Mostrando 61 - 74 Resultados de 74 Para Buscar '"McAfee"', tiempo de consulta: 0.10s Limitar resultados
  1. 61
    por Shipley, Todd G.
    Publicado 2014
    Tabla de Contenidos: “…Front Cover; Investigating Internet Crimes; Copyright Page; Contents; Foreword; Preface; About the Authors; About the Technical Editor; Acknowledgments; 1 Introduction to Internet Crime; Defining Internet crime; Internet crime's prevalence; CSI 2010/2011 Computer Crime and Security Survey; NortonTM Cybercrime Report 2011; HTCIA 2011 Report on Cybercrime Investigation; McAfee® Threats Reports; 2012 Data Breach Investigations Report; Internet Crime Compliant Center; Internet harassment; Traditional crimes and the Internet; Investigative responses to Internet crime…”
    Libro electrónico
  2. 62
    por Pogue, David, 1963-
    Publicado 2009
    Tabla de Contenidos: “…Special Software, Special Problems; ACDSee; Acrobat Reader; ACT; Ad Subtract (Pop-up Stopper); Adobe [your favorite program here]; America Online; AIM (AOL Instant Messenger); Children's Software; Easy CD Creator; Encarta; Eudora; Excel; Firefox; Games; Google Desktop Search; ICQ; Internet Explorer; iTunes; Limewire; McAfee VirusScan; Microsoft Access; Microsoft Money; Microsoft Office; Microsoft Publisher…”
    Libro electrónico
  3. 63
    Publicado 2019
    Libro electrónico
  4. 64
    por Viega, John
    Publicado 2009
    “…Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. …”
    Libro electrónico
  5. 65
    Publicado 2022
    Libro
  6. 66
    Publicado 2007
    “…This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or applicationNew material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking ""unbreakable"" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and VistaAlso features the first-ever published information on exploiting Cisco's IOS, with content that has never before been exploredThe companion Web site fe…”
    Libro electrónico
  7. 67
    Publicado 2023
    Tabla de Contenidos: “…Chapter 11 Cybercrime Task Force -- The Cryptocurrency Intelligence Program -- Cyber Fraud Task Force -- The DOJ's Cryptocurrency Enforcement Framework -- Joint Cybercrime Action Taskforce -- The EU's Proposed Digital Asset Legislation -- Notes -- Chapter 12 Money Laundering -- Shuttering of Bulgaria-Based BTC-e Bitcoin Exchange-FinCEN's First Action Against a Foreign-Located MSB and Second-Highest Penalty of 110 Million -- Suex, 2021 -- BitMEX -- Tian Yinyin and Li Jiadong -- Helix13 -- Notes -- Chapter 13 Theft Hacking and Ransom Payments -- Notes -- Chapter 14 Cryptocurrency Bribes -- Notes -- Chapter 15 Corruption -- Notes -- Chapter 16 US Tax Evasion -- Bob Brockman -- John McAfee -- Notes -- Chapter 17 Intellectual Property Espionage and Cryptocurrency -- Notes -- Chapter 18 The US Government Implements Blockchain Programs to Improve Transparency and Efficiency -- The General Services Administration (GSA) -- Department of the Treasury -- US State Department -- Department of Defense (DOD) -- Department of Homeland Security (DHS) -- National Aeronautics and Space Administration (NASA) -- Notes -- Chapter 19 Supply Chain Management with Blockchain Amid the COVID Pandemic -- Blockchain Adoption by US Federal Food and Disease Regulators -- Blockchain Adoption to Track Meat Supply Chain in Australia -- Operation Carne Fraca and Other Violations in the Meat Industry -- Blockchain for Tracking Corruption in Government Funds and Grants -- Tracing Fishy Risks with Blockchain Tech Amid the COVID-19 Pandemic -- Seafood Industry-Related Malpractices -- COVID-19-Related Risks in Seafood Supply Chains -- Seafood Safety in the United States -- Seafood Fraud in the United States -- Mislabeling, Fraud, and Tax Evasion -- Price Fixing and Collusion -- Notes -- Chapter 20 Are NFTs Here to Stay? …”
    Libro electrónico
  8. 68
    Tabla de Contenidos: “…Botnets -- A Closer Look at Spyware -- Trojans and Backdoors -- Rootkits -- Viruses and Worms -- Botnets -- Brief History of Viruses, Worms, and Trojans -- The Current Situation -- Anti-Virus Software -- Need for Anti-Virus Software -- Top 5 Commercially Available Anti-Virus Software -- Symantec Norton Anti-Virus Software -- McAfee Anti- Virus -- Kaspersky Anti- Virus -- Bitdefender Anti- Virus -- AVG Anti-Virus Software -- A Few Words of Caution -- Chapter Summary -- Chapter 8: Cryptography -- Introduction -- Cryptographic Algorithms -- Symmetric Key Cryptography -- Key Distribution -- Asymmetric Key Cryptography -- Public Key Cryptography -- RSA Algorithm -- Advantages of Public Key Cryptography -- Applications of PKC -- Public Key Infrastructure (PKI) -- Certificate Authority (CA) -- Digital Certificate -- Hash Function Cryptography -- Popular Hashes -- Digital Signatures -- Summary of Cryptography Standard Algorithms -- Disk / Drive Encryption -- Attacks on Cryptography -- Chapter Summary -- Part IV: Network Security -- Chapter 9: Understanding Networks and Network Security -- Introduction -- Networking Fundamentals -- Computer Communication -- Network and its Components -- Network Protocols -- OSI (Open Systems Interconnection) Reference Model -- TCP/IP Model -- Network Vulnerabilities and Threats -- Vulnerabilities -- Security Policy Weaknesses -- Technology Weaknesses -- Configuration Weaknesses -- Threats -- Attacks -- Reconnaissance -- Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) -- Other Attacks on Networks -- How to counter the Network Attacks -- Chapter Summary -- Chapter 10: Firewalls -- Introduction -- How Do You Protect a Network? …”
    Libro electrónico
  9. 69
    Publicado 2004
    “…Coverage includes Step-by-step junk mail filtering with Procmail Protecting Sendmail, Postfix, qmail, Microsoft Exchange, and Lotus Domino servers from spam Making the most of native MTA anti-spam features, including whitelists/blacklists, DNS black hole services, and header checking Distributed checksum filtering solutions, including Vipul's Razor and Distributed Checksum Clearinghouse McAfee SpamKiller for Lotus Domino McAfee SpamKiller for Microsoft Exchange Implementing and managing SpamAssassin Implementing SMTP AUTH, providing effective outbound SMTP authentication and relaying with any mail client; and STARTTLS, encrypting outbound mail content, user names, and passwords Sender verification techniques, including challenge/response, special use addresses, and sender compute Anti-spam solutions for Outlook, Outlook Express, Mozilla Messenger, and Unix mail clients Whatever your IT environment and mail platform, Slamming Spam's defense in-depth strategies can help you dramatically reduce spam and all its attendant costs—IT staff time, network/computing resources, and user productivity. © Copyright Pearson Education. …”
    Libro electrónico
  10. 70
    Publicado 2012
    “…In the past he has worked at startups and larger companies like Google, Microsoft, and McAfee. Currently, Paul is a co-founder at Errplane, a cloud based service for monitoring and alerting on application performance and metrics. …”
    Video
  11. 71
    Publicado 2013
    “…Morace gives you an inside look at how Chubb Insurance, McAfee, EMC, T-Mobile, Bupa, SolarWinds, UBS, Alcatel-Lucent, Genentech, and others have applied his methods. …”
    Grabación no musical
  12. 72
    Publicado 2017
    “…Using insight and case studies, Mastering Digital Business does a superb job guiding us through the changes coming, and helping us think through not only new product and logistics strategies, but how management itself must evolve to thrive in the coming decades.'' R. Preston McAfee, Microsoft, Chief Economist. --- ''By their very nature, transformations require disruptive changes. …”
    Libro electrónico
  13. 73
    Publicado 2013
    “…Morace gives you an inside look at how Chubb Insurance, McAfee, EMC, T-Mobile, Bupa, SolarWinds, UBS, Alcatel-Lucent, Genentech, and others have applied his methods. …”
    Grabación de sonido
  14. 74
    Publicado 2015
    “…Why Should Anyone Care at All about Privacy, Privacy Engineering, or Data? Michelle Dennedy (McAfee, an Intel Company) Learn how to ..…”
    Video