Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 49
- Computer security 48
- Computer networks 42
- Engineering & Applied Sciences 25
- Filosofía 22
- Historia 22
- Computer Science 14
- Electrical & Computer Engineering 12
- Telecommunications 12
- Ciencias sociales 11
- Certification 9
- Bergson, Henri 8
- Examinations 8
- Operating systems (Computers) 8
- Arquitectura 7
- Electronic data processing personnel 7
- Firewalls (Computer security) 7
- Internet 7
- Luther, Martin 7
- Computer crimes 6
- Computers 6
- Environment 6
- History 6
- Programming 6
- Access control 5
- Computer programs 5
- Derecho canónico 5
- Educación 5
- Història 5
- Protestantismo 5
-
281por Grossman, Wendy, authorTabla de Contenidos: “…Frontmatter -- Contents -- Acknowledgments -- Introduction -- 1 The Year September Never Ended -- 2 Make.Money.Fast -- 3 The Making of an Underclass: AOL -- 4 Guerrilla Cryptographers -- 5 Stuffing the Genie Back in the Can of Worms -- 6 Copyright Terrorists -- 7 Exporting the First Amendment -- 8 Never Wrestle a Pig -- 9 Unsafe Sex in the Red Page District -- 10 The Wrong Side of the Passwords -- 11 Beyond the Borderline -- 12 Garbage In, Garbage Out -- 13 Grass Roots -- 14 The Net Is Dead -- 15 Networks of Trust -- 16 Dumping Tea in the Virtual Harbor -- Notes -- Additional References -- Index -- About the Author…”
Publicado 2019
Libro electrónico -
282Publicado 2001Tabla de Contenidos: “…Intro -- copyright -- Table of Contents -- Preface -- Chapter 1: Introduction -- Chapter 2: DOS Computer Viruses -- Chapter 3: Windows Technologies -- Chapter 4: Viruses in a Windows World -- Chapter 5: Macro Viruses -- Chapter 6: Trojans and Worms -- Chapter 7: Instant Messaging Attacks -- Chapter 8: Internet Browser Technologies -- Chapter 9: Internet Browser Attacks -- Chapter 10: Malicious Java Applets -- Chapter 11: Malicious ActiveX Controls -- Chapter 12: Email Attacks -- Chapter 13: Hoax Viruses -- Chapter 14: Defense -- Chapter 15: The Future -- Index -- About the Author…”
Libro electrónico -
283por Sheikh, Ahmed F.Tabla de Contenidos: “…Trojans and Backdoors Viruses and Worms -- Chapter 6. Sniffers & Social Engineering -- Chapter 7. …”
Publicado 2024
Libro electrónico -
284por Schmitz, PhilippTabla de Contenidos: “…Histoire externe ; Du concordat de worms au concile de Trente ; Du concile de Trente au XXe siècle ; Histoire constitutionnelle -- v.4. …”
Publicado 1942
Libro -
285Publicado 2006Tabla de Contenidos: “…CROSS REFERENCESREFERENCES; Hacking Techniques in Wireless Networks; INTRODUCTION; WIRELESS LAN OVERVIEW; WIRELESS NETWORK SNIFFING; WIRELESS SPOOFING; WIRELESS NETWORK PROBING; AP WEAKNESSES; EQUIPMENT FLAWS; DENIAL OF SERVICE; MAN-IN-THE-MIDDLE ATTACKS; WAR DRIVING; WIRELESS SECURITY BEST PRACTICES; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; Computer Viruses and Worms; INTRODUCTION; TROJAN HORSES, VIRUSES, WORMS, RATS, AND OTHER BEASTS; FIRST GENERATION VIRUSES; MACRO VIRUSES; E-MAIL VIRUSES; WORMS ( FIRST AND THIRD GENERATION); DETECTION TECHNIQUES…”
Libro electrónico -
286Publicado 2003Tabla de Contenidos: “…Cover; Contents; Foreword; Chapter 1 Hide and Sneak-Ido Dubrawsky; Chapter 2 The Worm Turns-Ryan Russell and Tim Mullen; Chapter 3 Just Another Day at the Office -Joe Grand; Chapter 4 h3X's Adventures in Networkland-FX; Chapter 5 The Thief No One Saw-Paul Craig; Chapter 6 Flying the Friendly Skies-Joe Grand; Chapter 7 dis-card-Mark Burnett; Chapter 8 Social (In)Security-Ken Pfeil; Chapter 9 BabelNet-Dan Kaminsky; Chapter 10 The Art of Tracking-Mark Burnett; Appendix The Laws of Security-Ryan Russell…”
Libro electrónico -
287por Harré, Rom, 1927-2019Tabla de Contenidos: “…Instruments and apparatus : tools for experimenting -- Detecting : hyenas, frogs, zebra fish, and assorted farm animals -- Measuring : the bodies of kings, fossils, lichen, and pollen grains -- Extending an established domain : dogs, horses, frogs, and trees -- Exploring a new domain : a bald mouse, two chimpanzees, and some people -- Testing hypotheses : more dogs, monkeys, and ticks -- Modelling individuals : yet more dogs, a few mice, and one human stomach -- Modelling worlds : voles, peas, fruit flies, finches, and deep oceanic worms -- Practising deception : spring wheat and midwife toads -- Inventing novel beings : an imaginary cat and virtual life forms…”
Publicado 2009
Libro -
288por Hotez, Peter J.Tabla de Contenidos: “…Introduction to the neglected tropical diseases -- "The unholy trinity": the soil-transmitted Helminth infections ascariasis, trichuriasis, and hookworm infection -- Schistosomiasis (snail fever) -- The filarial infections: lymphatic filariasis (elephantiasis) and dracunculiasis (Guinea worm) -- The blinding neglected tropical diseases: onchocerciasis (river blindness) and trachoma -- The mycobacterial infections: buruli ulcer and leprosy -- The kinetoplastid infections: human African trypanosomiasis (sleeping sickness), Chagas' disease, and the leishmaniases -- The urban neglected tropical diseases: leptospirosis, dengue, and rabies -- The neglected tropical diseases of North America -- The global network for neglected tropical disease control -- Future trends in control of neglected tropical diseases and the antipoverty vaccines -- Repairing the world…”
Publicado 2008
Libro -
289Publicado 2012Tabla de Contenidos: “…-- The right place and the right time : when does the early bird get the worm? -- Expanding the perspective means changing the conversation -- Changing the game : reconfiguring the ecosystem to work for you -- Sequencing success : winning the connected game -- Multiplying your odds of success…”
Libro -
290por Williams, Paul, D.P.MTabla de Contenidos:
Publicado 2010Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca Universitat Ramon Llull)Enlace del recurso
Libro electrónico -
291Publicado 1994Microfilme
-
292
-
293
-
294
-
295Publicado 2009Tabla de Contenidos: “…Shook -- James and Bergson: reciprocal readings / Frédéric Worms translated by John J. Conley -- William James on free will: the French connection with Charles Renouvier / Donald Wayne Viney -- Blondel and pragmatism: truth as the real adequation of mind and life / Michael J. …”
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
296por Schmitz, Philibert 1888-1963Tabla de Contenidos: “…Histoire externe. 1. Du concordat de worms au Concile de Trente (1948; 295 p.) -- V.4. …”
Publicado 1948
Libro -
297Publicado 2002Tabla de Contenidos: “…Cover; Table of Contents; Foreword v 1.0; Foreword v 1.5; Chapter 1 How To Hack; Chapter 2 The Laws of Security; Chapter 3 Classes of Attack; Chapter 4 Methodology; Chapter 5 Diffing; Chapter 6 Cryptography; Chapter 7 Unexpected Input; Chapter 8 Buffer Overflow; Chapter 9 Format Strings; Chapter 10 Sniffing; Chapter 11 Session Hijacking; Chapter 12 Spoofing: Attacks on Trusted Identity; Chapter 13 Tunneling; Chapter 14 Hardware Hacking; Chapter 15 Viruses, Trojan Horses, and Worms; Chapter 16 IDS Evasion; Chapter 17 Automated Security Review and Attack Tools…”
Libro electrónico -
298Tabla de Contenidos: “…Malware Security: Combating Viruses, Worms, and Root Kits -- 9. Encrypting Files and Volumes -- 10. …”
Libro electrónico -
299Publicado 2022Tabla de Contenidos: “…Livelihood Generation Avenues Using Earth-Worm Based Manure: A Study Referencing India 56 -- 4. …”
Libro electrónico -
300