Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 20
- Computer security 18
- Computer networks 11
- Engineering & Applied Sciences 8
- History 8
- Penetration testing (Computer security) 8
- Blockchains (Databases) 7
- Computer Science 6
- Computer software 5
- Development 5
- Social welfare & social services 5
- Artificial intelligence 4
- Data protection 4
- Mass media 4
- Python (Computer program language) 4
- Video games 4
- arbetsliv 4
- työelämä 4
- Access control 3
- Application software 3
- Digital media 3
- Human-computer interaction 3
- Information society 3
- Linux 3
- Microsoft Office 3
- Peace 3
- Politics and government 3
- Research 3
- Social aspects 3
- Technological innovations 3
-
181Publicado 2020“…Rebecca was sent to the psych after it was suspected that she was tampering lines when admitted to the medical unit, an accusation Rebecca adamantly and angrily denies. …”
Vídeo online -
182Publicado 2021“…The Blockchain Technology for Secure and Smart Applications across Industry Verticals, Volume 121, presents the latest information on a type of distributed ledger used for maintaining a permanent and tamper-proof record of transactional data. The book presents a novel compendium of existing and budding Blockchain technologies for various smart applications. …”
Libro electrónico -
183Publicado 2019“…In this video course, intended for developers and programmers who have a basic understanding of web-based applications, you learn the fundamentals of a blockchain and Decentralized Applications, or DApps, and how data that's stored there is considered immutable--all but impossible to tamper or change, and if an attempt were made, it would be detected immediately. …”
Video -
184Publicado 2019“…The accepted papers cover topics ranging from deep neural networks for video analytics, network considerations in streaming the videos, tamper-proof video processing, and evolution of smart cameras with compute onboard. …”
Libro electrónico -
185Publicado 2003“…What trusted computing platforms are, how they work, and what problems they will solve Transforming standard platforms into trusted platforms cost-effectively Scenarios for managers: TCPA applications in the security-focused business Protected storage: how TCPA can ensure the confidentiality of stored data Software integrity: ensuring that a system's software environment hasn't been tampered with Trust mechanisms in a trusted platform: functional descriptions, advantages, and overhead Trusted platforms in practice: TCPA for developers and technical professionals How trusted platforms can be used to protect user privacy The TCPA initiative: its history, status, and next steps forward Backed by an extraordinary range of industry leaders, TCPA offers the first complete, cost-effective, and globally applicable solution for trusted computing. …”
Libro electrónico -
186por Johansson, Karl Magnus“…Tapio Raunio is Professor of Political Science at Tampere University, Finland. His research focuses on representative democracy and political institutions, both in the context of national politics and at the European level, specifically on legislatures, executives, political parties, and foreign policy decision-making. …”
Publicado 2024
Libro electrónico -
187Publicado 2021“…Anu Koivunen is Professor of Gender Studies at the Faculty of Social Science at Tampere University, Finland, on leave of absence from professorship in the Department of Media Studies at Stockholm University, Sweden. …”
Libro electrónico -
188por Aslama Horowitz, Minna“…Katja Lehtisaari is a Senior Lecturer in Journalism at Tampere University, Finland, and Docent at the University of Helsinki, Finland. …”
Publicado 2024
Libro electrónico -
189Publicado 2023“…Updated for SQL Server 2022, this edition includes coverage of new features, such as Ledger, which provides an immutable record of table history to protect you against malicious data tampering, and integration with cloud providers to support hybrid cloud scenarios. …”
Libro electrónico -
190Publicado 2008“…You’ll learn how to: · Mitigate unique risks associated with Ajax, including overly granular Web services, application control flow tampering, and manipulation of program logic · Write new Ajax code more safely—and identify and fix flaws in existing code · Prevent emerging Ajax-specific attacks, including JavaScript hijacking and persistent storage theft · Avoid attacks based on XSS and SQL Injection—including a dangerous SQL Injection variant that can extract an entire backend database with just two requests · Leverage security built into Ajax frameworks like Prototype, Dojo, and ASP.NET AJAX Extensions—and recognize what you still must implement on your own · Create more secure “mashup” applications Ajax Security will be an indispensable resource for developers coding or maintaining Ajax applications; architects and development managers planning or designing new Ajax software, and all software security professionals, from QA specialists to penetration testers…”
Libro electrónico -
191Publicado 2022“…Maria Törhönen is a researcher and a project manager at Tampere University, Finland. Maria’s research focuses on the merger of work and play, especially in the context of streaming and esports. …”
Libro electrónico -
192Publicado 2018“…Technically, it is an immutable and tamper-proof distributed ledger of all transactions across a peer-to-peer network. …”
Libro electrónico -
193Publicado 2016“…What You Will Learn Explore the internal workings of the ELF binary format Discover techniques for UNIX Virus infection and analysis Work with binary hardening and software anti-tamper methods Patch executables and process memory Bypass anti-debugging measures used in malware Perform advanced forensic analysis of binaries Design ELF-related tools in the C language Learn to operate on memory with ptrace In Detail Learning Linux Binary Analysis is packed with knowledge and code that will teach you the inner workings of the ELF format, and the methods used by hackers and security analysts for virus analysis, binary patching, software protection and more. …”
Libro electrónico -
194Publicado 2023“…What you will learn Explore various DLL injection techniques for setting API hooks Understand how to run an arbitrary program file in memory Become familiar with malware obfuscation techniques to evade antivirus detection Discover how malware circumvents current security measures and tools Use Microsoft Authenticode to sign your code to avoid tampering Explore various strategies to bypass UAC design for privilege escalation Who this book is for This book is for cybersecurity professionals- especially for anyone working on Windows security, or malware researchers, network administrators, ethical hackers looking to explore Windows exploit, kernel practice, and reverse engineering. …”
Libro electrónico -
195Publicado 2022“…You will further understand how to blend in, uncover other actors' motivations and means, and learn to tamper with them to hinder their ability to detect your presence. …”
Grabación no musical -
196Publicado 2024“…You'll explore the methodology for threat modeling--Spoofing, Tampering, Repudiation, Information Disclosure, and Elevation of Privilege (S.T.R.I.D.E.) with Privacy deck and the T.R.I.M. extension pack. …”
Libro electrónico -
197Publicado 2023“…What you will learn Understand and adopt the Microsoft infrastructure kill chain methodology Attack Windows services, such as Active Directory, Exchange, WSUS, SCCM, AD CS, and SQL Server Disappear from the defender's eyesight by tampering with defensive capabilities Upskill yourself in offensive OpSec to stay under the radar Find out how to detect adversary activities in your Windows environment Get to grips with the steps needed to remediate misconfigurations Prepare yourself for real-life scenarios by getting hands-on experience with exercises Who this book is for This book is for pentesters and red teamers, security and IT engineers, as well as blue teamers and incident responders interested in Windows infrastructure security. …”
Libro electrónico