Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 7
- Management 5
- Security measures 5
- Computer networks 4
- Ecumenismo 4
- Authorized 3
- Bible 3
- Data protection 3
- Historia 3
- Iglesia Católica 3
- Information technology 3
- Mac OS 3
- Teología 3
- Versions 3
- BIBLES 2
- Bible and literature 2
- Business 2
- Corporate culture 2
- Crítica e interpretación 2
- Església Catòlica 2
- History 2
- Macintosh (Computer) 2
- Operating systems (Computers) 2
- Organizational change 2
- RELIGION 2
- Relaciones 2
- - Historia 1
- - Iglesia 1
- Access control 1
- African Americans 1
-
61por Shipley, Todd G.Tabla de Contenidos: “…Front Cover; Investigating Internet Crimes; Copyright Page; Contents; Foreword; Preface; About the Authors; About the Technical Editor; Acknowledgments; 1 Introduction to Internet Crime; Defining Internet crime; Internet crime's prevalence; CSI 2010/2011 Computer Crime and Security Survey; NortonTM Cybercrime Report 2011; HTCIA 2011 Report on Cybercrime Investigation; McAfee® Threats Reports; 2012 Data Breach Investigations Report; Internet Crime Compliant Center; Internet harassment; Traditional crimes and the Internet; Investigative responses to Internet crime…”
Publicado 2014
Libro electrónico -
62por Pogue, David, 1963-Tabla de Contenidos: “…Special Software, Special Problems; ACDSee; Acrobat Reader; ACT; Ad Subtract (Pop-up Stopper); Adobe [your favorite program here]; America Online; AIM (AOL Instant Messenger); Children's Software; Easy CD Creator; Encarta; Eudora; Excel; Firefox; Games; Google Desktop Search; ICQ; Internet Explorer; iTunes; Limewire; McAfee VirusScan; Microsoft Access; Microsoft Money; Microsoft Office; Microsoft Publisher…”
Publicado 2009
Libro electrónico -
63Publicado 2019Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico
-
64por Viega, John“…Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. …”
Publicado 2009
Libro electrónico -
65
-
66Publicado 2007“…This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or applicationNew material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking ""unbreakable"" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and VistaAlso features the first-ever published information on exploiting Cisco's IOS, with content that has never before been exploredThe companion Web site fe…”
Libro electrónico -
67Publicado 2023Tabla de Contenidos: “…Chapter 11 Cybercrime Task Force -- The Cryptocurrency Intelligence Program -- Cyber Fraud Task Force -- The DOJ's Cryptocurrency Enforcement Framework -- Joint Cybercrime Action Taskforce -- The EU's Proposed Digital Asset Legislation -- Notes -- Chapter 12 Money Laundering -- Shuttering of Bulgaria-Based BTC-e Bitcoin Exchange-FinCEN's First Action Against a Foreign-Located MSB and Second-Highest Penalty of 110 Million -- Suex, 2021 -- BitMEX -- Tian Yinyin and Li Jiadong -- Helix13 -- Notes -- Chapter 13 Theft Hacking and Ransom Payments -- Notes -- Chapter 14 Cryptocurrency Bribes -- Notes -- Chapter 15 Corruption -- Notes -- Chapter 16 US Tax Evasion -- Bob Brockman -- John McAfee -- Notes -- Chapter 17 Intellectual Property Espionage and Cryptocurrency -- Notes -- Chapter 18 The US Government Implements Blockchain Programs to Improve Transparency and Efficiency -- The General Services Administration (GSA) -- Department of the Treasury -- US State Department -- Department of Defense (DOD) -- Department of Homeland Security (DHS) -- National Aeronautics and Space Administration (NASA) -- Notes -- Chapter 19 Supply Chain Management with Blockchain Amid the COVID Pandemic -- Blockchain Adoption by US Federal Food and Disease Regulators -- Blockchain Adoption to Track Meat Supply Chain in Australia -- Operation Carne Fraca and Other Violations in the Meat Industry -- Blockchain for Tracking Corruption in Government Funds and Grants -- Tracing Fishy Risks with Blockchain Tech Amid the COVID-19 Pandemic -- Seafood Industry-Related Malpractices -- COVID-19-Related Risks in Seafood Supply Chains -- Seafood Safety in the United States -- Seafood Fraud in the United States -- Mislabeling, Fraud, and Tax Evasion -- Price Fixing and Collusion -- Notes -- Chapter 20 Are NFTs Here to Stay? …”
Libro electrónico -
68Tabla de Contenidos: “…Botnets -- A Closer Look at Spyware -- Trojans and Backdoors -- Rootkits -- Viruses and Worms -- Botnets -- Brief History of Viruses, Worms, and Trojans -- The Current Situation -- Anti-Virus Software -- Need for Anti-Virus Software -- Top 5 Commercially Available Anti-Virus Software -- Symantec Norton Anti-Virus Software -- McAfee Anti- Virus -- Kaspersky Anti- Virus -- Bitdefender Anti- Virus -- AVG Anti-Virus Software -- A Few Words of Caution -- Chapter Summary -- Chapter 8: Cryptography -- Introduction -- Cryptographic Algorithms -- Symmetric Key Cryptography -- Key Distribution -- Asymmetric Key Cryptography -- Public Key Cryptography -- RSA Algorithm -- Advantages of Public Key Cryptography -- Applications of PKC -- Public Key Infrastructure (PKI) -- Certificate Authority (CA) -- Digital Certificate -- Hash Function Cryptography -- Popular Hashes -- Digital Signatures -- Summary of Cryptography Standard Algorithms -- Disk / Drive Encryption -- Attacks on Cryptography -- Chapter Summary -- Part IV: Network Security -- Chapter 9: Understanding Networks and Network Security -- Introduction -- Networking Fundamentals -- Computer Communication -- Network and its Components -- Network Protocols -- OSI (Open Systems Interconnection) Reference Model -- TCP/IP Model -- Network Vulnerabilities and Threats -- Vulnerabilities -- Security Policy Weaknesses -- Technology Weaknesses -- Configuration Weaknesses -- Threats -- Attacks -- Reconnaissance -- Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) -- Other Attacks on Networks -- How to counter the Network Attacks -- Chapter Summary -- Chapter 10: Firewalls -- Introduction -- How Do You Protect a Network? …”
Libro electrónico -
69Publicado 2004“…Coverage includes Step-by-step junk mail filtering with Procmail Protecting Sendmail, Postfix, qmail, Microsoft Exchange, and Lotus Domino servers from spam Making the most of native MTA anti-spam features, including whitelists/blacklists, DNS black hole services, and header checking Distributed checksum filtering solutions, including Vipul's Razor and Distributed Checksum Clearinghouse McAfee SpamKiller for Lotus Domino McAfee SpamKiller for Microsoft Exchange Implementing and managing SpamAssassin Implementing SMTP AUTH, providing effective outbound SMTP authentication and relaying with any mail client; and STARTTLS, encrypting outbound mail content, user names, and passwords Sender verification techniques, including challenge/response, special use addresses, and sender compute Anti-spam solutions for Outlook, Outlook Express, Mozilla Messenger, and Unix mail clients Whatever your IT environment and mail platform, Slamming Spam's defense in-depth strategies can help you dramatically reduce spam and all its attendant costs—IT staff time, network/computing resources, and user productivity. © Copyright Pearson Education. …”
Libro electrónico -
70Publicado 2012“…In the past he has worked at startups and larger companies like Google, Microsoft, and McAfee. Currently, Paul is a co-founder at Errplane, a cloud based service for monitoring and alerting on application performance and metrics. …”
-
71Publicado 2013“…Morace gives you an inside look at how Chubb Insurance, McAfee, EMC, T-Mobile, Bupa, SolarWinds, UBS, Alcatel-Lucent, Genentech, and others have applied his methods. …”
Grabación no musical -
72Publicado 2017“…Using insight and case studies, Mastering Digital Business does a superb job guiding us through the changes coming, and helping us think through not only new product and logistics strategies, but how management itself must evolve to thrive in the coming decades.'' R. Preston McAfee, Microsoft, Chief Economist. --- ''By their very nature, transformations require disruptive changes. …”
Libro electrónico -
73Publicado 2013“…Morace gives you an inside look at how Chubb Insurance, McAfee, EMC, T-Mobile, Bupa, SolarWinds, UBS, Alcatel-Lucent, Genentech, and others have applied his methods. …”
Grabación de sonido -
74Publicado 2015“…Why Should Anyone Care at All about Privacy, Privacy Engineering, or Data? Michelle Dennedy (McAfee, an Intel Company) Learn how to ..…”