top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalit√† di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Database security. Volume X : status and prospects : IFIP TC11/WG11.3 tenth International Conference on Database Security, 22-24 July 1996, Como, Italy / edited by Pierangela Samarati and Ravi S. Sandhu
Database security. Volume X : status and prospects : IFIP TC11/WG11.3 tenth International Conference on Database Security, 22-24 July 1996, Como, Italy / edited by Pierangela Samarati and Ravi S. Sandhu
Creatore [IFIP TC11/WG 11.3 International Conference on Database Security (11th : 1996 : Como, Italy)]
Estensione 1 online resource (ix, 313 pages).
Disciplina 005.8
Accesso persona Samarati, Pierangela, editor
Sandhu, Ravi, editor
Genere/Forma Electronic books
Conference papers and proceedings
ISBN 9780387351674
0387351671
9781504129008
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. NYU-004460062
[IFIP TC11/WG 11.3 International Conference on Database Security (11th : 1996 : Como, Italy)]  
Materiale a stampa
Lo trovi qui: New York University
Cisco PIX firewalls : configure, manage, & troubleshoot / Thorsten Behrens [and others] ; Charles Riley, technical editor ; Umer Khan, technical reviewer
Cisco PIX firewalls : configure, manage, & troubleshoot / Thorsten Behrens [and others] ; Charles Riley, technical editor ; Umer Khan, technical reviewer
Estensione 1 online resource (xxvi, 548 pages) : illustrations
Disciplina 005.8
Accesso persona Behrens, Thorsten
Riley, Charles
Khan, Umer
Genere/Forma Electronic books
Soggetto non controllato Andre fag (naturvidenskab og teknik) Andre fag
ISBN 1423754182
9781423754183
9780080488486
008048848X
9781597490047
1597490040
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Contents; Foreword; Introduction to Security and Firewalls; Introduction to Pix Firewalls; PIX Firewall Operations; Adaptive Security Device Manager; Application Inspection; Filtering, Intrusion Detection, and Attack Management; Services; Configuring Authentication, Authorization and Accounting; PIX Firewall Management; Configuring Virtual Private Networking; Configuring Failover; Troubleshooting and Performance Monitoring; Index; Related Titles.
Record Nr. NYU-004464545
Materiale a stampa
Lo trovi qui: New York University
Host integrity monitoring : using Osiris and Samhain / Brian Wotring ; Bruce Potter, technical editor ; for[e]word by Marcus J. Ranum
Host integrity monitoring : using Osiris and Samhain / Brian Wotring ; Bruce Potter, technical editor ; for[e]word by Marcus J. Ranum
Creatore [Wotring, Brian]
Estensione 1 online resource (xxvi, 421 pages) : illustrations
Disciplina 005.8
Accesso persona Potter, Bruce
Genere/Forma Electronic books
ISBN 1597490180
9781597490184
0080488943
9780080488943
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Contents; Foreword; Preface; Host Integrity; Understanding the Terrain; Understanding Threats; Planning; Host Integrity Monitoring with Open Source Tools; Osiris; Samhain; Log Monitoring and Response; Advanced Strategies; Monitoring Linksys Devices; Extending Osiris and Samhain with Modules; Additional Resources; Index; Related Titles.
Record Nr. NYU-004464679
[Wotring, Brian]  
Materiale a stampa
Lo trovi qui: New York University
Cybersecurity in Switzerland / Myriam Dunn Cavelty
Cybersecurity in Switzerland / Myriam Dunn Cavelty
Creatore [Dunn Cavelty, Myriam, author]
Estensione 1 online resource (x, 75 pages) : illustrations.
Disciplina 005.8
Genere/Forma Electronic books
ISBN 9783319106205
3319106201
3319106198
9783319106199
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foreword -- List of Abbreviations -- Introduction -- Global Cyber-security Policy Evolution -- Phase 1: The Four Pillar Model for Information Assurance (1997-2004) -- Phase 2: Reporting and Analysis Center for Information Assurance (MELANI) (2004-2010) -- Phase 3: Consolidation and Cyber-Risk Strategy (2011-2014) -- Conclusion.
Record Nr. NYU-004450935
[Dunn Cavelty, Myriam, author]  
Materiale a stampa
Lo trovi qui: New York University
DDoS attacks : evolution, detection, prevention, reaction, and tolerance / Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita
DDoS attacks : evolution, detection, prevention, reaction, and tolerance / Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita
Creatore [Bhattacharyya, Dhruba Kumar, author]
Estensione 1 online resource
Disciplina 005.8
Accesso persona Kalita, Jugal Kumar, author
Genere/Forma Electronic books
ISBN 9781498729659
1498729657
9781498729642
1498729649
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Introduction -- 2. DDoS, machine learning, measures -- 3. Botnets : trends and challenges -- 4. DDoS detection -- 5. DDoS prevention -- 6. DDoS reaction and tolerance -- 7. Tools and systems -- 8. Conclusion and research challenges.
Record Nr. NYU-004699769
[Bhattacharyya, Dhruba Kumar, author]  
Materiale a stampa
Lo trovi qui: New York University
Digital watermarking : third international workshop, IWDW 2004, Seoul, Korea, October 30-November 1, 2004 : revised selected papers / Ingemar J. Cox, Ton Kalker, Heung-Kyu Lee (eds.).
Digital watermarking : third international workshop, IWDW 2004, Seoul, Korea, October 30-November 1, 2004 : revised selected papers / Ingemar J. Cox, Ton Kalker, Heung-Kyu Lee (eds.).
Estensione 1 online resource (ix, 306 pages) : figure, table.
Disciplina 005.8
Accesso persona Kalker, Ton.
Cox, I. J. (Ingemar J.)
Lee, Heung-Kyu
Accesso ente LINK (Online service)
Accesso convegno IWDW 2004 (3rd : 2004 : Seoul, Korea)
Genere/Forma Electronic books
Conference papers and proceedings
ISBN 3540248390
9783540248392
9783540318057
3540318054
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Lecture -- Reversible Data Hiding -- Fingerprinting Curves -- Informed Detection Revisited -- Session I: Systems -- A Counter-Geometric Distortions Data Hiding Scheme Using Double Channels in Color Images -- A Secure Internet-Based Personal Identity Verification System Using Lossless Watermarking and Fingerprint Recognition -- Better Use of Human Visual Model in Watermarking Based on Linear Prediction Synthesis Filter -- Watermarking System for QoS Aware Content Adaptation -- Session II: Theory -- Weighted Segmented Digital Watermarking -- Robust Estimation of Amplitude Modification for Scalar Costa Scheme Based Audio Watermark Detection -- Reversible Data Hiding Using Integer Wavelet Transform and Companding Technique -- Session III: Authentication and Stego -- Alteration-Locating Authentication Watermarking for Binary Images -- On Security Notions of Steganographic Systems -- A Multi-feature Based Invertible Authentication Watermarking for JPEG Images -- Steganographic Scheme Using a Block Cipher -- Watermarking Attack: Security of WSS Techniques -- Session IV: Cryptography -- Flaws in Generic Watermarking Protocols Based on Zero-Knowledge Proofs -- Cryptanalysis of a Wavelet Based Watermarking Scheme -- A Generalized Method for Constructing and Proving Zero-Knowledge Watermark Proof Systems -- Towards the Public but Noninvertible Watermarking -- A Generalization of an Anonymous Buyer-Seller Watermarking Protocol and Its Application to Mobile Communications -- Session V: Methods -- Robust Frequency Domain Audio Watermarking: A Tuning Analysis -- Watermarking Technique for Authentication of 3-D Polygonal Meshes -- Fidelity-Controlled Robustness Enhancement of Blind Watermarking Schemes Using Evolutionary Computational Techniques -- Robust Watermarking on Polygonal Meshes Using Distribution of Vertex Norms -- A Video Watermarking Using the 3-D Wavelet Transform and Two Perceptual Watermarks.
Record Nr. NYU-004604485
Materiale a stampa
Lo trovi qui: New York University
Trusted computing platforms : design and applications / Sean W. Smith
Trusted computing platforms : design and applications / Sean W. Smith
Creatore [Smith, Sean W., 1964-]
Estensione 1 online resource (xx, 239 pages) : illustrations
Disciplina 005.8
Genere/Forma Electronic books
ISBN 0387239170
9780387239170
0387239162
9780387239163
6610147876
9786610147878
9783662410158
366241015X
9787302131748
Classificazione TP309
54.62
54.32
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Preliminaries; Contents; List of Figures; List of Tables; Preface; Acknowledgments; 1. INTRODUCTION; 2. MOTIVATING SCENARIOS; 3. ATTACKS; 4. FOUNDATIONS; 5. DESIGN CHALLENGES; 6. PLATFORM ARCHITECTURE; 7. OUTBOUND AUTHENTICATION; 8. VALIDATION; 9. APPLICATION CASE STUDIES; 10. TCPA/TCG; 11. EXPERIMENTING WITH TCPA/TCG; 12. NEW HORIZONS; Glossary; References; About the Author; Index.
Record Nr. NYU-004604635
[Smith, Sean W., 1964-]  
Materiale a stampa
Lo trovi qui: New York University
Critical Information Infrastructures Security : 4th International Workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009, Revised Papers
Critical Information Infrastructures Security : 4th International Workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009, Revised Papers
Creatore [Rome, Erich, editor]
Estensione 1 online resource (xii, 213 pages).
Disciplina 005.8
Accesso persona Bloomfield, Robin, editor
Genere/Forma Conference papers and proceedings
ISBN 9783642143786
3642143784
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. NYU-004617632
[Rome, Erich, editor]  
Materiale a stampa
Lo trovi qui: New York University
Information security and privacy : 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13-15, 2004 : proceedings / Huaxiong Wang, Josef Pieprzyk, Vijay Varadharajan (eds.).
Information security and privacy : 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13-15, 2004 : proceedings / Huaxiong Wang, Josef Pieprzyk, Vijay Varadharajan (eds.).
Creatore [ACISP (Conference) (9th : 2004 : Sydney, N.S.W.)]
Estensione 1 online resource (xii, 494 pages) : illustrations.
Disciplina 005.8
Accesso persona Wang, Huaxiong
Pieprzyk, Josef, 1949-
Varadharajan, Vijay
Genere/Forma Electronic books
Conference papers and proceedings
ISBN 3540278001
9783540278009
3540223797
9783540223795
Classificazione 54.80
54.62
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. NYU-004604820
[ACISP (Conference) (9th : 2004 : Sydney, N.S.W.)]  
Materiale a stampa
Lo trovi qui: New York University
Information security and cryptology : 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015 ; proceedings / Dongdai Lin, XiaoFeng Wang, Moti Yung (eds.).
Information security and cryptology : 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015 ; proceedings / Dongdai Lin, XiaoFeng Wang, Moti Yung (eds.).
Creatore [Inscrypt (Conference) (11th : 2015 : Beijing, China)]
Estensione 1 online resource (xiii, 490 pages) : illustrations.
Disciplina 005.8
Accesso persona Lin, Dongdai, editor
Wang, Xiaofeng, 1971-editor
Yung, Moti, editor
Genere/Forma Electronic books
Conference papers and proceedings
ISBN 9783319388984
3319388983
9783319388977
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. NYU-004461832
[Inscrypt (Conference) (11th : 2015 : Beijing, China)]  
Materiale a stampa
Lo trovi qui: New York University