top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalit├á di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Querying databases privately : a new approach to private information retrieval / Dmitri Asonov
Querying databases privately : a new approach to private information retrieval / Dmitri Asonov
Creatore [Asonov, Dmitri]
Estensione 1 online resource (xi, 113 pages) : illustrations.
Disciplina 005.8
Genere/Forma Electronic books
ISBN 3540277706
9783540277705
3540224416
9783540224419
Classificazione 54.32
54.62
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto And Related Work -- 1 Introduction -- 2 Related Work -- Almost Optimal PIR -- 3 PIR with O(1) Query Response Time and O(1) Communication -- 4 Improving Processing and Preprocessing Complexity -- 5 Experimental Analysis of Shuffling Algorithms -- Generalizing the PIR Model -- 6 Repudiative Information Retrieval -- 7 Digital Rights Management for PIR -- Discussion -- 8 Conclusion and Future Work -- References.
Record Nr. NYU-005692302
[Asonov, Dmitri]  
Materiale a stampa
Lo trovi qui: New York University
Data protection : ensuring data availability / Preston de Guise
Data protection : ensuring data availability / Preston de Guise
Creatore [De Guise, Preston, author]
Estensione 1 online resource.
Disciplina 005.8
Genere/Forma Electronic books
ISBN 9781351689519
1351689517
9781482244151
1482244152
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. NYU-005736703
[De Guise, Preston, author]  
Materiale a stampa
Lo trovi qui: New York University
PCI DSS A Pocket Guide : a Pocket Guide
PCI DSS A Pocket Guide : a Pocket Guide
Creatore [Calder, Alan]
Edizione [2nd ed.]
Estensione 1 online resource (45 pages)
Disciplina 005.8
Accesso persona Carter, Nicki
Genere/Forma Electronic books
ISBN 9781849281737
1849281734
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto FOREWORD; ABOUT THE AUTHORS; ACKNOWLEDGEMENTS; CONTENTS; CHAPTER 1: WHAT IS THE PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS)?; CHAPTER 2: WHAT IS THE SCOPE OFTHE PCI DSS?; CHAPTER 3: COMPLIANCE AND COMPLIANCE PROGRAMMES; CHAPTER 4: CONSEQUENCES OF A BREACH; CHAPTER 5: HOW DO YOU COMPLY WITH THE REQUIREMENTS OF THE STANDARD?; CHAPTER 6: MAINTAINING COMPLIANCE; CHAPTER 7: PCI DSS -- THE STANDARD; CHAPTER 8: ASPECTS OF PCI DSS COMPLIANCE; CHAPTER 9: THE PCI SELF-ASSESSMENT QUESTIONNAIRE (SAQ); CHAPTER 10: PROCEDURES AND QUALIFICATIONS; CHAPTER 11: PCI DSS AND ISO/IEC 27001.
CHAPTER 12: PAYMENT APPLICATION DATA SECURITY STANDARD (PA-DSS)CHAPTER 13: PIN TRANSACTION SECURITY (PTS)); ITG RESOURCES.
Record Nr. NYU-005807814
[Calder, Alan]  
Materiale a stampa
Lo trovi qui: New York University
Computer and information security handbook [electronic resource] / edited by John R. Vacca
Computer and information security handbook [electronic resource] / edited by John R. Vacca
Edizione [Third edition.]
Estensione 1 online resource
Disciplina 005.8
Accesso persona Vacca, John R., editor.
Genere/Forma Electronic books
ISBN 9780128039298
0128039299
0128038438
9780128038437
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Computer and Information Security Handbook; Computer and Information Security Handbook; Copyright; Dedication; Contents; Contributors; About the Editor; Foreword; Preface; 1. ORGANIZATION OF THIS BOOK; Part 1: Overview of System and Network Security: A Comprehensive Introduction; Part 2: Managing Information Security; Part 3: Disaster Recovery Security; Part 4: Security Standards and Policies; Part 5: Cyber, Network, and Systems Forensics Security and Assurance; Part 6: Encryption Technology; Part 7: Privacy and Access Management; Part 8: Storage Security; Part 9: Cloud Security
Part 10: Virtual SecurityPart 11: Cyber Physical Security; Part 12: Practical Security; Part 13: Critical Infrastructure Security; Part 14: Advanced Security; 2. SUPPLEMENTAL MATERIALS; Acknowledgments; I -- Overview of System and Network Security: A Comprehensive Introduction; 1 -- Information Security in the Modern Enterprise; 1. INTRODUCTION; Management Matters as Much as Technology; Trade Secrets and ``Reasonable Efforts''; 2. CHALLENGES FACING INFORMATION SECURITY; 3. ASSESSMENT AND PLANNING; Know Where to Begin; Risk Management; Public Standards for Information Security
Creating the Security Plan4. POLICIES AND PROCEDURES; 5. TRAINING; 6. SUMMARY; CHAPTER REVIEW QUESTIONS/EXERCISES; True/False; Multiple Choice; EXERCISE; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; 2 -- Building a Secure Organization; 1. OBSTACLES TO SECURITY; Security Is Inconvenient; 2. COMPUTERS ARE POWERFUL AND COMPLEX; Computer Users Are Unsophisticated; Computers Created Without a Thought to Security; 3. CURRENT TREND IS TO SHARE, NOT PROTECT; Data Accessible From Anywhere; 4. SECURITY IS NOT ABOUT HARDWARE AND SOFTWARE
The Bad Guys Are Very SophisticatedManagement Sees Security as a Drain on the Bottom Line; 5. TEN STEPS TO BUILDING A SECURE ORGANIZATION; Evaluate the Risks and Threats; Threats Based on the Infrastructure Model; Threats Based on the Business Itself; Threats Based on Industry; Global Threats; Beware of Common Misconceptions; Provide Security Training for Information Technology Staff: Now and Forever; Think ``Outside the Box''; DOXing; Train Employees: Develop a Culture of Security; Identify and Use Built-in Security Features of the Operating System and Applications; Monitor Systems
Hire a Third Party to Audit SecurityDo Not Forget the Basics; Change Default Account Passwords; Use Robust Passwords; Close Unnecessary Ports; Patch, Patch, Patch; Use Administrator Accounts for Administrative Tasks; Restrict Physical Access; Do Not Forget Paper!; 6. PREPARING FOR THE BUILDING OF SECURITY CONTROL ASSESSMENTS; 7. SUMMARY; CHAPTER REVIEW QUESTIONS/EXERCISES; True/False; Multiple Choice; EXERCISE; Problem; Hands-on Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; 3 -- A Cryptography Primer; 1. WHAT IS CRYPTOGRAPHY? WHAT IS ENCRYPTION?
Record Nr. NYU-005737799
Materiale a stampa
Lo trovi qui: New York University
Foundations of security analysis and design VI : FOSAD tutorial lectures / Alessandro Aldini, Roberto Gorrieri (eds.).
Foundations of security analysis and design VI : FOSAD tutorial lectures / Alessandro Aldini, Roberto Gorrieri (eds.).
Creatore [International School on Foundations of Security Analysis and Design (2010 : Bertinoro, Italy)]
Estensione 1 online resource (vi, 274 pages) : illustrations.
Disciplina 005.8
Accesso persona Aldini, Alessandro
Gorrieri, Roberto
Genere/Forma Electronic books
Conference papers and proceedings
ISBN 9783642230820
3642230822
9783642230813
3642230814
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. NYU-005709722
[International School on Foundations of Security Analysis and Design (2010 : Bertinoro, Italy)]  
Materiale a stampa
Lo trovi qui: New York University
Open research problems in network security : IFIP WG 11.4 international workshop, iNetSec 2010, Sofia, Bulgaria, March 5-6, 2010 : revised selected papers / Jan Camenisch, Valentin Kisimov, Maria Dubovitskaya (eds.).
Open research problems in network security : IFIP WG 11.4 international workshop, iNetSec 2010, Sofia, Bulgaria, March 5-6, 2010 : revised selected papers / Jan Camenisch, Valentin Kisimov, Maria Dubovitskaya (eds.).
Creatore [INetSec 2010 (2010 : Sofia, Bulgaria)]
Estensione 1 online resource (viii, 169 pages) : illustrations.
Disciplina 005.8
Accesso persona Camenisch, Jan.
Kisimov, Valentin
Dubovitskaya, Maria
Genere/Forma Electronic books
Conference papers and proceedings
Kongress
ISBN 9783642192289
3642192289
3642192270
9783642192272
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. NYU-006177051
[INetSec 2010 (2010 : Sofia, Bulgaria)]  
Materiale a stampa
Lo trovi qui: New York University
Wireless and Mobile Networks Security
Wireless and Mobile Networks Security
Creatore [Chaouchi, H.]
Estensione 1 online resource (689 pages)
Disciplina 005.8
Genere/Forma Electronic books
ISBN 9780470610282
047061028X
128269149X
9781282691490
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Wireless and Mobile Network Security: Security Basics, Security in On-the-shelf and Emerging Technologies; Table of Contents; Introduction; Part 1. Basic Concepts; Chapter 1. Introduction to Mobile and Wireless Networks; Chapter 2. Vulnerabilities of Wired and Wireless Networks; Chapter 3. Fundamental Security Mechanisms; Chapter 4. Wi-Fi Security Dedicated Architectures; Chapter 5. Multimedia Content Watermarking; Part 2. Off-the Shelf Technologies; Chapter 6. Bluetooth Security; Chapter 7. Wi-Fi Security; Chapter 8. WiMAX Security; Chapter 9. Security in Mobile Telecommunication Networks.
Chapter 10. Security of Downloadable ApplicationsPart 3. Emerging Technologies; Chapter 11. Security in Next Generation Mobile Networks; Chapter 12. Security of IP-Based Mobile Networks; Chapter 13. Security in Ad Hoc Networks; Chapter 14. Key Management in Ad Hoc Networks; Chapter 15. Wireless Sensor Network Security; Chapter 16. Key Management in Wireless Sensor Networks; Conclusion; List of Authors; Index.
Record Nr. NYU-006069628
[Chaouchi, H.]  
Materiale a stampa
Lo trovi qui: New York University
Information security practices : emerging threats and perspectives / Issa Traoré, Ahmed Awad, Isaac Woungang, editors
Information security practices : emerging threats and perspectives / Issa Traoré, Ahmed Awad, Isaac Woungang, editors
Estensione 1 online resource
Disciplina 005.8
Accesso persona Traoré, Issa, editor
Awad, Ahmed, editor
Woungang, Isaac, editor
Genere/Forma Electronic books
ISBN 9783319489476
331948947X
9783319489469
3319489461
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Preface; Contents; Chapter 1: Introduction: Emerging Threats Call for New Security Paradigms; 1.1 Emerging Threats Landscape; 1.2 Next Generation Cybersecurity Systems; References; Chapter 2: Botnets Threat Analysis and Detection; 2.1 Introduction; 2.2 Evolution of Botnets: History and Topologies; 2.3 Famous Botnets; 2.3.1 ZeuS or Zbot; 2.3.2 Koobface; 2.3.3 Windigo; 2.4 Botnet Detection Evasion Techniques; 2.5 Botnet Detection Methodologies; 2.5.1 Passive Techniques; 2.5.1.1 Packet Inspection; 2.5.1.2 Analysis of Flow Records; 2.5.1.3 DNS-Based Approaches; 2.5.1.4 Analysis of Spam Records.
2.5.1.5 Analysis of (Application) Log Files2.5.1.6 Honeypots; 2.5.1.7 Evaluation of Antivirus; 2.5.1.8 Software Feedback; 2.5.2 Active Techniques; 2.5.2.1 Sinkholing; 2.5.2.2 DNS Cache Snooping; 2.5.2.3 Infiltration; 2.5.2.4 Tracking of Fast-Flux Network; 2.6 Defense Against Botnet Using Network Security Devices; 2.6.1 Intrusion Prevention and Detection Systems; 2.6.2 Network Firewalls; 2.6.2.1 Dynamic and Administrator Blacklist Data; 2.6.2.2 Traffic Classification and Reporting; 2.6.2.3 Domain Name System Snooping; 2.7 Security Measures Against Botnets; 2.7.1 Network Design.
2.7.1.1 Advance Threat Protection2.7.1.2 Intrusion Prevention and Detection System; 2.7.1.3 Email Security Systems; 2.7.1.4 Forensic Analysis; 2.7.1.5 Security Event Monitoring; 2.7.2 Application Usage; 2.7.2.1 HIPS (Host-Based Intrusion Prevention System); 2.7.2.2 End Point Security; 2.7.2.3 Application Firewall; 2.8 Conclusion; References; Chapter 3: Collective Framework for Fraud Detection Using Behavioral Biometrics; 3.1 Background; 3.2 Fraud Detection Framework; 3.3 Behavioral Identity Verification; 3.4 Experimental Evaluation; 3.4.1 Evaluation Metrics and Procedures; 3.4.2 Results.
3.5 ConclusionReferences; Chapter 4: The Hardware Trojan System: An Online Suite of Tools for Hardware Trojan Analysis; 4.1 Introduction; 4.2 Hardware Trojan Analysis Techniques; 4.2.1 Trojan Classification; 4.2.2 Trojan Evaluation; 4.3 The Hardware Trojan System; 4.3.1 The Classification Tool; 4.3.2 The Evaluation Tool; 4.3.3 The Web Environment; 4.4 Case Study; 4.4.1 Classification Tool; 4.4.2 Evaluation Tool; 4.5 Conclusion; References; Chapter 5: Combining Mouse and Eye Movement Biometrics for User Authentication; 5.1 Introduction; 5.2 Related Work.
5.2.1 Previous Research on Mouse Movements5.2.2 Previous Research on Eye Movements; 5.3 Experiment Setting and Design; 5.3.1 Experiment Setting; 5.3.2 Participants; 5.3.3 Experiment Design; 5.3.4 Experiment Procedure; 5.4 Data Processing and Feature Extraction; 5.4.1 Data Alignment; 5.4.2 Data Cleaning; 5.4.3 Data Visualization; 5.4.4 Feature Extraction; 5.5 Proposed Approaches; 5.5.1 Simple Multi-class Classification Model; 5.5.2 Binary Classification Model; 5.5.3 Regression Model Using Fusion; 5.6 Result and Discussion; 5.7 Conclusion and Future Research Direction; References.
Record Nr. NYU-006083549
Materiale a stampa
Lo trovi qui: New York University
Security and privacy in the digital era. Volume 1 / Claudine Guerrier
Security and privacy in the digital era. Volume 1 / Claudine Guerrier
Creatore [Guerrier, Claudine, author]
Estensione 1 online resource (xxvii, 252 pages)
Disciplina 005.8
Genere/Forma Electronic books
ISBN 9781119347750
1119347750
9781119347323
1119347327
9781119347705
111934770X
9781786300782
1786300788
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover ; Title Page ; Copyright; Contents; Introduction; Part 1. Technology and Human Rights; 1. The Ideology of Human Rights; 1.1. Constitutional texts; 1.2. Some texts have an international scope; 1.3. European texts; 2. Protection of Personal Data; 2.1. Convention 108; 2.2. United Nations General Assembly Resolution 45/95 on December 14, 1990; 2.3. Sources of EU law; 3. Telecommunication Interception; 3.1. Jurisprudence of the EHCR; 3.2. Interceptions in the United States; 3.3. European states and interceptions; 3.4. Interception controls; 4. Biometrics and Videosurveillance.
4.1. Biometrics4.2. Videosurveillance; Part 2. The Era of Surveillance and Control; 5. The Sources of Law in the Field of Security Illustrate This Change; 5.1. The USA; 5.2. The United Kingdom; 5.3. France; 6. Interceptions; 6.1. The United States of America; 6.2. France; 7. Other Methods of Surveillance; 7.1. Biometrics; 7.2. Passenger name record; 7.3. Data and files; 7.4. New technologies; geolocation, body scanners, drones are increasingly used; Part 3. Between Security and Freedom; 8. Towards Compromise; 8.1. Legal measures have been taken in order to protect some fundamental freedoms.
8.2. European jurisprudence8.3. The monitoring continues to develop in the communications sector; Conclusion; Bibliography; Index; Other titles from iSTE in Innovation, Entrepreneurship and Management; EULA.
Record Nr. NYU-005975395
[Guerrier, Claudine, author]  
Materiale a stampa
Lo trovi qui: New York University
Computer security and cryptography / Alan G. Konheim
Computer security and cryptography / Alan G. Konheim
Creatore [Konheim, Alan G., 1934-]
Estensione 1 online resource (xvii, 521 pages) : illustrations
Disciplina 005.8
Genere/Forma Electronic books
ISBN 9780470083970
0470083972
9780470083987
0470083980
0471947830
9780471947837
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto COMPUTER SECURITY AND CRYPTOGRAPHY; CONTENTS; FOREWORD; PREFACE; ABOUT THE AUTHOR; CHAPTER 1 APERITIFS; CHAPTER 2 COLUMNAR TRANSPOSITION; CHAPTER 3 MONOALPHABETIC SUBSTITUTION; CHAPTER 4 POLYALPHABETIC SUBSTITUTION; CHAPTER 5 STATISTICAL TESTS; CHAPTER 6 THE EMERGENCE OF CIPHER MACHINES; CHAPTER 7 THE JAPANESE CIPHER MACHINES; CHAPTER 8 STREAM CIPHERS; CHAPTER 9 BLOCK-CIPHERS: LUCIFER, DES, AND AES; CHAPTER 10 THE PARADIGM OF PUBLIC KEY CRYPTOGRAPHY; CHAPTER 11 THE KNAPSACK CRYPTOSYSTEM; CHAPTER 12 THE RSA CRYPTOSYSTEM; CHAPTER 13 PRIME NUMBERS AND FACTORIZATION.
Record Nr. NYU-006065064
[Konheim, Alan G., 1934-]  
Materiale a stampa
Lo trovi qui: New York University