| | | Certificazioni Professionali in Sicurezza Informatica 2.pdf | 1.16 MB |
| | | Thumbs.db | 22.5 KB |
| | | Certificazioni Professionali in Sicurezza Informatica 1.pdf | 553.25 KB |
| | | HTTP Fingerprinting and Advanced Assessment Techniques (httprint_win32).zip | 824.82 KB |
| | | HTTP Fingerprinting and Advanced Assessment Techniques.pdf | 565.77 KB |
| | | Hardening Windows Servers.pdf | 3.91 MB |
| | | HTTP Fingerprinting and Advanced Assessment Techniques (httprint_paper).zip | 583.89 KB |
| | | HTTP Fingerprinting and Advanced Assessment Techniques (httprint_linux).zip | 641.53 KB |
| | | Hardening Windows Servers.zip | 4.69 MB |
| | | HTTP Fingerprinting and Advanced Assessment Techniques (httprint_macosx).zip | 673.86 KB |
| | | HTTP Fingerprinting and Advanced Assessment Techniques (httprint_freebsd).zip | 693.25 KB |
| | | ISA Server - Best Practices from the Field.ppt | 4.42 MB |
| | | Forensic Secrets for Windows Servers.zip | 4.14 KB |
| | | Performance and Security- How to Have Both.pdf | 550.94 KB |
| | | Penetration Testing.pdf | 117.04 KB |
| | | Password Alternatives for Mobile Devices.pdf | 835.17 KB |
| | | Perimeter What Perimeter.pdf | 468.42 KB |
| | | Practical Privacy- Effectively Complying with Privacy Regulations in a Business Environment.pdf | 354.23 KB |
| | | Proactive and Reactive Security- What's the Best Mix.pdf | 1.62 MB |
| | | Padding Oracle Attacks on the ISO CBC Mode Encryption Standard.pdf | 1021.28 KB |
| | | Periodic Properties of Counter Assisted Stream Ciphers.pdf | 540.03 KB |
| | | Nota 2004.zip | 137.86 MB |
| | | NIH-Educause PKI Interoperability- Phase 3.pdf | 1.26 MB |
| | | stigliani.pdf | 476.3 KB |
| | | wright2.pdf | 100.37 KB |
| | | Zaba.pdf | 38.79 KB |
| | | quintarelli.pps | 151 KB |
| | | Rizzo.pdf | 88.48 KB |
| | | Rizzoli.pdf | 276.07 KB |
| | | scalici.pdf | 184.01 KB |
| | | Sanna.pdf | 538.98 KB |
| | | Rossi.pdf | 496.08 KB |
| | | Vella.pdf | 62.4 KB |
| | | SeminarioCNIPASmartCard(01102004).ppt | 184.5 KB |
| | | Allasso_MKTG_Allot.ppt | 4.33 MB |
| | | Allasso_MKTG_NetReport.ppt | 3.15 MB |
| | | BlueSocket_Allasso.ppt | 11.63 MB |
| | | Welcome-OneDaySeminar-Milano-Roma.ppt | 1.97 MB |
| | | Allasso_MKTG_Netilla.ppt | 2.11 MB |
| | | SmartCardAvanzato18062004.ppt | 972 KB |
| | | CR01.pdf | 698.5 KB |
| | | Firma_digitale(SeminarioCNIPA25062004).ppt | 743.5 KB |
| | | European Union vs. Spam - A Legal Response.pdf | 110.58 KB |
| | | Exploring Support Vector Machines and Random Forests for Spam Detection.pdf | 152.88 KB |
| | | IP Addresses in Email Clients.pdf | 95.58 KB |
| | | Inferring Ongoing Activities of Workstation Users by Clustering Email.pdf | 45.09 KB |
| | | Beyond Identity in Electronic Mail System.pdf | 115.44 KB |
| | | Extracting social networks and contact information from email and the Web.pdf | 242.9 KB |
| | | A Multifaceted Approach to Spam Reduction.pdf | 127.46 KB |
| | | Integration of Email and Task Lists.pdf | 88.42 KB |
| | | Anatomy of a Phishing Email.pdf | 62.61 KB |
| | | Filtron - A Learning-Based Anti-Spam Filter.pdf | 549.48 KB |
| | | Symantec Network Security 7100.pdf | 126.3 KB |
| | | symantec.zip | 3.8 MB |
| | | ActiveCard.zip | 12.86 MB |
| | | mgardiner profile&competition.pps | 1.28 MB |
| | | mgardiner netegrity vision.pps | 829.5 KB |
| | | mgardiner provisioning.pps | 868 KB |
| | | mgardiner federation.pps | 454 KB |
| | | dschreiber Marketing&Partner.pps | 290.5 KB |
| | | 7_Zambon.pps | 1.57 MB |
| | | 9_Lo Reto-Ugolini.pps | 937.5 KB |
| | | 8_Lo Reto-Ugolini.pps | 162.5 KB |
| | | 10_Gardiner.pps | 846.5 KB |
| | | 3_Degradi.pps | 148 KB |
| | | 2_Giacchino.pps | 923.5 KB |
| | | 4_Giannoni.pps | 144.5 KB |
| | | 5_Passoni.pps | 730 KB |
| | | 1_renzi.pps | 12.24 MB |
| | | 6_Fumagalli.pps | 739.5 KB |
| | | JN_Corp_Overview_Ent_4.mht | 3.52 MB |
| | | JN_Corp_Overview_Ent_3.mht | 2.47 MB |
| | | JN_Corp_Overview_Ent_2.mht | 2.07 MB |
| | | JN_Corp_Overview_Ent_1.mht | 3.38 MB |
| | | JN_Corp_Overview_Ent_5.mht | 7.31 MB |
| | | 01 Aladdin-eSafe.ppt | 2.13 MB |
| | | 02 BlueCoat.ppt | 6.4 MB |
| | | 04 BlueSocket.ppt | 12.85 MB |
| | | 09 Juniper.ppt | 10.21 MB |
| | | 10 Check Point Security Vision.ppt | 2.61 MB |
| | | 08 Websense.ppt | 3.29 MB |
| | | 07 Radware.ppt | 4.05 MB |
| | | 05 Nortel.ppt | 7.99 MB |
| | | 06 Nokia.ppt | 6.93 MB |
| | | 03 Stonesoft.ppt | 1.68 MB |
| | | Faggioli - Plenaria.ppt | 83.5 KB |
| | | radware.ppt | 11.71 MB |
| | | PACKETEER.ppt | 3.68 MB |
| | | iss.ppt | 7.53 MB |
| | | SafeAnet.ppt | 2.5 MB |
| | | SonicWALL.ppt | 6.62 MB |
| | | Trend_Micro_1.ppt | 782.5 KB |
| | | Crossbeam.ppt | 8.96 MB |
| | | Check_Point.ppt | 2.62 MB |
| | | Avocent.ppt | 12.44 MB |
| | | Trend_Micro_2.ppt | 1.49 MB |
| | | DE01b.pdf | 198.1 KB |
| | | de01a.pdf | 157.38 KB |
| | | Attestato di frequenza - Il documento elettronico (CLUSIT).pdf | 320.05 KB |
| | | Gabriele Faggioli - Il documento elettronico.pdf | 2.82 MB |
| | | Daniela Rocca - Il documento elettronico.pdf | 1.54 MB |
| | | Technology.ppt | 10.3 MB |
| | | Il valore della certificazione ECB-S nei Data Centres (Da Gasso).zip | 3.49 MB |
| | | La gestione delle identità.zip | 650.1 KB |
| | | Gli strumenti di prevenzione psicologica degli attacchi ad opera di insider (Bruzzone).zip | 27.8 KB |
| | | Come scegliere la migliore tecnologia anti-spam (Costantini).zip | 3.36 MB |
| | | Piattaforma Integrata per la Sicurezza Informatica.zip | 3.69 MB |
| | | Il token con memoria come nuova evoluzione della smartcard (Gissi).zip | 2.22 MB |
| | | Privacy e standard BS7799 (Gentile).zip | 130.78 KB |
| | | Privacy, identità e asset aziendali (Rossi).zip | 1.8 MB |
| | | Soluzione semplice a problemi reali (Turani).zip | 1.31 MB |
| | | Soluzioni di protezione da Spam e Phishing (Casazza).zip | 1.73 MB |
| | | VP01a.pdf | 401.38 KB |
| | | VP01b.pdf | 1.28 MB |
| | | VP01c.pdf | 541.17 KB |
| | | CQ01b.pdf | 1.11 MB |
| | | CQ01a.pdf | 814.55 KB |
| | | 20041213-abstract-bruschi.pdf | 74.15 KB |
| | | 20041213-abstract-burani.pdf | 30.05 KB |
| | | 20041213-abstract-crudele.pdf | 58.52 KB |
| | | 20041213-abstract-marziale.pdf | 54.75 KB |
| | | 20041213-abstract-monsmonni.pdf | 37.11 KB |
| | | Convegno 13 Dicembre 2004-1.zip | 237.15 KB |
| | | WF01a.pdf | 5.89 MB |
| | | WF01b.pdf | 914.91 KB |
| | | SampleParticipant.zip | 440.93 KB |
| | | fvc2004cfp.doc | 89.5 KB |
| | | FvcCheckMemTime.zip | 15.25 KB |
| | | DB4_B.zip | 6.11 MB |
| | | DB3_B.zip | 5.34 MB |
| | | fvc2004cfp.pdf | 71.61 KB |
| | | sourceFVC.zip | 17.12 KB |
| | | DB2_B.zip | 6.06 MB |
| | | DB1_B.zip | 5.17 MB |
| | | Avbpa_2003_evaluation_metrics.pdf | 434.45 KB |
| | | AVBPA-2003.pdf | 92.61 KB |
| | | FRVT_2002_Evaluation_Report.pdf | 4.04 MB |
| | | FRVT_2002_Overview_and_Summary.pdf | 565.9 KB |
| | | FRVT_2002_Technical_Appendices.pdf | 7.21 MB |
| | | frvt2002_supplemental.pdf | 1.66 MB |
| | | appendices.pdf | 10.65 MB |
| | | FRVT2000_Executive_Overview.pdf | 399.98 KB |
| | | FRVT_2000.pdf | 6.11 MB |
| | | FVC2002_results_summary.pdf | 86.66 KB |
| | | fvc2002cfp.doc | 77 KB |
| | | FVC2002_ICPR.pdf | 593.75 KB |
| | | fvc2002cfp.pdf | 55.9 KB |
| | | source2002.zip | 4.64 KB |
| | | Source.zip | 4.43 KB |
| | | fvc2000_report.pdf | 1.2 MB |
| | | Evaluating Technology Properly.pdf | 238.71 KB |
| | | Evaluating Facial Recognition Technology.pdf | 1.11 MB |
| | | Facial Recognition.pdf | 188 KB |
| | | Raffaele Cappelli - Introduzione ai sistemi biometrici.pdf | 8.43 MB |
| | | Raffaele Cappelli - Misurare le prestazioni dei sistemi biometrici.pdf | 2.77 MB |
| | | Attestato di frequenza - Tecniche biometriche (CLUSIT).pdf | 339.38 KB |
| | | Andrea Patrignani - Integrazione di sistemi biometrici.pdf | 6.9 MB |
| | | An Introduction to Evaluating Biometric Systems.pdf | 397.12 KB |
| | | misi-naga-lan+vlan.release.ppt | 519.5 KB |
| | | LineeGuidaCNS11032005.ppt | 1.13 MB |
| | | rf01.pdf | 5.19 MB |
| | | digital right management.pdf | 1.25 MB |
| | | honeypot.pdf | 2.18 MB |
| | | slides scaricate.pdf | 258.94 KB |
| | | clusit-controllo dei lavoratori-attestato.pdf | 145.05 KB |
| | | controllo lavoratori.pdf | 3 MB |
| | | Sciolla.zip | 431.76 KB |
| | | Barrault.zip | 137.32 KB |
| | | Bonacina.zip | 537.21 KB |
| | | NetConsulting.zip | 713.55 KB |
| | | Mancini.zip | 418.12 KB |
| | | slides scaricate.pdf | 698.07 KB |
| | | attestato.pdf | 148.36 KB |
| | | Progettare un servizio di posta elettronica sicuro.pdf | 7.13 MB |
| | | telecom.pdf | 2.19 MB |
| | | self_defending_network_mircoli.pdf | 3.57 MB |
| | | misi_sdn_mgmt.pdf | 2.86 MB |
| | | app_ipc.pdf | 3.19 MB |
| | | Cisco Expo - Documentazione 27 settembre.mht | 94.42 KB |
| | | aons_techday.pdf | 2.35 MB |
| | | convegno (getronics).pdf | 3.84 MB |
| | | IBM.pdf | 1.97 MB |
| | | ce_wlan_dbf.pdf | 6.95 MB |
| | | brdc_pomelli.pdf | 1.79 MB |
| | | evoluzione canale.pdf | 2.7 MB |
| | | wifi_maggiora.pdf | 2.76 MB |
| | | somenzi.pdf | 103.54 KB |
| | | ialfvg.pdf | 2.67 MB |
| | | mgn.pdf | 3.5 MB |
| | | Mobile.pdf | 2.43 MB |
| | | servizi_universitari_fanelli.pdf | 2.42 MB |
| | | expo_fanelli.wmv | 16.97 MB |
| | | webtv.pdf | 625.42 KB |
| | | cisco_service_control.pdf | 3.24 MB |
| | | Pres Packeteer-Ita Ott-2005.ppt | 3.61 MB |
| | | Zultys.ppt | 1.62 MB |
| | | Citrix1.ppt | 5.02 MB |
| | | Citrix2.ppt | 5.07 MB |
| | | Citrix_Latona.ppt | 6.51 MB |
| | | Crossbeam_preso_2005.ppt | 11.33 MB |
| | | CL_ISS DiPierro-18-10-05.pdf | 3.05 MB |
| | | CLU 2005 - Nokia Secure and Mobile Connectivity.zip | 6.43 MB |
| | | CLU 2005 - Nokia Soluzioni di mobilità per l'azienda - parte prima.pdf | 4.47 MB |
| | | CLU 2005 - Nokia Soluzioni di mobilità per l'azienda - parte seconda.pdf | 4.25 MB |
| | | F5Computerlinks.ppt | 10.38 MB |
| | | raoul.pdf | 2.81 MB |
| | | Marioni.pdf | 162.67 KB |
| | | gigi.pdf | 1.09 MB |
| | | gianotti.pdf | 123.97 KB |
| | | 050617carbone.pdf | 902.97 KB |
| | | 050617cotognini.pdf | 2.98 MB |
| | | 050617berenci.pdf | 4.9 MB |
| | | 050616giudice.pdf | 306.06 KB |
| | | 050616carlone.pdf | 669.02 KB |
| | | 050616cruciani.pdf | 254.11 KB |
| | | 050617niglio.pdf | 596.96 KB |
| | | 050617palchetti.pdf | 703.6 KB |
| | | 050616cabianca.pdf | 529.21 KB |
| | | Greco.pdf | 837.04 KB |
| | | franchina.pdf | 126.79 KB |
| | | Guida.pdf | 286.67 KB |
| | | piovera.pdf | 353.94 KB |
| | | varaldo.pdf | 55.72 KB |
| | | faggioli.pdf | 120.46 KB |
| | | perucchini.pdf | 151.51 KB |
| | | actis_dato.pdf | 156.52 KB |
| | | Armando Lombardi - CISCO.pdf | 5.77 MB |
| | | Luca Piccinini - MARCONI.pdf | 398.27 KB |
| | | Antonio Lioy - POLITECNICO DI TORINO.pdf | 125.77 KB |
| | | Roberto Mircoli - CISCO.pdf | 3.87 MB |
| | | Tiziana Moro - ALCATEL.pdf | 1.25 MB |
| | | Luca Marzegalli - CEFRIEL.pdf | 2.31 MB |
| | | Gigi Tagliapietra - CLUSIT.pdf | 5.58 MB |
| | | decina.pdf | 3.55 MB |
| | | marzegalli.pdf | 3.8 MB |
| | | misitano.pdf | 2.54 MB |
| | | webbit_gigi.pdf | 645.95 KB |
| | | rocca.pdf | 798.87 KB |
| | | mircoli.pdf | 149.83 KB |
| | | smau05_wright.pdf | 318.98 KB |
| | | smau05_tagliapietra.pdf | 1.52 MB |
| | | smau05_telmon.pdf | 179.94 KB |
| | | smau05_barbarito.pdf | 538.85 KB |
| | | INDICE.txt | 5.24 KB |
| | | smau05_cavallini.pdf | 800.7 KB |
| | | IBM GSC III GGiudice.pdf | 341.7 KB |
| | | smau05_pasquinucci.pdf | 163.19 KB |
| | | smau05_seveso.pdf | 219.29 KB |
| | | smau05_santucci.pdf | 235.29 KB |
| | | Bruno Fiammella Computer Forensic.pdf | 751.58 KB |
| | | Ghirardini Computer Forensic.pdf | 169.36 KB |
| | | Marzegalli - La necessità per le aziende di un approccio integrato alla info security.pdf | 739.98 KB |
| | | Gattoli - Criticità e falsi miti nel processo di definizione di un SGSI BS 7799.pdf | 208.99 KB |
| | | Conti - Il miglioramento delle performance dei provvedimenti tecnici.pdf | 647.18 KB |
| | | DaRos - Cosa sta succedendo nel mercato.pdf | 261.89 KB |
| | | Besia- Vantaggi giuridici collegabili alla applicazione della BS 7799.pdf | 149.69 KB |
| | | Sicurezza Fisica (MI).pdf | 563.24 KB |
| | | Sicurezza Fisica (RM).pdf | 2.59 MB |
| | | Sicurezza Informatica per la piccola impresa.pdf | 242.58 KB |
| | | Jeremy Rauch - PDB, the Protocol DeBugger.pdf | 1.13 MB |
| | | Jesse Burns - Fuzzing Selected Win32 Interprocess Communication Mechanisms.pdf | 257.03 KB |
| | | Joanna Rutkowska - Subverting Vista Kernel For Fun And Profit.pdf | 5.08 MB |
| | | Jeremiah Grossman - Hacking Intranet Websites from the Outside 'JavaScript malware just got... | 5.41 MB |
| | | John Lambert - Security Engineering in Windows Vista.pdf | 6.97 MB |
| | | Abolade Gbadegesin - The NetIO Stack - Reinventing TCP-IP in Windows Vista.pdf | 20.87 MB |
| | | Hendrik Scholz - SIP Stack Fingerprinting and Stack Difference Attacks.pdf | 2.16 MB |
| | | Jeff Waldron - VOIP Security Essentials.pdf | 298.47 KB |
| | | Jay Schulman - Phishing with Asterisk PBX.pdf | 2.37 MB |
| | | Jamie Butler - The Exponential Growth of Rootkit Techniques.pdf | 235.87 KB |
| | | Reti Wi-Fi (b).pdf | 914.91 KB |
| | | Reti Wi-Fi (a).pdf | 5.89 MB |
| | | IAM - Bruno Degradi, Computer Associates.ppt | 33.93 MB |
| | | IAM - Emanuela Giannetta, Sun Microsystems.pdf | 1.04 MB |
| | | Introduzione - Alessandro Giacchino, BCI Italia.pdf | 170.55 KB |
| | | Stato dell'arte - Alessandro Giacchino, BCI Italia.pdf | 478.44 KB |
| | | IAM - Michele Gugliemo, NetIQ Country Manager.pdf | 1.47 MB |
| | | Appliances e Tools - Vito Divincenzo, Sophos.pdf | 642.11 KB |
| | | Appliances e Tools - Elio Molteni, Computer Associates.pdf | 1.06 MB |
| | | Appliances e Tools - Giuseppe Borgonovo, Symantec.pdf | 2.53 MB |
| | | Appliances e Tools - Marco D'Angelo, Microsoft.pdf | 4.92 MB |
| | | IAM - Alberto Ocello, Engiweb Security.pdf | 734.06 KB |
| | | IAM - Andrea Rossi, Novell.pdf | 1.24 MB |
| | | Andrea Ghirardini - Il phishing.pdf | 734.86 KB |
| | | Giuseppe Bellazzi - Aspetti legali del phishing.pdf | 1.58 MB |
| | | Gerardo Costabile - Phishing e cyber-riciclaggio.pdf | 1.87 MB |
| | | attestato di frequenza.pdf | 155 KB |
| | | PH01.zip | 1.91 MB |
| | | ATS - La TV è mobile.pdf | 750.93 KB |
| | | Pasquale Palma - Formazione 3 - RFID.pdf | 453.29 KB |
| | | Pasquale Palma - Formazione 4 - WiMAX, l'era delle Wireless Man.pdf | 475.12 KB |
| | | Pasquale Palma - Formazione 2 - La sicurezza nelle reti wireless.pdf | 1.06 MB |
| | | Pasquale Palma - Formazione 1 - Wi-Fi e Wireless Lan.pdf | 1.32 MB |
| | | Lucent Technologies - Fixed-mobile convergence.pdf | 675.97 KB |
| | | Oracle - Tagliare i costi e incrementare la produttività con le applicazioni mobili.pdf | 1.07 MB |
| | | Telecom - Extended Mobile Business.pdf | 1.15 MB |
| | | USRobotics - Wireless Lan dalle parole ai fatti.pdf | 1.08 MB |
| | | Vodafone - Mobile data are now.pdf | 771.82 KB |
| | | Sala - Borland ITM_G 2006.pdf | 765.02 KB |
| | | Prof Damiani it gov.pdf | 169.26 KB |
| | | 11 KODAK.pdf | 919.39 KB |
| | | 12 Canon.pdf | 5.61 MB |
| | | 10 Vega Informatica.pdf | 828.67 KB |
| | | 1 Extensity.pdf | 848.94 KB |
| | | 13 Docflow.pdf | 2.51 MB |
| | | 5 Cardinis Solutions.pdf | 698.44 KB |
| | | 14 Esker XP.pdf | 9.08 MB |
| | | 6 Hewlett Packard.pdf | 881.35 KB |
| | | 7 Adobe.pdf | 3.65 MB |
| | | 9 NICA.pdf | 1013.69 KB |
| | | msutton-filefuzz-breadth.wmv | 162.66 KB |
| | | msutton-filefuzz-depth.wmv | 344.65 KB |
| | | msutton-comraider.wmv | 994.14 KB |
| | | asotirov-re-microsoft-binaries.pdf | 378.61 KB |
| | | dhulton-breaking-wifi-faster.ppt | 1.55 MB |
| | | msutton-filefuzz.zip | 280.17 KB |
| | | lightning-ecarrera-unpacking-birds-eye-view.pdf | 518.53 KB |
| | | lmiras-fix-bugs-in-binaries.pdf | 1.27 MB |
| | | dcox-insiders-view.pdf | 1.03 MB |
| | | cabad-anonymous-eannoyance.tgz | 8.76 MB |
| | | Malnati-TELECOM-.zip | 1.71 MB |
| | | Locati-HP-.zip | 372 KB |
| | | Gallo-FRONTRANGE-.zip | 2.48 MB |
| | | Nava-COMPUWARE-.zip | 1.44 MB |
| | | Salvato-KPMG-.zip | 2.06 MB |
| | | Sangiorgi-COMPUWARE-.zip | 2.2 MB |
| | | Pavone-POSTE ITALIANE-.zip | 573.05 KB |
| | | Renna-CA-.zip | 2.24 MB |
| | | De NisI-CASEWISE-.zip | 4.25 MB |
| | | Ciceri-NOLAN NORTON ITALIA-.zip | 1.03 MB |
| | | Davide Carlesi (BlueCoat) Sicurezza delle applicazioni Web based e Wan acceleration.pdf | 5.4 MB |
| | | Domenico Dominoni (IronPort) Internet un ambiente sicuro- Ultime dalla rete.pdf | 789.08 KB |
| | | Bruno Melandri (EMC) I diversi aspetti della sicurezza.pdf | 3.21 MB |
| | | Andrea Rizzi (CheckPoint) Un nuovo approccio alla sicurezza - l'infrastruttura unificata.pdf | 2.67 MB |
| | | Gabriele Faggioli - Profili legali ed obblighi di conservazione.pdf | 99.45 KB |
| | | Primo Bonacina (Magirus) Il ruolo del distributore a valore aggiunto.pdf | 4.85 MB |
| | | Orlando Arena (Nokia) Mobilità Sicura per l'azienda.pdf | 2.96 MB |
| | | Giancarlo Palmieri (Infoblox) Come fornire servizi di Network Identity.pdf | 3.4 MB |
| | | Zanero - 360° Anomaly Based Unsupervised Intrusion Detection - Whitepaper.pdf | 279.16 KB |
| | | Zanero - 360° Anomaly Based Unsupervised Intrusion Detection.pdf | 605.94 KB |
| | | Rutkowska - Defeating Hardware Based RAM Acquisition Tools.pdf | 791.31 KB |
| | | Kendall_McMillan - Practical Malware Analysis.pdf | 3.43 MB |
| | | Kendall_McMillan - Practical Malware Analysis - Whitepaper.pdf | 1023.02 KB |
| | | Heasman - Firmware Rootkits - Whitepaper.pdf | 2.76 MB |
| | | Litchfield - Advanced Oracle Attack Techniques - Papers.zip | 2.8 KB |
| | | Litchfield - Advanced Oracle Attack Techniques.pdf | 997.01 KB |
| | | Martin_Barnum_Christey - Being Explicit about Software Weaknesses.pdf | 2.74 MB |
| | | Martin_Barnum_Christey - Being Explicit about Software Weaknesses - Whitepaper.pdf | 557.71 KB |
| | | Pagliuzzi (NetTeam) - Case History Net Team.pdf | 4.36 MB |
| | | Grillo (Verisign) - Un approccio globale alle frodi online.pdf | 5.34 MB |
| | | Ferradini (Thuga) - Il caso Thuega.pdf | 228.72 KB |
| | | Rottigni (Stonesoft) - La sicurezza dei flussi informativi tramite una gestione unificata delle... | 868.61 KB |
| | | Mastropasqua (IDC) - Le nuove sfide della sicurezza.pdf | 884.45 KB |
| | | Scarpelli (VPTech) - La Sicurezza dei dati come driver.pdf | 409.11 KB |
| | | Fantoni (Adobe) - La sicurezza delle informazioni nell'Azienda.pdf | 16.35 MB |
| | | Zambon (ENI) - Un sistema di SSO con Federation.pdf | 1.32 MB |
| | | Volpi (ISS) - Le nuove esigenze della sicurezza.pdf | 4.16 MB |
| | | Taglioretti (McAfee) - ORANGE ha scelto McAfee DLP.pdf | 2.35 MB |
| | | Business continuity & availability.pdf | 2.07 MB |
| | | Classificazione dei rischi dell'outsourcing.pdf | 455.38 KB |
| | | Come proteggere le vostre informazioni.pdf | 1.92 MB |
| | | Case study Arthis - Identity Management & Provisioning.pdf | 1017.16 KB |
| | | Tecnologia abilitante per la sicurezza delle informazioni.pdf | 142.88 KB |
| | | Stardard e certificazioni per la sicurezza informatica.pdf | 625.75 KB |
| | | Soluzioni tecnologiche IBM per la continuità operativa e casi reali.pdf | 2.16 MB |
| | | OWASP and OWASP Top 10.pdf | 2.5 MB |
| | | Storage Virtualization in action.pdf | 1.17 MB |
| | | Studio Associato Adacta.pdf | 176.4 KB |
| | | Forme di controllo delle informazioni digitali.pdf | 335.56 KB |
| | | Information Security Governance ed incidenti informatici.pdf | 1.29 MB |
| | | DDoS Mitigation.ppt | 4.16 MB |
| | | Computer forensic in azienda.pdf | 356.31 KB |
| | | Come gestire le informazioni e la loro sicurezza all'interno del ciclo di vita.pdf | 5.38 MB |
| | | La computer and network forensics e le investigazioni digitali.pdf | 79.83 KB |
| | | Privacy e controlli sul lavoro.pdf | 331.93 KB |
| | | Benefici di Sicurezza in una Infrastruttura Citrix di Application Delivery.ppt | 5.7 MB |
| | | Lo storage che fa bene al business.pdf | 5.17 MB |
| | | La sicurezza nella PA.pdf | 180.44 KB |
| | | Security Failures in Secure Devices.pdf | 2.25 MB |
| | | Side Channel Analysis on Embedded Systems.pdf | 1.53 MB |
| | | New Viral Threats of PDF Language.pdf | 15.64 KB |
| | | Mobile Phone Spying Tools.pdf | 948.78 KB |
| | | Malware on the Net.pdf | 112.01 KB |
| | | Spam-Evolution.pdf | 186.61 KB |
| | | URI Use and Abuse.pdf | 1.36 MB |
| | | The Reverse Engineer's Unexpected Swiss Army Knife.pdf | 361.73 KB |
| | | LDAP Injection & Blind LDAP Injection.pdf | 1.88 MB |
| | | Iron Chef Black Hat.pdf | 1.66 MB |
| | | Monitoring and Lawful Interception.pdf | 675.97 KB |
| | | Passive Monitoring of Packet Telephony and Data Networks.pdf | 354.39 KB |
| | | Prevent Loss of Revenue by Detecting and Mitigating Gray VoIP.pdf | 1.1 MB |
| | | Mobil Network Interception Standardization.pdf | 199.69 KB |
| | | Passive Trunk Monitoring for GSM and PSTN Networks.pdf | 3.1 MB |
| | | Conceptional Monitoring.pdf | 8.5 MB |
| | | Challenges of Monitoring Converged Networks.pdf | 301.2 KB |
| | | VoIP Lawful Intercept.pdf | 3.57 MB |
| | | Deep Packet Inspection for Layer 7 Intercept.pdf | 2.85 MB |
| | | How to meet Country-Specific Data Retention Requirements Cost-Effectively.pdf | 327.03 KB |
| | | Track Telecommunications Traffic.pdf | 1.15 MB |
| | | Different Methods of Data Retention.pdf | 336.37 KB |
| | | Data Retention and Archival.pdf | 99.64 KB |
| | | Data Retention Low Cost Solutions.pdf | 435.01 KB |
| | | A Scalable and Affordable Approach to Data Retention and Retrieval.pdf | 636.48 KB |
| | | European Directive on Retained Data and an Update.pdf | 1.07 MB |
| | | Automatic Data Retention Solution.pdf | 2.73 MB |
| | | ThorpeGlen Solutions - Data Collectors and Concentrators.pdf | 2.27 MB |
| | | The Challenges of Collecting Data.pdf | 2.15 MB |
| | | Legal to Strategic and how to Aggregate with all other Captors.pdf | 809.13 KB |
| | | Internet Traffic Decoding.pps | 2.3 MB |
| | | Intelligent Surveillance Service Platform.pdf | 1.59 MB |
| | | Monitoring of Satellite based Personal Communication Systems.pdf | 787.17 KB |
| | | The role of Passive Surveillance.pdf | 1.41 MB |
| | | Intelligence Led Policing.pdf | 615.1 KB |
| | | Remote Control System.pdf | 2.11 MB |
| | | Real Time Capabilities for Speech Analysis.pdf | 1.29 MB |
| | | Automatic Compliance Testing for Service and Subscriber Data Monitoring.pdf | 1.56 MB |
| | | Video Analytics.pdf | 1.37 MB |
| | | Intelligent Video Surveillance & Content Analytics.pdf | 1.01 MB |
| | | Activity-Based Forensic Analysis of Unstructured Video Data.pdf | 1.4 MB |
| | | Cell Phone Call and Cell Tower Records for Investigators.pdf | 428.63 KB |
| | | INDICE.pdf | 152.71 KB |
| | | DLP-AIEA.pdf | 1.17 MB |
| | | DLP-AIEA.ppt | 2.35 MB |
| | | LocandinaTorino080410.pdf | 546.91 KB |
| | | SCHEDA-ISCRIZIONE-080410.doc | 108 KB |
| | | linee guida del Garante per posta elettronica e internet.pdf | 154.02 KB |
| | | sentenza cassazione del 19 Dicembre 2007.pdf | 56.98 KB |
| | | sintesi.xls | 42 KB |
| | | linee guida del Garante per posta elettronica e internet (sintesi).pdf | 66.65 KB |
| | | abstract dlp.doc | 156 KB |
| | | casi.pdf | 226.54 KB |
| | | governo_rischio.doc | 299.5 KB |
| | | techfor.ppt | 473 KB |
| | | techfor.tif | 410.73 KB |
| | | techfor.pptx | 168.78 KB |
| | | Advance Telecommunications Technology-Aid or Threat to Corruption Investigation.pdf | 4.55 MB |
| | | 2nd Keynote.pdf | 2.03 MB |
| | | Internet and IP Networking Impact on Lawful Interception, Criminal Investigation and Intelligence... | 2.73 MB |
| | | Using Passive Probes in Packet and Traditional Networks to Deliver High Precision Communications... | 196.91 KB |
| | | Lawful Interception in 2015.pdf | 278.89 KB |
| | | Overview of Lawful Interception Challenges and Issues.pdf | 389.77 KB |
| | | Technical and political challenges, solutions for active and passive interception.pdf | 349.07 KB |
| | | Conducting Corruption Investigations jointly with Telecom Operators and Vendors (2).pdf | 42.56 KB |
| | | 7 Highly effective methods to bypass and evade monitoring and interception systems.pdf | 1.92 MB |
| | | Conducting Corruption Investigations jointly with Telecom Operators and Vendors (1).pdf | 118.6 KB |
| | | Do you Need to Retain the Complete haystack to find the needle.pdf | 233.96 KB |
| | | VoIP Lawful Intercept.pdf | 573.51 KB |
| | | Unified Interception & Location Platform for Law Enforcement and Intelligence Agencies.pdf | 434.04 KB |
| | | Elenco degli speeches.pdf | 246 KB |
| | | Evoluzione delle tecniche e dei profili degli attaccanti.pdf | 801.29 KB |
| | | La Sicurezza in banca.pdf | 605.06 KB |
| | | Data Protection e Retention di Infrastrutture Critiche.pdf | 2.23 MB |
| | | Cosa si può chiedere e cosa si può pretendere da un fornitore di servizi di sicurezza... | 151.65 KB |
| | | A strategy for protecting critical data.pdf | 4.28 MB |
| | | La criminalità informatica in Italia e le attività della Polizia delle Comunicazioni.pdf | 459.63 KB |
| | | Le ultime novità normative in materia di Data Retention.pdf | 492.42 KB |
| | | Minori e nuovi media.pdf | 324.21 KB |
| | | Workshop 2.0 2008 07 08 - Report Schede Feedback.xls | 52 KB |
| | | Workshop 2.0 2008 07 08 - Programma.xls | 180.97 KB |
| | | Workshop 2.0 2008 07 08 - Presentazione Arato.pdf | 1.28 MB |
| | | Workshop 2.0 2008 07 08 - Elenco Partecipanti.xls | 25.5 KB |
| | | Workshop 2.0 2008 07 08 - Presentazione Sigiani.pdf | 170.34 KB |
| | | Workshop 2.0 2008 07 08 - Presentazione Spreafico.pdf | 3.24 MB |
| | | Workshop 2.0 2008 07 08 - Presentazione Viscanti.mov | 16.46 MB |
| | | MauroBonfanti Agora.pdf | 1.04 MB |
| | | PeterVdArend ETSI.pdf | 453.4 KB |
| | | ReneNitzinger Utimaco.pdf | 879.15 KB |
| | | RichardJarvis Detica.pdf | 166.74 KB |
| | | RimKhazhin BTT.pdf | 2.09 MB |
| | | PatrickPaul Qosmos.pdf | 1.91 MB |
| | | OttoKern Group2000.pdf | 1.14 MB |
| | | MichaelThomas DigiTask.pdf | 1.54 MB |
| | | NicolasDeckmyn Amesys.pdf | 943.96 KB |
| | | OlegFedorov Oxygen.pdf | 2.27 MB |
| | | Aspetti organizzativi per la gestione delle identità e del controllo degli accessi.pdf | 299.51 KB |
| | | Approccio IBM alla sicurezza fisica e soluzioni innovative.pdf | 4.74 MB |
| | | Centro di gestione SPC e gestione incidenti di sicurezza.pdf | 1.74 MB |
| | | Come gestire al meglio la sicurezza delle applicazioni web.pdf | 2.74 MB |
| | | SPC - Connettività e sicurezza.pdf | 1.78 MB |
| | | SPC - Interoperabilità, cooperazione e sicurezza.pdf | 891.88 KB |
| | | Sicurezza nella PA italiana.pdf | 1013.85 KB |
| | | Sistema di gestione per la sicurezza delle informazioni.pdf | 1.41 MB |
| | | Modelli per rispondere alle esigenze di continuità operativa.pdf | 2.87 MB |
| | | Lo standard BS25999.pdf | 2.9 MB |
| | | RSA_enVision_Intro v2.ppt | 6.83 MB |
| | | RSA_Demo_Authentication_Manager_7.1.exe | 31.79 MB |
| | | ISS_CL_University_1008.pdf | 3.54 MB |
| | | 20081015 CLinksUni_Verona.pdf | 3.11 MB |
| | | SwyxWare-Due Case Study.ppt | 2.35 MB |
| | | Soluzione_IP-PBX_SwyxWare.ppt | 4.51 MB |
| | | NextGeneration Security.ppt | 3.43 MB |
| | | NokiaSessioneCommerciale_FP.pdf | 7.02 MB |
| | | NokiaSourcefire_CLUni08.ppt | 2.92 MB |
| | | NokiaTechnicalSession_Pe.pdf | 2.46 MB |
| | | phion_CL_University.ppt | 10.48 MB |
| | | DT2008_sacchetti.ppt | 4.18 MB |
| | | Computerlinks Italy University 2008.ppt | 8.29 MB |
| | | Cl University.ppt | 13.11 MB |
| | | Aladdin eSafe il content security proattivo.pptx | 5.29 MB |
| | | Casi di successo nella gestione della Strong Authentication.ppt | 2.36 MB |
| | | Juniper_Preso_DVD2.pdf | 3.33 MB |
| | | 2_TippingPointIPS_CoreDeck_053008.ppt | 11.67 MB |
| | | 3_NAC-IPSDeck042007.ppt | 5.41 MB |
| | | 4_ThreatLinQ_Presentation_2008-0807.ppt | 4.04 MB |
| | | 1_TippingPointCorpDeck.ppt | 4.15 MB |
| | | macho-on-the-fly.zip | 10.01 KB |
| | | Let Your Mach-O Fly (slides).pdf | 417.34 KB |
| | | Emulation-based Software Protection Providing Encrypted Code Execution and Page Granularity Code... | 512.94 KB |
| | | Let Your Mach-O Fly.pdf | 237.04 KB |
| | | Making Privacy-Preserving Data Mining Practical with Smartcards (slides).pdf | 1.82 MB |
| | | New Techniques for Defeating SSL-TLS.pdf | 2.34 MB |
| | | Making Privacy-Preserving Data Mining Practical with Smartcards.pdf | 283.64 KB |
| | | Dissecting Web Attacks.pdf | 1.47 MB |
| | | Dissecting Web Attacks (slides).pdf | 8.18 MB |
| | | Blinded by Flash.pdf | 6.65 KB |