top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalit√† di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Firewalls don't stop dragons : a step-by-step guide to computer security for non-techies / Carey Parker
Firewalls don't stop dragons : a step-by-step guide to computer security for non-techies / Carey Parker
Creatore [Parker, Carey, author]
Edizione [Third edition.]
Estensione 1 online resource.
Disciplina 005.8
Genere/Forma Electronic books
ISBN 9781484238523
1484238524
9781484238516
1484238516
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro; Table of Contents; About the Author; About the Technical Reviewer; Preface; Chapter 1: Before We Begin; "How Worried Should I Be?"; Threat Analysis; Indirect Threats; Privacy vs. Security; Summary; How to Use This Book; Reader Prerequisites; Operating Systems Covered; Navigating the Checklists; Tip 1-1. Simple Tip; Tip 1-2. Tip with Steps; Tip 1-3. Tip with Variations; Tip 1-3a. Microsoft Windows 7; Tip 1-3b. Microsoft Windows 8.1/10; Tip 1-3c. Mac OS; Web Addresses and Staying Up-to-Date; Always Go to the Source; Feedback Welcome; Spread the Word; Not So Fast
Chapter 2: Cybersecurity 101Here Be Dragons; I Dub Thee...; Prevention, Detection, and Recovery; Computer Lingo; Hardware and Software; File Manager; Bits and Bytes; Storage; Networks (Wired and Wireless); Bandwidth; Bluetooth; Clients and Servers; The Cloud; Net Neutrality; The Internet of Things; Know Your Enemy; Malware; Hardware Bugs; Exploit; How the Internet Works; Tools of the Trade; Encryption and Cryptanalysis; Modern Cryptography; Authentication and Message Integrity; Triple-A; Newer Isn't Always Better; Privacy and Tracking; Who Can You Trust?; Summary; Checklist
Tip 2-1. Know ThyselfTip 2-2. Know What They Know; Chapter 3: The Three Ups: Back Up, Clean Up, and Update; Backups; Spring Cleaning; Update Everything; Summary; Checklist; Operating System Configuration; Microsoft Windows 7; Microsoft Windows 8.1; Microsoft Windows 10; Mac OS; Tip 3-1. Back Up to an External Drive; Buy an External Hard Drive; Connect the Drive to Your Computer; Configure Your Backup; Tip 3-1a. Microsoft Windows 7; Tip 3-1b. Microsoft Windows 8.1; Tip 3-1c. Microsoft Windows 10; Tip 3-1d. Mac OS; Tip 3-2. Back Up to the Cloud; Tip 3-3. Buy a UPS; Tip 3-4. Clean Up Your Apps
Tip 3-4a. Microsoft Windows 7Tip 3-4b. Microsoft Windows 8.1; Tip 3-4c. Microsoft Windows 10; Tip 3-4d. Mac OS; Update Everything; Tip 3-5. Turn On Auto-Update for Your OS; Tip 3-5a. Microsoft Windows 7; Tip 3-5b. Microsoft Windows 8.1; Tip 3-5c. Microsoft Windows 10; Tip 3-5d. Mac OS; Tip 3-6. Update Adobe Flash (If You Really Need It); Tip 3-7. Update Java (If You Really Need It); Chapter 4: Passwords; How Did We Get Here?; Understanding Password Strength; Managing Your Passwords; Choosing a Master Password; Doing the Two-Step; Periodically Changing Passwords; Summary; Checklist
Tip 4-1. Choose a Strong Master PasswordTip 4-2. Install LastPass on Your Computer; Tip 4-3. Install the LastPass App on Your Smartphone; Tip 4-4. Enable Two-Factor Authentication; Tip 4-5. Disallow LastPass Login from Foreign Countries; Tip 4-6. Create Some One-Time Passwords; Tip 4-7. Disable Password Saving on Your Browser; Tip 4-8. Perform a Security Check in LastPass; Tip 4-9. Generate Strong Passwords for Key Accounts; Tip 4-10. Use LastPass to Store Secure Notes; Tip 4-11. Generate and Store Offline Passwords; Tip 4-12. Use Throwaway Accounts; Chapter 5: Computer Security
Record Nr. NYU-006356262
[Parker, Carey, author]  
Materiale a stampa
Lo trovi qui: New York University
DNS security management / Michael Dooley, Timothy Rooney
DNS security management / Michael Dooley, Timothy Rooney
Creatore [Dooley, Michael (Computer scientist), author]
Estensione 1 online resource : illustrations.
Disciplina 005.8
Accesso persona Rooney, Tim, author
Genere/Forma Electronic books
ISBN 9781119328292
1119328292
9781119331407
1119331404
9781119331391
1119331390
9781119328278
1119328276
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto DNS Security Management; Contents; Preface; Acknowledgments; 1 Introduction; Why Attack DNS?; Network Disruption; DNS as a Backdoor; DNS Basic Operation; Basic DNS Data Sources and Flows; DNS Trust Model; DNS Administrator Scope; Security Context and Overview; Cybersecurity Framework Overview; Framework Implementation; Whats Next; 2 Introduction to the Domain Name System (DNS); DNS Overview -- Domains and Resolution; Domain Hierarchy; Name Resolution; Zones and Domains; Dissemination of Zone Information; Additional Zones; Resolver Configuration; Summary; 3 DNS Protocol and Messages
DNS Message FormatEncoding of Domain Names; Name Compression; Internationalized Domain Names; DNS Message Format; DNS Update Messages; The DNS Resolution Process Revisited; DNS Resolution Privacy Extension; Summary; 4 DNS Vulnerabilities; Introduction; DNS Data Security; DNS Information Trust Model; DNS Information Sources; DNS Risks; DNS Infrastructure Risks and Attacks; DNS Service Availability; Hardware/OS Attacks; DNS Service Denial; Pseudorandom Subdomain Attacks; Cache Poisoning Style Attacks; Authoritative Poisoning; Resolver Redirection Attacks; Broader Attacks that Leverage DNS
Network ReconnaissanceDNS Rebinding Attack; Reflector Style Attacks; Data Exfiltration; Advanced Persistent Threats; Summary; 5 DNS Trust Sectors; Introduction; Cybersecurity Framework Items; Identify; Protect; Detect; DNS Trust Sectors; External DNS Trust Sector; Basic Server Configuration; DNS Hosting of External Zones; External DNS Diversity; Extranet DNS Trust Sector; Recursive DNS Trust Sector; Tiered Caching Servers; Basic Server Configuration; Internal Authoritative DNS Servers; Basic Server Configuration; Additional DNS Deployment Variants; Internal Delegation DNS Master/Slave Servers
Multi-Tiered Authoritative ConfigurationsHybrid Authoritative/Caching DNS Servers; Stealth Slave DNS Servers; Internal Root Servers; Deploying DNS Servers with Anycast Addresses; Other Deployment Considerations; High Availability; Multiple Vendors; Sizing and Scalability; Load Balancers; Lab Deployment; Putting It All Together; 6 Security Foundation; Introduction; Hardware/Asset Related Framework Items; Identify: Asset Management; Identify: Business Environment; Identify: Risk Assessment; Protect: Access Control; Protect: Data Security; Protect: Information Protection; Protect: Maintenance
Detect: Anomalies and EventsDetect: Security Continuous Monitoring; Respond: Analysis; Respond: Mitigation; Recover: Recovery Planning; Recover: Improvements; DNS Server Hardware Controls; DNS Server Hardening; Additional DNS Server Controls; Summary; 7 Service Denial Attacks; Introduction; Denial of Service Attacks; Pseudorandom Subdomain Attacks; Reflector Style Attacks; Detecting Service Denial Attacks; Denial of Service Protection; DoS/DDoS Mitigation; Bogus Queries Mitigation; PRSD Attack Mitigation; Reflector Mitigation; Summary; 8 Cache Poisoning Defenses; Introduction; Attack Forms
Record Nr. NYU-005387104
[Dooley, Michael (Computer scientist), author]  
Materiale a stampa
Lo trovi qui: New York University
IIH-MSP 2008 : 2008 Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing : 15-17 August 2008, Harbin, China / editors, Jeng-Shyang Pan ... [et al. ; sponsored by] IEEE Computer Society
IIH-MSP 2008 : 2008 Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing : 15-17 August 2008, Harbin, China / editors, Jeng-Shyang Pan ... [et al. ; sponsored by] IEEE Computer Society
Creatore [International Conference on Intelligent Information Hiding and Multimedia Signal Processing (4th : 2008 : Harbin Shi, China)]
Estensione 1 online resource (xxxiv, 1572 pages) : illustrations
Accesso persona Pan, Jeng-Shyang
Genere/Forma Conference papers and proceedings
ISBN 9780769532783
0769532780
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. NYU-005364444
[International Conference on Intelligent Information Hiding and Multimedia Signal Processing (4th : 2008 : Harbin Shi, China)]  
Materiale a stampa
Lo trovi qui: New York University
Proceedings, International Conference on Availability, Reliability and Security : ARES 2009 : 16-19 March 2009, Fukuoka, Fukuoka Prefecture, Japan
Proceedings, International Conference on Availability, Reliability and Security : ARES 2009 : 16-19 March 2009, Fukuoka, Fukuoka Prefecture, Japan
Creatore [International Conference on Availability, Security, and Reliability (4th : 2009 : Fukuoka-shi, Japan)]
Estensione 1 online resource (lxxx, 1036 pages) : illustrations (some color)
Genere/Forma Conference papers and proceedings
ISBN 9780769535647
076953564X
9781424435722
1424435722
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. NYU-005365579
[International Conference on Availability, Security, and Reliability (4th : 2009 : Fukuoka-shi, Japan)]  
Materiale a stampa
Lo trovi qui: New York University
5th International Conference on IT Security Incident Management & IT Forensics : IMF 2009 : proceedings : 15-17 September 2009, Stuttgart, Germany / editors, Oliver Goebel [and others]
5th International Conference on IT Security Incident Management & IT Forensics : IMF 2009 : proceedings : 15-17 September 2009, Stuttgart, Germany / editors, Oliver Goebel [and others]
Creatore [International Conference on IT Security Incident Management & IT Forensics (5th : 2009 : Stuttgart, Germany)]
Estensione 1 online resource (169 pages) : illustrations
Genere/Forma Conference papers and proceedings
ISBN 9780769538075
076953807X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. NYU-005365724
[International Conference on IT Security Incident Management & IT Forensics (5th : 2009 : Stuttgart, Germany)]  
Materiale a stampa
Lo trovi qui: New York University
Computer forensics with FTK / Fernando Carbone
Computer forensics with FTK / Fernando Carbone
Creatore [Carbone, Fernando]
Estensione 1 online resource : illustrations
Disciplina 005.8
Genere/Forma Electronic books
ISBN 9781783559039
1783559039
1306531136
9781306531139
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Getting started with computer forensics using FTK -- Working with FTK imager -- Working with registry view -- Working with FTK forensics -- Processing the case -- New features of FTK 5 -- Working with PRTK.
Record Nr. NYU-004306602
[Carbone, Fernando]  
Materiale a stampa
Lo trovi qui: New York University
Advances in Cryptology -- CRYPTO' 93 [electronic resource] : 13th Annual International Cryptology Conference Santa Barbara, California, USA August 22-26, 1993 Proceedings / edited by Douglas R. Stinson
Advances in Cryptology -- CRYPTO' 93 [electronic resource] : 13th Annual International Cryptology Conference Santa Barbara, California, USA August 22-26, 1993 Proceedings / edited by Douglas R. Stinson
Creatore [Stinson, Douglas R.]
Estensione 1 online resource : v.: digital.
Disciplina 005.82
Genere/Forma Electronic books
ISBN 9783540483298
3540483292
9783540577669
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptosystems -- Efficient Signature Schemes Based on Birational Permutations -- A new identification scheme based on syndrome decoding -- The Shrinking Generator -- Stream Ciphers and Cryptographic Functions -- An Integrity Check Value Algorithm for Stream Ciphers -- Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics -- Proof Systems and Zero-knowledge -- A Low Communication Competitive Interactive Proof System for Promised Quadratic Residuosity -- Secret Sharing and Perfect Zero Knowledge -- One Message Proof Systems with Known Space Verifiers -- Interactive Hashing can Simplify Zero-Knowledge Protocol Design Without Computational Assumptions -- Secret Sharing -- Fully Dynamic Secret Sharing Schemes -- Multisecret Threshold Schemes -- Secret Sharing Made Short -- Number Theory and Algorithms -- A Subexponential Algorithm for Discrete Logarithms over All Finite Fields -- An implementation of the general number field sieve -- On the factorization of RSA-120 -- Comparison of three modular reduction functions -- Differential Cryptanalysis -- Differential Cryptanalysis of Lucifer -- Differential Attack on Message Authentication Codes -- Cryptanalysis of the CFB mode of the DES with a reduced number of rounds -- Weak Keys for IDEA -- Complexity Theory -- Entity Authentication and Key Distribution -- On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures -- Joint Encryption and Message-Efficient Secure Computation -- Cryptographic Primitives Based on Hard Learning Problems -- Applications -- Extensions of Single-term Coins -- Untraceable Off-line Cash in Wallet with Observers -- Discreet Solitary Games -- Authentication Codes -- On Families of Hash Functions via Geometric Codes and Concatenation -- On the Construction of Perfect Authentication Codes that Permit Arbitration -- Codes for Interactive Authentication -- Hash Functions -- Hash functions based on block ciphers: a synthetic approach -- Security of Iterated Hash Functions Based on Block Ciphers -- Cryptanalysis -- Improved Algorithms for the Permuted Kernel Problem -- On the Distribution of Characteristics in Composite Permutations -- Remark on the Threshold RSA Signature Scheme -- Another Method for Attaining Security Against Adaptively Chosen Ciphertext Attacks -- Attacks on the Birational Permutation Signature Schemes -- Key Distribution -- Interaction in Key Distribution Schemes -- Secret-Key Agreement without Public-Key Cryptography -- Broadcast Encryption.
Record Nr. NYU-004390242
[Stinson, Douglas R.]  
Materiale a stampa
Lo trovi qui: New York University
Expert Oracle application express security [electronic resource] / Scott Spendolini
Expert Oracle application express security [electronic resource] / Scott Spendolini
Creatore [Spendolini, Scott]
Estensione 1 online resource.
Disciplina 005.8
Genere/Forma Electronic books
ISBN 9781430247326
1430247320
9781430247319
1430247312
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Threat Analysis -- Implementing a Security Plan -- APEX Architecture -- Instance Settings -- Workspace Settings -- Application Settings -- Application Threats -- User Authentication -- User Authorization -- Secure Export to CSV -- Secure Views -- Virtual Private Database -- Shadow Schema -- Encryption.
Record Nr. NYU-004420363
[Spendolini, Scott]  
Materiale a stampa
Lo trovi qui: New York University
Building in Big Brother [electronic resource] : the Cryptographic Policy Debate / edited by Lance J. Hoffman
Building in Big Brother [electronic resource] : the Cryptographic Policy Debate / edited by Lance J. Hoffman
Creatore [Hoffman, Lance J.]
Estensione 1 online resource (XVI, 560 pages)
Disciplina 005.82
Genere/Forma Electronic books
ISBN 9781461225249
1461225248
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto I Background -- 1 Cryptography (From Julius Caesar through Public Key Cryptosystems): Methods to Keep Secrets Secret -- 2 Key Escrow Cryptosystems: Keeping Secrets Secret Except When ... -- II Current Government Policy -- 3 The U.S. Government Policy Solution: Key Escrow Cryptosystems, Policies, Procedures, and Legislation -- 4 The Policy Debate: How Controlled a Global Information Infrastructure do We Want, and Who Decides? -- III Aspects of Cryptographic Policy -- 5 Law Enforcement: What Does It Cost to Commit a Perfect Crime? -- 6 Civil Liberties: Safeguarding Privacy (and More) in a Digital, Tappable Age -- 7 Export Policy: Prudent Controls in a Risky World or Making the World Safe for Foreign Competition? -- Afterword -- List of Acronyms.
Record Nr. NYU-004392253
[Hoffman, Lance J.]  
Materiale a stampa
Lo trovi qui: New York University
Security and privacy in communication networks : 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, revised selected papers / Tanveer Zia, Albert Zomaya, Vijay Varadharajan, Morley Mao (eds.).
Security and privacy in communication networks : 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, revised selected papers / Tanveer Zia, Albert Zomaya, Vijay Varadharajan, Morley Mao (eds.).
Creatore [SecureComm (Conference) (9th : 2013 : Sydney, N.S.W.)]
Estensione 1 online resource (xi, 420 pages) : illustrations.
Disciplina 005.8
Accesso persona Zia, Tanveer, editor
Zomaya, Albert Y., editor.
Varadharajan, Vijay, editor
Mao, Morley, editor
Genere/Forma Electronic books
Conference papers and proceedings
ISBN 9783319042831
3319042831
3319042823
9783319042824
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Session I: Security & Privacy in Mobile, Sensor, and Ad Hoc Networks -- Anomaly Detection in Beacon-Enabled IEEE 802.15.4 Wireless Sensor Networks / Eirini Karapistoli, Anastasios A. Economides -- Secure and Verifiable Top-k Query in Two-Tiered Sensor Networks / Ting Zhou, Yaping Lin, Wei Zhang, Sheng Xiao, Jinguo Li -- CamTalk: A Bidirectional Light Communications Framework for Secure Communications on Smartphones / Mengjun Xie, Liang Hao, Kenji Yoshigoe, Jiang Bian.
Session II: Malware, Botnets, and Distributed Denial of Service -- Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets / Cui Xiang, Fang Binxing, Shi Jinqiao, Liu Chaoge -- Contrasting Permission Patterns between Clean and Malicious Android Applications / Veelasha Moonsamy, Jia Rong, Shaowu Liu, Gang Li, Lynn Batten -- DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android / Yousra Aafer, Wenliang Du, Heng Yin
Session III: Security for Emerging Technologies: VoIP, Peer-to-peer, and Cloud Computing -- Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation / Ryan Farley, Xinyuan Wang -- VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing / Jun Jiang, Meining Nie, Purui Su, Dengguo Feng -- Integrated Security Architecture for Virtual Machines / Vijay Varadharajan, Udaya Tupakula.
Session IV: Encryption and Key Management -- Generic Mediated Encryption / Ibrahim Elashry, Yi Mu, Willy Susilo -- An Efficient Reconfigurable II-ONB Modular Multiplier / Li Miao, He Liangsheng, Yang Tongjie, Gao Neng, Liu Zongbin, Zhang Qinglong -- Public-Key Encryption Resilient to Linear Related-Key Attacks / Hui Cui, Yi Mu, Man Ho Au.
Session V: Security in Software and Machine Learning -- Clonewise -- Detecting Package-Level Clones Using Machine Learning / Silvio Cesare, Yang Xiang, Jun Zhang -- Automatic Polymorphic Exploit Generation for Software Vulnerabilities / Minghua Wang, Purui Su, Qi Li, Lingyun Ying, Yi Yang, Dengguo Feng.
Session VI: Network and System Security Model -- A Novel Web Tunnel Detection Method Based on Protocol Behaviors / Fei Wang, Liusheng Huang, Zhili Chen, Haibo Miao, Wei Yang -- Salus: Non-hierarchical Memory Access Rights to Enforce the Principle of Least Privilege / Niels Avonds, Raoul Strackx, Pieter Agten, Frank Piessens -- Scalable Security Model Generation and Analysis Using k-importance Measures / Jin B. Hong, Dong Seong Kim.
Session VII: Security and Privacy in Pervasive and Ubiquitous Computing -- The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems / Mehari Msgna, Konstantinos Markantonakis, Keith Mayes -- An e-payment Architecture Ensuring a High Level of Privacy Protection / Aude Plateaux, Patrick Lacharme, Vincent Coquet, Sylvain Vernois, Kumar Murty [and others] -- Unveiling Privacy Setting Breaches in Online Social Networks / Xin Ruan, Chuan Yue, Haining Wang.
ATIS 2013: 4th International Workshop on Applications and Techniques in Information Security -- Securing a Web-Based Anti-counterfeit RFID System / Belal Chowdhury, Morshed Chowdhury, Jemal Abawajy -- Security Concerns and Remedy in a Cloud Based E-learning System / Md. Anwar Hossain Masud, Md. Rafiqul Islam, Jemal Abawajy -- Ensuring Data Integrity by Anomaly Node Detection during Data Gathering in WSNs / Quazi Mamun, Rafiqul Islam, Mohammed Kaosar -- (k -- n) Oblivious Transfer Using Fully Homomorphic Encryption System / Mohammed Kaosar, Quazi Mamun, Rafiqul Islam, Xun Yi -- Detection of Android API Call Using Logging Mechanism within Android Framework / Yuuki Nishimoto, Naoya Kajiwara, Shinichi Matsumoto, Yoshiaki Hori, Kouichi Sakurai -- Reversible Data Hiding Scheme Based on 3-Least Significant Bits and Mix Column Transform / Wafaa Mustafa Abduallah, Abdul Monem S. Rahma, Al-Sakib Khan Pathan.
Record Nr. NYU-004443089
[SecureComm (Conference) (9th : 2013 : Sydney, N.S.W.)]  
Materiale a stampa
Lo trovi qui: New York University