top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Digital data integrity : the evolution from passive protection to active management / David B. Little, Skip Farmer, Oussama El-Hilali
Digital data integrity : the evolution from passive protection to active management / David B. Little, Skip Farmer, Oussama El-Hilali
Creatore [Little, David B.]
Estensione 1 online resource (xvi, 240 pages) : illustrations
Disciplina 005.8
Accesso persona Farmer, Skip
El-Hilali, Oussama
Genere/Forma Electronic books
ISBN 9780470035191
0470035196
9780470035184
0470035188
9780470018279
0470018275
1280838965
9781280838965
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Digital Data Integrity -- TOC36;Contents -- Acknowledgements -- Introduction -- CH36;146; An Introduction to Data Protection Today -- 146;1 Introduction -- 146;2 Traditional Backup and Recovery -- 146;3 Hierarchical Storage Migration 40;HSM41; -- 146;4 Disaster Recovery -- 146;5 Vaulting -- 146;546;1 Offsiting Original Backup -- 146;546;2 Create Multiple Copies of the Backup -- 146;546;3 Duplicate the Original Backup -- 146;6 Encryption -- 146;646;1 Client Side Encryption -- 146;646;2 Media Server Encryption -- 146;646;3 Encryption Appliance -- 146;7 Management and Reporting -- 146;746;1 Service Level Management -- 146;8 Summary -- CH36;246; The Evolution -- 246;1 Introduction -- 246;2 Storage Virtualization -- 246;246;1 Why Storage Virtualization63; -- 246;3 RAID -- 246;346;1 So What Does This Really Mean63; -- 246;4 RAID Levels -- 246;5 What Mirroring and RAID Do Not Do -- 246;546;1 Which RAID Should I Use When63; -- 246;6 Replication -- 246;646;1 Host45;Based Replication -- 246;646;2 RAID System Replication -- 246;7 Standby or DR Site -- 246;8 Summary -- CH36;346; Backup Integration -- 346;1 Introduction -- 346;2 Snapshots -- 346;246;1 Mirror -- 346;246;2 COW Snapshot -- 346;246;3 Replication -- 346;246;4 Applications -- 346;246;5 Summary -- CH36;446; Bare Metal Restore -- 446;1 Introduction -- 446;2 Background -- 446;246;1 Why BMR63; -- 446;246;2 Why Has This Taken So Long63; -- 446;3 The Evolution of BMR Capabilities -- 446;346;1 The Manual Reinstall45;and45;Restore Method -- 446;346;2 Operating System Provided Recovery Solutions -- 446;346;3 Hybrid or Home45;Grown Recovery Solutions -- 446;4 Filling the Gap 8211; Integrated BMR -- 446;446;1 The Bar Rises -- 446;5 The Problem of Dissimilar Disk Recovery -- 446;546;1 Approach 158; Changing the Disk and Volume Configuration Information -- 446;546;2 Approach 258; Adjusting the Volumes and File Systems During Recovery -- 446;6 The Problem of Automating Disk Mapping -- 446;7 The Problem of Dissimilar System Recovery -- 446;746;1 Windows Dissimilar System Restore Issues -- 446;746;2 UNIX Dissimilar System Restore Issues -- 446;8 The Current State of Integrated BMR -- 446;9 The Future of BMR -- 446;946;1 Enterprise Data Protection Server Self45;Restore -- 446;946;2 Automated Dissimilar Disk Restore -- 446;946;3 Automated Dissimilar System Recovery -- 446;946;4 Network Integration -- 446;10 New Capabilities and Challenges in Data Protection and the Effect on Bare Metal Recovery -- 446;1046;1 Continuous Data Protection 40;CDP41; -- 446;1046;2 Single Instance Store 40;SIS41; -- 446;1046;3 Storage Area Network 40;SAN41; -- 446;11 Large45;Scale Automated Bare Metal Recovery -- 446;12 Summary -- CH36;546; Management -- 546;1 Introduction -- 546;2 Protecting Data Throughout Its Life Cycle -- 546;3 Architecting for Efficient Management -- 546;4 Reporting -- 546;446;1 Backup Operations Reporting -- 546;446;2 Alerting and Notification -- 546;446;3 Backup Reporting to Business Units -- 546;5 Business Unit Chargeback -- 546;546;1 Backup Service P.
Record Nr. NYU-006065086
[Little, David B.]  
Materiale a stampa
Lo trovi qui: New York University
Information Systems Security [electronic resource] : 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings / edited by Aditya Bagchi, Indrakshi Ray.
Information Systems Security [electronic resource] : 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings / edited by Aditya Bagchi, Indrakshi Ray.
Creatore [Bagchi, Aditya]
Estensione 1 online resource (XVI, 404 p. 70 illus.) online resource.
Disciplina 005.8
Accesso persona Ray, Indrakshi
Accesso ente SpringerLink (Online service)
Genere/Forma Electronic books
ISBN 9783642452048
9783642452031
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Challenges and Opportunities for Security with Differential Privacy -- An Encrypted In-Memory Column-Store: The Onion Selection Problem -- Risk Aware Approach to Data Confidentiality in Cloud Computing -- Jamming Resistant Schemes for Wireless Communication -- Improved Biometric-Based Three-factor Remote User Authentication Scheme with Key Agreement Using Smart Card -- Signcryption from Randomness Recoverable PKE Revisited -- Auctions with Rational Adversary -- A Framework for Formal Reasoning about Privacy Properties Based on Trust Relationships in Complex Electronic Services -- Correctness Verification in Outsourced Databases: More Reliable Fake Tuples Approach -- Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management -- Secure States versus Secure Executions - From Access Control to Flow Control -- Monitoring for Slow Suspicious Activities Using a Target Centric Approach -- RAPID-FeinSPN: A Rapid Prototyping Framework for Feistel and SPN-Based Block Ciphers -- Simple and Efficient Time-Bound Hierarchical Key Assignment Scheme -- Traitor-Traceable Key Pre-distribution Based on Visual Secret Sharing -- Web Services Based Attacks against Image CAPTCHAs -- New Long-Term Glimpse of RC4 Stream Cipher -- A Voucher Assisted Adaptive Acknowledgement Based Intrusion Detection Protocol for MANETs -- Cryptanalysis of Pairing-Free Identity-Based Authenticated Key Agreement Protocols -- Information Theoretical Analysis of Side-Channel Attack -- Efficient Multi-bit Image Steganography in Spatial Domain -- Evolutionary Multibit Grouping Steganographic Algorithm -- Let the Right One in: Discovering and Mitigating Permission Gaps -- A Novel RSU-Aided Hybrid Architecture for Anonymous Authentication (RAHAA) in VANET -- Recipient Anonymous Ciphertext-Policy Attribute Based Encryption -- Error Correction of Partially Exposed RSA Private Keys from MSB Side -- Efficient Enforcement of Privacy for Moving Object Trajectories -- An Administrative Model for Spatio-Temporal Role Based Access Control -- A UC-Secure Authenticated Contributory Group Key Exchange Protocol Based on Discrete Logarithm. ỹ
Record Nr. DUKE-006043684
[Bagchi, Aditya]  
Materiale a stampa
Lo trovi qui: Duke University
ISSE 2013 securing electronic business processes [electronic resource] : highlights of the information security solutions Europe 2013 Conference / edited by Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider
ISSE 2013 securing electronic business processes [electronic resource] : highlights of the information security solutions Europe 2013 Conference / edited by Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider
Estensione 1 online resource (1 online resource (278 pages)) : illustrations
Disciplina 005.8
Accesso persona Pohlmann, Norbert
Reimer, Helmut
Schneider, Wolfgang
Genere/Forma Electronic books
ISBN 9783658033712
9783658033705
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cloud Security, Trust Services, eId & Access Management -- Human Factors, Awareness & Privacy, Regulations and Policies -- Security Management -- Cyber Security, Cybercrime, Critical Infrastructures -- Mobile Security & Applications.
Record Nr. DUKE-005998777
Materiale a stampa
Lo trovi qui: Duke University
Electronic Identity [electronic resource] / by Norberto Nuno Gomes Andrade, Lisha Chen-Wilson, David Argles, Gary Wills, Michele Schiano di Zenise
Electronic Identity [electronic resource] / by Norberto Nuno Gomes Andrade, Lisha Chen-Wilson, David Argles, Gary Wills, Michele Schiano di Zenise
Creatore [Andrade, Norberto Nuno Gomes]
Estensione 1 online resource (VIII, 90 p. 14 illus.) online resource.
Disciplina 005.8
Accesso persona Chen-Wilson, Lisha
Argles, David
Wills, Gary
Schiano di Zenise, Michele
Accesso ente SpringerLink (Online service)
Genere/Forma Electronic books
ISBN 9781447164494
9781447164487
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The Importance and Relevance of eID in Modern Society -- eID Legal State of the Art -- General Legal and Technical Barriers -- Specific Legal Barriers -- Legal Solutions: Overview of Proposals.
Record Nr. DUKE-006112754
[Andrade, Norberto Nuno Gomes]  
Materiale a stampa
Lo trovi qui: Duke University
ICT Systems Security and Privacy Protection [electronic resource] : 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings / edited by Nora Cuppens-Boulahia, Frédéric Cuppens, Sushil Jajodia, Anas Abou El Kalam, Thierry Sans
ICT Systems Security and Privacy Protection [electronic resource] : 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings / edited by Nora Cuppens-Boulahia, Frédéric Cuppens, Sushil Jajodia, Anas Abou El Kalam, Thierry Sans
Creatore [Cuppens-Boulahia, Nora]
Estensione 1 online resource (XIV, 494 p. 94 illus.) online resource.
Disciplina 005.8
Accesso persona Cuppens, Frédéric
Jajodia, Sushil
Abou El Kalam, Anas
Sans, Thierry
Accesso ente SpringerLink (Online service)
Genere/Forma Electronic books
ISBN 9783642554155
9783642554148
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intrusion detection -- Data security -- Mobile security -- Privacy -- Metrics and risk assessment -- Information flow control -- Identity management -- Identifiability and decision making -- Malicious behavior and fraud -- Organizational security.
Record Nr. DUKE-006113407
[Cuppens-Boulahia, Nora]  
Materiale a stampa
Lo trovi qui: Duke University
Fundamentals of cryptology : a professional reference and interactive tutorial / by Henk C. A. van Tilborg
Fundamentals of cryptology : a professional reference and interactive tutorial / by Henk C. A. van Tilborg
Creatore [Tilborg, Henk C. A. van, 1947-]
Estensione xiv, 491 p. : ill. ; 26 cm. + 1 computer optical disc (4 3/4 in.).
Disciplina 005.8
Accesso persona Tilborg, Henk C. A. van, 1947-
ISBN 0792386752 (alk. paper)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. DUKE-002694135
[Tilborg, Henk C. A. van, 1947-]  
Materiale a stampa
Lo trovi qui: Duke University
Computer security : ESORICS 94 : third European Symposium on Research in Computer Security, Brighton, United Kingdom, November 7-9, 1994 : proceedings / Dieter Gollmann (Ed.)
Computer security : ESORICS 94 : third European Symposium on Research in Computer Security, Brighton, United Kingdom, November 7-9, 1994 : proceedings / Dieter Gollmann (Ed.)
Creatore [European Symposium on Research in Computer Security (3rd : 1994 : Brighton, England)]
Estensione xi, 468 p. : ill. ; 24 cm.
Disciplina 005.8
Accesso persona Gollmann, Dieter
ISBN 3540586180 (Berlin)
0387586180 (New York)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. DUKE-001668578
[European Symposium on Research in Computer Security (3rd : 1994 : Brighton, England)]  
Materiale a stampa
Lo trovi qui: Duke University
Applied Cryptography and Network Security [electronic resource] : 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings / edited by Michael Jacobson, Michael Locasto, Payman Mohassel, Reihaneh Safavi-Naini
Applied Cryptography and Network Security [electronic resource] : 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings / edited by Michael Jacobson, Michael Locasto, Payman Mohassel, Reihaneh Safavi-Naini
Creatore [Jacobson, Michael]
Estensione 1 online resource (XIV, 572 p. 115 illus.) online resource.
Disciplina 005.8
Accesso persona Locasto, Michael
Mohassel, Payman
Safavi-Naini, Reihanah
Accesso ente SpringerLink (Online service)
Genere/Forma Electronic books
ISBN 9783642389801
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cloud Cryptography -- Secure Computation -- Hash Function and Block Cipher -- Signature -- System Attack -- Secure Implementation - Hardware -- Secure Implementation-Software -- Group-oriented Systems -- Key Exchange and Leakage Resilience -- Cryptographic Proof -- Cryptosystems.
Record Nr. DUKE-005934668
[Jacobson, Michael]  
Materiale a stampa
Lo trovi qui: Duke University
Intelligence and Security Informatics [electronic resource] : Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan, May 13, 2014. Proceedings / edited by Michael Chau, Hsinchun Chen, G. Alan Wang, Jau-Hwang Wang
Intelligence and Security Informatics [electronic resource] : Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan, May 13, 2014. Proceedings / edited by Michael Chau, Hsinchun Chen, G. Alan Wang, Jau-Hwang Wang
Creatore [Chau, Michael]
Estensione 1 online resource (XIV, 91 p. 25 illus.) online resource.
Disciplina 005.8
Accesso persona Chen, Hsinchun
Wang, G. Alan
Wang, Jau-Hwang
Accesso ente SpringerLink (Online service)
Genere/Forma Electronic books
ISBN 9783319066776
9783319066769
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Regional data sets and case studies -- Cybercrime -- Information security engineering -- Text mining.
Record Nr. DUKE-006119754
[Chau, Michael]  
Materiale a stampa
Lo trovi qui: Duke University
Understanding intrusion detection through visualization / by Stefan Axelsson, David Sands
Understanding intrusion detection through visualization / by Stefan Axelsson, David Sands
Creatore [Axelsson, Stefan, 1968-]
Estensione xx, 145 p. : ill. ; 25 cm.
Disciplina 005.8
Accesso persona Sands, David, 1965-
ISBN 0387276343 (hbk.)
038727636X (e-book)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. DUKE-003738743
[Axelsson, Stefan, 1968-]  
Materiale a stampa
Lo trovi qui: Duke University