Search preferences
Vai alla pagina principale dei risultati di ricerca

Filtri di ricerca

Tipo di articolo

  • Tutti i tipi di prodotto 
  • Libri (10)
  • Riviste e Giornali (Nessun altro risultato corrispondente a questo perfezionamento)
  • Fumetti (Nessun altro risultato corrispondente a questo perfezionamento)
  • Spartiti (Nessun altro risultato corrispondente a questo perfezionamento)
  • Arte, Stampe e Poster (Nessun altro risultato corrispondente a questo perfezionamento)
  • Fotografie (Nessun altro risultato corrispondente a questo perfezionamento)
  • Mappe (Nessun altro risultato corrispondente a questo perfezionamento)
  • Manoscritti e Collezionismo cartaceo (Nessun altro risultato corrispondente a questo perfezionamento)

Condizioni Maggiori informazioni

  • Nuovo (8)
  • Come nuovo, Ottimo o Quasi ottimo (2)
  • Molto buono o Buono (Nessun altro risultato corrispondente a questo perfezionamento)
  • Discreto o Mediocre (Nessun altro risultato corrispondente a questo perfezionamento)
  • Come descritto (Nessun altro risultato corrispondente a questo perfezionamento)

Legatura

  • Tutte 
  • Rilegato (Nessun altro risultato corrispondente a questo perfezionamento)
  • Brossura (10)

Ulteriori caratteristiche

  • Prima ed. (Nessun altro risultato corrispondente a questo perfezionamento)
  • Copia autograf. (Nessun altro risultato corrispondente a questo perfezionamento)
  • Sovracoperta (Nessun altro risultato corrispondente a questo perfezionamento)
  • Con foto (8)
  • Non Print on Demand (7)

Lingua (1)

Prezzo

Fascia di prezzo personalizzata (EUR)

Spedizione gratuita

  • Spedizione gratuita in U.S.A. (Nessun altro risultato corrispondente a questo perfezionamento)

Paese del venditore

  • Bertino, Elisa

    Lingua: Inglese

    Editore: Springer, 2012

    ISBN 10: 303100762X ISBN 13: 9783031007620

    Da: GreatBookPrices, Columbia, MD, U.S.A.

    Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

    Contatta il venditore

    EUR 39,31

    Spedizione EUR 2,23
    Spedito in U.S.A.

    Quantità: Più di 20 disponibili

    Aggiungi al carrello

    Condizione: As New. Unread book in perfect condition.

  • Bertino, Elisa

    Lingua: Inglese

    Editore: Springer, 2012

    ISBN 10: 303100762X ISBN 13: 9783031007620

    Da: Ria Christie Collections, Uxbridge, Regno Unito

    Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

    Contatta il venditore

    EUR 36,63

    Spedizione EUR 13,75
    Spedito da Regno Unito a U.S.A.

    Quantità: Più di 20 disponibili

    Aggiungi al carrello

    Condizione: New. In English.

  • Bertino, Elisa

    Lingua: Inglese

    Editore: Springer, 2012

    ISBN 10: 303100762X ISBN 13: 9783031007620

    Da: GreatBookPrices, Columbia, MD, U.S.A.

    Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

    Contatta il venditore

    EUR 49,32

    Spedizione EUR 2,23
    Spedito in U.S.A.

    Quantità: Più di 20 disponibili

    Aggiungi al carrello

    Condizione: New.

  • Bertino, Elisa

    Lingua: Inglese

    Editore: Springer, 2012

    ISBN 10: 303100762X ISBN 13: 9783031007620

    Da: GreatBookPricesUK, Woodford Green, Regno Unito

    Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

    Contatta il venditore

    EUR 36,62

    Spedizione EUR 17,21
    Spedito da Regno Unito a U.S.A.

    Quantità: Più di 20 disponibili

    Aggiungi al carrello

    Condizione: New.

  • Bertino, Elisa

    Lingua: Inglese

    Editore: Springer, 2012

    ISBN 10: 303100762X ISBN 13: 9783031007620

    Da: GreatBookPricesUK, Woodford Green, Regno Unito

    Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

    Contatta il venditore

    EUR 42,86

    Spedizione EUR 17,21
    Spedito da Regno Unito a U.S.A.

    Quantità: Più di 20 disponibili

    Aggiungi al carrello

    Condizione: As New. Unread book in perfect condition.

  • Elisa Bertino

    Lingua: Inglese

    Editore: Springer International Publishing, 2012

    ISBN 10: 303100762X ISBN 13: 9783031007620

    Da: AHA-BUCH GmbH, Einbeck, Germania

    Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

    Contatta il venditore

    EUR 35,30

    Spedizione EUR 60,95
    Spedito da Germania a U.S.A.

    Quantità: 1 disponibili

    Aggiungi al carrello

    Taschenbuch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - As data represent a key asset for today's organizations, the problem of how to protect this data from theft and misuse is at the forefront of these organizations' minds. Even though today several data security techniques are available to protect data and computing infrastructures, many such techniques -- such as firewalls and network security tools -- are unable to protect data from attacks posed by those working on an organization's 'inside.' These 'insiders' usually have authorized access to relevant information systems, making it extremely challenging to block the misuse of information while still allowing them to do their jobs. This book discusses several techniques that can provide effective protection against attacks posed by people working on the inside of an organization. Chapter One introduces the notion of insider threat and reports some data about data breaches due to insider threats. Chapter Two covers authentication and access control techniques, and Chapter Three shows how these general security techniques can be extended and used in the context of protection from insider threats. Chapter Four addresses anomaly detection techniques that are used to determine anomalies in data accesses by insiders. These anomalies are often indicative of potential insider data attacks and therefore play an important role in protection from these attacks. Security information and event management (SIEM) tools and fine-grained auditing are discussed in Chapter Five. These tools aim at collecting, analyzing, and correlating -- in real-time -- any information and event that may be relevant for the security of an organization. As such, they can be a key element in finding a solution to such undesirable insider threats. Chapter Six goes on to provide a survey of techniques for separation-of-duty (SoD). SoD is an important principle that, when implemented in systems and tools, can strengthen data protection from malicious insiders. However, to date, very few approaches have been proposed for implementing SoD in systems. In Chapter Seven, a short survey of a commercial product is presented, which provides different techniques for protection from malicious users with system privileges -- such as a DBA in database management systems. Finally, in Chapter Eight, the book concludes with a few remarks and additional research directions. Table of Contents: Introduction / Authentication / Access Control / Anomaly Detection / Security Information and Event Management and Auditing / Separation of Duty / Case Study: Oracle Database Vault / Conclusion.

  • Elisa Bertino

    Lingua: Inglese

    Editore: Springer International Publishing, Springer International Publishing Jul 2012, 2012

    ISBN 10: 303100762X ISBN 13: 9783031007620

    Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania

    Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

    Contatta il venditore

    EUR 35,30

    Spedizione EUR 60,00
    Spedito da Germania a U.S.A.

    Quantità: 2 disponibili

    Aggiungi al carrello

    Taschenbuch. Condizione: Neu. Neuware -As data represent a key asset for today's organizations, the problem of how to protect this data from theft and misuse is at the forefront of these organizations' minds. Even though today several data security techniques are available to protect data and computing infrastructures, many such techniques -- such as firewalls and network security tools -- are unable to protect data from attacks posed by those working on an organization's 'inside.' These 'insiders' usually have authorized access to relevant information systems, making it extremely challenging to block the misuse of information while still allowing them to do their jobs. This book discusses several techniques that can provide effective protection against attacks posed by people working on the inside of an organization. Chapter One introduces the notion of insider threat and reports some data about data breaches due to insider threats. Chapter Two covers authentication and access control techniques, and Chapter Three shows how these general security techniques can be extended and used in the context of protection from insider threats. Chapter Four addresses anomaly detection techniques that are used to determine anomalies in data accesses by insiders. These anomalies are often indicative of potential insider data attacks and therefore play an important role in protection from these attacks. Security information and event management (SIEM) tools and fine-grained auditing are discussed in Chapter Five. These tools aim at collecting, analyzing, and correlating -- in real-time -- any information and event that may be relevant for the security of an organization. As such, they can be a key element in finding a solution to such undesirable insider threats. Chapter Six goes on to provide a survey of techniques for separation-of-duty (SoD). SoD is an important principle that, when implemented in systems and tools, can strengthen data protection from malicious insiders. However, to date, very few approaches have been proposed for implementing SoD in systems. In Chapter Seven, a short survey of a commercial product is presented, which provides different techniques for protection from malicious users with system privileges -- such as a DBA in database management systems. Finally, in Chapter Eight, the book concludes with a few remarks and additional research directions. Table of Contents: Introduction / Authentication / Access Control / Anomaly Detection / Security Information and Event Management and Auditing / Separation of Duty / Case Study: Oracle Database Vault / ConclusionSpringer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 92 pp. Englisch.

  • Bertino, Elisa

    Lingua: Inglese

    Editore: Springer, 2012

    ISBN 10: 303100762X ISBN 13: 9783031007620

    Da: Brook Bookstore On Demand, Napoli, NA, Italia

    Valutazione del venditore 4 su 5 stelle 4 stelle, Maggiori informazioni sulle valutazioni dei venditori

    Contatta il venditore

    Print on Demand

    EUR 32,62

    Spedizione EUR 4,00
    Spedito da Italia a U.S.A.

    Quantità: Più di 20 disponibili

    Aggiungi al carrello

    Condizione: new. Questo è un articolo print on demand.

  • Elisa Bertino

    Lingua: Inglese

    Editore: Springer International Publishing Jul 2012, 2012

    ISBN 10: 303100762X ISBN 13: 9783031007620

    Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania

    Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

    Contatta il venditore

    Print on Demand

    EUR 35,30

    Spedizione EUR 23,00
    Spedito da Germania a U.S.A.

    Quantità: 2 disponibili

    Aggiungi al carrello

    Taschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -As data represent a key asset for today's organizations, the problem of how to protect this data from theft and misuse is at the forefront of these organizations' minds. Even though today several data security techniques are available to protect data and computing infrastructures, many such techniques -- such as firewalls and network security tools -- are unable to protect data from attacks posed by those working on an organization's 'inside.' These 'insiders' usually have authorized access to relevant information systems, making it extremely challenging to block the misuse of information while still allowing them to do their jobs. This book discusses several techniques that can provide effective protection against attacks posed by people working on the inside of an organization. Chapter One introduces the notion of insider threat and reports some data about data breaches due to insider threats. Chapter Two covers authentication and access control techniques, and Chapter Three shows how these general security techniques can be extended and used in the context of protection from insider threats. Chapter Four addresses anomaly detection techniques that are used to determine anomalies in data accesses by insiders. These anomalies are often indicative of potential insider data attacks and therefore play an important role in protection from these attacks. Security information and event management (SIEM) tools and fine-grained auditing are discussed in Chapter Five. These tools aim at collecting, analyzing, and correlating -- in real-time -- any information and event that may be relevant for the security of an organization. As such, they can be a key element in finding a solution to such undesirable insider threats. Chapter Six goes on to provide a survey of techniques for separation-of-duty (SoD). SoD is an important principle that, when implemented in systems and tools, can strengthen data protection from malicious insiders. However, to date, very few approaches have been proposed for implementing SoD in systems. In Chapter Seven, a short survey of a commercial product is presented, which provides different techniques for protection from malicious users with system privileges -- such as a DBA in database management systems. Finally, in Chapter Eight, the book concludes with a few remarks and additional research directions. Table of Contents: Introduction / Authentication / Access Control / Anomaly Detection / Security Information and Event Management and Auditing / Separation of Duty / Case Study: Oracle Database Vault / Conclusion 92 pp. Englisch.

  • Bertino, Elisa

    Lingua: Inglese

    Editore: Springer, Berlin|Springer International Publishing|Morgan & Claypool|Springer, 2012

    ISBN 10: 303100762X ISBN 13: 9783031007620

    Da: moluna, Greven, Germania

    Valutazione del venditore 4 su 5 stelle 4 stelle, Maggiori informazioni sulle valutazioni dei venditori

    Contatta il venditore

    Print on Demand

    EUR 32,69

    Spedizione EUR 48,99
    Spedito da Germania a U.S.A.

    Quantità: Più di 20 disponibili

    Aggiungi al carrello

    Condizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. As data represent a key asset for today s organizations, the problem of how to protect this data from theft and misuse is at the forefront of these organizations minds. Even though today several data security techniques are available to protect data and co.