//
|
Certificazioni Professionali in Sicurezza Informatica 2.pdf
|
1.2 MB
|
Thumbs.db
|
23.0 KB
|
Certificazioni Professionali in Sicurezza Informatica 1.pdf
|
566.5 KB
|
//2004 RSA/
|
Performance and Security- How to Have Both.pdf
|
564.2 KB
|
Penetration Testing.pdf
|
119.9 KB
|
Password Alternatives for Mobile Devices.pdf
|
855.2 KB
|
Perimeter What Perimeter.pdf
|
479.7 KB
|
Practical Privacy- Effectively Complying with Privacy Regulations in a Business Environment.pdf
|
362.7 KB
|
Proactive and Reactive Security- What's the Best Mix.pdf
|
1.7 MB
|
Padding Oracle Attacks on the ISO CBC Mode Encryption Standard.pdf
|
1.0 MB
|
Periodic Properties of Counter Assisted Stream Ciphers.pdf
|
553.0 KB
|
Nota 2004.zip
|
144.6 MB
|
NIH-Educause PKI Interoperability- Phase 3.pdf
|
1.3 MB
|
NGSCB- A Trusted Open Platform.pdf
|
1.0 MB
|
Multi-Vendor Security Management.pdf
|
4.1 MB
|
Network Identity- Unlocking the Value of Web Services.pdf
|
1.6 MB
|
No Parking Anytime - Protecting Your Wireless Access Point from War Driving.pdf
|
3.2 MB
|
Now You See It, Now You DonÆt- Computer Forensics, Incident Response, and Compliance.pdf
|
917.6 KB
|
Protecting Against a New breed of Web Services Attacks û Balancing Threat vs. Trust.pdf
|
738.1 KB
|
On-line Encryption Schemes New Security Notions and Constructions.pdf
|
790.8 KB
|
Rapid Risk Response, When Hackers are Mobilizing for Imminent Attack.pdf
|
1.2 MB
|
Secure System Development.pdf
|
841.4 KB
|
Scalable and Flexible Hardware Design for RSA and Elliptic Curve.pdf
|
442.1 KB
|
Sarbanes-Oxley- What it Means to Your Security Program.pdf
|
1.6 MB
|
Secure Wireless LAN.pdf
|
8.8 MB
|
Secure Your Perimeter in the Perimeterless Web Services World.pdf
|
289.5 KB
|
Securing Federal Information Systems and BeyondùNIST's Key Contributions.pdf
|
1.4 MB
|
Securing Critical Infrastructure Against Cyber Threat.pdf
|
1.5 MB
|
SSL-Based Reverse Proxy Access (SSL VPN)- Network Security at the Application Layer.pdf
|
2.8 MB
|
SPML - a New Standard for Provisioning.pdf
|
577.5 KB
|
Real World Identity & Access Management Strategies.pdf
|
331.1 KB
|
Multi-Programmable Smart Cards- Navigating Federal Cryptographic Standards.pdf
|
1.9 MB
|
Regulating Information Security- Lessons from HIPAA.pdf
|
135.2 KB
|
Related-key Attacks on Triple-DES and DESX Variants.pdf
|
563.4 KB
|
SIP Security for Voice, Video and Instant Messaging Networks.pdf
|
1.4 MB
|
SAML 2.0- What Is It and How Does It Integrate Liberty ID-FF.pdf
|
541.4 KB
|
Protecting Your Messaging Stream with an Email Firewall.pdf
|
815.8 KB
|
Making the Most of your Credentials.pdf
|
574.0 KB
|
Improving Robustness of PGP Keyrings by Conflict Detection.pdf
|
399.4 KB
|
Implementing a Decade's Worth of Technology Update in a Quarter.pdf
|
767.6 KB
|
Implementing In-Person Identity Proofing in a Large Federal Agency.pdf
|
1.0 MB
|
Incident Response- Bracing for Anything.pdf
|
438.6 KB
|
Information Security Risk Metrics- How to Quantitatively Assess Applications.pdf
|
499.9 KB
|
Integrating Security into Enterprise Applications using SAML (Security Assertion Markup Language).pdf
|
476.8 KB
|
Inside the Mind of a Spammer- The Making of an Email Menace.pdf
|
965.2 KB
|
Identity Based Undeniable Signatures.pdf
|
444.9 KB
|
IP-Intelligence- A New Line of Defense in Online Security.pdf
|
444.7 KB
|
How to Augment Security Defense-in-depth with Network Anomaly Detection.pdf
|
2.3 MB
|
Hot Topics in Information Security Law 2004- An Update of the Work of the American Bar Association.pdf
|
5.7 MB
|
How to Break Software Security- Practical Security Testing.pdf
|
421.4 KB
|
How to Build SAML Enforcement into Your SOAP Handler.pdf
|
770.1 KB
|
How to Think Like a Cryptographer.pdf
|
1.1 MB
|
How to Build an Enterprise Security Architecture for Mobile Handheld Devices.pdf
|
536.3 KB
|
Interoperable Single Sign-On- Project Liberty in the Real World.pdf
|
1.1 MB
|
Investors' Appetite for Internet Security Firms- What Makes Their Mouths Water.pdf
|
508.3 KB
|
Layer 3 Routing and Enterprise Network Security.pdf
|
1.0 MB
|
LDAP Injection - Are your Applications Vulnerable.pdf
|
378.1 KB
|
Keys To Securing Web Services.pdf
|
2.3 MB
|
Letting the Good Guys In- From SPAM Filters to Trusted Messaging.pdf
|
1.0 MB
|
M&A Benchmarks- Valuation, Negotiation and Alternatives.pdf
|
486.8 KB
|
Securing the Critical DNS Infrastructure.pdf
|
1.1 MB
|
Making Sense of User Authentication- the Authentication Scorecard for 2003.pdf
|
2.5 MB
|
Key Management Framework.pdf
|
5.4 MB
|
Key Management & Cardholder Authentication in the Card Payments Industry - Trends and Techniques.pdf
|
862.7 KB
|
Islands of Defense û Closing the Security Gap.pdf
|
1.1 MB
|
Is It Safe Yet.pdf
|
535.4 KB
|
Issues of Security with the Oswald-Aigner Exponentiation Algorithm.pdf
|
579.1 KB
|
It Wasn't Me! My Wireless Network Did It! Potential Liability When Your Wireless Network is Compromised.pdf
|
936.7 KB
|
Keeping Tabs on Network Rogues.pdf
|
924.2 KB
|
Java Card Security.pdf
|
579.0 KB
|
Moving Network Security From Negative to Positive.pdf
|
431.4 KB
|
Security Applications Integration with OpenCryptoki - Open-source PKCS 11 Implementation.pdf
|
425.2 KB
|
Tsunami! Web Services Ahead.pdf
|
1.8 MB
|
Trusted Timestamping - Truth or Consequences.pdf
|
269.5 KB
|
Trusted Computing Group (TCG) Specifications and Credentials- A Developer's Overview.pdf
|
655.9 KB
|
Understanding Security Threat Models- A Risk-based Approach.pdf
|
304.2 KB
|
Understanding the Gartner Information Security Hype Cycle.pdf
|
691.3 KB
|
Using AES and Other Ciphers in Java.pdf
|
694.8 KB
|
Universal Re-encryption for Mixnets.pdf
|
2.2 MB
|
Trust Governance in a Web Services World.pdf
|
62.6 KB
|
Trends in Security Technology Project Spending.pdf
|
488.6 KB
|
The Virtue of Secure Software on Homeland Security.pdf
|
348.9 KB
|
The Threats of the Future.pdf
|
493.1 KB
|
The State of the Art in High Speed Intrusion Prevention.pdf
|
932.5 KB
|
Time and Content Authentication to Enhance Identity.pdf
|
576.5 KB
|
Top 10 Infosec Challenge.pdf
|
586.6 KB
|
Traps for the Unwary- The Other Information Security Laws.pdf
|
129.6 KB
|
Total Recall- California Law Leads the Way Again.pdf
|
1.3 MB
|
Using a Directory Infrastructure to Create a XKMS, SAML, XACML and UDDI Backbone for Web Services.pdf
|
841.1 KB
|
Vulnerabilities, Threats, and Countermeasures in Windows Server 2003.pdf
|
1.7 MB
|
X509 Certificate support in the .NET Framework.pdf
|
302.2 KB
|
Who's Watching Your Real World Device Network.pdf
|
727.4 KB
|
What Hackers Know about Wireless LANS and How to Secure Them.pdf
|
6.5 MB
|
XACML= Scalable Access Control.pdf
|
328.9 KB
|
Yet Another Sieving Device.pdf
|
344.4 KB
|
k-Resilient Identity-Based Encryption in the Standard Model.pdf
|
405.2 KB
|
developer basic.pdf
|
192.2 KB
|
Web Services û Paving the Way for Broad Adoption.pdf
|
1.9 MB
|
Web Services Security- Sorting out Standards Overload for Practical XML Security.pdf
|
1.0 MB
|
Weak Fields for ECC.pdf
|
347.0 KB
|
WLANs- Ready to Roll Out.pdf
|
422.3 KB
|
Web Hacking Live.pdf
|
995.2 KB
|
Web Services Attacks û Are You Vulnerable Already.pdf
|
501.0 KB
|
Web Services Security, Choreography and Management - Can They Dance Together.pdf
|
1.7 MB
|
Web Services Security - Moving up the Stack.pdf
|
294.9 KB
|
The Spyware Wars-Next Real Threat After Viruses Have Been Conquered.pdf
|
2.0 MB
|
The Security Quagmire- How Can a Business Comply.pdf
|
644.6 KB
|
Self-Protecting Digital Content.pdf
|
3.2 MB
|
Selected Patch Management Strategies.pdf
|
542.5 KB
|
Security in Storage Standards- Recent Developments.pdf
|
942.4 KB
|
Self-Randomized Exponentiation Algorithms.pdf
|
363.7 KB
|
Server Assisted Signatures Revisited.pdf
|
437.1 KB
|
Social Engineering.pdf
|
315.2 KB
|
Smart Security Through Network Behavior Analysis- Mazu Profiler and Network Traffic Intelligence.pdf
|
2.2 MB
|
Security for Wireless Networking.pdf
|
399.1 KB
|
Security at Microsoft.pdf
|
5.1 MB
|
Hot Practice or Hot Water. Information Security Ethics Issues in Modern Law Practice.pdf
|
583.0 KB
|
Securing your Assets- TODAY!.pdf
|
1.2 MB
|
Security Implications of IPv6.pdf
|
1.3 MB
|
Security Intelligence- The Cornerstone of Effective Security Management and Control.pdf
|
3.7 MB
|
Security and the Resilient Enterprise.pdf
|
545.7 KB
|
Security Standards to Meet HIPAA.pdf
|
337.5 KB
|
Spam- A Growing Security Risk in the Enterprise.pdf
|
1.6 MB
|
Spyware vs. Antispyware.pdf
|
829.1 KB
|
The Magic of Computer Hacking.pdf
|
196.1 KB
|
The Identity-Based PKI Approach to Secure Communication.pdf
|
427.2 KB
|
The IT Security Industry - Geeks Gone Wild.pdf
|
667.5 KB
|
The Myth of the Disappearing Perimeter.pdf
|
750.3 KB
|
The Next Frontier in Managed Security Services.pdf
|
5.8 MB
|
The Reality of Security Information Management (SIM).pdf
|
404.2 KB
|
The P2P Piracy Epidemic.pdf
|
2.5 MB
|
The Evolving Internet Worm Ecology.pdf
|
456.4 KB
|
The Evolution of Libnet.pdf
|
1.5 MB
|
Tear Down the Wall- Lessons from the Worm Wars.pdf
|
2.4 MB
|
Standards in Application Security and the Benefits of Interoperability.pdf
|
3.8 MB
|
Technical Perspective- Managing the Insider Threat.pdf
|
899.8 KB
|
Ten Critical Success Factors for PKI Deployment.pdf
|
512.6 KB
|
The Effects of Internet Worms on Global Routing Instability.pdf
|
1.6 MB
|
The Disappearing Perimeter.pdf
|
505.5 KB
|
Securing the Next Layer - Application Security.pdf
|
1.1 MB
|
Network Forensics - On the Hacker's Trail.pdf
|
767.5 KB
|
Applying Low-tech Methodology to Break High-tech Security.pdf
|
788.6 KB
|
Assessing Large Networks Effectively.pdf
|
2.1 MB
|
Assessing the Out-sourcers.pdf
|
483.9 KB
|
And The Hits Keep Coming. Analysis and Lessons Learned From the Summer 2003 Threats..pdf
|
1.4 MB
|
High-speed Modular Multiplication.pdf
|
6.3 MB
|
An Analysis of Attacker Counter-Forensic Methodologies.pdf
|
919.9 KB
|
An Incremental Path to Web Services Security for Control and Protection.pdf
|
770.7 KB
|
Analyzing Topologies of Transitive Trust.pdf
|
2.2 MB
|
Attaining ôSecurity Currencyö- Operational, Risk, and Cost Efficiency Approaches to Patch Management.pdf
|
511.3 KB
|
Auditing Firewalls and IDS- Plugging the 10 Biggest Holes in Your Network Security.pdf
|
347.1 KB
|
Biometrics and IT Security- International Standardization.pdf
|
488.2 KB
|
Bit String Commitment Reductions with a Non-Zero Rate.pdf
|
245.5 KB
|
Bluetooth Security Overview.pdf
|
1.3 MB
|
Best Practices in Identity Management for Regulatory Compliance.pdf
|
799.7 KB
|
Bank One Presents- The Realistic Road to Shared Authentication.pdf
|
287.1 KB
|
Authentication Standards and Digital Credentials- State Challenges.pdf
|
1.3 MB
|
Authentication in Wireless Local Area Networks.pdf
|
7.8 MB
|
Automated IS Risk Assessment and Aggregation.pdf
|
293.2 KB
|
Alphabet Soupàor How to Sort the XML-Web Services Security Standards Mix.pdf
|
384.1 KB
|
Almost Ideal Contrast Visual Cryptography with Reversing.pdf
|
456.7 KB
|
A Generic Construction for Intrusion-Resilient Public-Key Encryption.pdf
|
328.1 KB
|
A Key Recovery System as Secure as Factoring.pdf
|
427.3 KB
|
A New Life for Group Signatures.pdf
|
486.2 KB
|
A Fast Correlation Attack via Unequal Error Correcting LDPC Codes.pdf
|
414.4 KB
|
A Certificate-based Signature Scheme.pdf
|
7.4 MB
|
10 No-Nos in Smart Card Deployments.pdf
|
391.7 KB
|
802.11x Wireless Networks - Standards, Strategies, & Security.pdf
|
821.2 KB
|
A 1 gbit-s Partially Unrolled Architecture of Hash Functions sha-1 and sha-512.pdf
|
606.5 KB
|
A PKI Success Story- Implementation Strategies for Securing Financial Applications.pdf
|
1.0 MB
|
A Parallelizable Enciphring Scheme.pdf
|
1.2 MB
|
Access Control û Access for Whom Control to What.pdf
|
519.6 KB
|
Achieving Defense in Depth- A New Approach to Anti-Tamper Software Protection.pdf
|
542.5 KB
|
Adaptive Intrusion Protection.pdf
|
992.5 KB
|
Access Control Challenge for a Global Financial Institution.pdf
|
698.3 KB
|
A View From the Vault- Information Security Requirements in Financial Services.pdf
|
540.2 KB
|
A Practical Approach to Whole Risk Assessment.pdf
|
456.9 KB
|
A Practical Implementation of ISO17799.pdf
|
450.6 KB
|
A Role-based Approach to Federated Identity.pdf
|
1.7 MB
|
Buffer Overruns- Cleaning Up the Problem Systemically.pdf
|
481.5 KB
|
Anatomy of a Patch- Security Patch Management Exposed.pdf
|
543.7 KB
|
Emulating the Human Biosystem to Meet Cyber Security Challenges.pdf
|
1.3 MB
|
Ensuring Security Anytime, Anywhere.pdf
|
311.5 KB
|
Evaluating architectures for Database Encryption.pdf
|
531.2 KB
|
Emerging Standards- How Secure Is ZigBee.pdf
|
986.4 KB
|
Electronic Signatures in the US and Europe- Where Are We Now.pdf
|
1.0 MB
|
Does SSL Provide Sufficient Protection for Web Services Integration.pdf
|
485.6 KB
|
E-Authentication Initiative and the E-Gov Initiatives- An Update.pdf
|
1.5 MB
|
Easy, Fast, Secure Remote Access with Regulatory Compliance.pdf
|
2.9 MB
|
Fast Verification of Hash Chain.pdf
|
341.6 KB
|
Federal Identity Credentialing Achieving Interoperability Across the Federal Enterprise.pdf
|
548.1 KB
|
HIPAA Security Implementation.pdf
|
474.4 KB
|
Hacking the Intelligent Building.pdf
|
653.5 KB
|
Hardware Countermeasures Against DPA---A Statistical Analysis of their Effectiveness.pdf
|
414.6 KB
|
Gain Control Over the Internet with a Globally Distributed Applications Infrastructure.pdf
|
984.7 KB
|
Forensic Analysis on Databases.pdf
|
819.3 KB
|
Federated Identity Management- Changing the Way Businesses Make Money and Build Relationships.pdf
|
2.7 MB
|
Federated Identity and Web Services- The Journey Continues.pdf
|
454.3 KB
|
Distributed Security for Application Layer Traffic.pdf
|
804.8 KB
|
Getting Ahead of the Vulnerability Gap.pdf
|
4.3 MB
|
Chief Privacy OfficersÆ Roundtable- New Developments, Best Practices and Managing Trust.pdf
|
371.3 KB
|
Compressing Rabin Signatures.pdf
|
115.3 KB
|
Confessions of a Process Junkie.pdf
|
186.2 KB
|
Case Studies in International Privacy Protection- Working Internationally Without Breaking the Bank.pdf
|
303.0 KB
|
Business-friendly Digital Signatures Applied to Electronic Documents.pdf
|
536.0 KB
|
Digital Signatures- Enabling Trusted Document Exchange for E-government.pdf
|
2.3 MB
|
Building 802.11i enabled equipment for secure wireless enterprise deployment.pdf
|
1.1 MB
|
Business Systems Security - Are you Really Protected from Today's Internet Threats.pdf
|
7.7 MB
|
Corporate Internet Policies For the Wireless World.pdf
|
671.5 KB
|
Business-Practical Security- How a Pragmatic Approach Enables Better Risk Management.pdf
|
446.2 KB
|
Designing Secure Service Provisioning Solution.pdf
|
2.0 MB
|
Cost-Effective Management of Security and Privacy Compliance.pdf
|
901.8 KB
|
Designing and Attacking Virtual Machines.pdf
|
682.9 KB
|
Defining a Common Security Framework for Services-Oriented Architectures.pdf
|
1.7 MB
|
Design of AES Based on Dual Cipher and Composite Field.pdf
|
1.4 MB
|
Dangers Posed By Going Mobile and the Latest Advancements in Securing Wireless Networks.pdf
|
431.9 KB
|
Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95.pdf
|
387.8 KB
|
Cracker Methodologies and Tools.pdf
|
3.2 MB
|
//2004 BlackHat/
|
HTTP Fingerprinting and Advanced Assessment Techniques (httprint_win32).zip
|
844.6 KB
|
HTTP Fingerprinting and Advanced Assessment Techniques.pdf
|
579.3 KB
|
Hardening Windows Servers.pdf
|
4.1 MB
|
HTTP Fingerprinting and Advanced Assessment Techniques (httprint_paper).zip
|
597.9 KB
|
HTTP Fingerprinting and Advanced Assessment Techniques (httprint_linux).zip
|
656.9 KB
|
Hardening Windows Servers.zip
|
4.9 MB
|
HTTP Fingerprinting and Advanced Assessment Techniques (httprint_macosx).zip
|
690.0 KB
|
HTTP Fingerprinting and Advanced Assessment Techniques (httprint_freebsd).zip
|
709.9 KB
|
ISA Server - Best Practices from the Field.ppt
|
4.6 MB
|
Forensic Secrets for Windows Servers.zip
|
4.2 KB
|
Introduction to Embedded Security.pdf
|
11.5 MB
|
Integrating Security Into Agile Development-Testing.pdf
|
339.8 KB
|
Information Security in Mergers & Acquisitions.ppt
|
315.4 KB
|
Hide 'n' Seek Anatomy of Stealth Malware.pdf
|
582.8 KB
|
INDICE.pdf
|
59.7 KB
|
Hide 'n' Seek Anatomy of Stealth Malware (whitepaper).pdf
|
254.3 KB
|
Capturing Windows Passwords Using the Network Provider API.pdf
|
132.1 KB
|
Automated Binary Reverse Engineering.pdf
|
417.9 KB
|
Building an Early Warning System.pdf
|
1.3 MB
|
Auditing ActiveX Controls.pdf
|
481.4 KB
|
Auditing ActiveX Controls (examples).zip
|
19.3 KB
|
Addressing Complete Security to Save Money.pdf
|
600.4 KB
|
Application Intrusion Detection.pdf
|
332.3 KB
|
Capturing Windows Passwords Using the Network Provider API.rtf
|
17.8 KB
|
DKOM (Direct Kernel Object Manipulation).pdf
|
1.4 MB
|
Dynamic Detection and Prevention of Race Conditions in File Accesses.pdf
|
82.7 KB
|
Fingerprinting through Windows RPC.pdf
|
1.0 MB
|
Digital Security - Policies & The Law.pdf
|
39.9 KB
|
Detecting Ø-days Attacks With Learning Intrusion Detection Systems.pdf
|
140.5 KB
|
Data Hiding On A Live (NTFS) System.ppt
|
312.3 KB
|
De-Perimeterisation.pdf
|
1.1 MB
|
Forensic Secrets for Windows Servers.pdf
|
825.2 KB
|
Introduction to Mobile Device Insecurity.pdf
|
3.6 MB
|
Trusted Computing 101.pdf
|
670.9 KB
|
When the Tables Turn.pdf
|
2.1 MB
|
Trusted Computing 101 (papers).zip
|
5.0 MB
|
The Keys to the Kingdom – Understanding Covert Channels.pdf
|
4.6 MB
|
The Art of Defiling.pdf
|
2.5 MB
|
The Challenges of Automated Web Application Scanning.pdf
|
3.1 MB
|
WinCE PDA Insecurity.pdf
|
653.6 KB
|
Windows Heap Overflows.ppt
|
249.3 KB
|
raceprot.tgz
|
19.9 KB
|
Legal Risks of Vulnerability Disclosure.pdf
|
42.5 KB
|
erandom-0.1.tgz
|
13.7 KB
|
bh-eu-04-wavesec-for-windows.zip
|
3.6 MB
|
Windows WaveSEC Deployment.pdf
|
373.6 KB
|
Windows XP - Improving Resiliency.pdf
|
1.0 MB
|
Terrorism and Immigration.ppt
|
143.4 KB
|
Windows Heap Overflows.rtf
|
17.8 KB
|
Practical Win32 and UNICODE Exploitation.pdf
|
4.0 MB
|
Lessons Learned When The Cisco Guys Went to Windows land.pdf
|
4.0 MB
|
Oracle PL-SQL Injection.pdf
|
1.7 MB
|
Old win32 Code For A Modern, Super-Stealth Trojan.pdf
|
360.2 KB
|
Nobody’s Anonymous – Tracking Spam.pdf
|
745.5 KB
|
Old win32 Code For A Modern, Super-Stealth Trojan (demo).zip
|
176.6 KB
|
Privacy Rights Management Using DRM.pdf
|
516.3 KB
|
Pseudorandom Number Generation, Entropy Harvesting, and Provable Security in Linux (references).pdf
|
23.5 KB
|
Security Within A Development Lifecycle.pdf
|
93.4 KB
|
Smartphone Security Issues (whitepaper).pdf
|
517.3 KB
|
Security Patches Management On A Windows Infrastructure.pdf
|
7.5 MB
|
Reverse Engineering ARM Based Devices.pdf
|
5.3 MB
|
Pseudorandom Number Generation, Entropy Harvesting, and Provable Security in Linux.pdf
|
150.2 KB
|
Reverse Engineering ARM Based Devices (resource).zip
|
16.2 MB
|
Smartphone Security Issues.pdf
|
497.1 KB
|
//2008-05 Techfor/
|
techfor.ppt
|
484.4 KB
|
techfor.tif
|
420.6 KB
|
techfor.pptx
|
172.8 KB
|
//2004-11 ISS Seminar/
|
Technology.ppt
|
10.8 MB
|
//2005-05-03 Honeypot/
|
Honeypot.pdf
|
2.3 MB
|
//2007-02 Blackhat USA/
|
Zanero - 360° Anomaly Based Unsupervised Intrusion Detection - Whitepaper.pdf
|
285.9 KB
|
Zanero - 360° Anomaly Based Unsupervised Intrusion Detection.pdf
|
620.5 KB
|
Rutkowska - Defeating Hardware Based RAM Acquisition Tools.pdf
|
810.3 KB
|
Kendall_McMillan - Practical Malware Analysis.pdf
|
3.6 MB
|
Kendall_McMillan - Practical Malware Analysis - Whitepaper.pdf
|
1.0 MB
|
Heasman - Firmware Rootkits - Whitepaper.pdf
|
2.9 MB
|
Litchfield - Advanced Oracle Attack Techniques - Papers.zip
|
2.9 KB
|
Litchfield - Advanced Oracle Attack Techniques.pdf
|
1.0 MB
|
Martin_Barnum_Christey - Being Explicit about Software Weaknesses.pdf
|
2.9 MB
|
Martin_Barnum_Christey - Being Explicit about Software Weaknesses - Whitepaper.pdf
|
571.1 KB
|
Mandia - Agile Incident Response.pdf
|
4.2 MB
|
Ferret - Data Seepage - Broadcast analysis tool.zip
|
96.5 KB
|
Cerrudo - The Oracle Case.pdf
|
239.8 KB
|
Barnum - Attack Patterns.pdf
|
2.9 MB
|
Barnum - Attack Patterns - Whitepaper.pdf
|
125.6 KB
|
Broesch - Secure Processors for Embedded Applications - Whitepaper.pdf
|
144.2 KB
|
Broesch - Secure Processors for Embedded Applications.pdf
|
319.8 KB
|
Cerrudo - The Oracle Case - Whitepaper.pdf
|
457.5 KB
|
Cerrudo - The Oracle Case - PoC-Exploit.zip
|
2.1 KB
|
Maynor_Graham - Data Seepage.pdf
|
2.9 MB
|
Nazario - Botnet Tracking - Whitepaper.pdf
|
277.2 KB
|
Walters - Integrating Volatile Memory Forensics into the Digital Investigation Process.pdf
|
2.4 MB
|
Walters - Integrating Volatile Memory Forensics into the Digital Investigation Process - Whitepaper.pdf
|
77.2 KB
|
Walenstein - Exploting Similarity Between Variants to Defeat Malware.pdf
|
2.1 MB
|
Whitehouse - GS and ASLR in Windows Vista - Whitepaper.pdf
|
552.0 KB
|
Whitehouse - GS and ASLR in Windows Vista.pdf
|
1.9 MB
|
Willis_Belani - Web Application Incident Response and Forensics.pdf
|
4.8 MB
|
Willis_Belani - Web Application Incident Response and Forensics - Whitepaper.pdf
|
97.0 KB
|
Walenstein - Exploting Similarity Between Variants to Defeat Malware - Whitepaper.pdf
|
254.6 KB
|
Sutton - Applying Fuzzing to Web Applications and Web Services.pdf
|
1.9 MB
|
Ofir - Bypassing NAC.pdf
|
3.4 MB
|
Ofir - Bypassing NAC - Whitepaper.pdf
|
890.4 KB
|
Nazario - Botnet Tracking.pdf
|
629.9 KB
|
Sabanal_Yason - Reversing C++ - Whitepaper.pdf
|
616.3 KB
|
Sabanal_Yason - Reversing C++.pdf
|
8.9 MB
|
Shulman - The Untold Tale of Database Communication Protocol Vulnerabilities.pdf
|
11.4 MB
|
Shulman - The Untold Tale of Database Communication Protocol Vulnerabilities - Whitepaper.pdf
|
342.4 KB
|
//2004-10 Allasso Expo/
|
01 Aladdin-eSafe.ppt
|
2.2 MB
|
02 BlueCoat.ppt
|
6.7 MB
|
04 BlueSocket.ppt
|
13.5 MB
|
09 Juniper.ppt
|
10.7 MB
|
10 Check Point Security Vision.ppt
|
2.7 MB
|
08 Websense.ppt
|
3.5 MB
|
07 Radware.ppt
|
4.2 MB
|
05 Nortel.ppt
|
8.4 MB
|
06 Nokia.ppt
|
7.3 MB
|
03 Stonesoft.ppt
|
1.8 MB
|
Faggioli - Plenaria.ppt
|
85.5 KB
|
//2007-02 Infosecurity/
|
Business continuity & availability.pdf
|
2.2 MB
|
Classificazione dei rischi dell'outsourcing.pdf
|
466.3 KB
|
Come proteggere le vostre informazioni.pdf
|
2.0 MB
|
Case study Arthis - Identity Management & Provisioning.pdf
|
1.0 MB
|
Tecnologia abilitante per la sicurezza delle informazioni.pdf
|
146.3 KB
|
Stardard e certificazioni per la sicurezza informatica.pdf
|
640.8 KB
|
Soluzioni tecnologiche IBM per la continuità operativa e casi reali.pdf
|
2.3 MB
|
OWASP and OWASP Top 10.pdf
|
2.6 MB
|
Storage Virtualization in action.pdf
|
1.2 MB
|
Studio Associato Adacta.pdf
|
180.6 KB
|
WEB Application Security (2).pdf
|
904.7 KB
|
Un nuovo approccio al Cybercrime.pdf
|
1.9 MB
|
Un approccio integrato al furto di identità. L'esperienza CREDEM.pdf
|
1.9 MB
|
L’identità digitale nell’e-government europeo.pdf
|
2.0 MB
|
La sicurezza e gli SLA.pdf
|
298.6 KB
|
Il furto di identità digitale.pdf
|
2.3 MB
|
Il ciclo di vita dell'outsourcing.pdf
|
287.3 KB
|
Disaster Recovery e Virtualizzazione.pdf
|
1.0 MB
|
L'aspetto contrattuale dell'outsourcing.pdf
|
278.7 KB
|
L'esecuzione dell'audit (1).pdf
|
347.9 KB
|
La protezione delle informazioni mission critical.pdf
|
454.2 KB
|
La gestione del rischio come opportunità di business.pdf
|
1.8 MB
|
L'esecuzione dell'audit (2).pdf
|
1.1 MB
|
Compliance Applicata.pdf
|
1.7 MB
|
WEB Application Security.pdf
|
1.2 MB
|
//2009-02 Blackhat USA/
|
macho-on-the-fly.zip
|
10.2 KB
|
Let Your Mach-O Fly (slides).pdf
|
427.4 KB
|
Emulation-based Software Protection Providing Encrypted Code Execution and Page Granularity Code Signing.pdf
|
525.2 KB
|
Let Your Mach-O Fly.pdf
|
242.7 KB
|
Making Privacy-Preserving Data Mining Practical with Smartcards (slides).pdf
|
1.9 MB
|
New Techniques for Defeating SSL-TLS.pdf
|
2.5 MB
|
Making Privacy-Preserving Data Mining Practical with Smartcards.pdf
|
290.4 KB
|
Dissecting Web Attacks.pdf
|
1.5 MB
|
Dissecting Web Attacks (slides).pdf
|
8.6 MB
|
Blinded by Flash.pdf
|
6.8 KB
|
Attacking Intel Trusted Execution Technology.zip
|
2.9 MB
|
Defending Against BGP Man-In-The-Middle Attacks.pdf
|
4.2 MB
|
Defending Your DNS in a Post-Kaminsky World (slides).pdf
|
2.8 MB
|
Defending Your DNS in a Post-Kaminsky World.pdf
|
1.8 MB
|
One Cell is Enough to Break Tor's Anonymity.pdf
|
234.9 KB
|
Rebuilding the Import Address Table Using Hooked DLL Calls (slides).pdf
|
3.7 MB
|
WAF Virtual Patching Challenge.pdf
|
323.6 KB
|
The Dangers of Persistent Web Browser Storage.pdf
|
8.6 MB
|
Windows Vista Security Internals.pdf
|
10.5 MB
|
XSS Anonymous Browser (slides).pdf
|
853.7 KB
|
Your Face Is NOT Your Password.pdf
|
403.8 KB
|
XSS Anonymous Browser.pdf
|
165.6 KB
|
Snort My Memory.zip
|
9.0 KB
|
Snort My Memory.pdf
|
2.5 MB
|
Reversing and Exploiting Wireless Sensors.pdf
|
754.9 KB
|
Rebuilding the Import Address Table Using Hooked DLL Calls.pdf
|
172.1 KB
|
SQL Server Anti-Forensics.pdf
|
158.9 KB
|
Satellite Hacking for Fun and Profit.pdf
|
5.6 MB
|
Snort My Memory (WP).pdf
|
179.9 KB
|
Attacking Intel Trusted Execution Technology.pdf
|
4.4 MB
|
DNS 2008 and the New (old) Nature of Critical Infrastructure.pdf
|
857.6 KB
|
//2005-09-28 Cisco Expo/
|
evoluzione canale.pdf
|
2.8 MB
|
wifi_maggiora.pdf
|
2.9 MB
|
somenzi.pdf
|
106.0 KB
|
ialfvg.pdf
|
2.8 MB
|
mgn.pdf
|
3.7 MB
|
mobile.pdf
|
2.5 MB
|
servizi_universitari_fanelli.pdf
|
2.5 MB
|
expo_fanelli.wmv
|
17.8 MB
|
webtv.pdf
|
640.4 KB
|
cisco_service_control.pdf
|
3.4 MB
|
cnap_lepore.pdf
|
1.3 MB
|
connectedcommun.pdf
|
1.4 MB
|
cisco_service_control (gestione traffico).pdf
|
3.4 MB
|
cisco_cim.pdf
|
371.4 KB
|
cerruti.pdf
|
365.3 KB
|
campoli.pdf
|
9.9 MB
|
ce2005_mpalmigi_retail.pdf
|
2.2 MB
|
aons_busday.pdf
|
2.9 MB
|
bandalarga.pdf
|
1.1 MB
|
abi_sys.pdf
|
964.4 KB
|
Cisco Expo - Documentazione 28 settembre.mht
|
99.0 KB
|
//2005-09-27 Cisco Expo/
|
telecom.pdf
|
2.3 MB
|
self_defending_network_mircoli.pdf
|
3.7 MB
|
misi_sdn_mgmt.pdf
|
3.0 MB
|
app_ipc.pdf
|
3.3 MB
|
Cisco Expo - Documentazione 27 settembre.mht
|
96.7 KB
|
aons_techday.pdf
|
2.5 MB
|
convegno (getronics).pdf
|
4.0 MB
|
ibm.pdf
|
2.1 MB
|
ce_wlan_dbf.pdf
|
7.3 MB
|
brdc_pomelli.pdf
|
1.9 MB
|
app_ipc_ganzaroli.pdf
|
3.8 MB
|
ip_foundation.pdf
|
5.9 MB
|
ipc_architetture_finale.pdf
|
3.1 MB
|
apc.pdf
|
1.9 MB
|
italtel.pdf
|
657.1 KB
|
voip.pdf
|
1.2 MB
|
//2006-01-18 Reti Wi-Fi/
|
Reti Wi-Fi (b).pdf
|
936.9 KB
|
Reti Wi-Fi (a).pdf
|
6.2 MB
|
//2004-10 Computerlinks/
|
Radware.ppt
|
12.3 MB
|
Packeteer.ppt
|
3.9 MB
|
ISS.ppt
|
7.9 MB
|
SafeAnet.ppt
|
2.6 MB
|
SonicWALL.ppt
|
6.9 MB
|
Trend_Micro_1.ppt
|
801.3 KB
|
Crossbeam.ppt
|
9.4 MB
|
Check_Point.ppt
|
2.7 MB
|
Avocent.ppt
|
13.0 MB
|
Trend_Micro_2.ppt
|
1.6 MB
|
THINTUNE.ppt
|
5.4 MB
|
Websense.ppt
|
3.9 MB
|
//2006 Black Hat USA 2006/
|
Jeremy Rauch - PDB, the Protocol DeBugger.pdf
|
1.2 MB
|
Jesse Burns - Fuzzing Selected Win32 Interprocess Communication Mechanisms.pdf
|
263.2 KB
|
Joanna Rutkowska - Subverting Vista Kernel For Fun And Profit.pdf
|
5.3 MB
|
Jeremiah Grossman - Hacking Intranet Websites from the Outside 'JavaScript malware just got a lot more dangerous'.pdf
|
5.7 MB
|
John Lambert - Security Engineering in Windows Vista.pdf
|
7.3 MB
|
Abolade Gbadegesin - The NetIO Stack - Reinventing TCP-IP in Windows Vista.pdf
|
21.9 MB
|
Hendrik Scholz - SIP Stack Fingerprinting and Stack Difference Attacks.pdf
|
2.3 MB
|
Jeff Waldron - VOIP Security Essentials.pdf
|
305.6 KB
|
Jay Schulman - Phishing with Asterisk PBX.pdf
|
2.5 MB
|
Jamie Butler - The Exponential Growth of Rootkit Techniques.pdf
|
241.5 KB
|
HD Moore - Metasploit Reloaded.pdf
|
23.3 MB
|
Franck Veyssett - Wi-Fi Advanced Stealth.pdf
|
794.8 KB
|
Dino Dai Zovi - Hardware Virtualization Based Rootkits.pdf
|
1.2 MB
|
Doug Mohney - Defending Against Social Engineering with Voice Analytics.pdf
|
398.3 KB
|
Emmanuelle Zambon - False Positive Reduction Through Anomaly Detection.pdf
|
1.9 MB
|
FX - Analysing Complex Systems (the BlackBerry Case).pdf
|
19.5 MB
|
Himanshu Dwivedi - I’m going to shoot the next person who says VLANs.pdf
|
2.7 MB
|
Bruce Potter - Bluetooth Defense Kit.pdf
|
295.7 KB
|
Claudio Merloni - A Mobile, Covert Bluetooth Attack and Infection Device.pdf
|
3.1 MB
|
Chuck Willis - Web Application Incident Response and Forensics.pdf
|
5.4 MB
|
Chris Eng - Breaking Crypto Without Keys.pdf
|
547.4 KB
|
Charles Edge - Attacking Apple's Xsan.pdf
|
278.5 KB
|
Corey Benninger - Finding Gold in the Browser Cache.pdf
|
3.1 MB
|
Dan Moniz and David Hulton - Hacks and Cracks with FPGAs.pdf
|
5.9 MB
|
Johnny Cache - Device Drivers.pdf
|
1.9 MB
|
David Endler - Hacking VoIP Exposed.pdf
|
3.8 MB
|
Daniel Bilar - Automated Malware Classification.pdf
|
1.7 MB
|
Bruce Potter - The Trusted Computing Revolution.pdf
|
325.7 KB
|
Brian Caswell - Thermoptic Camoflauge (Total IDS Evasion).pdf
|
554.8 KB
|
Alexander Tereshkin - Rootkits, Attacking Personal Firewalls.pdf
|
261.5 KB
|
Alexander Sotirov - Hotpatching and the Rise of Third-Party Patches.pdf
|
123.6 KB
|
Alexander Kornbrust - Oracle Rootkits 2.0.pdf
|
1.3 MB
|
Andrew Cushman - Microsoft Security Fundamentals.pdf
|
3.3 MB
|
Bala Neerumalla - SQL Injections by Truncation.pdf
|
344.0 KB
|
Brendan O'Connor - Vulnerabilities in Not-So Embedded Systems.pdf
|
959.2 KB
|
Billy Hoffman - Analysis of Web Application Worms and Viruses.pdf
|
1.8 MB
|
Billy Hoffman - AJAX (in)security.pdf
|
5.7 MB
|
Adrian Marinescu - Windows Vista Heap Management Enhancements.pdf
|
3.0 MB
|
Renaud Bidou - IPS Shortcomings.pdf
|
428.5 KB
|
Jonathan Squire - Project Cowbird.pdf
|
5.5 MB
|
Yuan Fan and Xiao Rong - When WebApp and Database Security Pen-Test-Audit Is a Joy.pdf
|
2.9 MB
|
Zvi Gutterman - Vulnerabilities of the Linux Random Number Generator.pdf
|
4.2 MB
|
William Kimball - Code Integration-Based Vulnerability Auditing.pdf
|
620.7 KB
|
Paul Boehm - Taming Bugs.pdf
|
7.2 MB
|
Ofir Arkin - Bypassing Network Access Control.pdf
|
1.9 MB
|
Nicolas Fishbach - Carrier VoIP Security.pdf
|
414.6 KB
|
Pete Finnigan - How to Unwrap Oracle PL-SQL.pdf
|
1.0 MB
|
Peter Silberman - Rootkit Analysis Identification Elimination.pdf
|
402.2 KB
|
Scott Stender - Attacking Internationalized Software.pdf
|
267.2 KB
|
Philip Trainor - Utilizing Active Honeypots for Hosting Potentially Malicious Events.pdf
|
480.7 KB
|
Neal Krawetz - You Are What You Type (Non-Classical Computer Forensics).pdf
|
4.0 MB
|
Michael Sutton - Hiding Shellcode In Plain Sight.pdf
|
2.3 MB
|
Lukas Grunwald - New Attack RFID-systems and Their Middleware and Backends.pdf
|
791.8 KB
|
Kimber Spradlin - Auditing Data Access Without Bringing Your Database To Its Knees.pdf
|
796.8 KB
|
Kevin Mandia - The State of Incidence Response.pdf
|
3.3 MB
|
Maik Morgenstern - Runtime Packers.pdf
|
380.7 KB
|
Marco Morana - Building Security into the Software LifeCycle.pdf
|
1.4 MB
|
ULTIMO FATTO.txt
|
0.0 KB
|
Mariusz Burdach - Physical Memory Forensics.pdf
|
456.2 KB
|
Shawn Embleton - An Evolutionary Guidance System for Malicious Input Crafting.pdf
|
1.4 MB
|
Melanie Rieback - RFID Malware Demystified.pdf
|
15.6 MB
|
Tom Ptacek - Do Enterprise Management Applications Dream of Electric Sheep.pdf
|
2.2 MB
|
Tom Gallagher - Finding and Preventing Cross-site request Forgery.pdf
|
471.3 KB
|
Tod Beardsley - Investigating Evil Websites with Monkeyspaw.pdf
|
349.8 KB
|
Stefano Zanero - Host Based Anomaly Detection on System Call Arguments.pdf
|
1.1 MB
|
Stefan Frei and Martin May - The Speed of (In)security.pdf
|
597.0 KB
|
Shawn Moyer - Defending Black Box Web Applications.pdf
|
490.7 KB
|
//2008-02 Blackhat Europe/
|
Security Failures in Secure Devices.pdf
|
2.4 MB
|
Side Channel Analysis on Embedded Systems.pdf
|
1.6 MB
|
New Viral Threats of PDF Language.pdf
|
16.0 KB
|
Mobile Phone Spying Tools.pdf
|
971.5 KB
|
Malware on the Net.pdf
|
114.7 KB
|
Spam-Evolution.pdf
|
191.1 KB
|
URI Use and Abuse.pdf
|
1.4 MB
|
The Reverse Engineer's Unexpected Swiss Army Knife.pdf
|
370.4 KB
|
LDAP Injection & Blind LDAP Injection.pdf
|
2.0 MB
|
Iron Chef Black Hat.pdf
|
1.7 MB
|
Biologger - A Biometric Keylogger.pdf
|
677.1 KB
|
Client-side Security.pdf
|
782.2 KB
|
Attacking Anti-Virus.pdf
|
266.6 KB
|
Antiphishing Security Strategy.pdf
|
677.6 KB
|
0-Day Patch -Exposing Vendors (In)Security Performance.pdf
|
142.8 KB
|
CrackStation.pdf
|
212.9 KB
|
Developments in Cisco IOS Forensics.pdf
|
75.3 KB
|
Investigating Individuals and Organizations Using Open Source Intelligence.pdf
|
8.2 MB
|
Intercepting Mobile Phone.pdf
|
79.0 KB
|
Hacking Second Life.pdf
|
638.5 KB
|
Exposing Vulnerabilities in Media Software.pdf
|
233.7 KB
|
The Fundamentals of Physical Security.pdf
|
877.6 KB
|
//2004-11-21 Voice over IP/
|
VP01a.pdf
|
411.0 KB
|
VP01b.pdf
|
1.3 MB
|
VP01c.pdf
|
554.2 KB
|
//2005-10 SMAU Milano 2005/
|
smau05_wright.pdf
|
326.6 KB
|
smau05_tagliapietra.pdf
|
1.6 MB
|
smau05_telmon.pdf
|
184.3 KB
|
smau05_barbarito.pdf
|
551.8 KB
|
INDICE.txt
|
5.4 KB
|
smau05_cavallini.pdf
|
819.9 KB
|
IBM GSC III GGiudice.pdf
|
349.9 KB
|
smau05_pasquinucci.pdf
|
167.1 KB
|
smau05_seveso.pdf
|
224.6 KB
|
smau05_santucci.pdf
|
240.9 KB
|
//2007-06 Infosecurity Roma/
|
Forme di controllo delle informazioni digitali.pdf
|
343.6 KB
|
Information Security Governance ed incidenti informatici.pdf
|
1.4 MB
|
DDoS Mitigation.ppt
|
4.4 MB
|
Computer forensic in azienda.pdf
|
364.9 KB
|
Come gestire le informazioni e la loro sicurezza all'interno del ciclo di vita.pdf
|
5.6 MB
|
La computer and network forensics e le investigazioni digitali.pdf
|
81.7 KB
|
Privacy e controlli sul lavoro.pdf
|
339.9 KB
|
Benefici di Sicurezza in una Infrastruttura Citrix di Application Delivery.ppt
|
6.0 MB
|
Lo storage che fa bene al business.pdf
|
5.4 MB
|
La sicurezza nella PA.pdf
|
184.8 KB
|
Next Generation Security Solutions e Pubblica Amministrazione.pdf
|
2.3 MB
|
Security Compliance e Data Protection.pdf
|
1.3 MB
|
Soluzioni storage per la prevenzione dei crimini informatici.pdf
|
5.5 MB
|
La sicurezza nel Sistema Pubblico di Connettività.pdf
|
892.5 KB
|
//2008-06 Infosecurity Roma/
|
Evoluzione delle tecniche e dei profili degli attaccanti.pdf
|
820.5 KB
|
La Sicurezza in banca.pdf
|
619.6 KB
|
Data Protection e Retention di Infrastrutture Critiche.pdf
|
2.3 MB
|
Cosa si può chiedere e cosa si può pretendere da un fornitore di servizi di sicurezza informatica.pdf
|
155.3 KB
|
A strategy for protecting critical data.pdf
|
4.5 MB
|
La criminalità informatica in Italia e le attività della Polizia delle Comunicazioni.pdf
|
470.7 KB
|
Le ultime novità normative in materia di Data Retention.pdf
|
504.2 KB
|
Minori e nuovi media.pdf
|
332.0 KB
|
//2005-10 ComputerLinks2005/
|
Zultys.ppt
|
1.7 MB
|
Citrix1.ppt
|
5.3 MB
|
Citrix2.ppt
|
5.3 MB
|
Citrix_Latona.ppt
|
6.8 MB
|
Crossbeam_preso_2005.ppt
|
11.9 MB
|
CL_ISS DiPierro-18-10-05.pdf
|
3.2 MB
|
CLU 2005 - Nokia Secure and Mobile Connectivity.zip
|
6.7 MB
|
CLU 2005 - Nokia Soluzioni di mobilità per l'azienda - parte prima.pdf
|
4.7 MB
|
CLU 2005 - Nokia Soluzioni di mobilità per l'azienda - parte seconda.pdf
|
4.5 MB
|
F5Computerlinks.ppt
|
10.9 MB
|
Fortinet_CLINKS - Sept 18 2005 Unfolding.ppt
|
2.9 MB
|
ScriptLogic.ppt
|
5.5 MB
|
RSA.ppt
|
5.1 MB
|
Pres Packeteer-Ita Ott-2005.zip
|
3.0 MB
|
MicroDaSys_102005ok.ppt
|
821.2 KB
|
Mirapoint_universites05_Engl.ppt
|
4.4 MB
|
Packeteer_Soluzioni e Benefici - Rolling Ottobre 05.zip
|
1.6 MB
|
CL University Gazzoni.pdf
|
1.7 MB
|
Avocent_Italia-completa-DSView3-new.ppt
|
16.6 MB
|
4100_ssl.ppt
|
2.7 MB
|
CheckPoint.ppt
|
4.6 MB
|
Websense.ppt
|
6.7 MB
|
Utimaco_University05.ppt
|
4.9 MB
|
WebTrends.ppt
|
365.6 KB
|
WebTrends2.ppt
|
15.1 MB
|
TRENDMICRO_nuove-minacce.pdf
|
2.6 MB
|
TRENDMICRO_spyware.pdf
|
915.6 KB
|
TRENDMICRO_University_2005pdf.pdf
|
2.6 MB
|
//2004-02 Infosecurity 2004/
|
stigliani.pdf
|
487.7 KB
|
wright2.pdf
|
102.8 KB
|
zaba.pdf
|
39.7 KB
|
quintarelli.pps
|
154.6 KB
|
rizzo.pdf
|
90.6 KB
|
rizzoli.pdf
|
282.7 KB
|
scalici.pdf
|
188.4 KB
|
sanna.pdf
|
551.9 KB
|
rossi.pdf
|
508.0 KB
|
vella.pdf
|
63.9 KB
|
vignati.pdf
|
1.9 MB
|
varaldo.pdf
|
137.6 KB
|
valeri.pdf
|
504.1 KB
|
tondi.pdf
|
3.4 MB
|
pierani.pdf
|
204.2 KB
|
mansutti.pdf
|
639.8 KB
|
mancini.pdf
|
498.0 KB
|
dal_checco.pdf
|
286.1 KB
|
manzetti.pdf
|
1.2 MB
|
marega.pdf
|
188.4 KB
|
mitchison.pdf
|
174.6 KB
|
mendicino.pdf
|
137.4 KB
|
marioni.pdf
|
178.1 KB
|
genghini.pdf
|
237.4 KB
|
giardina-dr.pdf
|
717.6 KB
|
piazzi.pdf
|
984.3 KB
|
giudice-clusis e clusit.pdf
|
176.9 KB
|
giudice.pdf
|
93.6 KB
|
lace.pdf
|
247.1 KB
|
ledda.pdf
|
296.8 KB
|
giardina.pdf
|
717.6 KB
|
giudice-c.pdf
|
286.2 KB
|
lega.pdf
|
187.2 KB
|
corasaniti.pdf
|
188.0 KB
|
martignoni.pdf
|
220.6 KB
|
albertini.pdf
|
191.1 KB
|
orlandi.pdf
|
342.7 KB
|
neri.pdf
|
213.2 KB
|
INDICE.txt
|
9.8 KB
|
pacini.pdf
|
576.1 KB
|
petrillo.pdf
|
212.9 KB
|
Giuseppe Borgonovo.pdf
|
3.1 MB
|
palumbo.pdf
|
591.9 KB
|
muffett.pdf
|
697.1 KB
|
bruschi.pdf
|
262.9 KB
|
morris.pdf
|
487.7 KB
|
buscarini.pdf
|
69.9 KB
|
//2004-12 Internet e Minori/
|
20041213-abstract-bruschi.pdf
|
75.9 KB
|
20041213-abstract-burani.pdf
|
30.8 KB
|
20041213-abstract-crudele.pdf
|
59.9 KB
|
20041213-abstract-marziale.pdf
|
56.1 KB
|
20041213-abstract-monsmonni.pdf
|
38.0 KB
|
Convegno 13 Dicembre 2004-1.zip
|
242.8 KB
|
//2005-01-18 Sicurezza WLAN/
|
WF01a.pdf
|
6.2 MB
|
WF01b.pdf
|
936.9 KB
|
//2006-07-10 ITIL Point 2006/
|
Malnati-TELECOM-.zip
|
1.8 MB
|
Locati-HP-.zip
|
380.9 KB
|
Gallo-FRONTRANGE-.zip
|
2.6 MB
|
Nava-COMPUWARE-.zip
|
1.5 MB
|
Salvato-KPMG-.zip
|
2.2 MB
|
Sangiorgi-COMPUWARE-.zip
|
2.3 MB
|
Pavone-POSTE ITALIANE-.zip
|
586.8 KB
|
Renna-CA-.zip
|
2.3 MB
|
De NisI-CASEWISE-.zip
|
4.5 MB
|
Ciceri-NOLAN NORTON ITALIA-.zip
|
1.1 MB
|
Bassi-NORTHERN ITALY CHAPTER.zip
|
1.5 MB
|
Avico-TSF-.zip
|
4.1 MB
|
Fruin-QUINT-.zip
|
759.5 KB
|
Cilli-ISACA-.zip
|
1.7 MB
|
Albano-RAI-.zip
|
760.2 KB
|
Fondacaro-HP-.zip
|
608.4 KB
|
//2005-04-01 Tecnologia RFID/
|
RF01.pdf
|
5.4 MB
|
//2004-11-04 ICT Forum (Roma)/
|
Il valore della certificazione ECB-S nei Data Centres (Da Gasso).zip
|
3.7 MB
|
La gestione delle identità.zip
|
665.7 KB
|
Gli strumenti di prevenzione psicologica degli attacchi ad opera di insider (Bruzzone).zip
|
28.5 KB
|
Come scegliere la migliore tecnologia anti-spam (Costantini).zip
|
3.5 MB
|
Piattaforma Integrata per la Sicurezza Informatica.zip
|
3.9 MB
|
Il token con memoria come nuova evoluzione della smartcard (Gissi).zip
|
2.3 MB
|
Privacy e standard BS7799 (Gentile).zip
|
133.9 KB
|
Privacy, identità e asset aziendali (Rossi).zip
|
1.9 MB
|
Soluzione semplice a problemi reali (Turani).zip
|
1.4 MB
|
Soluzioni di protezione da Spam e Phishing (Casazza).zip
|
1.8 MB
|
Tutela della privacy e diritti dell'utenza.zip
|
6.7 MB
|
Tecnologia che consente di trasformare gli obblighi di legge in vantaggi e roi (Degradi).zip
|
1.4 MB
|
Proteggiamo davvero ciò che conta (Zoffoli).zip
|
941.4 KB
|
Leadership indiscussa nella prevenzione delle minacce (Quarchioni).zip
|
5.4 MB
|
La sicurezza nelle infrastrutture di Storage (Gozzoli).zip
|
1.6 MB
|
Biometria, Privacy e Sicurezza (Camagni).zip
|
1.9 MB
|
Collaborazione internazionale per l'information sharing e la sicurezza delle reti (Franchina).zip
|
2.3 MB
|
Le soluzioni del Gruppo Poste Italiane per l'accesso sicuro ai servizi in rete per cittadini e imprese (Palumbo).zip
|
2.2 MB
|
Le strategie di prevenzione globali per gli attacchi inside (Battelli).zip
|
224.3 KB
|
Spyware e dintorni (Molteni).zip
|
3.4 MB
|
//2005-11-08 Sicurezza fisica/
|
Sicurezza Fisica (MI).pdf
|
576.8 KB
|
Sicurezza Fisica (RM).pdf
|
2.7 MB
|
//2007-01-30 L'azienda sicura/
|
Davide Carlesi (BlueCoat) Sicurezza delle applicazioni Web based e Wan acceleration.pdf
|
5.7 MB
|
Domenico Dominoni (IronPort) Internet un ambiente sicuro- Ultime dalla rete.pdf
|
808.0 KB
|
Bruno Melandri (EMC) I diversi aspetti della sicurezza.pdf
|
3.4 MB
|
Andrea Rizzi (CheckPoint) Un nuovo approccio alla sicurezza - l'infrastruttura unificata.pdf
|
2.8 MB
|
Gabriele Faggioli - Profili legali ed obblighi di conservazione.pdf
|
101.8 KB
|
Primo Bonacina (Magirus) Il ruolo del distributore a valore aggiunto.pdf
|
5.1 MB
|
Orlando Arena (Nokia) Mobilità Sicura per l'azienda.pdf
|
3.1 MB
|
Giancarlo Palmieri (Infoblox) Come fornire servizi di Network Identity.pdf
|
3.6 MB
|
/.../09 Sept 04/
|
mgardiner profile&competition.pps
|
1.3 MB
|
mgardiner netegrity vision.pps
|
849.4 KB
|
mgardiner provisioning.pps
|
888.8 KB
|
mgardiner federation.pps
|
464.9 KB
|
dschreiber Marketing&Partner.pps
|
297.5 KB
|
/.../10 Sept 04/
|
7_Zambon.pps
|
1.6 MB
|
9_Lo Reto-Ugolini.pps
|
960.0 KB
|
8_Lo Reto-Ugolini.pps
|
166.4 KB
|
10_Gardiner.pps
|
866.8 KB
|
3_Degradi.pps
|
151.6 KB
|
2_Giacchino.pps
|
945.7 KB
|
4_Giannoni.pps
|
148.0 KB
|
5_Passoni.pps
|
747.5 KB
|
1_renzi.pps
|
12.8 MB
|
6_Fumagalli.pps
|
757.2 KB
|
//2008-02 Conferenza ISS (Dubai)/
|
INDICE.pdf
|
156.4 KB
|
//2008-09 Conferenza ISS (Praga)/
|
MauroBonfanti Agora.pdf
|
1.1 MB
|
PeterVdArend ETSI.pdf
|
464.3 KB
|
ReneNitzinger Utimaco.pdf
|
900.2 KB
|
RichardJarvis Detica.pdf
|
170.7 KB
|
RimKhazhin BTT.pdf
|
2.2 MB
|
PatrickPaul Qosmos.pdf
|
2.0 MB
|
OttoKern Group2000.pdf
|
1.2 MB
|
MichaelThomas DigiTask.pdf
|
1.6 MB
|
NicolasDeckmyn Amesys.pdf
|
966.6 KB
|
OlegFedorov Oxygen.pdf
|
2.4 MB
|
RobertLeitch PROTEI.pdf
|
1.5 MB
|
RudolphWinschuh Utimaco.pdf
|
1.6 KB
|
VassilisStathopoulos Helenic Authority.pdf
|
340.1 KB
|
VincentBarry ThorpeGlen.pdf
|
280.3 KB
|
VincenzettiBedeschi HT.pdf
|
2.2 MB
|
WillemVanderMeer Group2000.pdf
|
590.5 KB
|
ThomasKrockel DigiTask.pdf
|
1.5 MB
|
Telecom-Operator-Roundtable-Panel.pdf
|
193.9 KB
|
ShaneOFlynn Openet.pdf
|
647.0 KB
|
ShaneOFlynn1 Openet.pdf
|
302.8 KB
|
StefanBjornson ETSI.pdf
|
496.3 KB
|
MatveyZhokhov Speech Technology Center.pdf
|
1.6 MB
|
MattiaMazzola Area.pdf
|
1.2 MB
|
Data-Retention-Guru-Panel.pdf
|
199.2 KB
|
ElanSharon Septier.pdf
|
1.4 MB
|
EmilioMartinez Agnitio.pdf
|
1.5 MB
|
ErikDeBueger SS8.pdf
|
1.9 MB
|
CharlieMcAlister SenSage.pdf
|
1.8 MB
|
BernhadSpalt Nokia.pdf
|
1.6 KB
|
AndreScholtz VASTech.pdf
|
664.4 KB
|
AndreaFabrizi HP.pdf
|
1.1 MB
|
BenjaminPenalsla Suntech.pdf
|
1.6 KB
|
HermannKunzel Phonetics.pdf
|
2.1 MB
|
Intelligence-Gathering-Guru-Panel.pdf
|
194.2 KB
|
KohalmiPeller NETI.pdf
|
339.3 KB
|
Lawful-Interception-Guru-Panel.pdf
|
195.2 KB
|
MarkLastdrager Pine Digital Security.pdf
|
779.7 KB
|
MarkShepherd Detica.pdf
|
198.3 KB
|
KoenJaspers The Netherlands Ministerie.pdf
|
464.7 KB
|
KjellYving Ericsson.pdf
|
1.4 MB
|
JLelievre Thales.pdf
|
1.5 MB
|
Jerry-Lucas-Keynote-Presentation.pdf
|
511.7 KB
|
KeithDriver Telesoft.pdf
|
418.5 KB
|
AlanDubberley AQSACOM.pdf
|
3.4 MB
|
//2006-03-21 Mobile Business 2006/
|
ATS - La TV è mobile.pdf
|
769.0 KB
|
Pasquale Palma - Formazione 3 - RFID.pdf
|
464.2 KB
|
Pasquale Palma - Formazione 4 - WiMAX, l'era delle Wireless Man.pdf
|
486.5 KB
|
Pasquale Palma - Formazione 2 - La sicurezza nelle reti wireless.pdf
|
1.1 MB
|
Pasquale Palma - Formazione 1 - Wi-Fi e Wireless Lan.pdf
|
1.4 MB
|
Lucent Technologies - Fixed-mobile convergence.pdf
|
692.2 KB
|
Oracle - Tagliare i costi e incrementare la produttività con le applicazioni mobili.pdf
|
1.1 MB
|
Telecom - Extended Mobile Business.pdf
|
1.2 MB
|
USRobotics - Wireless Lan dalle parole ai fatti.pdf
|
1.1 MB
|
Vodafone - Mobile data are now.pdf
|
790.3 KB
|
programma.pdf
|
353.0 KB
|
IBM - La collaborazione mobile.pdf
|
697.7 KB
|
Gartner - Scenario mobile and wireless.pdf
|
221.5 KB
|
EDSLan - Wireless pervasive broadband service network.pdf
|
1.1 MB
|
Ericsson - Mobilizing your enterprise.pdf
|
795.2 KB
|
Datalogic - Mobile business solution.pdf
|
650.0 KB
|
Alcatel - WiMAX - Novità per l'accesso mobile a larga banda.pdf
|
683.1 KB
|
Sybase - Il device management.pdf
|
639.5 KB
|
//2006-04-12 Info Management 2006/
|
11 KODAK.pdf
|
941.5 KB
|
12 Canon.pdf
|
5.9 MB
|
10 Vega Informatica.pdf
|
848.6 KB
|
1 Extensity.pdf
|
869.3 KB
|
13 Docflow.pdf
|
2.6 MB
|
5 Cardinis Solutions.pdf
|
715.2 KB
|
14 Esker XP.pdf
|
9.5 MB
|
6 Hewlett Packard.pdf
|
902.5 KB
|
7 Adobe.pdf
|
3.8 MB
|
9 NICA.pdf
|
1.0 MB
|
8 fujitsu.pdf
|
1.9 MB
|
3 IBM.pdf
|
4.2 MB
|
4 borland.pdf
|
206.9 KB
|
15 DeltaDator.pdf
|
1.6 MB
|
2 openwork.pdf
|
4.7 MB
|
17 ASG.pdf
|
1.4 MB
|
18 Top Consult.pdf
|
1.1 MB
|
16 OPTIMAS.pdf
|
2.4 MB
|
//2005-01-25 Tecniche biometriche/
|
Evaluating Technology Properly.pdf
|
244.4 KB
|
Evaluating Facial Recognition Technology.pdf
|
1.2 MB
|
Facial Recognition.pdf
|
192.5 KB
|
Raffaele Cappelli - Introduzione ai sistemi biometrici.pdf
|
8.8 MB
|
Raffaele Cappelli - Misurare le prestazioni dei sistemi biometrici.pdf
|
2.9 MB
|
Attestato di frequenza - Tecniche biometriche (CLUSIT).pdf
|
347.5 KB
|
Andrea Patrignani - Integrazione di sistemi biometrici.pdf
|
7.2 MB
|
An Introduction to Evaluating Biometric Systems.pdf
|
406.7 KB
|
//2005-02-18 Sicurezza LAN e VLAN/
|
misi-naga-lan+vlan.release.ppt
|
532.0 KB
|
//2006-03-28 Borland IT Governance/
|
Sala - Borland ITM_G 2006.pdf
|
783.4 KB
|
Prof Damiani it gov.pdf
|
173.3 KB
|
//2008-04-10 Sessione di studio AIEA/
|
DLP-AIEA.pdf
|
1.2 MB
|
DLP-AIEA.ppt
|
2.5 MB
|
LocandinaTorino080410.pdf
|
560.0 KB
|
SCHEDA-ISCRIZIONE-080410.doc
|
110.6 KB
|
linee guida del Garante per posta elettronica e internet.pdf
|
157.7 KB
|
sentenza cassazione del 19 Dicembre 2007.pdf
|
58.4 KB
|
sintesi.xls
|
43.0 KB
|
linee guida del Garante per posta elettronica e internet (sintesi).pdf
|
68.2 KB
|
abstract dlp.doc
|
159.7 KB
|
casi.pdf
|
232.0 KB
|
governo_rischio.doc
|
306.7 KB
|
//2004-02-25 Allasso One Day Seminar/
|
Allasso_MKTG_Allot.ppt
|
4.5 MB
|
Allasso_MKTG_NetReport.ppt
|
3.3 MB
|
BlueSocket_Allasso.ppt
|
12.2 MB
|
Welcome-OneDaySeminar-Milano-Roma.ppt
|
2.1 MB
|
Allasso_MKTG_Netilla.ppt
|
2.2 MB
|
/education/
|
raoul.pdf
|
2.9 MB
|
marioni.pdf
|
166.6 KB
|
gigi.pdf
|
1.1 MB
|
gianotti.pdf
|
127.0 KB
|
//2008-06 Conferenza ISS (Singapore)/
|
Elenco degli speeches.pdf
|
251.9 KB
|
//2004-11-23 Crittografia quantistica/
|
CQ01b.pdf
|
1.2 MB
|
CQ01a.pdf
|
834.1 KB
|
//2005-07-05 Controllo dei lavoratori/
|
slides scaricate.pdf
|
265.2 KB
|
clusit-controllo dei lavoratori-attestato.pdf
|
148.5 KB
|
controllo lavoratori.pdf
|
3.1 MB
|
//2004-06-22 Principi di crittografia/
|
CR01.pdf
|
715.3 KB
|
//2007-02 IDC Security Conference 2007/
|
Pagliuzzi (NetTeam) - Case History Net Team.pdf
|
4.6 MB
|
Grillo (Verisign) - Un approccio globale alle frodi online.pdf
|
5.6 MB
|
Ferradini (Thuga) - Il caso Thuega.pdf
|
234.2 KB
|
Rottigni (Stonesoft) - La sicurezza dei flussi informativi tramite una gestione unificata delle minacce.pdf
|
889.5 KB
|
Mastropasqua (IDC) - Le nuove sfide della sicurezza.pdf
|
905.7 KB
|
Scarpelli (VPTech) - La Sicurezza dei dati come driver.pdf
|
418.9 KB
|
Fantoni (Adobe) - La sicurezza delle informazioni nell'Azienda.pdf
|
17.1 MB
|
Zambon (ENI) - Un sistema di SSO con Federation.pdf
|
1.4 MB
|
Volpi (ISS) - Le nuove esigenze della sicurezza.pdf
|
4.4 MB
|
Taglioretti (McAfee) - ORANGE ha scelto McAfee DLP.pdf
|
2.5 MB
|
Savi (Unicredit) - zOS Enterprise Directory Architecture.pdf
|
681.1 KB
|
Ocello (Engiweb) - L'esperienza progettuale di Engiweb Security e Novell nel Progetto ENEL.pdf
|
1.6 MB
|
Falcone (Trendmicro) - L’evoluzione dell’IN_Sicurezza.pdf
|
4.2 MB
|
Ballerini - Compliance Applicata.pdf
|
998.2 KB
|
Cicognini (INET) - La sicurezza come fattore abilitante del business.pdf
|
207.1 KB
|
DelMiglio (Symantec) - Online Fraud Management.pdf
|
5.0 MB
|
Domage (IDC) - 2007 Convergence of Security Answerspdf.pdf
|
494.8 KB
|
Beluzzi (Corte di Appello Brescia) - Il Fascicolo Processuale Penale in formato PDF presso il tribunale di Cremona.pdf
|
3.5 MB
|
Berti (Emerson Network) - quando la Business Continuity è un profitto per l'organizzazione.pdf
|
2.9 MB
|
Cecchini (SOX Coordinator) - La sicurezza end-to-end.pdf
|
1.8 MB
|
Campagna (INET) - Dalle reti sicure alle informazioni sicure.pdf
|
1.2 MB
|
Biasiol (Siemens) - Biometric Access Control System at Italian Defense Premises.pdf
|
1.9 MB
|
Dominoni (Ironport) - Internet un ambiente sicuro.pdf
|
2.4 MB
|
Anderson (Cambridge Laboratory) - La sicurezza delle informazioni è problematica.pdf
|
226.4 KB
|
Fagnani (IBM) - L'urgenza di affrontare il tema della sicurezza in modo olistico.pdf
|
5.2 MB
|
/prevenzione/
|
050617carbone.pdf
|
924.6 KB
|
050617cotognini.pdf
|
3.1 MB
|
050617berenci.pdf
|
5.1 MB
|
050616giudice.pdf
|
313.4 KB
|
050616carlone.pdf
|
685.1 KB
|
050616cruciani.pdf
|
260.2 KB
|
050617niglio.pdf
|
611.3 KB
|
050617palchetti.pdf
|
720.5 KB
|
050616cabianca.pdf
|
541.9 KB
|
//2005-04-19 Digital Rigths Management/
|
Digital Right Management.pdf
|
1.3 MB
|
//2005-10-06 Applicazione della BS7799/
|
Marzegalli - La necessità per le aziende di un approccio integrato alla info security.pdf
|
757.7 KB
|
Gattoli - Criticità e falsi miti nel processo di definizione di un SGSI BS 7799.pdf
|
214.0 KB
|
Conti - Il miglioramento delle performance dei provvedimenti tecnici.pdf
|
662.7 KB
|
DaRos - Cosa sta succedendo nel mercato.pdf
|
268.2 KB
|
Besia- Vantaggi giuridici collegabili alla applicazione della BS 7799.pdf
|
153.3 KB
|
/infosecurity/
|
greco.pdf
|
857.1 KB
|
franchina.pdf
|
129.8 KB
|
guida.pdf
|
293.5 KB
|
piovera.pdf
|
362.4 KB
|
varaldo.pdf
|
57.1 KB
|
faggioli.pdf
|
123.3 KB
|
perucchini.pdf
|
155.2 KB
|
actis_dato.pdf
|
160.3 KB
|
//2004-09 Allasso- Symantec e ActiveCard/
|
Symantec Network Security 7100.pdf
|
129.3 KB
|
Symantec.zip
|
4.0 MB
|
ActiveCard.zip
|
13.5 MB
|
/Rsa/
|
RSA_enVision_Intro v2.ppt
|
7.2 MB
|
RSA_Demo_Authentication_Manager_7.1.exe
|
33.3 MB
|
/Ibm/
|
ISS_CL_University_1008.pdf
|
3.7 MB
|
20081015 CLinksUni_Verona.pdf
|
3.3 MB
|
/sicurezza reti/
|
Armando Lombardi - CISCO.pdf
|
6.0 MB
|
Luca Piccinini - MARCONI.pdf
|
407.8 KB
|
Antonio Lioy - POLITECNICO DI TORINO.pdf
|
128.8 KB
|
Roberto Mircoli - CISCO.pdf
|
4.1 MB
|
Tiziana Moro - ALCATEL.pdf
|
1.3 MB
|
Luca Marzegalli - CEFRIEL.pdf
|
2.4 MB
|
Gigi Tagliapietra - CLUSIT.pdf
|
5.9 MB
|
//2006-06 Recon 2006 - Reverse Engineering/
|
msutton-filefuzz-breadth.wmv
|
166.6 KB
|
msutton-filefuzz-depth.wmv
|
352.9 KB
|
msutton-comraider.wmv
|
1.0 MB
|
asotirov-re-microsoft-binaries.pdf
|
387.7 KB
|
dhulton-breaking-wifi-faster.ppt
|
1.6 MB
|
msutton-filefuzz.zip
|
286.9 KB
|
lightning-ecarrera-unpacking-birds-eye-view.pdf
|
531.0 KB
|
lmiras-fix-bugs-in-binaries.pdf
|
1.3 MB
|
dcox-insiders-view.pdf
|
1.1 MB
|
cabad-anonymous-eannoyance.tgz
|
9.2 MB
|
alopes-x86-os-independent-virus.tgz
|
141.7 KB
|
lightning-ecarrera-win32-static-analysis-in-python.pdf
|
569.1 KB
|
asotirov-re-microsoft-binaries.ppt
|
342.5 KB
|
bunnie-disassembling-and-patching-hardware.ppt
|
47.7 MB
|
aionescu-subverting-w2k3-kernel-integrity-protection.ppt
|
218.6 KB
|
msutton-comraider_setup.exe
|
1.9 MB
|
spoonm-idarub-0.4.zip
|
188.6 KB
|
spoonm-idarub.pdf
|
179.5 KB
|
sconheady-social-engineering-for-pen-testers.pdf
|
587.2 KB
|
vskype-logging-on-off.zip
|
0.9 KB
|
tunangst-secure-development.ppt
|
98.3 KB
|
vskype-part1.pdf
|
2.4 MB
|
msutton-webfuzz-overflow.wmv
|
1.5 MB
|
pamini-five-finger.pdf
|
1.2 MB
|
msutton-fuzzing.ppt
|
2.7 MB
|
msutton-webfuzz.zip
|
130.6 KB
|
vskype-part2.pdf
|
3.0 MB
|
//2004-09-27 Beyond the Internet (Juniper)/
|
JN_Corp_Overview_Ent_4.mht
|
3.7 MB
|
JN_Corp_Overview_Ent_3.mht
|
2.6 MB
|
JN_Corp_Overview_Ent_2.mht
|
2.2 MB
|
JN_Corp_Overview_Ent_1.mht
|
3.5 MB
|
JN_Corp_Overview_Ent_5.mht
|
7.7 MB
|
/Swyx/
|
SwyxWare-Due Case Study.ppt
|
2.5 MB
|
Soluzione_IP-PBX_SwyxWare.ppt
|
4.7 MB
|
/Nokia/
|
NextGeneration Security.ppt
|
3.6 MB
|
NokiaSessioneCommerciale_FP.PDF
|
7.4 MB
|
NokiaSourcefire_CLUni08.ppt
|
3.1 MB
|
NokiaTechnicalSession_Pe.pdf
|
2.6 MB
|
/tutela aziendale/
|
decina.pdf
|
3.7 MB
|
marzegalli.pdf
|
4.0 MB
|
misitano.pdf
|
2.7 MB
|
webbit_gigi.pdf
|
661.5 KB
|
rocca.pdf
|
818.0 KB
|
mircoli.pdf
|
153.4 KB
|
/phion/
|
phion_CL_University.ppt
|
11.0 MB
|
/Citrix/
|
DT2008_sacchetti.ppt
|
4.4 MB
|
/Ruckus/
|
Computerlinks Italy University 2008.ppt
|
8.7 MB
|
/Avocent/
|
Cl University.ppt
|
13.7 MB
|
/Aladdin/
|
Aladdin eSafe il content security proattivo.pptx
|
5.6 MB
|
Casi di successo nella gestione della Strong Authentication.ppt
|
2.5 MB
|
/Juniper/
|
Juniper_Preso_DVD2.pdf
|
3.5 MB
|
/Tipping/
|
2_TippingPointIPS_CoreDeck_053008.ppt
|
12.2 MB
|
3_NAC-IPSDeck042007.ppt
|
5.7 MB
|
4_ThreatLinQ_Presentation_2008-0807.ppt
|
4.2 MB
|
1_TippingPointCorpDeck.ppt
|
4.3 MB
|
/Utimaco/
|
Utimaco_CLinks-Univ_15oct08.ppt
|
12.1 MB
|
/Radware/
|
Clinks_University_ver.A.ppt
|
7.9 MB
|
//2004-10-19 CLUSIT - Il documento elettronico/
|
DE01b.pdf
|
202.9 KB
|
DE01a.pdf
|
161.2 KB
|
Attestato di frequenza - Il documento elettronico (CLUSIT).pdf
|
327.7 KB
|
Gabriele Faggioli - Il documento elettronico.pdf
|
3.0 MB
|
Daniela Rocca - Il documento elettronico.pdf
|
1.6 MB
|
/Websense/
|
WHAS_Biagini_CLinksUniv_Ott08.ppt
|
3.3 MB
|
/Infoblox/
|
Infoblox follow up_full.ppt
|
3.1 MB
|
/Blue Coat/
|
Blue Coat Web Security (BOB).pdf
|
26.8 MB
|
Blue Coat Systems - Better Together RoadShow 2008.pdf
|
9.9 MB
|
Next Generation WAN Optimization.pdf
|
9.3 MB
|
BlueCoat Overview & Security.pdf
|
28.9 MB
|
//2006-01-26 E-Security Lab (IAM e Provisioning)/
|
IAM - Bruno Degradi, Computer Associates.ppt
|
35.6 MB
|
IAM - Emanuela Giannetta, Sun Microsystems.pdf
|
1.1 MB
|
Introduzione - Alessandro Giacchino, BCI Italia.pdf
|
174.6 KB
|
Stato dell'arte - Alessandro Giacchino, BCI Italia.pdf
|
489.9 KB
|
IAM - Michele Gugliemo, NetIQ Country Manager.pdf
|
1.5 MB
|
Appliances e Tools - Vito Divincenzo, Sophos.pdf
|
657.5 KB
|
Appliances e Tools - Elio Molteni, Computer Associates.pdf
|
1.1 MB
|
Appliances e Tools - Giuseppe Borgonovo, Symantec.pdf
|
2.6 MB
|
Appliances e Tools - Marco D'Angelo, Microsoft.pdf
|
5.2 MB
|
IAM - Alberto Ocello, Engiweb Security.pdf
|
751.7 KB
|
IAM - Andrea Rossi, Novell.pdf
|
1.3 MB
|
//2006-03-14 Phishing - Aspetti legali e tecnici/
|
Andrea Ghirardini - Il phishing.pdf
|
752.5 KB
|
Giuseppe Bellazzi - Aspetti legali del phishing.pdf
|
1.7 MB
|
Gerardo Costabile - Phishing e cyber-riciclaggio.pdf
|
2.0 MB
|
attestato di frequenza.pdf
|
158.7 KB
|
PH01.zip
|
2.0 MB
|
/Checkpoint/
|
Total Security Corporate Presentation_CL University.ppt
|
4.1 MB
|
/Trend Micro/
|
WFBS.pdf
|
7.2 MB
|
//2005-07-05 La voce su IP a supporto del business/
|
Sciolla.zip
|
442.1 KB
|
Barrault.zip
|
140.6 KB
|
Bonacina.zip
|
550.1 KB
|
NetConsulting.zip
|
730.7 KB
|
Mancini.zip
|
428.2 KB
|
/Computerlinks/
|
CL PS Global PPT 0.2.ppt
|
2.5 MB
|
//2008-10-09 Security and software development (IBM)/
|
Aspetti organizzativi per la gestione delle identità e del controllo degli accessi.pdf
|
306.7 KB
|
Approccio IBM alla sicurezza fisica e soluzioni innovative.pdf
|
5.0 MB
|
Centro di gestione SPC e gestione incidenti di sicurezza.pdf
|
1.8 MB
|
Come gestire al meglio la sicurezza delle applicazioni web.pdf
|
2.9 MB
|
SPC - Connettività e sicurezza.pdf
|
1.9 MB
|
SPC - Interoperabilità, cooperazione e sicurezza.pdf
|
913.3 KB
|
Sicurezza nella PA italiana.pdf
|
1.0 MB
|
Sistema di gestione per la sicurezza delle informazioni.pdf
|
1.5 MB
|
Modelli per rispondere alle esigenze di continuità operativa.pdf
|
3.0 MB
|
Lo standard BS25999.pdf
|
3.0 MB
|
Come affrontare la conformità per la sicurezza delle informazioni.pdf
|
732.2 KB
|
Continuità operativa nella PA - Linee guida.pdf
|
776.0 KB
|
Evoluzione delle minacce in rete.pdf
|
1.4 MB
|
La sicurezza nell'accesso ai servizi di e-government.pdf
|
261.7 KB
|
Certificazione ISO27001 - L'esperienza IBM.pdf
|
2.2 MB
|
SPC - Identità federate.pdf
|
877.8 KB
|
/Keynote Sessions/
|
Advance Telecommunications Technology-Aid or Threat to Corruption Investigation.pdf
|
4.8 MB
|
2nd Keynote.pdf
|
2.1 MB
|
Internet and IP Networking Impact on Lawful Interception, Criminal Investigation and Intelligence Gathering.pdf
|
2.9 MB
|
//2004-07 First Conference on Email and Anti-Spam (CEAS)/
|
European Union vs. Spam - A Legal Response.pdf
|
113.2 KB
|
Exploring Support Vector Machines and Random Forests for Spam Detection.pdf
|
156.6 KB
|
IP Addresses in Email Clients.pdf
|
97.9 KB
|
Inferring Ongoing Activities of Workstation Users by Clustering Email.pdf
|
46.2 KB
|
Beyond Identity in Electronic Mail System.pdf
|
118.2 KB
|
Extracting social networks and contact information from email and the Web.pdf
|
248.7 KB
|
A Multifaceted Approach to Spam Reduction.pdf
|
130.5 KB
|
Integration of Email and Task Lists.pdf
|
90.5 KB
|
Anatomy of a Phishing Email.pdf
|
64.1 KB
|
Filtron - A Learning-Based Anti-Spam Filter.pdf
|
562.7 KB
|
Internet Users and Spam - about fighting spam.pdf
|
31.5 KB
|
Trends in Spam Products and Methods.pdf
|
46.0 KB
|
Resisting SPAM Delivery by TCP Damping.pdf
|
77.8 KB
|
The Impact of Feature Selection on Signature-Driven Spam Detection.pdf
|
176.5 KB
|
Technological Responses to the Problem of Spam.pdf
|
44.2 KB
|
SpamBayes - Effective open-source, Bayesian based, email classification system.pdf
|
143.5 KB
|
Shall We Stop All Unsolicited Email Messages.pdf
|
136.7 KB
|
Stopping Spam by Extrusion Detection.pdf
|
112.7 KB
|
Reputation Network Analysis for Email Filtering.pdf
|
662.5 KB
|
Personalised, Collaborative Spam Filtering.pdf
|
99.4 KB
|
Word Stemming to Enhance Spam Filtering.pdf
|
22.0 KB
|
Learning to Extract Signature and Reply Lines from Email.pdf
|
86.7 KB
|
Introducing the Enron Corpus.pdf
|
113.0 KB
|
Managing Customer Opt-Outs in a Complex Global Environment.pdf
|
71.8 KB
|
Multiple Email Addresses - A Socio-technical Investigation.pdf
|
100.7 KB
|
Pattern-discovery-based System for the Automatic Identification of SPAM.pdf
|
81.7 KB
|
On Attacking Statistical Spam Filters.pdf
|
141.4 KB
|
No-Email-Collection Flag.pdf
|
123.6 KB
|
SpamGuru - An Enterprise Anti-Spam Filtering System.pdf
|
74.9 KB
|
//2008-07-08 Oracle - Dalla teoria 2.0 alla Business 2.0/
|
Workshop 2.0 2008 07 08 - Report Schede Feedback.xls
|
53.2 KB
|
Workshop 2.0 2008 07 08 - Programma.xls
|
185.3 KB
|
Workshop 2.0 2008 07 08 - Presentazione Arato.pdf
|
1.3 MB
|
Workshop 2.0 2008 07 08 - Elenco Partecipanti.xls
|
26.1 KB
|
Workshop 2.0 2008 07 08 - Presentazione Sigiani.pdf
|
174.4 KB
|
Workshop 2.0 2008 07 08 - Presentazione Spreafico.pdf
|
3.4 MB
|
Workshop 2.0 2008 07 08 - Presentazione Viscanti.mov
|
17.3 MB
|
//2005-12-01 Sicurezza Informatica per la piccola impresa/
|
Sicurezza Informatica per la piccola impresa.pdf
|
248.4 KB
|
/.../Nuove presentazioni Packeteer/
|
Pres Packeteer-Ita Ott-2005.ppt
|
3.8 MB
|
/GFI/Italian Presentations/
|
lanss_presentation_IT.pps
|
1.8 MB
|
fax_presentation_IT.pps
|
1.2 MB
|
mar_presentation_it.pps
|
1.7 MB
|
esm_presentation_it.pps
|
4.3 MB
|
webmon_presentation_IT.pps
|
1.3 MB
|
memsec_presentation_it.pps
|
3.5 MB
|
nsm_presentation_IT.pps
|
1.3 MB
|
esec_presentation_IT.pps
|
1.6 MB
|
//2005-09-13 Progettare un servizio di posta elettronica sicuro/
|
slides scaricate.pdf
|
714.8 KB
|
attestato.pdf
|
151.9 KB
|
Progettare un servizio di posta elettronica sicuro.pdf
|
7.5 MB
|
//2005-10-04 Elementi probatori negli illeciti ed analisi forense/
|
Bruno Fiammella Computer Forensic.pdf
|
769.6 KB
|
Ghirardini Computer Forensic.pdf
|
173.4 KB
|
//2004-02-11 CNIPA - Smartcard (Tecnologie ed applicazioni nella PA)/
|
SeminarioCNIPASmartCard(01102004).ppt
|
188.9 KB
|
/.../Track 1 - ISS for Lawful Interception/
|
Monitoring and Lawful Interception.pdf
|
692.2 KB
|
Passive Monitoring of Packet Telephony and Data Networks.pdf
|
362.9 KB
|
Prevent Loss of Revenue by Detecting and Mitigating Gray VoIP.pdf
|
1.2 MB
|
Mobil Network Interception Standardization.pdf
|
204.5 KB
|
Passive Trunk Monitoring for GSM and PSTN Networks.pdf
|
3.3 MB
|
Conceptional Monitoring.pdf
|
8.9 MB
|
Challenges of Monitoring Converged Networks.pdf
|
308.4 KB
|
VoIP Lawful Intercept.pdf
|
3.7 MB
|
Deep Packet Inspection for Layer 7 Intercept.pdf
|
3.0 MB
|
How to meet Country-Specific Data Retention Requirements Cost-Effectively.pdf
|
334.9 KB
|
Lawful Interception Implementations Challenges.pdf
|
1.9 MB
|
Lawful Interception (LI) Bureau Model.pdf
|
384.8 KB
|
//2004-06-25 CNIPA - La firma digitale e le carte multiservizi della PA/
|
Firma_digitale(SeminarioCNIPA25062004).ppt
|
761.3 KB
|
/.../Track 1 - ISS for Lawful Interception/
|
Using Passive Probes in Packet and Traditional Networks to Deliver High Precision Communications Intercept.pdf
|
201.6 KB
|
Lawful Interception in 2015.pdf
|
285.6 KB
|
Overview of Lawful Interception Challenges and Issues.pdf
|
399.1 KB
|
Technical and political challenges, solutions for active and passive interception.pdf
|
357.4 KB
|
/.../Fingerprint Verification Competition 2004/
|
SampleParticipant.zip
|
451.5 KB
|
fvc2004cfp.doc
|
91.6 KB
|
FvcCheckMemTime.zip
|
15.6 KB
|
DB4_B.zip
|
6.4 MB
|
DB3_B.zip
|
5.6 MB
|
fvc2004cfp.pdf
|
73.3 KB
|
sourceFVC.zip
|
17.5 KB
|
DB2_B.zip
|
6.4 MB
|
DB1_B.zip
|
5.4 MB
|
/.../Face Recognition Vendor Test 2002 Results/
|
Avbpa_2003_evaluation_metrics.pdf
|
444.9 KB
|
AVBPA-2003.pdf
|
94.8 KB
|
FRVT_2002_Evaluation_Report.pdf
|
4.2 MB
|
FRVT_2002_Overview_and_Summary.pdf
|
579.5 KB
|
FRVT_2002_Technical_Appendices.pdf
|
7.6 MB
|
frvt2002_supplemental.pdf
|
1.7 MB
|
/.../Face Recognition Vendor Test 2000 Results/
|
Appendices.pdf
|
11.2 MB
|
FRVT2000_Executive_Overview.pdf
|
409.6 KB
|
FRVT_2000.pdf
|
6.4 MB
|
/.../Fingerprint Verification Competition 2002/
|
FVC2002_results_summary.pdf
|
88.7 KB
|
fvc2002cfp.doc
|
78.8 KB
|
FVC2002_ICPR.pdf
|
608.0 KB
|
fvc2002cfp.pdf
|
57.2 KB
|
source2002.zip
|
4.7 KB
|
/.../Fingerprint Verification Competition 2000/
|
source.zip
|
4.5 KB
|
fvc2000_report.pdf
|
1.3 MB
|
/.../Track 3 - ISS for Data Retention and LEA Handoff/
|
Track Telecommunications Traffic.pdf
|
1.2 MB
|
Different Methods of Data Retention.pdf
|
344.4 KB
|
Data Retention and Archival.pdf
|
102.0 KB
|
Data Retention Low Cost Solutions.pdf
|
445.5 KB
|
A Scalable and Affordable Approach to Data Retention and Retrieval.pdf
|
651.8 KB
|
European Directive on Retained Data and an Update.pdf
|
1.1 MB
|
Automatic Data Retention Solution.pdf
|
2.9 MB
|
ThorpeGlen Solutions - Data Collectors and Concentrators.pdf
|
2.4 MB
|
The Challenges of Collecting Data.pdf
|
2.3 MB
|
//2004-06-18 CNIPA - La tecnologia e le applicazioni delle smart card nell’e-government/
|
SmartCardAvanzato18062004.ppt
|
995.3 KB
|
//2005-03-11 CNIPA - Linee Guida per l’emissione e l’utilizzo della Carta Nazionale dei Servizi/
|
LineeGuidaCNS11032005.ppt
|
1.2 MB
|
/.../Track 2 - ISS for Criminal Investigation and Intelligence Gathering/
|
Legal to Strategic and how to Aggregate with all other Captors.pdf
|
828.5 KB
|
Internet Traffic Decoding.pps
|
2.4 MB
|
Intelligent Surveillance Service Platform.pdf
|
1.7 MB
|
Monitoring of Satellite based Personal Communication Systems.pdf
|
806.1 KB
|
The role of Passive Surveillance.pdf
|
1.5 MB
|
Intelligence Led Policing.pdf
|
629.9 KB
|
Remote Control System.pdf
|
2.2 MB
|
Real Time Capabilities for Speech Analysis.pdf
|
1.4 MB
|
Automatic Compliance Testing for Service and Subscriber Data Monitoring.pdf
|
1.6 MB
|
/.../Track 4 - ISS for Intelligent Video Surveillance and Content Analytics/
|
Video Analytics.pdf
|
1.4 MB
|
Intelligent Video Surveillance & Content Analytics.pdf
|
1.1 MB
|
Activity-Based Forensic Analysis of Unstructured Video Data.pdf
|
1.5 MB
|
/.../Track 2 - ISS for Criminal Investigation and Intelligence Gathering/
|
Conducting Corruption Investigations jointly with Telecom Operators and Vendors (2).pdf
|
43.6 KB
|
7 Highly effective methods to bypass and evade monitoring and interception systems.pdf
|
2.0 MB
|
Conducting Corruption Investigations jointly with Telecom Operators and Vendors (1).pdf
|
121.4 KB
|
Do you Need to Retain the Complete haystack to find the needle.pdf
|
239.6 KB
|
VoIP lawful Intercept.pdf
|
587.3 KB
|
Unified Interception & Location Platform for Law Enforcement and Intelligence Agencies.pdf
|
444.5 KB
|
/.../Track 5 - LEA, Intelligence and Defense Analyst Training and Product Demonstration/
|
Cell Phone Call and Cell Tower Records for Investigators.pdf
|
438.9 KB
|
Total files 1127
|