Mostrando 41 - 60 Resultados de 197 Para Buscar '"Tampere"', tiempo de consulta: 0.07s Limitar resultados
  1. 41
    Publicado 1971
    Revista digital
  2. 42
    Publicado 2018
    Libro electrónico
  3. 43
    Publicado 2009
    Revista digital
  4. 44
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Introduction -- Who This Book Is For -- What You'll Gain from This Book -- A Few Words for the Nonengineer -- Security Terminology -- How This Book Is Organized -- Chapter 1 Spoofing and Authenticity -- Identifiers and Authentication -- Technical Identifiers -- Human Identifiers -- Authenticating People to People -- Authenticating People to Computers -- Authenticating Computers to People -- Authenticating Computers to Computers -- Spoofing Attacks -- Spoofing Files -- Spoofing Processes -- Spoofing Machines -- Spoofing in Specific Scenarios -- Internet of Things -- Mobile Phones -- Cloud -- Considerations in Authenticating to Organizations -- Mechanisms for Spoofing Attacks -- Misrepresentation -- Attacks on Authentication Mechanisms -- Threats Against Authentication Types -- Defenses -- Authenticating People -- Authenticating Computers -- Conclusion -- Chapter 2 Tampering and Integrity -- Introduction -- Targets of Tampering -- Tampering with Storage -- Tampering with Communications -- Tampering with Time -- Process Tampering -- Tampering in Specific Technologies -- Mechanisms for Tampering -- Location for Tampering -- Tools for Tampering -- Defenses -- Cryptography -- The Kernel -- Detection -- Conclusion -- Chapter 3 Repudiation and Proof -- Introduction -- The Threat: Repudiation -- Message Repudiation -- Fraud -- Account Takeover -- Logging Threats -- Repudiation in Specific Technologies -- Internet of Things (Including Phones) -- Cloud -- AI/ML -- Crypto and Blockchain -- Repudiation Mechanisms -- Defenses -- Cryptography -- Keeping Logs -- Using Logs -- Antifraud Tools -- Conclusion -- Chapter 4 Information Disclosure and Confidentiality -- Threats to Confidentiality -- Information Disclosure, at Rest -- Information Disclosure, in Motion…”
    Libro electrónico
  5. 45
    por S. Juuti, Petri
    Publicado 2017
    Electrónico
  6. 46
    Publicado 1990
    Revista digital
  7. 47
    Publicado 2017
    “…"Tampere3 project, general knowledge, multicultural education, relocation of upper secondary school in a university campus, educational institution safety, wellbeing at work, successful recruitment process - these topics are discussed in eleven articles of this publication. …”
    Libro electrónico
  8. 48
    Publicado 1987
    Microfilme
  9. 49
    Publicado 2017
    Electrónico
  10. 50
    Publicado 2015
    Libro electrónico
  11. 51
    Publicado 2017
    Libro electrónico
  12. 52
    Publicado 2018
    Electrónico
  13. 53
    Publicado 2016
    Libro electrónico
  14. 54
    Publicado 2017
    Libro electrónico
  15. 55
  16. 56
    Publicado 2019
    Libro electrónico
  17. 57
    por Wilson, Randal Paul, 1961-
    Publicado 2013
    Tabla de Contenidos: “…The power of completion -- Communication is king -- Fix the processes -- Waste management -- Managing your resources -- Budget control -- Don't be afraid of risks -- Synergy in management -- Tamper-proof training -- The weakest link -- Organizing for efficiency -- Managing change…”
    Libro electrónico
  18. 58
    Publicado 2017
    Electrónico
  19. 59
    por Jerraya, Ahmed
    Publicado 2012
    Libro electrónico
  20. 60
    por Hope, Paco
    Publicado 2009
    Tabla de Contenidos: “…Installing some free tools -- Basic observation -- Web-oriented data encoding -- Tampering with input -- Automated bulk scanning -- Automating specific tasks with cURL -- Automating with LibWWWPerl -- Seeking design flaws -- Attacking AJAX -- Manipulating sessions -- Multifaceted tests…”
    Libro electrónico