top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Critical Infrastructure Protection VIII [electronic resource] : 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers / edited by Jonathan Butts, Sujeet Shenoi
Critical Infrastructure Protection VIII [electronic resource] : 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers / edited by Jonathan Butts, Sujeet Shenoi
Creatore [Butts, Jonathan]
Estensione 1 online resource (XVIII, 276 p. 86 illus.) online resource.
Disciplina 005.8
Accesso persona Shenoi, Sujeet
Accesso ente SpringerLink (Online service)
Genere/Forma Electronic books
ISBN 9783662453551
9783662453544
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Detecting Integrity Attacks on Industrial Control Systems -- Detecting Malicious Software Execution in Programmable Logic Controllers Using Power Fingerprinting -- Timing of Cyber-Physical Attacks on Process Control Systems -- Recovery of Structural Controllability for Control Systems -- Industrial Control System Traffic Data Sets for Intrusion Detection Research -- An Industrial Control System Testbed Based on Emulation, Physical Devices and Simulation -- Evidence Theory for Cyber-Physical Systems -- An Automated Dialog System for Conducting Security Interviews for Access Control -- A Survey of Critical Infrastructure Security -- A System Dynamics Framework for Modeling Critical Infrastructure Resilience -- Reinforcement Learning Using Monte Carlo Policy Estimation for Disaster Mitigation -- Accuracy of Service Area Estimation Methods Used for Critical Infrastructure Recovery -- A Decision Support Tool for a Unified Homeland Security Strategy -- Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical Systems -- Assessing Potential Casualties in Critical Events -- Evaluation of Format-Preserving Encryption Algorithms for Critical Infrastructure Protection -- Asynchronous Binary Byzantine Consensus over Graphs with Power-Law Degree Sequence.
Record Nr. DUKE-006232007
[Butts, Jonathan]  
Materiale a stampa
Lo trovi qui: Duke University
Computer security basics [electronic resource] / Deborah Russell and G.T. Gangemi, Sr.
Computer security basics [electronic resource] / Deborah Russell and G.T. Gangemi, Sr.
Creatore [Russell, Deborah]
Edizione [[Rev. ed.]]
Estensione 1 online resource (xx, 448 p.) : ill.
Disciplina 005.8
Accesso persona Gangemi, G. T.
Accesso ente NetLibrary, Inc.
Genere/Forma Electronic books
ISBN 1565928784 (electronic bk.) :
0937175714
Formato Risorse elettroniche
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. DUKE-002929719
[Russell, Deborah]  
Risorse elettroniche
Lo trovi qui: Duke University
Mac security bible [electronic resource] / Joe Kissell
Mac security bible [electronic resource] / Joe Kissell
Creatore [Kissell, Joe.]
Estensione 1 online resource (xxxv, 900 p.) : ill.
Disciplina 005.8
Genere/Forma Electronic books
ISBN 9780470474198
047047419X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Mac security basics -- Protecting your privacy -- Network security fundamentals -- Advanced security measures -- Securing Mac OS X Server.
Record Nr. DUKE-006385662
[Kissell, Joe.]  
Materiale a stampa
Lo trovi qui: Duke University
The misuse of information systems [electronic resource] : the impact of security countermeasures / John P. D'Arcy
The misuse of information systems [electronic resource] : the impact of security countermeasures / John P. D'Arcy
Creatore [D'Arcy, John P., 1975-]
Estensione 1 online resource (x, 191 p.) : ill.
Disciplina 005.8
Genere/Forma Electronic books
ISBN 9781593322434
1593322437
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- IS security, IS misuse, and security countermeasures -- A deterrence-based model of security countermeasure effectiveness -- IS misuse in the workplace -- Security countermeasures as deterrents to IS misuse -- Discussion, implications, and conclusions -- References -- Appendix A: IS misuse scenarios -- Appendix B: Survey items -- Appendix C: Data analysis for MBA and industry samples -- Appendix D: Hypotheses tests for MBA and industry samples -- Index.
Record Nr. DUKE-006392618
[D'Arcy, John P., 1975-]  
Materiale a stampa
Lo trovi qui: Duke University
The Browser Hacker's Handbook / Wade Alcorn, Christian Frichot, Michele Orrù
The Browser Hacker's Handbook / Wade Alcorn, Christian Frichot, Michele Orrù
Creatore [Alcorn, Wade]
Estensione 1 online resource (xxi, 626 pages) : illustrations
Disciplina 005.8
Accesso persona Frichot, Christian
Orrù, Michele
Genere/Forma Electronic books
ISBN 9781118662106
1118662105
9781118914359
111891435X
9781306473446
1306473446
9781118662090
1118662091
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Web Browser Security -- Initiating Control -- Retaining Control -- Bypassing the Same Origin Policy -- Attacking Users -- Attacking Browsers -- Attacking Extensions -- Attacking Plugins -- Attacking Web Applications -- Attacking Networks -- Epilogue: Final Thoughts.
Copyright; About the Authors; About the Contributing Authors; About the Technical Editor; Credits; Acknowledgments; Contents; Introduction; Chapter 1: Web Browser Security; A Principal Principle; Exploring the Browser; Symbiosis with the Web Application; Same Origin Policy; HTTP Headers; Markup Languages; HTML; XML; Cascading Style Sheets; Scripting; JavaScript; VBScript; Document Object Model; Rendering Engines; WebKit; Trident; Gecko; Presto; Blink; Geolocation; Web Storage; Cross-origin Resource Sharing; HTML5; WebSocket; Web Workers; History Manipulation; WebRTC; Vulnerabilities.
Evolutionary Pressures HTTP Headers; Content Security Policy; Secure Cookie Flag; HttpOnly Cookie Flag; X-Content-Type-Options; Strict-Transport-Security; X-Frame-Options; Reflected XSS Filtering; Sandboxing; Browser Sandboxing; IFrame Sandboxing; Anti-phishing and Anti-malware; Mixed Content; Core Security Problems; Attack Surface; Rate of Change; Silent Updating; Extensions; Plugins; Surrendering Control; TCP Protocol Control; Encrypted Communication; Same Origin Policy; Fallacies; Robustness Principle Fallacy; External Security Perimeter Fallacy; Browser Hacking Methodology; Initiating.
Retaining Attacking; Summary; Questions; Notes; Chapter 2: Initiating Control; Understanding Control Initiation; Control Initiation Techniques; Using Cross-site Scripting Attacks; Reflected Cross-site Scripting; Stored Cross-site Scripting; DOM Cross-site Scripting; Universal Cross-site Scripting; XSS Viruses; Bypassing XSS Controls; Using Compromised Web Applications; Using Advertising Networks; Using Social Engineering Attacks; Phishing Attacks; Baiting; Anti-Phishing Controls; Using Man-in-the-Middle Attacks; Man-in-the-Browser; Wireless Attacks; ARP Spoofing; DNS Poisoning.
Exploiting Caching Summary; Questions; Notes; Chapter 3: Retaining Control; Understanding Control Retention; Exploring Communication Techniques; Using XMLHttpRequest Polling; Using Cross-origin Resource Sharing; Using WebSocket Communication; Using Messaging Communication; Using DNS Tunnel Communication; Exploring Persistence Techniques; Using IFrames; Using Full Browser Frame Overlay; Using Browser Events; Using Pop-Under Windows; Using Man-in-the-Browser Attacks; Hijacking AJAX Calls; Hijacking Non-AJAX Requests; Evading Detection; Evasion using Encoding; Base64 Encoding; Whitespace Encoding.
Non-alphanumeric JavaScript Evasion using Obfuscation; Random Variables and Methods; Mixing Object Notations; Time Delays; Mixing Content from Another Context; Using the callee Property; Evasion using JavaScript Engines Quirks; Summary; Questions; Notes; Chapter 4: Bypassing the Same; Understanding the Same Origin Policy; Understanding the SOP with the DOM; Understanding the SOP with CORS; Understanding the SOP with Plugins; Understanding the SOP with UI Redressing; Understanding the SOP with Browser History; Exploring SOP Bypasses; Bypassing SOP in Java; Bypassing SOP in Adobe Reader. Bypassing SOP in Adobe Flash.
Record Nr. NYU-004057385
[Alcorn, Wade]  
Materiale a stampa
Lo trovi qui: New York University
Mobile Security : How to secure, privatize and recover your devices / Tim Speed, Darla Nykamp, Mari Heiser, Joseph Anderson, Jaya Nampalli
Mobile Security : How to secure, privatize and recover your devices / Tim Speed, Darla Nykamp, Mari Heiser, Joseph Anderson, Jaya Nampalli
Creatore [Speed, Tim.]
Estensione 1 online resource (242 pages)
Disciplina 005.8
Accesso persona Nykamp, Darla
Heiser, Mari
Anderson, Joseph
Nampalli, Jaya
Genere/Forma Electronic books
ISBN 9781849693615
1849693617
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Living in a mobile world -- Users and mobile device management -- Privacy : small word, big consequences -- Mobile and social : the threats you should know about -- Protecting your mobile devices -- Support and warranty insurance -- Baby boomers, teens, and tweens -- Getting your life back after you've been hacked -- Appendix A. IBM notes traveler -- Appendix B. Mobile device management -- Appendix C. Tips to help you protect your mobile device -- Appendix D. Mobile Acceptable Use Policy template -- Appendix E. The history of social networking, the Internet, and smartphones.
Record Nr. NYU-004059608
[Speed, Tim.]  
Materiale a stampa
Lo trovi qui: New York University
Threat modeling : designing for security / Adam Shostack
Threat modeling : designing for security / Adam Shostack
Creatore [Shostack, Adam, author]
Estensione 1 online resource (xxxiii, 590 pages) : illustrations
Disciplina 005.8
Genere/Forma Electronic books
ISBN 9781118822692
1118822692
1118810058
9781118810057
9781118809990
1118809998
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part I. Getting started -- part II. Finding threats -- part III. Managing and addressing threats -- part IV. Threat modeling in technologies and tricky areas -- part V. Taking it to the next level.
Record Nr. NYU-004064512
[Shostack, Adam, author]  
Materiale a stampa
Lo trovi qui: New York University
Data and Goliath : the hidden battles to collect your data and control your world / Bruce Schneier
Data and Goliath : the hidden battles to collect your data and control your world / Bruce Schneier
Creatore [Schneier, Bruce, 1963- author]
Edizione [First edition.]
Estensione 383 pages ; 24 cm
Disciplina 005.8
ISBN 9780393244816 (hardcover)
0393244814
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The world we're creating. -- Data as a by-product of computing -- Data as surveillance -- Analyzing our data -- The business of surveillance -- Government surveillance and control -- Consolidation of institutional control -- What's at stake. -- Political liberty and justice -- Commercial fairness and equality -- Business competitiveness -- Privacy -- Security -- What to do about it. -- Principles -- Solutions for government -- Solutions for corporations -- Solutions for the rest of us -- Social norms and the big data trade-off.
Record Nr. NYU-004121279
[Schneier, Bruce, 1963- author]  
Materiale a stampa
Lo trovi qui: New York University
Decrypted secrets : methods and maxims of cryptology / Friedrich L. Bauer
Decrypted secrets : methods and maxims of cryptology / Friedrich L. Bauer
Creatore [Bauer, Friedrich Ludwig, 1924-]
Edizione [3rd, rev. and updated ed.]
Estensione xii, 473 p. : ill. ; 24 cm.
Disciplina 005.8
ISBN 3540426744 (alk. paper)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. NYU-000763005
[Bauer, Friedrich Ludwig, 1924-]  
Materiale a stampa
Lo trovi qui: New York University
Trust, computing, and society / edited by Richard H. R. Harper
Trust, computing, and society / edited by Richard H. R. Harper
Estensione xii, 362 pages ; 24 cm
Disciplina 005.8
Accesso persona Harper, Richard H. R., 1960-editor of compilation
ISBN 9781107038479 (hardback)
1107038472 (hardback)
Classificazione COM079000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. NYU-003974323
Materiale a stampa
Lo trovi qui: New York University