| | Certificazioni Professionali in Sicurezza Informatica 2.pdf | 1.16 MB |
| | Thumbs.db | 22.5 KB |
| | Certificazioni Professionali in Sicurezza Informatica 1.pdf | 553.25 KB |
| | HTTP Fingerprinting and Advanced Assessment Techniques (httprint_win32).zip | 824.82 KB |
| | HTTP Fingerprinting and Advanced Assessment Techniques.pdf | 565.77 KB |
| | Hardening Windows Servers.pdf | 3.91 MB |
| | HTTP Fingerprinting and Advanced Assessment Techniques (httprint_paper).zip | 583.89 KB |
| | HTTP Fingerprinting and Advanced Assessment Techniques (httprint_linux).zip | 641.53 KB |
| | Hardening Windows Servers.zip | 4.69 MB |
| | HTTP Fingerprinting and Advanced Assessment Techniques (httprint_macosx).zip | 673.86 KB |
| | HTTP Fingerprinting and Advanced Assessment Techniques (httprint_freebsd).zip | 693.25 KB |
| | ISA Server - Best Practices from the Field.ppt | 4.42 MB |
| | Forensic Secrets for Windows Servers.zip | 4.14 KB |
| | Performance and Security- How to Have Both.pdf | 550.94 KB |
| | Penetration Testing.pdf | 117.04 KB |
| | Password Alternatives for Mobile Devices.pdf | 835.17 KB |
| | Perimeter What Perimeter.pdf | 468.42 KB |
| | Practical Privacy- Effectively Complying with Privacy Regulations in a Business Environment.pdf | 354.23 KB |
| | Proactive and Reactive Security- What's the Best Mix.pdf | 1.62 MB |
| | Padding Oracle Attacks on the ISO CBC Mode Encryption Standard.pdf | 1021.28 KB |
| | Periodic Properties of Counter Assisted Stream Ciphers.pdf | 540.03 KB |
| | Nota 2004.zip | 137.86 MB |
| | NIH-Educause PKI Interoperability- Phase 3.pdf | 1.26 MB |
| | stigliani.pdf | 476.3 KB |
| | wright2.pdf | 100.37 KB |
| | Zaba.pdf | 38.79 KB |
| | quintarelli.pps | 151 KB |
| | Rizzo.pdf | 88.48 KB |
| | Rizzoli.pdf | 276.07 KB |
| | scalici.pdf | 184.01 KB |
| | Sanna.pdf | 538.98 KB |
| | Rossi.pdf | 496.08 KB |
| | Vella.pdf | 62.4 KB |
| | SeminarioCNIPASmartCard(01102004).ppt | 184.5 KB |
| | Allasso_MKTG_Allot.ppt | 4.33 MB |
| | Allasso_MKTG_NetReport.ppt | 3.15 MB |
| | BlueSocket_Allasso.ppt | 11.63 MB |
| | Welcome-OneDaySeminar-Milano-Roma.ppt | 1.97 MB |
| | Allasso_MKTG_Netilla.ppt | 2.11 MB |
| | SmartCardAvanzato18062004.ppt | 972 KB |
| | CR01.pdf | 698.5 KB |
| | Firma_digitale(SeminarioCNIPA25062004).ppt | 743.5 KB |
| | European Union vs. Spam - A Legal Response.pdf | 110.58 KB |
| | Exploring Support Vector Machines and Random Forests for Spam Detection.pdf | 152.88 KB |
| | IP Addresses in Email Clients.pdf | 95.58 KB |
| | Inferring Ongoing Activities of Workstation Users by Clustering Email.pdf | 45.09 KB |
| | Beyond Identity in Electronic Mail System.pdf | 115.44 KB |
| | Extracting social networks and contact information from email and the Web.pdf | 242.9 KB |
| | A Multifaceted Approach to Spam Reduction.pdf | 127.46 KB |
| | Integration of Email and Task Lists.pdf | 88.42 KB |
| | Anatomy of a Phishing Email.pdf | 62.61 KB |
| | Filtron - A Learning-Based Anti-Spam Filter.pdf | 549.48 KB |
| | Symantec Network Security 7100.pdf | 126.3 KB |
| | symantec.zip | 3.8 MB |
| | ActiveCard.zip | 12.86 MB |
| | mgardiner profile&competition.pps | 1.28 MB |
| | mgardiner netegrity vision.pps | 829.5 KB |
| | mgardiner provisioning.pps | 868 KB |
| | mgardiner federation.pps | 454 KB |
| | dschreiber Marketing&Partner.pps | 290.5 KB |
| | 7_Zambon.pps | 1.57 MB |
| | 9_Lo Reto-Ugolini.pps | 937.5 KB |
| | 8_Lo Reto-Ugolini.pps | 162.5 KB |
| | 10_Gardiner.pps | 846.5 KB |
| | 3_Degradi.pps | 148 KB |
| | 2_Giacchino.pps | 923.5 KB |
| | 4_Giannoni.pps | 144.5 KB |
| | 5_Passoni.pps | 730 KB |
| | 1_renzi.pps | 12.24 MB |
| | 6_Fumagalli.pps | 739.5 KB |
| | JN_Corp_Overview_Ent_4.mht | 3.52 MB |
| | JN_Corp_Overview_Ent_3.mht | 2.47 MB |
| | JN_Corp_Overview_Ent_2.mht | 2.07 MB |
| | JN_Corp_Overview_Ent_1.mht | 3.38 MB |
| | JN_Corp_Overview_Ent_5.mht | 7.31 MB |
| | 01 Aladdin-eSafe.ppt | 2.13 MB |
| | 02 BlueCoat.ppt | 6.4 MB |
| | 04 BlueSocket.ppt | 12.85 MB |
| | 09 Juniper.ppt | 10.21 MB |
| | 10 Check Point Security Vision.ppt | 2.61 MB |
| | 08 Websense.ppt | 3.29 MB |
| | 07 Radware.ppt | 4.05 MB |
| | 05 Nortel.ppt | 7.99 MB |
| | 06 Nokia.ppt | 6.93 MB |
| | 03 Stonesoft.ppt | 1.68 MB |
| | Faggioli - Plenaria.ppt | 83.5 KB |
| | radware.ppt | 11.71 MB |
| | PACKETEER.ppt | 3.68 MB |
| | iss.ppt | 7.53 MB |
| | SafeAnet.ppt | 2.5 MB |
| | SonicWALL.ppt | 6.62 MB |
| | Trend_Micro_1.ppt | 782.5 KB |
| | Crossbeam.ppt | 8.96 MB |
| | Check_Point.ppt | 2.62 MB |
| | Avocent.ppt | 12.44 MB |
| | Trend_Micro_2.ppt | 1.49 MB |
| | DE01b.pdf | 198.1 KB |
| | de01a.pdf | 157.38 KB |
| | Attestato di frequenza - Il documento elettronico (CLUSIT).pdf | 320.05 KB |
| | Gabriele Faggioli - Il documento elettronico.pdf | 2.82 MB |
| | Daniela Rocca - Il documento elettronico.pdf | 1.54 MB |
| | Technology.ppt | 10.3 MB |
| | Il valore della certificazione ECB-S nei Data Centres (Da Gasso).zip | 3.49 MB |
| | La gestione delle identità.zip | 650.1 KB |
| | Gli strumenti di prevenzione psicologica degli attacchi ad opera di insider (Bruzzone).zip | 27.8 KB |
| | Come scegliere la migliore tecnologia anti-spam (Costantini).zip | 3.36 MB |
| | Piattaforma Integrata per la Sicurezza Informatica.zip | 3.69 MB |
| | Il token con memoria come nuova evoluzione della smartcard (Gissi).zip | 2.22 MB |
| | Privacy e standard BS7799 (Gentile).zip | 130.78 KB |
| | Privacy, identità e asset aziendali (Rossi).zip | 1.8 MB |
| | Soluzione semplice a problemi reali (Turani).zip | 1.31 MB |
| | Soluzioni di protezione da Spam e Phishing (Casazza).zip | 1.73 MB |
| | VP01a.pdf | 401.38 KB |
| | VP01b.pdf | 1.28 MB |
| | VP01c.pdf | 541.17 KB |
| | CQ01b.pdf | 1.11 MB |
| | CQ01a.pdf | 814.55 KB |
| | 20041213-abstract-bruschi.pdf | 74.15 KB |
| | 20041213-abstract-burani.pdf | 30.05 KB |
| | 20041213-abstract-crudele.pdf | 58.52 KB |
| | 20041213-abstract-marziale.pdf | 54.75 KB |
| | 20041213-abstract-monsmonni.pdf | 37.11 KB |
| | Convegno 13 Dicembre 2004-1.zip | 237.15 KB |
| | WF01a.pdf | 5.89 MB |
| | WF01b.pdf | 914.91 KB |
| | SampleParticipant.zip | 440.93 KB |
| | fvc2004cfp.doc | 89.5 KB |
| | FvcCheckMemTime.zip | 15.25 KB |
| | DB4_B.zip | 6.11 MB |
| | DB3_B.zip | 5.34 MB |
| | fvc2004cfp.pdf | 71.61 KB |
| | sourceFVC.zip | 17.12 KB |
| | DB2_B.zip | 6.06 MB |
| | DB1_B.zip | 5.17 MB |
| | Avbpa_2003_evaluation_metrics.pdf | 434.45 KB |
| | AVBPA-2003.pdf | 92.61 KB |
| | FRVT_2002_Evaluation_Report.pdf | 4.04 MB |
| | FRVT_2002_Overview_and_Summary.pdf | 565.9 KB |
| | FRVT_2002_Technical_Appendices.pdf | 7.21 MB |
| | frvt2002_supplemental.pdf | 1.66 MB |
| | appendices.pdf | 10.65 MB |
| | FRVT2000_Executive_Overview.pdf | 399.98 KB |
| | FRVT_2000.pdf | 6.11 MB |
| | FVC2002_results_summary.pdf | 86.66 KB |
| | fvc2002cfp.doc | 77 KB |
| | FVC2002_ICPR.pdf | 593.75 KB |
| | fvc2002cfp.pdf | 55.9 KB |
| | source2002.zip | 4.64 KB |
| | Source.zip | 4.43 KB |
| | fvc2000_report.pdf | 1.2 MB |
| | Evaluating Technology Properly.pdf | 238.71 KB |
| | Evaluating Facial Recognition Technology.pdf | 1.11 MB |
| | Facial Recognition.pdf | 188 KB |
| | Raffaele Cappelli - Introduzione ai sistemi biometrici.pdf | 8.43 MB |
| | Raffaele Cappelli - Misurare le prestazioni dei sistemi biometrici.pdf | 2.77 MB |
| | Attestato di frequenza - Tecniche biometriche (CLUSIT).pdf | 339.38 KB |
| | Andrea Patrignani - Integrazione di sistemi biometrici.pdf | 6.9 MB |
| | An Introduction to Evaluating Biometric Systems.pdf | 397.12 KB |
| | misi-naga-lan+vlan.release.ppt | 519.5 KB |
| | LineeGuidaCNS11032005.ppt | 1.13 MB |
| | rf01.pdf | 5.19 MB |
| | digital right management.pdf | 1.25 MB |
| | honeypot.pdf | 2.18 MB |
| | slides scaricate.pdf | 258.94 KB |
| | clusit-controllo dei lavoratori-attestato.pdf | 145.05 KB |
| | controllo lavoratori.pdf | 3 MB |
| | Sciolla.zip | 431.76 KB |
| | Barrault.zip | 137.32 KB |
| | Bonacina.zip | 537.21 KB |
| | NetConsulting.zip | 713.55 KB |
| | Mancini.zip | 418.12 KB |
| | slides scaricate.pdf | 698.07 KB |
| | attestato.pdf | 148.36 KB |
| | Progettare un servizio di posta elettronica sicuro.pdf | 7.13 MB |
| | telecom.pdf | 2.19 MB |
| | self_defending_network_mircoli.pdf | 3.57 MB |
| | misi_sdn_mgmt.pdf | 2.86 MB |
| | app_ipc.pdf | 3.19 MB |
| | Cisco Expo - Documentazione 27 settembre.mht | 94.42 KB |
| | aons_techday.pdf | 2.35 MB |
| | convegno (getronics).pdf | 3.84 MB |
| | IBM.pdf | 1.97 MB |
| | ce_wlan_dbf.pdf | 6.95 MB |
| | brdc_pomelli.pdf | 1.79 MB |
| | evoluzione canale.pdf | 2.7 MB |
| | wifi_maggiora.pdf | 2.76 MB |
| | somenzi.pdf | 103.54 KB |
| | ialfvg.pdf | 2.67 MB |
| | mgn.pdf | 3.5 MB |
| | Mobile.pdf | 2.43 MB |
| | servizi_universitari_fanelli.pdf | 2.42 MB |
| | expo_fanelli.wmv | 16.97 MB |
| | webtv.pdf | 625.42 KB |
| | cisco_service_control.pdf | 3.24 MB |
| | Pres Packeteer-Ita Ott-2005.ppt | 3.61 MB |
| | Zultys.ppt | 1.62 MB |
| | Citrix1.ppt | 5.02 MB |
| | Citrix2.ppt | 5.07 MB |
| | Citrix_Latona.ppt | 6.51 MB |
| | Crossbeam_preso_2005.ppt | 11.33 MB |
| | CL_ISS DiPierro-18-10-05.pdf | 3.05 MB |
| | CLU 2005 - Nokia Secure and Mobile Connectivity.zip | 6.43 MB |
| | CLU 2005 - Nokia Soluzioni di mobilità per l'azienda - parte prima.pdf | 4.47 MB |
| | CLU 2005 - Nokia Soluzioni di mobilità per l'azienda - parte seconda.pdf | 4.25 MB |
| | F5Computerlinks.ppt | 10.38 MB |
| | raoul.pdf | 2.81 MB |
| | Marioni.pdf | 162.67 KB |
| | gigi.pdf | 1.09 MB |
| | gianotti.pdf | 123.97 KB |
| | 050617carbone.pdf | 902.97 KB |
| | 050617cotognini.pdf | 2.98 MB |
| | 050617berenci.pdf | 4.9 MB |
| | 050616giudice.pdf | 306.06 KB |
| | 050616carlone.pdf | 669.02 KB |
| | 050616cruciani.pdf | 254.11 KB |
| | 050617niglio.pdf | 596.96 KB |
| | 050617palchetti.pdf | 703.6 KB |
| | 050616cabianca.pdf | 529.21 KB |
| | Greco.pdf | 837.04 KB |
| | franchina.pdf | 126.79 KB |
| | Guida.pdf | 286.67 KB |
| | piovera.pdf | 353.94 KB |
| | varaldo.pdf | 55.72 KB |
| | faggioli.pdf | 120.46 KB |
| | perucchini.pdf | 151.51 KB |
| | actis_dato.pdf | 156.52 KB |
| | Armando Lombardi - CISCO.pdf | 5.77 MB |
| | Luca Piccinini - MARCONI.pdf | 398.27 KB |
| | Antonio Lioy - POLITECNICO DI TORINO.pdf | 125.77 KB |
| | Roberto Mircoli - CISCO.pdf | 3.87 MB |
| | Tiziana Moro - ALCATEL.pdf | 1.25 MB |
| | Luca Marzegalli - CEFRIEL.pdf | 2.31 MB |
| | Gigi Tagliapietra - CLUSIT.pdf | 5.58 MB |
| | decina.pdf | 3.55 MB |
| | marzegalli.pdf | 3.8 MB |
| | misitano.pdf | 2.54 MB |
| | webbit_gigi.pdf | 645.95 KB |
| | rocca.pdf | 798.87 KB |
| | mircoli.pdf | 149.83 KB |
| | smau05_wright.pdf | 318.98 KB |
| | smau05_tagliapietra.pdf | 1.52 MB |
| | smau05_telmon.pdf | 179.94 KB |
| | smau05_barbarito.pdf | 538.85 KB |
| | INDICE.txt | 5.24 KB |
| | smau05_cavallini.pdf | 800.7 KB |
| | IBM GSC III GGiudice.pdf | 341.7 KB |
| | smau05_pasquinucci.pdf | 163.19 KB |
| | smau05_seveso.pdf | 219.29 KB |
| | smau05_santucci.pdf | 235.29 KB |
| | Bruno Fiammella Computer Forensic.pdf | 751.58 KB |
| | Ghirardini Computer Forensic.pdf | 169.36 KB |
| | Marzegalli - La necessità per le aziende di un approccio integrato alla info security.pdf | 739.98 KB |
| | Gattoli - Criticità e falsi miti nel processo di definizione di un SGSI BS 7799.pdf | 208.99 KB |
| | Conti - Il miglioramento delle performance dei provvedimenti tecnici.pdf | 647.18 KB |
| | DaRos - Cosa sta succedendo nel mercato.pdf | 261.89 KB |
| | Besia- Vantaggi giuridici collegabili alla applicazione della BS 7799.pdf | 149.69 KB |
| | Sicurezza Fisica (MI).pdf | 563.24 KB |
| | Sicurezza Fisica (RM).pdf | 2.59 MB |
| | Sicurezza Informatica per la piccola impresa.pdf | 242.58 KB |
| | Jeremy Rauch - PDB, the Protocol DeBugger.pdf | 1.13 MB |
| | Jesse Burns - Fuzzing Selected Win32 Interprocess Communication Mechanisms.pdf | 257.03 KB |
| | Joanna Rutkowska - Subverting Vista Kernel For Fun And Profit.pdf | 5.08 MB |
| | Jeremiah Grossman - Hacking Intranet Websites from the Outside 'JavaScript malware just got... | 5.41 MB |
| | John Lambert - Security Engineering in Windows Vista.pdf | 6.97 MB |
| | Abolade Gbadegesin - The NetIO Stack - Reinventing TCP-IP in Windows Vista.pdf | 20.87 MB |
| | Hendrik Scholz - SIP Stack Fingerprinting and Stack Difference Attacks.pdf | 2.16 MB |
| | Jeff Waldron - VOIP Security Essentials.pdf | 298.47 KB |
| | Jay Schulman - Phishing with Asterisk PBX.pdf | 2.37 MB |
| | Jamie Butler - The Exponential Growth of Rootkit Techniques.pdf | 235.87 KB |
| | Reti Wi-Fi (b).pdf | 914.91 KB |
| | Reti Wi-Fi (a).pdf | 5.89 MB |
| | IAM - Bruno Degradi, Computer Associates.ppt | 33.93 MB |
| | IAM - Emanuela Giannetta, Sun Microsystems.pdf | 1.04 MB |
| | Introduzione - Alessandro Giacchino, BCI Italia.pdf | 170.55 KB |
| | Stato dell'arte - Alessandro Giacchino, BCI Italia.pdf | 478.44 KB |
| | IAM - Michele Gugliemo, NetIQ Country Manager.pdf | 1.47 MB |
| | Appliances e Tools - Vito Divincenzo, Sophos.pdf | 642.11 KB |
| | Appliances e Tools - Elio Molteni, Computer Associates.pdf | 1.06 MB |
| | Appliances e Tools - Giuseppe Borgonovo, Symantec.pdf | 2.53 MB |
| | Appliances e Tools - Marco D'Angelo, Microsoft.pdf | 4.92 MB |
| | IAM - Alberto Ocello, Engiweb Security.pdf | 734.06 KB |
| | IAM - Andrea Rossi, Novell.pdf | 1.24 MB |
| | Andrea Ghirardini - Il phishing.pdf | 734.86 KB |
| | Giuseppe Bellazzi - Aspetti legali del phishing.pdf | 1.58 MB |
| | Gerardo Costabile - Phishing e cyber-riciclaggio.pdf | 1.87 MB |
| | attestato di frequenza.pdf | 155 KB |
| | PH01.zip | 1.91 MB |
| | ATS - La TV è mobile.pdf | 750.93 KB |
| | Pasquale Palma - Formazione 3 - RFID.pdf | 453.29 KB |
| | Pasquale Palma - Formazione 4 - WiMAX, l'era delle Wireless Man.pdf | 475.12 KB |
| | Pasquale Palma - Formazione 2 - La sicurezza nelle reti wireless.pdf | 1.06 MB |
| | Pasquale Palma - Formazione 1 - Wi-Fi e Wireless Lan.pdf | 1.32 MB |
| | Lucent Technologies - Fixed-mobile convergence.pdf | 675.97 KB |
| | Oracle - Tagliare i costi e incrementare la produttività con le applicazioni mobili.pdf | 1.07 MB |
| | Telecom - Extended Mobile Business.pdf | 1.15 MB |
| | USRobotics - Wireless Lan dalle parole ai fatti.pdf | 1.08 MB |
| | Vodafone - Mobile data are now.pdf | 771.82 KB |
| | Sala - Borland ITM_G 2006.pdf | 765.02 KB |
| | Prof Damiani it gov.pdf | 169.26 KB |
| | 11 KODAK.pdf | 919.39 KB |
| | 12 Canon.pdf | 5.61 MB |
| | 10 Vega Informatica.pdf | 828.67 KB |
| | 1 Extensity.pdf | 848.94 KB |
| | 13 Docflow.pdf | 2.51 MB |
| | 5 Cardinis Solutions.pdf | 698.44 KB |
| | 14 Esker XP.pdf | 9.08 MB |
| | 6 Hewlett Packard.pdf | 881.35 KB |
| | 7 Adobe.pdf | 3.65 MB |
| | 9 NICA.pdf | 1013.69 KB |
| | msutton-filefuzz-breadth.wmv | 162.66 KB |
| | msutton-filefuzz-depth.wmv | 344.65 KB |
| | msutton-comraider.wmv | 994.14 KB |
| | asotirov-re-microsoft-binaries.pdf | 378.61 KB |
| | dhulton-breaking-wifi-faster.ppt | 1.55 MB |
| | msutton-filefuzz.zip | 280.17 KB |
| | lightning-ecarrera-unpacking-birds-eye-view.pdf | 518.53 KB |
| | lmiras-fix-bugs-in-binaries.pdf | 1.27 MB |
| | dcox-insiders-view.pdf | 1.03 MB |
| | cabad-anonymous-eannoyance.tgz | 8.76 MB |
| | Malnati-TELECOM-.zip | 1.71 MB |
| | Locati-HP-.zip | 372 KB |
| | Gallo-FRONTRANGE-.zip | 2.48 MB |
| | Nava-COMPUWARE-.zip | 1.44 MB |
| | Salvato-KPMG-.zip | 2.06 MB |
| | Sangiorgi-COMPUWARE-.zip | 2.2 MB |
| | Pavone-POSTE ITALIANE-.zip | 573.05 KB |
| | Renna-CA-.zip | 2.24 MB |
| | De NisI-CASEWISE-.zip | 4.25 MB |
| | Ciceri-NOLAN NORTON ITALIA-.zip | 1.03 MB |
| | Davide Carlesi (BlueCoat) Sicurezza delle applicazioni Web based e Wan acceleration.pdf | 5.4 MB |
| | Domenico Dominoni (IronPort) Internet un ambiente sicuro- Ultime dalla rete.pdf | 789.08 KB |
| | Bruno Melandri (EMC) I diversi aspetti della sicurezza.pdf | 3.21 MB |
| | Andrea Rizzi (CheckPoint) Un nuovo approccio alla sicurezza - l'infrastruttura unificata.pdf | 2.67 MB |
| | Gabriele Faggioli - Profili legali ed obblighi di conservazione.pdf | 99.45 KB |
| | Primo Bonacina (Magirus) Il ruolo del distributore a valore aggiunto.pdf | 4.85 MB |
| | Orlando Arena (Nokia) Mobilità Sicura per l'azienda.pdf | 2.96 MB |
| | Giancarlo Palmieri (Infoblox) Come fornire servizi di Network Identity.pdf | 3.4 MB |
| | Zanero - 360° Anomaly Based Unsupervised Intrusion Detection - Whitepaper.pdf | 279.16 KB |
| | Zanero - 360° Anomaly Based Unsupervised Intrusion Detection.pdf | 605.94 KB |
| | Rutkowska - Defeating Hardware Based RAM Acquisition Tools.pdf | 791.31 KB |
| | Kendall_McMillan - Practical Malware Analysis.pdf | 3.43 MB |
| | Kendall_McMillan - Practical Malware Analysis - Whitepaper.pdf | 1023.02 KB |
| | Heasman - Firmware Rootkits - Whitepaper.pdf | 2.76 MB |
| | Litchfield - Advanced Oracle Attack Techniques - Papers.zip | 2.8 KB |
| | Litchfield - Advanced Oracle Attack Techniques.pdf | 997.01 KB |
| | Martin_Barnum_Christey - Being Explicit about Software Weaknesses.pdf | 2.74 MB |
| | Martin_Barnum_Christey - Being Explicit about Software Weaknesses - Whitepaper.pdf | 557.71 KB |
| | Pagliuzzi (NetTeam) - Case History Net Team.pdf | 4.36 MB |
| | Grillo (Verisign) - Un approccio globale alle frodi online.pdf | 5.34 MB |
| | Ferradini (Thuga) - Il caso Thuega.pdf | 228.72 KB |
| | Rottigni (Stonesoft) - La sicurezza dei flussi informativi tramite una gestione unificata delle... | 868.61 KB |
| | Mastropasqua (IDC) - Le nuove sfide della sicurezza.pdf | 884.45 KB |
| | Scarpelli (VPTech) - La Sicurezza dei dati come driver.pdf | 409.11 KB |
| | Fantoni (Adobe) - La sicurezza delle informazioni nell'Azienda.pdf | 16.35 MB |
| | Zambon (ENI) - Un sistema di SSO con Federation.pdf | 1.32 MB |
| | Volpi (ISS) - Le nuove esigenze della sicurezza.pdf | 4.16 MB |
| | Taglioretti (McAfee) - ORANGE ha scelto McAfee DLP.pdf | 2.35 MB |
| | Business continuity & availability.pdf | 2.07 MB |
| | Classificazione dei rischi dell'outsourcing.pdf | 455.38 KB |
| | Come proteggere le vostre informazioni.pdf | 1.92 MB |
| | Case study Arthis - Identity Management & Provisioning.pdf | 1017.16 KB |
| | Tecnologia abilitante per la sicurezza delle informazioni.pdf | 142.88 KB |
| | Stardard e certificazioni per la sicurezza informatica.pdf | 625.75 KB |
| | Soluzioni tecnologiche IBM per la continuità operativa e casi reali.pdf | 2.16 MB |
| | OWASP and OWASP Top 10.pdf | 2.5 MB |
| | Storage Virtualization in action.pdf | 1.17 MB |
| | Studio Associato Adacta.pdf | 176.4 KB |
| | Forme di controllo delle informazioni digitali.pdf | 335.56 KB |
| | Information Security Governance ed incidenti informatici.pdf | 1.29 MB |
| | DDoS Mitigation.ppt | 4.16 MB |
| | Computer forensic in azienda.pdf | 356.31 KB |
| | Come gestire le informazioni e la loro sicurezza all'interno del ciclo di vita.pdf | 5.38 MB |
| | La computer and network forensics e le investigazioni digitali.pdf | 79.83 KB |
| | Privacy e controlli sul lavoro.pdf | 331.93 KB |
| | Benefici di Sicurezza in una Infrastruttura Citrix di Application Delivery.ppt | 5.7 MB |
| | Lo storage che fa bene al business.pdf | 5.17 MB |
| | La sicurezza nella PA.pdf | 180.44 KB |
| | Security Failures in Secure Devices.pdf | 2.25 MB |
| | Side Channel Analysis on Embedded Systems.pdf | 1.53 MB |
| | New Viral Threats of PDF Language.pdf | 15.64 KB |
| | Mobile Phone Spying Tools.pdf | 948.78 KB |
| | Malware on the Net.pdf | 112.01 KB |
| | Spam-Evolution.pdf | 186.61 KB |
| | URI Use and Abuse.pdf | 1.36 MB |
| | The Reverse Engineer's Unexpected Swiss Army Knife.pdf | 361.73 KB |
| | LDAP Injection & Blind LDAP Injection.pdf | 1.88 MB |
| | Iron Chef Black Hat.pdf | 1.66 MB |
| | Monitoring and Lawful Interception.pdf | 675.97 KB |
| | Passive Monitoring of Packet Telephony and Data Networks.pdf | 354.39 KB |
| | Prevent Loss of Revenue by Detecting and Mitigating Gray VoIP.pdf | 1.1 MB |
| | Mobil Network Interception Standardization.pdf | 199.69 KB |
| | Passive Trunk Monitoring for GSM and PSTN Networks.pdf | 3.1 MB |
| | Conceptional Monitoring.pdf | 8.5 MB |
| | Challenges of Monitoring Converged Networks.pdf | 301.2 KB |
| | VoIP Lawful Intercept.pdf | 3.57 MB |
| | Deep Packet Inspection for Layer 7 Intercept.pdf | 2.85 MB |
| | How to meet Country-Specific Data Retention Requirements Cost-Effectively.pdf | 327.03 KB |
| | Track Telecommunications Traffic.pdf | 1.15 MB |
| | Different Methods of Data Retention.pdf | 336.37 KB |
| | Data Retention and Archival.pdf | 99.64 KB |
| | Data Retention Low Cost Solutions.pdf | 435.01 KB |
| | A Scalable and Affordable Approach to Data Retention and Retrieval.pdf | 636.48 KB |
| | European Directive on Retained Data and an Update.pdf | 1.07 MB |
| | Automatic Data Retention Solution.pdf | 2.73 MB |
| | ThorpeGlen Solutions - Data Collectors and Concentrators.pdf | 2.27 MB |
| | The Challenges of Collecting Data.pdf | 2.15 MB |
| | Legal to Strategic and how to Aggregate with all other Captors.pdf | 809.13 KB |
| | Internet Traffic Decoding.pps | 2.3 MB |
| | Intelligent Surveillance Service Platform.pdf | 1.59 MB |
| | Monitoring of Satellite based Personal Communication Systems.pdf | 787.17 KB |
| | The role of Passive Surveillance.pdf | 1.41 MB |
| | Intelligence Led Policing.pdf | 615.1 KB |
| | Remote Control System.pdf | 2.11 MB |
| | Real Time Capabilities for Speech Analysis.pdf | 1.29 MB |
| | Automatic Compliance Testing for Service and Subscriber Data Monitoring.pdf | 1.56 MB |
| | Video Analytics.pdf | 1.37 MB |
| | Intelligent Video Surveillance & Content Analytics.pdf | 1.01 MB |
| | Activity-Based Forensic Analysis of Unstructured Video Data.pdf | 1.4 MB |
| | Cell Phone Call and Cell Tower Records for Investigators.pdf | 428.63 KB |
| | INDICE.pdf | 152.71 KB |
| | DLP-AIEA.pdf | 1.17 MB |
| | DLP-AIEA.ppt | 2.35 MB |
| | LocandinaTorino080410.pdf | 546.91 KB |
| | SCHEDA-ISCRIZIONE-080410.doc | 108 KB |
| | linee guida del Garante per posta elettronica e internet.pdf | 154.02 KB |
| | sentenza cassazione del 19 Dicembre 2007.pdf | 56.98 KB |
| | sintesi.xls | 42 KB |
| | linee guida del Garante per posta elettronica e internet (sintesi).pdf | 66.65 KB |
| | abstract dlp.doc | 156 KB |
| | casi.pdf | 226.54 KB |
| | governo_rischio.doc | 299.5 KB |
| | techfor.ppt | 473 KB |
| | techfor.tif | 410.73 KB |
| | techfor.pptx | 168.78 KB |
| | Advance Telecommunications Technology-Aid or Threat to Corruption Investigation.pdf | 4.55 MB |
| | 2nd Keynote.pdf | 2.03 MB |
| | Internet and IP Networking Impact on Lawful Interception, Criminal Investigation and Intelligence... | 2.73 MB |
| | Using Passive Probes in Packet and Traditional Networks to Deliver High Precision Communications... | 196.91 KB |
| | Lawful Interception in 2015.pdf | 278.89 KB |
| | Overview of Lawful Interception Challenges and Issues.pdf | 389.77 KB |
| | Technical and political challenges, solutions for active and passive interception.pdf | 349.07 KB |
| | Conducting Corruption Investigations jointly with Telecom Operators and Vendors (2).pdf | 42.56 KB |
| | 7 Highly effective methods to bypass and evade monitoring and interception systems.pdf | 1.92 MB |
| | Conducting Corruption Investigations jointly with Telecom Operators and Vendors (1).pdf | 118.6 KB |
| | Do you Need to Retain the Complete haystack to find the needle.pdf | 233.96 KB |
| | VoIP Lawful Intercept.pdf | 573.51 KB |
| | Unified Interception & Location Platform for Law Enforcement and Intelligence Agencies.pdf | 434.04 KB |
| | Elenco degli speeches.pdf | 246 KB |
| | Evoluzione delle tecniche e dei profili degli attaccanti.pdf | 801.29 KB |
| | La Sicurezza in banca.pdf | 605.06 KB |
| | Data Protection e Retention di Infrastrutture Critiche.pdf | 2.23 MB |
| | Cosa si può chiedere e cosa si può pretendere da un fornitore di servizi di sicurezza... | 151.65 KB |
| | A strategy for protecting critical data.pdf | 4.28 MB |
| | La criminalità informatica in Italia e le attività della Polizia delle Comunicazioni.pdf | 459.63 KB |
| | Le ultime novità normative in materia di Data Retention.pdf | 492.42 KB |
| | Minori e nuovi media.pdf | 324.21 KB |
| | Workshop 2.0 2008 07 08 - Report Schede Feedback.xls | 52 KB |
| | Workshop 2.0 2008 07 08 - Programma.xls | 180.97 KB |
| | Workshop 2.0 2008 07 08 - Presentazione Arato.pdf | 1.28 MB |
| | Workshop 2.0 2008 07 08 - Elenco Partecipanti.xls | 25.5 KB |
| | Workshop 2.0 2008 07 08 - Presentazione Sigiani.pdf | 170.34 KB |
| | Workshop 2.0 2008 07 08 - Presentazione Spreafico.pdf | 3.24 MB |
| | Workshop 2.0 2008 07 08 - Presentazione Viscanti.mov | 16.46 MB |
| | MauroBonfanti Agora.pdf | 1.04 MB |
| | PeterVdArend ETSI.pdf | 453.4 KB |
| | ReneNitzinger Utimaco.pdf | 879.15 KB |
| | RichardJarvis Detica.pdf | 166.74 KB |
| | RimKhazhin BTT.pdf | 2.09 MB |
| | PatrickPaul Qosmos.pdf | 1.91 MB |
| | OttoKern Group2000.pdf | 1.14 MB |
| | MichaelThomas DigiTask.pdf | 1.54 MB |
| | NicolasDeckmyn Amesys.pdf | 943.96 KB |
| | OlegFedorov Oxygen.pdf | 2.27 MB |
| | Aspetti organizzativi per la gestione delle identità e del controllo degli accessi.pdf | 299.51 KB |
| | Approccio IBM alla sicurezza fisica e soluzioni innovative.pdf | 4.74 MB |
| | Centro di gestione SPC e gestione incidenti di sicurezza.pdf | 1.74 MB |
| | Come gestire al meglio la sicurezza delle applicazioni web.pdf | 2.74 MB |
| | SPC - Connettività e sicurezza.pdf | 1.78 MB |
| | SPC - Interoperabilità, cooperazione e sicurezza.pdf | 891.88 KB |
| | Sicurezza nella PA italiana.pdf | 1013.85 KB |
| | Sistema di gestione per la sicurezza delle informazioni.pdf | 1.41 MB |
| | Modelli per rispondere alle esigenze di continuità operativa.pdf | 2.87 MB |
| | Lo standard BS25999.pdf | 2.9 MB |
| | RSA_enVision_Intro v2.ppt | 6.83 MB |
| | RSA_Demo_Authentication_Manager_7.1.exe | 31.79 MB |
| | ISS_CL_University_1008.pdf | 3.54 MB |
| | 20081015 CLinksUni_Verona.pdf | 3.11 MB |
| | SwyxWare-Due Case Study.ppt | 2.35 MB |
| | Soluzione_IP-PBX_SwyxWare.ppt | 4.51 MB |
| | NextGeneration Security.ppt | 3.43 MB |
| | NokiaSessioneCommerciale_FP.pdf | 7.02 MB |
| | NokiaSourcefire_CLUni08.ppt | 2.92 MB |
| | NokiaTechnicalSession_Pe.pdf | 2.46 MB |
| | phion_CL_University.ppt | 10.48 MB |
| | DT2008_sacchetti.ppt | 4.18 MB |
| | Computerlinks Italy University 2008.ppt | 8.29 MB |
| | Cl University.ppt | 13.11 MB |
| | Aladdin eSafe il content security proattivo.pptx | 5.29 MB |
| | Casi di successo nella gestione della Strong Authentication.ppt | 2.36 MB |
| | Juniper_Preso_DVD2.pdf | 3.33 MB |
| | 2_TippingPointIPS_CoreDeck_053008.ppt | 11.67 MB |
| | 3_NAC-IPSDeck042007.ppt | 5.41 MB |
| | 4_ThreatLinQ_Presentation_2008-0807.ppt | 4.04 MB |
| | 1_TippingPointCorpDeck.ppt | 4.15 MB |
| | macho-on-the-fly.zip | 10.01 KB |
| | Let Your Mach-O Fly (slides).pdf | 417.34 KB |
| | Emulation-based Software Protection Providing Encrypted Code Execution and Page Granularity Code... | 512.94 KB |
| | Let Your Mach-O Fly.pdf | 237.04 KB |
| | Making Privacy-Preserving Data Mining Practical with Smartcards (slides).pdf | 1.82 MB |
| | New Techniques for Defeating SSL-TLS.pdf | 2.34 MB |
| | Making Privacy-Preserving Data Mining Practical with Smartcards.pdf | 283.64 KB |
| | Dissecting Web Attacks.pdf | 1.47 MB |
| | Dissecting Web Attacks (slides).pdf | 8.18 MB |
| | Blinded by Flash.pdf | 6.65 KB |