top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Cryptographic hardware and embedded systems--CHES 2011 : 13th international workshop, Nara, Japan, September 28-October 1, 2011 : proceedings / Bart Preneel, Tsuyoshi Takagi, (eds.).
Cryptographic hardware and embedded systems--CHES 2011 : 13th international workshop, Nara, Japan, September 28-October 1, 2011 : proceedings / Bart Preneel, Tsuyoshi Takagi, (eds.).
Creatore [CHES (Workshop) (13th : 2011 : Nara-shi, Japan)]
Estensione 1 online resource (xiv, 524 pages) : illustrations (some color).
Disciplina 005.8
Accesso persona Preneel, Bart, 1963-
Takagi, Tsuyoshi (Mathematician)
Genere/Forma Electronic books
Soggetto non controllato Computer science
Data protection
Data structures (Computer science)
Data encryption (Computer science)
Coding theory
Computer software
Computational complexity
Data Encryption
Coding and Information Theory
Data Structures, Cryptology and Information Theory
Systems and Data Security
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
ISBN 9783642239519
364223951X
9783642239502
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. NYU-005710737
[CHES (Workshop) (13th : 2011 : Nara-shi, Japan)]  
Materiale a stampa
Lo trovi qui: New York University
Information security : principles and practice / Mark Stamp
Information security : principles and practice / Mark Stamp
Creatore [Stamp, Mark]
Estensione 1 online resource (xxi, 390 pages) : illustrations
Disciplina 005.8
Genere/Forma Electronic books
ISBN 0471744182
9780471744184
9780471738480
0471738484
0471744190
9780471744191
1280241446
9781280241444
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Crypto basics -- Symmetric key crypto -- Public key crypto -- Hash functions and other topics -- Advanced cryptanalysis -- Authentication -- Authorization -- Simple authentication protocols -- Real-world security protocols -- Software flaws and malware -- Insecurity in software -- Operating systems and security.
Record Nr. NYU-006064394
[Stamp, Mark]  
Materiale a stampa
Lo trovi qui: New York University
Error correcting coding and security for data networks : analysis of the superchannel concept / G. Kabatiansky, E. Krouk, S. Semenov
Error correcting coding and security for data networks : analysis of the superchannel concept / G. Kabatiansky, E. Krouk, S. Semenov
Creatore [Kabatiansky, G.]
Estensione 1 online resource (288)
Disciplina 005.8
Accesso persona Krouk, E.
Semenov, S.
Genere/Forma Electronic books
Electronic resource
ISBN 0470867566
9780470867563
1280241861
9781280241864
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Error Correcting Coding and Security for Data Networks; Contents; Preface; ACKNOWLEDGMENTS; 1 Problems Facing Error Control Coding in Data Networks; 2 Block Codes; 3 General Methods of Decoding of Linear Codes; 4 Codes with Algebraic Decoding; 5 Decoding of LDPC Codes; 6 Convolutional Codes and Turbo-Codes; 7 Coding of Messages at the Transport Layer of the Data Network; 8 Providing Security of Data in a Network with the Help of Coding Methods; 9 Reconciliation of Coding at Different Layers of a Network; Index.
Record Nr. NYU-006064615
[Kabatiansky, G.]  
Materiale a stampa
Lo trovi qui: New York University
Trust, complexity and control : confidence in a convergent world / Piotr Cofta
Trust, complexity and control : confidence in a convergent world / Piotr Cofta
Creatore [Cofta, Piotr]
Estensione 1 online resource (xvi, 294 pages) : illustrations
Disciplina 005.8
Genere/Forma Electronic books
ISBN 9780470517840
0470517840
9780470517857
0470517859
1280974133
9781280974137
9780470061305
0470061308
Classificazione 54.32
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Trust, Complexity and Control; Contents; Foreword; Introduction; Part I Confidence: Trust and Control; 1 Setting the Scene; 2 The Model of Confidence; 3 Measuring Confidence; 4 Comparative Analysis of the Model of Confidence; 5 The Dynamics of Confidence; 6 The Dark Side; Part II Confidence and Technology; 7 Impact of Digital Technology; 8 Digital Security; 9 Confidence and Networks; 10 Attacks on Confidence; 11 Trust-Enhancing Technologies; Part III Confidence in a Convergent World; 12 Convergence and Confidence; 13 Confidence Creation in e-Business; 14 Privacy and Authentication.
Record Nr. NYU-006065240
[Cofta, Piotr]  
Materiale a stampa
Lo trovi qui: New York University
Digital defense : a cybersecurity primer / Joseph N. Pelton, Indu B. Singh
Digital defense : a cybersecurity primer / Joseph N. Pelton, Indu B. Singh
Creatore [Pelton, Joseph N., author]
Estensione 1 online resource (xx, 209 pages)
Disciplina 005.8
Accesso persona Singh, Indu Bhushan, author
Genere/Forma Electronic books
ISBN 9783319199535
3319199536
3319199528
9783319199528
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto What is at stake? What should you do? Why should you care? -- Where to go for assistance -- Is anyone looking out for you? Your government? Businesses where you trade? Your neighbor? or Just yourself? -- Ten key things to protect -- Cybersecurity for smart phones, mobile apps, and "the cloud" -- Protecting vital cyber infrastructure -- Who will control the future, black hat hackers or the hacked? -- Ten essential rules for your cyber defense -- Appendix A : Glossary of definitions and acronyms -- Appendix B : Current U.S. priorities on cybersecurity -- Appendix C : The U.S. Comprehensive National Cybersecurity Initiative (CNCI) -- Appendix D : Cybersecurity activities ad policies around the world.
Record Nr. NYU-005726953
[Pelton, Joseph N., author]  
Materiale a stampa
Lo trovi qui: New York University
IT security risk management in the context of cloud computing : towards an understanding of the key role of providers' IT security risk perceptions / André Loske ; with a foreword by Peter Buxman
IT security risk management in the context of cloud computing : towards an understanding of the key role of providers' IT security risk perceptions / André Loske ; with a foreword by Peter Buxman
Creatore [Loske, André, author]
Estensione 1 online resource (xxii, 167 pages) : illustrations.
Disciplina 005.8
Accesso persona Buxman, Peter, author of foreword
Genere/Forma Electronic books
ISBN 9783658113407
3658113405
9783658113391
3658113391
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foreword; Acknowledgements; Table of Contents; List of Tables; List of Figures; List of Abbreviations; Abstract; Zusammenfassung; 1 Introduction; 1.1 Problem Description and Motivation; 1.2 Objectives and Benefits; 1.3 Structure of the Thesis; 2 Foundations; 2.1 Cloud Computing; 2.1.1 Essential Characteristics; 2.1.2 Delivery Models; 2.1.3 Deployment Models; 2.2 IT Security Risk Perception; 2.2.1 The Nature of Perceived Risks; 2.2.2 Perceived IT Security Risks in the Context of the Cloud; 2.3 Organizational IT Security Risk Management; 2.3.1 Phase I: Identification of IT Security Threat
2.3.2 Phase II: IT Security Risk Analysis2.3.3 Phase III: Solution Analysis; 2.3.4 Phase IV: Decision; 2.3.5 Phase V: Implementation; 3 Part I: The Inhibiting Role of Unrealistic Optimism in Providers' IT Security Risk Management; 3.1 Theoretical Background and Hypotheses Development; 3.1.1 Organizational IT Security Risk Management; 3.1.2 Technology Threat Avoidance Theory; 3.1.3 Institutional Theory; 3.1.4 Decision Makers' IT Security Risk Perceptions; 3.1.5 Unrealistic Optimism in Decision Makers' IT Security Risk Perceptions; 3.2 Research Methodology; 3.2.1 Measurement Model
3.2.2 Survey Administration3.2.3 Sample Characteristics; 3.2.4 Data Analyses; 3.3 Results; 3.3.1 Impacts of Decision Makers' IT Security Risk Perceptions on Providers' IT Security Risk Management; 3.3.2 Existence of Unrealistic Optimism in the IT Security Risk Perceptions of Providers' Decision Makers; 3.4 Discussion of Study Findings; 4 Part II: Perceptual Incongruences regarding the IT Security Risks as a Barrier to Cloud Adoption; 4.1 Theoretical Background and Hypotheses Development; 4.1.1 Perceptual Congruence; 4.1.2 Perceptual Incongruences regarding the IT Security Risks
4.1.3 Cognitive Dissonance Theory4.1.4 Expectation Confirmation Theory; 4.1.5 Cloud Adoption; 4.2 Research Methodology; 4.2.1 Measurement Model; 4.2.2 Survey Administration; 4.2.3 Sample Characteristics; 4.2.4 Data Analyses; 4.3 Results; 4.3.1 Existence of Perceptual Incongruences between Providers and Customers regarding the IT Security Risks; 4.3.2 Impacts of Perceptual Incongruences between Providers and Customers regarding the IT Security Risks on Cloud Adoption; 4.4 Discussion of Study Findings; 5 Conclusion and Summary of Key Findings; 5.1 Implications for Theory and Research
5.2 Implications for Practice5.2.1 Implications and Recommended Actions for Providers; 5.2.2 Implications and Recommended Actions for (Potential) Customers; 5.3 Limitations and Future Research Directions; 5.4 Résumé; Appendix; A.1 Supporting Material for Part I (Chapter 3); A.1.1 Measurement Items; A.1.2 Validity Analysis; A.1.3 Consistency Analysis of the Absolute Unrealistic Optimism Classifier; A.1.4 Multi-Group Analysis of the Structural Model; A.2 Supporting Material for Part II (Chapter 4); A.2.1 Measurement Items; A.2.2 Validity Analysis
Record Nr. NYU-005727237
[Loske, André, author]  
Materiale a stampa
Lo trovi qui: New York University
ISSE 2010 Securing Electronic Business Processes : highlights of the Information Security Solutions Europe 2010 Conference / Norbert Pohlmann, Helmut Reimer, Wolfgang Schneider (Eds.).
ISSE 2010 Securing Electronic Business Processes : highlights of the Information Security Solutions Europe 2010 Conference / Norbert Pohlmann, Helmut Reimer, Wolfgang Schneider (Eds.).
Estensione 1 online resource (ix, 416 pages) : illustrations
Disciplina 005.8
Accesso persona Pohlmann, Norbert
Reimer, Helmut
Schneider, Wolfgang, 1947-
Accesso convegno Information Security Solutions Europe (Conference) (2010 : Berlin, Germany)
Genere/Forma Electronic books
Conference papers and proceedings
ISBN 9783834897886
3834897884
3834814385
9783834814388
Classificazione 54.62
54.32
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. NYU-005706998
Materiale a stampa
Lo trovi qui: New York University
Security protocols XVI : 16th international workshop, Cambridge, UK, April 16-18, 2008 : revised selected papers / Bruce Christianson [and others] (eds)
Security protocols XVI : 16th international workshop, Cambridge, UK, April 16-18, 2008 : revised selected papers / Bruce Christianson [and others] (eds)
Creatore [International Workshop on Security Protocols (16th : 2011 : Cambridge, England)]
Estensione 1 online resource (ix, 255 pages) : illustrations.
Disciplina 005.8
Accesso persona Christianson, Bruce
Genere/Forma Electronic books
Conference papers and proceedings
ISBN 9783642221378
3642221378
9783642221361
364222136X
Classificazione 54.62
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. NYU-006177643
[International Workshop on Security Protocols (16th : 2011 : Cambridge, England)]  
Materiale a stampa
Lo trovi qui: New York University
Proceedings of the 3rd European Conference on Computer Network Defense / edited by Vasilios Siris, Kostas Anagnostakis, Sotiris Ioannidis, Panagiotis Trimintzios
Proceedings of the 3rd European Conference on Computer Network Defense / edited by Vasilios Siris, Kostas Anagnostakis, Sotiris Ioannidis, Panagiotis Trimintzios
Creatore [Siris, Vasilios]
Edizione [1.]
Estensione 1 online resource.
Disciplina 005.8
Accesso persona Anagnostakis, Kostas
Ioannidis, Sotiris
Trimintzios, Panagiotis
Genere/Forma Electronic books
ISBN 9780387855554
0387855556
9780387855547
0387855548
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intrusion Detection -- Denial-of-Service -- Privacy Protection -- Security Policies -- Peer-to-Peer and Grid -- Security -- Network Monitoring -- Web Security -- Vulnerability Management and Tracking -- Network -- Forensics -- Wireless and Mobile Security -- Cryptography -- Network Discovery and Mapping -- Incident -- Response and Management -- Malicious Software -- Web Services Security -- Legal and Ethical Issues.
Record Nr. NYU-006177928
[Siris, Vasilios]  
Materiale a stampa
Lo trovi qui: New York University
Computer Security – ESORICS 2017 [electronic resource] : 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I / edited by Simon N. Foley, Dieter Gollmann, Einar Snekkenes
Computer Security – ESORICS 2017 [electronic resource] : 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I / edited by Simon N. Foley, Dieter Gollmann, Einar Snekkenes
Estensione 1 online resource (XXI, 485 p. 106 illus.) online resource.
Disciplina 005.8
Accesso persona Foley, Simon N.
Gollmann, Dieter
Snekkenes, Einar, 1961-
Accesso ente SpringerLink (Online service)
Genere/Forma Electronic books
ISBN 9783319664026
9783319664019
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Data protection -- Security protocols -- Systems -- Web and network security -- Privacy -- Threat modeling and detection -- Information flow -- Security in emerging applications such as cryptocurrencies, the Internet of Things and automotive.
Record Nr. DUKE-008106311
Materiale a stampa
Lo trovi qui: Duke University