top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Internet security you can afford : using untangle as your internet gateway / Christopher Dawson ; cover designer, Luke Fletcher
Internet security you can afford : using untangle as your internet gateway / Christopher Dawson ; cover designer, Luke Fletcher
Creatore [Dawson, Christopher, author]
Estensione 1 online resource (267 pages) : illustrations
Disciplina 005.8
Accesso persona Fletcher, Luke, cover designer
Genere/Forma Electronic books
ISBN 9781435461376
1435461371
1435461363
9781435461369
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto ""Cover""; ""Contents""; ""Introduction""; ""PART I: OKAY, I�M CONVINCED. NOW WHAT?""; ""Chapter 1 Getting a Computer""; ""Why Do I Need to Do Anything Special?""; ""New, Used, or DIY?""; ""A Basic DIY Setup""; ""Setting Up the Computer""; ""Location and Environmental Issues""; ""Chapter 2 Networking 101""; ""Evaluating Your Network""; ""Network Configurations""; ""Network Equipment""; ""Bandwidth and Internet Connections""; ""IP Addresses, TCP/IP, DNS, and DHCP""; ""Proxy Servers""; ""Chapter 3 Downloading and Installing Untangle""; ""Start Downloading and Start Burning""; ""Installation""
""Eth1? Eth0? What Do I Plug In Where?""""Isn�t the DMZ in Korea?""; ""Finishing the Install and Initial Configuration""; ""Running the Software: Basics of the UI""; ""PART II: SO WHAT ABOUT THIS SO-CALLED “SERVER�? HOW DO I PROTECT MY NETWORK?""; ""Chapter 4 What�s Happening InsideMy Untangle Gateway?""; ""Router Versus Bridge and Other Router-Setup Considerations""; ""The Apps Tab""; ""The Config Tab: Further Setup and Administration""; ""The Underlying Operating System""; ""The Virtual Server Rack: Configuring the Apps""; ""Chapter 5 Network and User Protection Best Practices""
""DHCP, DNS, and Network Devices""""Firewall, Ports, Protocols, and Intrusion Prevention""; ""Malware Protection""; ""Email Protection""; ""User Protection and Training""; ""Content Filtering""; ""Use Case Matrix: Recommendations by Environment""; ""Chapter 6 Implementing Networking Best Practices (or Not) with Untangle""; ""Network Configuration Overview""; ""NAT""; ""Pointing Traffic to a Web Server (Port Forwards)""; ""DHCP Configuration""; ""DNS""; ""Bypass Rules""; ""Advanced Configuration""
""Chapter 7 Implementing Protection Best Practices (or Not) with Untangle (a.k.a. “The Rack�)""""The Firewall""; ""The Application Control""; ""The Web Filter""; ""Attack Blocker (Shield) and Intrusion Prevention""; ""Anti-Malware and Email Protection""; ""Critical Features Missing from the Free Package""; ""Chapter 8 User Considerations""; ""Creating Users""; ""The Captive Portal: User Consent""; ""Bypassing Content Filters and Protections""; ""Enforcing Content Filtering Anytime, Anywhere (VPNs and Proxies)""; ""What Should You Be Filtering?""
""Event Logging, or Catching Them Being Naughty and What to Do About It""""Chapter 9 Advanced Topics""; ""Why Untangle Doesn�t Behave Like an Average Linux Server""; ""Remote Administration and SSH""; ""Enabling the Debian Repositories""; ""Virtualizing Untangle (The Right Way to Run Multiple Services on an Untangle Gateway)""; ""Optimizing Untangle""; ""Advanced Network Architectures with Untangle""; ""Using DynDNS""; ""PART III: WHAT IS THIS “SCALABILITY� OF WHICH YOU SPEAK?""; ""Chapter 10 Paid Features""; ""Paid Versus Free Features""
Record Nr. NYU-004256333
[Dawson, Christopher, author]  
Materiale a stampa
Lo trovi qui: New York University
Password / Martin Paul Eve.
Password / Martin Paul Eve.
Creatore [Eve, Martin Paul, 1986- author]
Estensione 124 pages ; 17 cm.
Disciplina 005.8
Genere/Forma Popular works
ISBN 9781501314872 (pbk. : alk. paper)
1501314874 (pbk. : alk. paper)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. NYU-004384433
[Eve, Martin Paul, 1986- author]  
Materiale a stampa
Lo trovi qui: New York University
Trusted systems [electronic resource] : 4th international conference, INTRUST 2012, London, UK, December 17-18, 2012 : proceedings / Chris J. Mitchell, Allan Tomlinson (eds.).
Trusted systems [electronic resource] : 4th international conference, INTRUST 2012, London, UK, December 17-18, 2012 : proceedings / Chris J. Mitchell, Allan Tomlinson (eds.).
Creatore [INTRUST (Conference) (4th : 2012 : London, England)]
Estensione 1 online resource (x, 115 pages) : illustrations.
Disciplina 005.8
Accesso persona Mitchell, Chris (Christopher John)
Tomlinson, Allan
Genere/Forma Electronic books
Conference papers and proceedings
ISBN 9783642353710
3642353711
9783642353703
3642353703
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Automatic Analysis of Security Properties of the TPM -- Stamp and Extend -- Instant But Undeniable Timestamping Based on Lazy Trees -- Secure Implementation of Asynchronous Method Calls and Futures -- Establishing Trust between Nodes in Mobile Ad-Hoc Networks -- Panel Discussion: Mobile Device Trust -- How Do We Link Social Needs, Technical Requirements, Techniques and Standards? -- Security in the Distributed Internet of Things -- A Multi-criteria-Based Evaluation of Android Applications -- Security Analysis of an Open Car Immobilizer Protocol Stack -- A Static Diffie-Hellman Attack on Several Direct Anonymous Attestation Schemes -- The Yin and Yang Sides of Embedded Security.
Record Nr. NYU-004389316
[INTRUST (Conference) (4th : 2012 : London, England)]  
Materiale a stampa
Lo trovi qui: New York University
Computer security / Dieter Gollmann
Computer security / Dieter Gollmann
Creatore [Gollmann, Dieter]
Edizione [3rd ed.]
Estensione xix, 436 pages : illustrations ; 24 cm
Disciplina 005.8
ISBN 9780470741153
0470741155
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto History of computer security -- Managing security -- Foundations of computer security -- Identification and authentication -- Access control -- Reference monitors -- Unix security -- Windows security -- Database security -- Software security -- Bell-LaPadula model -- Security models -- Security evaluation -- Cryptography -- Key establishment -- Communications security -- Network security -- Web security -- Mobility -- New access control paradigms.
Record Nr. NYU-004173855
[Gollmann, Dieter]  
Materiale a stampa
Lo trovi qui: New York University
Provable Security : 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013, Proceedings / Willy Susilo, Reza Reyhanitabar (eds.).
Provable Security : 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013, Proceedings / Willy Susilo, Reza Reyhanitabar (eds.).
Creatore [ProvSec (Conference) (7th : 2013 : Malacca, Malacca, Malaysia)]
Estensione 1 online resource (x, 346 pages) : illustrations (some color).
Disciplina 005.8
Accesso persona Susilo, Willy, editor
Reyhanitabar, Reza, editor
Genere/Forma Electronic books
Conference papers and proceedings
ISBN 9783642412271
3642412270
9783642412264
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto On Modeling Terrorist Frauds: Addressing Collusion in Distance Bounding Protocols -- Authenticated Key Exchange Protocols Based on Factoring Assumption -- Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round -- CIL Security Proof for a Password-Based Key Exchange -- Non Observability in the Random Oracle Model -- Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture -- Input-Aware Equivocable Commitments and UC-secure Commitments with Atomic Exchanges -- Towards Anonymous Ciphertext Indistinguishability with Identity Leakage -- k-Time Proxy Signature: Formal Definition and Efficient Construction -- Anonymous Signcryption against Linear Related-Key Attacks -- Improved Authenticity Bound of EAX, and Refinements -- The Security of the OCB Mode of Operation without the SPRP Assumption -- A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes -- How to Remove the Exponent GCD in HK09 -- Translation-Randomizable Distributions via Random Walks -- RKA Secure PKE Based on the DDH and HR Assumptions -- Computationally Efficient Dual-Policy Attribute Based Encryption with Short Ciphertext -- Factoring-Based Proxy Re-Encryption Schemes -- Towards a Secure Certificateless Proxy Re-Encryption Scheme.
Record Nr. NYU-004441106
[ProvSec (Conference) (7th : 2013 : Malacca, Malacca, Malaysia)]  
Materiale a stampa
Lo trovi qui: New York University
ISSE 2013 securing electronic business processes : highlights of the Information Security Solutions Europe 2013 Conference / Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider (eds.).
ISSE 2013 securing electronic business processes : highlights of the Information Security Solutions Europe 2013 Conference / Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider (eds.).
Creatore [Information Security Solutions Europe (Conference) (2013)]
Estensione 1 online resource (xv, 282 pages) : illustrations
Disciplina 005.8
Accesso persona Reimer, Helmut, editor
Pohlmann, Norbert, editor
Schneider, Wolfgang, editor
Genere/Forma Electronic books
Conference papers and proceedings
ISBN 9783658033712
3658033711
3658033703
9783658033705
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cloud Security, Trust Services, eId & Access Management -- Human Factors, Awareness & Privacy, Regulations and Policies -- Security Management -- Cyber Security, Cybercrime, Critical Infrastructures -- Mobile Security & Applications.
Record Nr. NYU-004441373
[Information Security Solutions Europe (Conference) (2013)]  
Materiale a stampa
Lo trovi qui: New York University
Intelligence and Security Informatics : Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013, proceedings / G. Alan Wang, Xiaolong Zheng, Michael Chau, Hsinchun Chen (eds.).
Intelligence and Security Informatics : Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013, proceedings / G. Alan Wang, Xiaolong Zheng, Michael Chau, Hsinchun Chen (eds.).
Creatore [PAISI (Workshop) (2013 : Beijing, China)]
Estensione 1 online resource (x, 115 pages) : illustrations.
Disciplina 005.8
Accesso persona Wang, G. Alan, editor
Genere/Forma Congresses
Electronic books
Conference papers and proceedings
ISBN 9783642396939
3642396933
3642396925
9783642396922
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Information Sharing and Data/Text Mining -- Belief Manipulation: A Formal Model of Deceit in Message Passing Systems / Aaron Hunter -- Region of Interest Discovery in Location-Based Social Networking Services with Protected Locations / Rong Tan, Junzhong Gu, Peng Chen, Zhou Zhong -- Label Micro-blog Topics Using the Bayesian Inference Method / Heng Gao, Qiudan Li, Xiaolong Zheng -- Terrorism Informatics -- Collective Intelligence for Suicide Surveillance in Web Forums / Tim M.H. Li, Ben C.M. Ng, Michael Chau, Paul W.C. Wong, Paul S.F. Yip -- Computing Optimal Attack Strategies Using Unconstrained Influence Diagrams / Viliam Lisý, Radek Píbil -- Network-Based Data Analytics -- Identifying Peer Influence in Online Social Networks Using Transfer Entropy / Saike He, Xiaolong Zheng, Daniel Zeng, Kainan Cui, Zhu Zhang, Chuan Luo -- Modeling Relationship Strength for Link Prediction / Ning Li, Xu Feng, Shufan Ji, Ke Xu -- What Is the Uniqueness of Growth Pattern in Human Flesh Search Organization? / Tao Wang, Qingpeng Zhang, Julei Fu, Xiao Wang, Suncong Zheng -- Information Access and Security -- Energy Saving Replay Attack Prevention in Clustered Wireless Sensor Networks / Amrita Ghosal, Aadirupa Saha, Sipra Das Bit -- Detecting Web Attacks Based on Domain Statistics / Chia-Mei Chen, Jhe-Jhun Huang, Ya-Hui Ou -- A Novel Key Scheme Based on QR Decomposition for Wireless Sensor Networks / Weimin Xie, Liejun Wang, Mingwei Wang.
Record Nr. NYU-004426368
[PAISI (Workshop) (2013 : Beijing, China)]  
Materiale a stampa
Lo trovi qui: New York University
Secure data management in decentralized systems / edited by Ting Yu, Sushil Jajodia
Secure data management in decentralized systems / edited by Ting Yu, Sushil Jajodia
Estensione 1 online resource (viii, 462 pages) : illustrations.
Disciplina 005.8
Accesso persona Yu, Ting, 1975-
Jajodia, Sushil
Genere/Forma Electronic books
ISBN 9780387276960
0387276963
0387276947
9780387276946
Classificazione TP393. 08
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Basic security concepts / Sushil Jajodia and Ting Yu -- Access control policies and languages in open environments / S. De Capitani di Vimercati, S. Foresti, S. Jajodia and P. Samarati -- Trusted recovery / Meng Yu, Peng Liu, Wanyu Zang and Sushil Jajodia -- Access control policy models for XML / Michiharu Kudo and Naizhen Qi -- Optimizing tree pattern queries over secure XML databases / Hui Wang, Divesh Srivastava, Laks V.S. Lakshmanan, SungRan Cho and Sihem Amer-Yahia -- Rule-based policy specification / Grigoris Antoniou, Matteo Baldoni, Piero A. Bonatti, Wolfgang Nejdl and Daniel Olmedilla -- Automated trust negotiation in open systems / Adam J. Lee, Kent E. Seamons, Marianne Winslett and Ting Yu.
Contents (cont'd) Building trust and security in peer-to-peer systems / Terry Bearly and Vijay Kumar -- Microdata protection / V. Ciriani, S. De Capitani di Vimercati, S. Foresti and P. Samarati -- k-Anonymity / V. Ciriani, S. De Capitani di Vimercati, S. Foresti and P. Samarati -- Preserving privacy in on-line analytical processing data cubes / Lingyu Wang, Sushil Jajodia and Duminda Wijesekera -- Search on encrypted data / Hakan Hacigumus, Bijit Hore, Bala Iyer and Sharad Mehrotra -- Rights assessment for relational data / Radu Sion.
Record Nr. NYU-004340774
Materiale a stampa
Lo trovi qui: New York University
Applied cryptography and network security : 5th international conference, ACNS 2007, Zhuhai, China, June 5-8, 2007 : proceedings / Jonathan Katz, Moti Yung (eds.).
Applied cryptography and network security : 5th international conference, ACNS 2007, Zhuhai, China, June 5-8, 2007 : proceedings / Jonathan Katz, Moti Yung (eds.).
Creatore [ACNS (Conference) (5th : 2007 : Zhuhai, China)]
Estensione 1 online resource (xiii, 498 pages) : illustrations.
Disciplina 005.8
Accesso persona Katz, Jonathan, 1974-
Yung, Moti
Genere/Forma Electronic books
Conference papers and proceedings
ISBN 9783540727385
3540727388
354072737X
9783540727378
9786610949236
6610949239
Classificazione TN915. 08-532
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. NYU-004340798
[ACNS (Conference) (5th : 2007 : Zhuhai, China)]  
Materiale a stampa
Lo trovi qui: New York University
Security for computer networks : an introduction to data security in teleprocessing and electronic funds transfer / D.W. Davies and W.L. Price
Security for computer networks : an introduction to data security in teleprocessing and electronic funds transfer / D.W. Davies and W.L. Price
Creatore [Davies, Donald Watts]
Edizione [2nd ed.]
Estensione xx, 377 p. : ill. ; 26 cm.
Disciplina 005.8
Accesso persona Price, W. L.
Soggetto non controllato Computer systems Security measures Cryptograms
ISBN 0471921378
3519064413 (West Germany)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. NYU-004184378
[Davies, Donald Watts]  
Materiale a stampa
Lo trovi qui: New York University