Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 20
- Computer security 18
- Computer networks 11
- Engineering & Applied Sciences 8
- History 8
- Penetration testing (Computer security) 8
- Blockchains (Databases) 7
- Computer Science 6
- Computer software 5
- Development 5
- Social welfare & social services 5
- Artificial intelligence 4
- Data protection 4
- Mass media 4
- Python (Computer program language) 4
- Video games 4
- arbetsliv 4
- työelämä 4
- Access control 3
- Application software 3
- Digital media 3
- Human-computer interaction 3
- Information society 3
- Linux 3
- Microsoft Office 3
- Peace 3
- Politics and government 3
- Research 3
- Social aspects 3
- Technological innovations 3
-
161Publicado 2009Tabla de Contenidos: “…7.2.2 Threats from 'Insiders' / Device Owners 135 -- 7.3 Countering the Threats 136 -- 7.3.1 Radio Link Protection 136 -- 7.3.2 Protecting the (IP) Backhaul 138 -- 7.3.3 Device Integrity / Tamper Resistance 143 -- 7.4 Conclusions 145 -- 8 Femtocell Standards and Industry Groups 147 / Simon Saunders -- 8.1 The Importance of Standards 147 -- 8.2 GSM 148 -- 8.3 WCDMA 148 -- 8.3.1 TSG RAN WG2 / Radio Layer 2 and Radio Layer 3 RR 149 -- 8.3.2 TSG RAN WG3 Architecture 149 -- 8.3.3 TSG RAN WG4 Radio Performance and Protocol Aspects RF Parameters and BS Conformance 150 -- 8.3.4 TSG SA WG1 / Services 150 -- 8.3.5 TSG SA WG3 / Security 150 -- 8.3.6 TSG SA WG5 Telecom Management 151 -- 8.3.7 Summary of WCDMA Standards 151 -- 8.4 TD-SCDMA 151 -- 8.5 LTE 151 -- 8.6 CDMA 153 -- 8.7 Mobile WiMAX 155 -- 8.8 The Femto Forum 156 -- 8.9 The Broadband Forum 157 -- 8.10 GSMA 157 -- 8.11 Conclusions 157 -- 9 Femtocell Regulation 159 / Simon Saunders -- 9.1 Introduction 159 -- 9.2 Regulatory Benefits of Femtocells 159 -- 9.3 Spectrum Efficiency 160 -- 9.4 Economic Efficiency 160 -- 9.5 Enabling Competition 160 -- 9.6 Broadening Access to Services 161 -- 9.7 Enabling Innovation 161 -- 9.8 Environmental Goals 161 -- 9.9 Spectrum Licensing Issues 162 -- 9.10 Location 163 -- 9.11 Authentication 163 -- 9.12 Emergency Calls 163 -- 9.13 Lawful Interception and Local IP Access 164 -- 9.14 Backhaul Challenges 165 -- 9.15 Mobile Termination Rates 165 -- 9.16 Competition Concerns 166 -- 9.17 Equipment Approvals 166 -- 9.18 Examples of Femtocell Regulations 166 -- 9.19 Conclusions 168 -- 10 Femtocell Implementation Considerations 169 / Simon Saunders -- 10.1 Introduction 169 -- 10.2 Signal Processing 170 -- 10.3 Location 170 -- 10.4 Frequency and Timing Control 171 -- 10.5 Protocol Implementation 172 -- 10.6 RF Implementation 172 -- 10.7 System Design and Cost 173 -- 10.8 Mobile Device Challenges and Opportunities 175 -- 10.9 Conclusions 176 -- 11 Business and Service Options for Femtocells 177 / Simon Saunders and Stuart Carlaw…”
Libro electrónico -
162Publicado 2023“…Annika Blomberg is a Senior Research Fellow at the Tampere University, Faculty of Management and Business, Finland. …”
Libro electrónico -
163por Collberg, Christian“…—Mikhail Atallah, Distinguished Professor of Computer Science at Purdue University Theory, Techniques, and Tools for Fighting Software Piracy, Tampering, and Malicious Reverse Engineering The last decade has seen significant progress in the development of techniques for resisting software piracy and tampering. …”
Publicado 2009
Libro electrónico -
164Publicado 2023“…Pertti Haapala is Emeritus Professor of History and the Director of the Academy of Finland Center of Excellence in the History of Experiences (2018-2021) at the University of Tampere, Finland. His special areas of research are social history and methodology of history. …”
Libro electrónico -
165Publicado 2017“…This course teaches you the techniques required for acquiring, validating, and protecting digital evidence in order to ensure the evidence is accurate and free from tampering. You'll learn how to use free, open source software utilities to acquire digital evidence from an electronic device; also covered is how to validate and verify the evidence, as well as how to handle and store the evidence. …”
-
166Publicado 2018“…Security threats come in many forms, from unauthorized access to data, data tampering, denial of service, and obtaining privileged access to systems. …”
Libro electrónico -
167por Knudsen, Jonathan“…These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity (authentication); and digital signatures, which ensure your data has not been damaged or tampered with. This book covers cryptographic programming in Java. …”
Publicado 1998
Libro electrónico -
168por Kortesoja, Matti. author“…Matti Kortesoja is a Postdoctoral Researcher at the Tampere Research Centre for Journalism, Media and Communication (COMET), Tampere University, Finland…”
Publicado 2023
Libro electrónico -
169Publicado 2022Tabla de Contenidos: “…Virtual Desktop -- Authentication and Authorization Considerations -- In-Band vs Out-of-Band Management -- REVIEW -- 44 QUESTIONS -- 44 ANSWERS -- Objective 45 Explain the importance of physical security -- Detection Methods -- Camera -- Motion Detection -- Asset Tags -- Tamper Detection -- Prevention Methods -- Employee Training -- Access Control Hardware -- Locking Racks, Locking Cabinets -- Access Control Vestibule (Previously Known as a Mantrap) -- Smart Lockers -- Asset Disposal -- Factory Reset/Wipe Configuration -- Sanitize Devices for Disposal -- REVIEW -- 45 QUESTIONS -- 45 ANSWERS -- 00-FMindd 23 22/04/22 11:12 AM -- xxiv Mike Meyers' CompTIA Network+ Certification Passport -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- 50 Network Troubleshooting -- Objective 51 Explain the network troubleshooting methodology -- Identify the Problem -- Gather Information -- Question Users -- Identify Symptoms -- Determine if Anything Has Changed -- Duplicate the Problem, if Possible -- Approach Multiple Problems Individually -- Establish a Theory of Probable Cause -- Question the Obvious -- Consider Multiple Approaches -- Test the Theory to Determine the Cause -- If the Theory Is Confirmed, Determine the Next Steps -- to Resolve the Problem -- If the Theory Is Not Confirmed, Reestablish a New Theory or Escalate -- Establish a Plan of Action to Resolve the Problem and Identify -- Potential Effects -- Implement the Solution or Escalate As Necessary -- Verify Full System Functionality and, if Applicable, Implement -- Preventive Measures -- Document Findings, Actions, Outcomes, and Lessons Learned -- REVIEW -- 51 QUESTIONS -- 51 ANSWERS -- Objective 52 Given a scenario, troubleshoot common cable -- connectivity issues and select the appropriate tools -- Specifications and Limitations -- Throughput -- Speed -- Distance -- Cable Considerations -- Shielded and Unshielded -- Plenum and Riser-Rated -- Cable Application -- Rollover Cable/Console Cable -- Crossover Cable -- Power over Ethernet -- Common Issues -- Attenuation -- Interference -- 00-FMindd 24 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Decibel (dB) Loss -- Incorrect Pinout -- Bad Ports -- Open/Short -- Light-Emitting Diode (LED) Status Indicators -- Incorrect Transceivers -- Duplexing Issues -- Transmit and Receive (TX/RX) Reversed -- Dirty Optical Cables -- Common Tools -- Cable Crimper -- Punchdown Tool -- Tone Generator -- Loopback Adapter -- Optical Time-Domain Reflectometer (OTDR) -- Multimeter -- Cable Tester -- Wire Map -- Tap -- Fusion Splicers -- Spectrum Analyzers -- Snips/Cutters -- Cable Stripper -- Fiber Light Meter -- REVIEW -- 52 QUESTIONS -- 52 ANSWERS -- Objective 53 Given a scenario, use the appropriate network -- software tools and commands…”
Libro electrónico -
170por Jurgensen, Timothy M.“…Smart Cards: A Developer's Toolkit covers all you need to know to plan, design, develop, and deploy advanced multi-application smart card environments, including: Smart card physical structure, construction, tamper resistance, and tamper-evident features International standards, inter-industry command sets, and industry specifications "Post issuance programmable" smart cards: the cutting edge of smart card deployment An in-depth review of two "high-performance" smart cards, including one multi-application card PC and workstation host software for supporting smart cards Applications with the SIM smart cards in GSM and 3G mobile phones Card management systems and readers for large-scale applications in real-world environments The evolving marketplace for smart cards in the U.S. and worldwide The authors present case studies from today's most advanced smart card deployments, covering both the logistics of initial deployment and best practices for supporting ongoing operations and card populations. …”
Publicado 2002
Libro electrónico -
171Publicado 2023“…Remove your doubts about AI and explore how this technology can be future-proofed using blockchain's smart contracts and tamper-evident ledgers. With this practical book, system architects, software engineers, and systems solution specialists will learn how enterprise blockchain provides permanent provenance of AI, removes the mystery, and allows you to validate AI before it's ever used. …”
Libro electrónico -
172Publicado 2015“…Software Protection aims to mitigate Man-At-The-End (MATE) attacks, such as reverse engineering, software piracy, and software tampering; more in general, software protection research aims at developing algorithms that protect the integrity of data and software applications deployed on untrusted devices. …”
Libro electrónico -
173Publicado 2017“…Develop real-time practical DApps using Ethereum and JavaScript About This Book Create powerful, end-to-end applications for Blockchain using Ethereum Write your first program using the Solidity programming language Change the way you think and design your applications by using the all new database-Blockchain Who This Book Is For This book is for JavaScript developers who now want to create tamper-proof data (and transaction) applications using Blockchain and Ethereum. …”
Libro electrónico -
174Publicado 2016“…Covering everything from parameter tampering, DDoS, XXS and SQL injection, it will build on the knowledge and skills you learned in the first module to make you an even mor..…”
Libro electrónico -
175Publicado 2022“…The book covers cutting-edge features such as the blockchain-based Ledger for creating a tamper-evident record of changes to data over time that you can rely on to be correct and reliable. …”
Libro electrónico -
176Publicado 2014“…However, the distinctive evidences obtained from an individual do not guarantee a 100% matching to be performed to the biometric characteristics corresponding to another subject, even after considering all aspects of accurate recognition process. Tampered sensors, distorted evidences, recognition at a distance, and sometimes, motion of the target subject cause identification process to be a weak one. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
177Publicado 2019“…The IBM Secure Service Container technology, which provides workload isolation, restricted administrator access, and tamper protection against internal threats, including from systems administrators. …”
Libro electrónico -
178Publicado 2023“…You'll also find: understandable and memorable introductions to the most important threats that every engineer should know; straightforward software security frameworks that will help engineers bake security directly into their systems; strategies to align large teams to achieve application security in today's fast-moving and agile world; and strategies attackers use, like tampering, to interfere with the integrity of applications and systems, and the kill chains that combine these threats into fully executed campaigns…”
Grabación no musical -
179Publicado 2022“…Visual content can be tampered with in order to produce manipulated but realistic versions of it. …”
Libro electrónico -
180Publicado 2020“…The IBM Secure Service Container technology, which provides workload isolation, restricted administrator access, and tamper protection against internal threats, including from systems administrators. …”
Libro electrónico