Κατάλογος Βιβλιοθηκών Mediterranean College

Image from OpenLibrary

Extensive Survey on Anonymity Over Internet and Anonymity Networks

Contributor(s): Material type: TextPublication details: 2016Description: 42Summary: Introduction, Internet Anonymity, Anonymity and Pseudonymity, Anonymity on the Internet, Positive and Negative Elements of Anonymity, Cyber Terrorism and Cyber Warfare, The Appeal of Cyber Terrorism for Terrorists, Dark Web, Hacktivism, Deep Web, Safeguarding Personal Data and Transfer Information, Certification, Authentication, Confidentiality, Privacy of Personal Data, Messaging Privacy, Integrity, Firewalls, The Necessity of Firewall Use, Firewall Design Issues, Features of Firewalls, Firewall Weaknesses, Psudonymity vs. Anonymity, Anonymity Systems, Mix Networks, High-Latency Anonymity Systems, Low-Latency Anonymity Systems, Anonymous Web Browsing, Anonymity Protocols, Anonymizer, Crowds, Onion Routing, TOR, TRUSTe, Lucent Personalized Web Assistant, Hordes, Freedom, I2P, Security Threat Model, Eavesdropping, Denial of Service (DoS) Attack, Conclusion, References.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Barcode
Διπλωματική εργασία MC Athens Campus Library COMP 2016 (31) (Browse shelf(Opens below)) 1 Available 9780000087058

Introduction, Internet Anonymity, Anonymity and Pseudonymity, Anonymity on the Internet, Positive and Negative Elements of Anonymity, Cyber Terrorism and Cyber Warfare, The Appeal of Cyber Terrorism for Terrorists, Dark Web, Hacktivism, Deep Web, Safeguarding Personal Data and Transfer Information, Certification, Authentication, Confidentiality, Privacy of Personal Data, Messaging Privacy, Integrity, Firewalls, The Necessity of Firewall Use, Firewall Design Issues, Features of Firewalls, Firewall Weaknesses, Psudonymity vs. Anonymity, Anonymity Systems, Mix Networks, High-Latency Anonymity Systems, Low-Latency Anonymity Systems, Anonymous Web Browsing, Anonymity Protocols, Anonymizer, Crowds, Onion Routing, TOR, TRUSTe, Lucent Personalized Web Assistant, Hordes, Freedom, I2P, Security Threat Model, Eavesdropping, Denial of Service (DoS) Attack, Conclusion, References.

There are no comments on this title.

to post a comment.

MC Athens Campus Library
Πατησίων 94 & Κοδριγκτώνος 13, 104 34
Πελλήνης 8 & Πατησίων 107, 112 51
Τ: +30 210 8899600

MC Thessaloniki Campus Library
Ίωνος Δραγούμη 21, 54625 | Ίωνος Δραγούμη 15, 54625
Τ: +30 2310 287779 – Τ: +30 2314 440300