Mostrando 281 - 300 Resultados de 502 Para Buscar '"Worms"', tiempo de consulta: 0.05s Limitar resultados
  1. 281
    por Grossman, Wendy, author
    Publicado 2019
    Tabla de Contenidos: “…Frontmatter -- Contents -- Acknowledgments -- Introduction -- 1 The Year September Never Ended -- 2 Make.Money.Fast -- 3 The Making of an Underclass: AOL -- 4 Guerrilla Cryptographers -- 5 Stuffing the Genie Back in the Can of Worms -- 6 Copyright Terrorists -- 7 Exporting the First Amendment -- 8 Never Wrestle a Pig -- 9 Unsafe Sex in the Red Page District -- 10 The Wrong Side of the Passwords -- 11 Beyond the Borderline -- 12 Garbage In, Garbage Out -- 13 Grass Roots -- 14 The Net Is Dead -- 15 Networks of Trust -- 16 Dumping Tea in the Virtual Harbor -- Notes -- Additional References -- Index -- About the Author…”
    Libro electrónico
  2. 282
    Publicado 2001
    Tabla de Contenidos: “…Intro -- copyright -- Table of Contents -- Preface -- Chapter 1: Introduction -- Chapter 2: DOS Computer Viruses -- Chapter 3: Windows Technologies -- Chapter 4: Viruses in a Windows World -- Chapter 5: Macro Viruses -- Chapter 6: Trojans and Worms -- Chapter 7: Instant Messaging Attacks -- Chapter 8: Internet Browser Technologies -- Chapter 9: Internet Browser Attacks -- Chapter 10: Malicious Java Applets -- Chapter 11: Malicious ActiveX Controls -- Chapter 12: Email Attacks -- Chapter 13: Hoax Viruses -- Chapter 14: Defense -- Chapter 15: The Future -- Index -- About the Author…”
    Libro electrónico
  3. 283
    por Sheikh, Ahmed F.
    Publicado 2024
    Tabla de Contenidos: “…Trojans and Backdoors Viruses and Worms -- Chapter 6. Sniffers & Social Engineering -- Chapter 7. …”
    Libro electrónico
  4. 284
    por Schmitz, Philipp
    Publicado 1942
    Tabla de Contenidos: “…Histoire externe ; Du concordat de worms au concile de Trente ; Du concile de Trente au XXe siècle ; Histoire constitutionnelle -- v.4. …”
    Libro
  5. 285
    Publicado 2006
    Tabla de Contenidos: “…CROSS REFERENCESREFERENCES; Hacking Techniques in Wireless Networks; INTRODUCTION; WIRELESS LAN OVERVIEW; WIRELESS NETWORK SNIFFING; WIRELESS SPOOFING; WIRELESS NETWORK PROBING; AP WEAKNESSES; EQUIPMENT FLAWS; DENIAL OF SERVICE; MAN-IN-THE-MIDDLE ATTACKS; WAR DRIVING; WIRELESS SECURITY BEST PRACTICES; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; Computer Viruses and Worms; INTRODUCTION; TROJAN HORSES, VIRUSES, WORMS, RATS, AND OTHER BEASTS; FIRST GENERATION VIRUSES; MACRO VIRUSES; E-MAIL VIRUSES; WORMS ( FIRST AND THIRD GENERATION); DETECTION TECHNIQUES…”
    Libro electrónico
  6. 286
    Publicado 2003
    Tabla de Contenidos: “…Cover; Contents; Foreword; Chapter 1 Hide and Sneak-Ido Dubrawsky; Chapter 2 The Worm Turns-Ryan Russell and Tim Mullen; Chapter 3 Just Another Day at the Office -Joe Grand; Chapter 4 h3X's Adventures in Networkland-FX; Chapter 5 The Thief No One Saw-Paul Craig; Chapter 6 Flying the Friendly Skies-Joe Grand; Chapter 7 dis-card-Mark Burnett; Chapter 8 Social (In)Security-Ken Pfeil; Chapter 9 BabelNet-Dan Kaminsky; Chapter 10 The Art of Tracking-Mark Burnett; Appendix The Laws of Security-Ryan Russell…”
    Libro electrónico
  7. 287
    por Harré, Rom, 1927-2019
    Publicado 2009
    Tabla de Contenidos: “…Instruments and apparatus : tools for experimenting -- Detecting : hyenas, frogs, zebra fish, and assorted farm animals -- Measuring : the bodies of kings, fossils, lichen, and pollen grains -- Extending an established domain : dogs, horses, frogs, and trees -- Exploring a new domain : a bald mouse, two chimpanzees, and some people -- Testing hypotheses : more dogs, monkeys, and ticks -- Modelling individuals : yet more dogs, a few mice, and one human stomach -- Modelling worlds : voles, peas, fruit flies, finches, and deep oceanic worms -- Practising deception : spring wheat and midwife toads -- Inventing novel beings : an imaginary cat and virtual life forms…”
    Libro
  8. 288
    por Hotez, Peter J.
    Publicado 2008
    Tabla de Contenidos: “…Introduction to the neglected tropical diseases -- "The unholy trinity": the soil-transmitted Helminth infections ascariasis, trichuriasis, and hookworm infection -- Schistosomiasis (snail fever) -- The filarial infections: lymphatic filariasis (elephantiasis) and dracunculiasis (Guinea worm) -- The blinding neglected tropical diseases: onchocerciasis (river blindness) and trachoma -- The mycobacterial infections: buruli ulcer and leprosy -- The kinetoplastid infections: human African trypanosomiasis (sleeping sickness), Chagas' disease, and the leishmaniases -- The urban neglected tropical diseases: leptospirosis, dengue, and rabies -- The neglected tropical diseases of North America -- The global network for neglected tropical disease control -- Future trends in control of neglected tropical diseases and the antipoverty vaccines -- Repairing the world…”
    Libro
  9. 289
    Publicado 2012
    Tabla de Contenidos: “…-- The right place and the right time : when does the early bird get the worm? -- Expanding the perspective means changing the conversation -- Changing the game : reconfiguring the ecosystem to work for you -- Sequencing success : winning the connected game -- Multiplying your odds of success…”
    Libro
  10. 290
    por Williams, Paul, D.P.M
    Publicado 2010
    Tabla de Contenidos: Enlace del recurso
    Libro electrónico
  11. 291
    Publicado 1994
    Microfilme
  12. 292
  13. 293
  14. 294
  15. 295
    Publicado 2009
    Tabla de Contenidos: “…Shook -- James and Bergson: reciprocal readings / Frédéric Worms translated by John J. Conley -- William James on free will: the French connection with Charles Renouvier / Donald Wayne Viney -- Blondel and pragmatism: truth as the real adequation of mind and life / Michael J. …”
    Click para texto completo desde fuera UPSA
    Click para texto completo desde UPSA
    Libro electrónico
  16. 296
    por Schmitz, Philibert 1888-1963
    Publicado 1948
    Tabla de Contenidos: “…Histoire externe. 1. Du concordat de worms au Concile de Trente (1948; 295 p.) -- V.4. …”
    Libro
  17. 297
    Publicado 2002
    Tabla de Contenidos: “…Cover; Table of Contents; Foreword v 1.0; Foreword v 1.5; Chapter 1 How To Hack; Chapter 2 The Laws of Security; Chapter 3 Classes of Attack; Chapter 4 Methodology; Chapter 5 Diffing; Chapter 6 Cryptography; Chapter 7 Unexpected Input; Chapter 8 Buffer Overflow; Chapter 9 Format Strings; Chapter 10 Sniffing; Chapter 11 Session Hijacking; Chapter 12 Spoofing: Attacks on Trusted Identity; Chapter 13 Tunneling; Chapter 14 Hardware Hacking; Chapter 15 Viruses, Trojan Horses, and Worms; Chapter 16 IDS Evasion; Chapter 17 Automated Security Review and Attack Tools…”
    Libro electrónico
  18. 298
    Tabla de Contenidos: “…Malware Security: Combating Viruses, Worms, and Root Kits -- 9. Encrypting Files and Volumes -- 10. …”
    Libro electrónico
  19. 299
    Publicado 2022
    Tabla de Contenidos: “…Livelihood Generation Avenues Using Earth-Worm Based Manure: A Study Referencing India 56 -- 4. …”
    Libro electrónico
  20. 300