Mostrando 181 - 197 Resultados de 197 Para Buscar '"Tampere"', tiempo de consulta: 0.06s Limitar resultados
  1. 181
    Publicado 2020
    “…Rebecca was sent to the psych after it was suspected that she was tampering lines when admitted to the medical unit, an accusation Rebecca adamantly and angrily denies. …”
    Vídeo online
  2. 182
    Publicado 2021
    “…The Blockchain Technology for Secure and Smart Applications across Industry Verticals, Volume 121, presents the latest information on a type of distributed ledger used for maintaining a permanent and tamper-proof record of transactional data. The book presents a novel compendium of existing and budding Blockchain technologies for various smart applications. …”
    Libro electrónico
  3. 183
    Publicado 2019
    “…In this video course, intended for developers and programmers who have a basic understanding of web-based applications, you learn the fundamentals of a blockchain and Decentralized Applications, or DApps, and how data that's stored there is considered immutable--all but impossible to tamper or change, and if an attempt were made, it would be detected immediately. …”
    Video
  4. 184
    Publicado 2019
    “…The accepted papers cover topics ranging from deep neural networks for video analytics, network considerations in streaming the videos, tamper-proof video processing, and evolution of smart cameras with compute onboard. …”
    Libro electrónico
  5. 185
    Publicado 2003
    “…What trusted computing platforms are, how they work, and what problems they will solve Transforming standard platforms into trusted platforms cost-effectively Scenarios for managers: TCPA applications in the security-focused business Protected storage: how TCPA can ensure the confidentiality of stored data Software integrity: ensuring that a system's software environment hasn't been tampered with Trust mechanisms in a trusted platform: functional descriptions, advantages, and overhead Trusted platforms in practice: TCPA for developers and technical professionals How trusted platforms can be used to protect user privacy The TCPA initiative: its history, status, and next steps forward Backed by an extraordinary range of industry leaders, TCPA offers the first complete, cost-effective, and globally applicable solution for trusted computing. …”
    Libro electrónico
  6. 186
    por Johansson, Karl Magnus
    Publicado 2024
    “…Tapio Raunio is Professor of Political Science at Tampere University, Finland. His research focuses on representative democracy and political institutions, both in the context of national politics and at the European level, specifically on legislatures, executives, political parties, and foreign policy decision-making. …”
    Libro electrónico
  7. 187
    Publicado 2021
    “…Anu Koivunen is Professor of Gender Studies at the Faculty of Social Science at Tampere University, Finland, on leave of absence from professorship in the Department of Media Studies at Stockholm University, Sweden. …”
    Libro electrónico
  8. 188
    por Aslama Horowitz, Minna
    Publicado 2024
    “…Katja Lehtisaari is a Senior Lecturer in Journalism at Tampere University, Finland, and Docent at the University of Helsinki, Finland. …”
    Libro electrónico
  9. 189
    Publicado 2023
    “…Updated for SQL Server 2022, this edition includes coverage of new features, such as Ledger, which provides an immutable record of table history to protect you against malicious data tampering, and integration with cloud providers to support hybrid cloud scenarios. …”
    Libro electrónico
  10. 190
    Publicado 2008
    “…You’ll learn how to: · Mitigate unique risks associated with Ajax, including overly granular Web services, application control flow tampering, and manipulation of program logic · Write new Ajax code more safely—and identify and fix flaws in existing code · Prevent emerging Ajax-specific attacks, including JavaScript hijacking and persistent storage theft · Avoid attacks based on XSS and SQL Injection—including a dangerous SQL Injection variant that can extract an entire backend database with just two requests · Leverage security built into Ajax frameworks like Prototype, Dojo, and ASP.NET AJAX Extensions—and recognize what you still must implement on your own · Create more secure “mashup” applications Ajax Security will be an indispensable resource for developers coding or maintaining Ajax applications; architects and development managers planning or designing new Ajax software, and all software security professionals, from QA specialists to penetration testers…”
    Libro electrónico
  11. 191
    Publicado 2022
    “…Maria Törhönen is a researcher and a project manager at Tampere University, Finland. Maria’s research focuses on the merger of work and play, especially in the context of streaming and esports. …”
    Libro electrónico
  12. 192
    Publicado 2018
    “…Technically, it is an immutable and tamper-proof distributed ledger of all transactions across a peer-to-peer network. …”
    Libro electrónico
  13. 193
    Publicado 2016
    “…What You Will Learn Explore the internal workings of the ELF binary format Discover techniques for UNIX Virus infection and analysis Work with binary hardening and software anti-tamper methods Patch executables and process memory Bypass anti-debugging measures used in malware Perform advanced forensic analysis of binaries Design ELF-related tools in the C language Learn to operate on memory with ptrace In Detail Learning Linux Binary Analysis is packed with knowledge and code that will teach you the inner workings of the ELF format, and the methods used by hackers and security analysts for virus analysis, binary patching, software protection and more. …”
    Libro electrónico
  14. 194
    Publicado 2023
    “…What you will learn Explore various DLL injection techniques for setting API hooks Understand how to run an arbitrary program file in memory Become familiar with malware obfuscation techniques to evade antivirus detection Discover how malware circumvents current security measures and tools Use Microsoft Authenticode to sign your code to avoid tampering Explore various strategies to bypass UAC design for privilege escalation Who this book is for This book is for cybersecurity professionals- especially for anyone working on Windows security, or malware researchers, network administrators, ethical hackers looking to explore Windows exploit, kernel practice, and reverse engineering. …”
    Libro electrónico
  15. 195
    Publicado 2022
    “…You will further understand how to blend in, uncover other actors' motivations and means, and learn to tamper with them to hinder their ability to detect your presence. …”
    Grabación no musical
  16. 196
    Publicado 2024
    “…You'll explore the methodology for threat modeling--Spoofing, Tampering, Repudiation, Information Disclosure, and Elevation of Privilege (S.T.R.I.D.E.) with Privacy deck and the T.R.I.M. extension pack. …”
    Libro electrónico
  17. 197
    Publicado 2023
    “…What you will learn Understand and adopt the Microsoft infrastructure kill chain methodology Attack Windows services, such as Active Directory, Exchange, WSUS, SCCM, AD CS, and SQL Server Disappear from the defender's eyesight by tampering with defensive capabilities Upskill yourself in offensive OpSec to stay under the radar Find out how to detect adversary activities in your Windows environment Get to grips with the steps needed to remediate misconfigurations Prepare yourself for real-life scenarios by getting hands-on experience with exercises Who this book is for This book is for pentesters and red teamers, security and IT engineers, as well as blue teamers and incident responders interested in Windows infrastructure security. …”
    Libro electrónico