, Sourav Mukhopadhyay -- Formal Modeling and Automatic Security Analysis of Two-Factor and Two-Channel Authentication Protocols / Alessandro Armando, Roberto Carbone, Luca Zanetti -- Towards a More Secure Apache Hadoop HDFS Infrastructure / Jason Cohen, Subatra Acharya -- A Formally Verified Initial Authentication and Key Agreement Protocol in Heterogeneous Environments Using Casper/FDR / Mahdi Aiash -- A Comprehensive Access Control System for Scientific Applications / Muhammad I. Sarfraz [and others] -- Partial Fingerprint Reconstruction with Improved Smooth Extension / Wei Zhou [and others] -- Modeling and Analysis for Thwarting Worm Propagation in Email Networks / Sheng Wen, Yang Xiang, Wanlei Zhou -- On Secure and Power-Efficient RFID-Based Wireless Body Area Network / Sana Ullah, Waleed Alsalih -- Towards Authenticated Objects / Daniele Midi, Ashish Kundu, Elisa Bertino -- A Finger-Vein Based Cancellable Bio-cryptosystem / Wencheng Yang, Jiankun Hu, Song Wang.
Record Nr. NYU-004638142
[International Conference on Network and System Security (7th : 2013 : Madrid, Spain)]  
Materiale a stampa
Lo trovi qui: New York University
Information hiding : 7th international workshop, IH 2005, Barcelona, Spain, June 6-8, 2005 : revised selected papers / Mauro Barni [and others] (eds.).
Information hiding : 7th international workshop, IH 2005, Barcelona, Spain, June 6-8, 2005 : revised selected papers / Mauro Barni [and others] (eds.).
Creatore [IH (Conference) (7th : 2005 : Barcelona, Spain)]
Estensione 1 online resource (xii, 414 pages) : illustrations.
Disciplina 005.8
Accesso persona Barni, Mauro, Ph. D.
Genere/Forma Electronic books
Conference papers and proceedings
ISBN 9783540314813
3540314814
3540290397
9783540290391
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited talk: On joint coding for watermarking and encryption / Neri Merhav -- Anonymity -- Watermarking -- Theory -- Watermark attacks -- Steganography -- Hiding in unusual content -- Steganalysis -- Software watermarking -- Fingerprinting.
Record Nr. NYU-004609869
[IH (Conference) (7th : 2005 : Barcelona, Spain)]  
Materiale a stampa
Lo trovi qui: New York University
Trust, privacy, and security in digital business : second international conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005 : proceedings / Sokratis Katsikas, Javier Lopez, Günther Pernul (eds.).
Trust, privacy, and security in digital business : second international conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005 : proceedings / Sokratis Katsikas, Javier Lopez, Günther Pernul (eds.).
Creatore [TrustBus (Conference) (2nd : 2005 : Copenhagen, Denmark)]
Estensione 1 online resource (xii, 332 pages) : illustrations.
Disciplina 005.8
Accesso persona Katsikas, Sokratis K.
López, Javier
Pernul, G. (Günther), 1961-
Genere/Forma Electronic books
Conference papers and proceedings
ISBN 9783540317968
3540317961
3540282246
9783540282242
Classificazione 54.81
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talk -- Privacy Enhanced Technologies: Methods {u2013} Markets {u2013} Misuse -- Digital Business -- Sec-Shield: Security Preserved Distributed Knowledge Management Between Autonomous Domains -- Protection Mechanisms Against Phishing Attacks -- Dropout-Tolerant TTP-Free Mental Poker -- A Self-healing Mechanism for an Intrusion Tolerance System -- Protecting Online Rating Systems from Unfair Ratings -- Anonymous Payment in a Fair E-Commerce Protocol with Verifiable TTP -- Designing Secure E-Tendering Systems -- Mobile/Wireless Services -- A Multilateral Secure Payment System for Wireless LAN Hotspots -- Secure Group Communications over Combined Wired and Wireless Networks -- A Privacy Enhancement Mechanism for Location Based Service Architectures Using Transaction Pseudonyms -- Making Money with Mobile Qualified Electronic Signatures -- Certificate Revocation/Index Search -- Efficient Certificate Revocation System Implementation: Huffman Merkle Hash Tree (HuffMHT) -- Secure Index Search for Groups -- Trust -- Provision of Secure Policy Enforcement Between Small and Medium Governmental Organizations -- Maximizing Utility of Mobile Agent Based E-Commerce Applications with Trust Enhanced Security -- The Fuzzy and Dynamic Nature of Trust -- Towards an Ontology of Trust -- Digital Signature -- An Improved Group Signature Scheme -- Efficient Member Revocation in Group Signature Schemes -- Conditional Digital Signatures -- A Mediated Proxy Signature Scheme with Fast Revocation for Electronic Transactions -- Privacy -- Privacy Enforcement for IT Governance in Enterprises: Doing It for Real -- An Adaptive Privacy Management System for Data Repositories -- Privacy Preserving Data Mining Services on the Web -- Reading Your Keystroke: Whose Mail Is It? -- E-Auctions -- A Novel Construction of Two-Party Private Bidding Protocols from Yao{u2019}s Millionaires Problem -- An Improved Double Auction Protocol Against False Bids -- An Investigation of Dispute Resolution Mechanisms on Power and Trust: A Domain Study of Online Trust in e-Auctions -- Smart Cards/Authentication -- A Secure Fingerprint Authentication System on an Untrusted Computing Environment -- Security Enhancement for Password Authentication Schemes with Smart Cards -- Securing Operating System Services Based on Smart Cards.
Record Nr. NYU-004609962
[TrustBus (Conference) (2nd : 2005 : Copenhagen, Denmark)]  
Materiale a stampa
Lo trovi qui: New York University