Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 49
- Computer security 48
- Computer networks 42
- Engineering & Applied Sciences 25
- Filosofía 22
- Historia 22
- Computer Science 14
- Electrical & Computer Engineering 12
- Telecommunications 12
- Ciencias sociales 11
- Certification 9
- Bergson, Henri 8
- Examinations 8
- Operating systems (Computers) 8
- Arquitectura 7
- Electronic data processing personnel 7
- Firewalls (Computer security) 7
- Internet 7
- Luther, Martin 7
- Computer crimes 6
- Computers 6
- Environment 6
- History 6
- Programming 6
- Access control 5
- Computer programs 5
- Derecho canónico 5
- Educación 5
- Història 5
- Protestantismo 5
-
321por Organisation for Economic Co-operation and Development.“…For the elimination phase, the worms are transferred to a soil free of test substance. …”
Publicado 2010
Libro electrónico -
322por Organisation for Economic Co-operation and Development.“…The test is conducted with at least 10 worms for each replicate. The report should include the total number and the dry weight of the worms, the observations of abnormal behaviour, of mortalities, the water characteristics within the test vessels and the total organic content…”
Publicado 2007
Libro electrónico -
323Publicado 2005“…Linux systems are even less vulnerable to attacks by computer viruses and worms. Not surprisingly, businesses, government agencies, schools, and a wealth of other institutions are all looking to Linux to replace the Windows desktop for these same benefits. …”
Libro electrónico -
324por Landau, Peter, 1935-2019“…., Cölestin II. oder Lucius III. sowie Kirchenrechtler wie Burchard von Worms und Gratian können nur einen kleinen Eindruck vermitteln, mit welchen Thematiken sich der Autor in seinen Aufsätzen auseinandersetzt. …”
Publicado 2013
Libro -
325Publicado 2010Tabla de Contenidos: “….-- Interweaving Substance Trajectories: Tiryaq, Circulation and Therapeutic Transformation in the Nineteenth Century / Guy Attewell.-- Winter Worm, Summer Grass: Cordyceps, Colonial Chinese Medicine, and the Formation of Historical Objects / Carla Nappi.-- Researching Amok in Malaysia / Thomas Williamson.-- Russian Imperial Medicine: The Case of the Kazakh Steppe / Anna Afanasyeva.-- Multiple Colonizations: State Formation, Public Health and the Yucatec Maya, 1891-1960 / David Sowell.-- Medical Pluralism as a Historical Phenomenon: A Regional and Multi-Level Approach to Health Care in German, British and Independent East Africa / Walter Bruchhausen.-- Crossing Colonial and Medical Boundaries: Plural Medicine on Java, 1850-1910 / Liesbeth Hesselink.-- Towards a Cultural History of Medicine(s) in Colonial Central Africa / Markku Hokkanen.-- Crossing Colonies and Empires: The Health Services of the Diamond Company of Angola / Jorge Varanda.-- Medicine, Colonial Order and Local Action in Goa / Cristiana Bastos.-- Loosening the Bonds of Historical Prejudice: Traditional Practitioners as Agents of Reconciliation and Change in Contemporary South Africa / Jo Wreford…”
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
326por Brenton, ChrisTabla de Contenidos: “…Setting Up a VPN Summary; Chapter 10: Viruses, Trojans, and Worms; Viruses: The Statistics; What Is a Virus?; Worms; Trojan Horses; Preventive Measures; Deploying Virus Protection; Summary; Chapter 11: Disaster Prevention and Recovery; Disaster Categories; Network Disasters; Topology; Server Disasters; Extreme Disasters; VERITAS Storage Replicator; Summary; Chapter 12: The Wide World of Windows; NT Overview; Active Directory; The Domain Structure; User Accounts; The File System; Logging; Security Patches; Available IP Services; Packet Filtering with Windows NT; Securing DCOM…”
Publicado 2003
Libro electrónico -
327Publicado 2013“…This book constructs an eclectic variant of geophilosophy through engagements with digging machines, nuclear waste, cyclones and volcanoes, giant worms, secret vessels, decay, subterranean cities, hell, demon souls, black suns, and xenoarcheaology, via continental theory (Nietzsche, Schelling, Deleuze, et alia) and various cultural objects such as horror films, videogames, and weird Lovecraftian fictions, with special attention to Speculative Realism and the work of Reza Negarestani. …”
Libro electrónico -
328por Bott, Ed“…Master security essentials to help protect against viruses, worms, and spyware. Troubleshoot errors and fine-tune performance. …”
Publicado 2010
Libro electrónico -
329Publicado 2006“…In direct correlation with the number of weaknesses discovered, the number of viruses, worms, and security attacks has also exploded across the Internet. …”
Libro electrónico -
330por Shema, Mike“…Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. …”
Publicado 2012
Libro electrónico -
331Publicado 2014Tabla de Contenidos: “…The luggable computer ; The HP way and the Xerox worm ; IBM -- The PC industry. Losing their religion ; Clones ; Consolidation ; Commoditization ; Cyberspace ; Apple without Jobs -- The post-PC era. …”
Libro electrónico -
332por Mammeri, Zoubir Z.Tabla de Contenidos: “…-- 1.1.4 Security vs Safety -- 1.1.5 Cybersecurity vs IT Security -- 1.2 Security Terms and Definitions -- 1.2.1 Assets and Attackers -- 1.2.2 Vulnerabilities, Threats, and Risks -- 1.3 Security Services -- 1.3.1 Confidentiality and Privacy -- 1.3.2 Integrity -- 1.3.3 Availability -- 1.3.4 Authentication and Authenticity -- 1.3.5 Non-repudiation and Accountability -- 1.3.6 Authorization -- 1.4 Attacks -- 1.4.1 Taxonomy of Attacks -- 1.4.1.1 Attacks According to Their Origin -- 1.4.1.2 Passive vs Active Attacks -- 1.4.1.3 Attacks According to Their Objectives -- 1.4.2 Taxonomy of Attackers -- 1.4.3 Malware Taxonomy -- 1.4.3.1 Virus -- 1.4.3.2 Worm -- 1.4.3.3 Trojan…”
Publicado 2024
Libro electrónico -
333Publicado 1993Tabla de Contenidos: “…/ China doll / Shotgun Boogie / Bimbo / Bonaparte's retreat / The world is waiting for the sunrise / Scarlet Ribbons (For her hair) / Life gits tee-jus' don't do it / When you and I were Young Maggie / You don't have to be a baby to cry / A dear John Letter / Careless hands / How high the moon / Riders in the sky / Oh oh I'm falling in love again / Banana boat song (Day 0) / Mexican Joe / Over the rainbow / Rum and Coca-Cola / String of pearls / On the sunny side of the street / Glow worm / Elmer's Tune / Cheek to cheek / September song / The loveliest night of the year / Sam's song (The happy tune) / Pennsylvania 6-5000 / To each his own / On a slow boat to China / You made me love you / I've Heard that song befote / Arrivederci Roma / Tuxedo Junction…”
CDROM -
334Publicado 2019Tabla de Contenidos: “…Principles -- Living a Counterfeit Life -- The Big Swim -- One Moment Please -- Past and Future Tense -- Part 5 Yogi, Boo-Boo, and the Homos -- The Worm that Turned -- The Rise of the Homo -- Acknowledgements -- About the Author -- Advert -- EULA…”
Libro electrónico -
335Publicado 2017Tabla de Contenidos: “…-- Chapter 11: How to Flick a Virtual Switch -- Chapter 12: Around and Around It Goes -- Chapter 13: Piles of Files: Dealing with Information Overload -- Chapter 14: Creating Loops within Loops -- Chapter 15: The Old Runaround -- Chapter 16: Using Loops and Arrays -- Part 4: Using Program Units -- Chapter 17: Programming with Objects and Classes -- Chapter 18: Using Methods and Fields from a Java Class -- Chapter 19: Creating New Java Methods -- Chapter 20: Oooey GUI Was a Worm -- Part 5: The Part of Tens -- Chapter 21: Ten Websites for Java -- Chapter 22: Ten Useful Classes in the Java API -- Index…”
Libro electrónico -
336Publicado 2006Tabla de Contenidos: “…Yengoyan -- Frazer, Leach, and Virgil: the popularity (and unpopularity) of The Golden Bough / Mary Beard ; Afterword / Mary Beard -- Cowries and conquest: toward a subalternate quality theory of money / Chris Gregory -- Cowries and conquest: prelude to a postscript / Chris Gregory -- Global violence and nationalizing wars in Eurasia and America: the geopolitics of war in the mid-nineteenth century / Michael Geyer and Charles Bright -- Postscript: on regional transformation, globalization, and war, with some afterthoughts on comparative and global history / Charles Bright and Michael Geyer -- Testing paradigms with comparative perspectives: British India and patterns of scientific and technology transfer in the age of European global hegemony / Michael Adas -- Race, ethnicity, species, and breed: totemism and horse-breed classification in America / John Borneman -- Postscript: reflections on totemism tomorrow: horse breeds and breeding in the United States and France / John Borneman -- The cities of Avignon and Worms as expressions of European community, 1945-1975 / Beverly Heckart -- Flowers and bones: approaches to the dead in Anglo-American and Italian cemeteries / Jack Goody and Cesare Poppi -- Flowers and bones: posthumous reflections / Cesare Poppi…”
Sumario
Libro -
337por Shinder, Thomas W.Tabla de Contenidos: “…; Protecting your network against social engineers; Denial of Service (DOS) Attacks; Distributed Denial of Service attacks; DNS DOS attack; SYN attack/LAND attack; Ping of Death; Teardrop; Ping Flood (ICMP flood); SMURF attack; UDP bomb or UDP flood; UDP Snork attack; WinNuke (Windows out-of-band attack); Mail bomb attack; Scanning and Spoofing; Port scan; IP half scan attack; IP Spoofing; Source Routing attack; Other protocol exploits; System and software exploits; Trojans, viruses and worms; Trojans…”
Publicado 2007
Libro electrónico -
338por Russell, Ryan, 1969-Tabla de Contenidos: “…IT'S ALWAYS THE WEB; KISS, OR KEEP IT SIMPLE, STUPID; THE JACKPOT; WITH CUSTOMERS LIKE ME...; CHAPTER 2 The Worm Turns; MR. WORM; YOU CAN GET IT IF YOU REALLY WANT; NO LIFE 'TIL LEATHER; IT'S POURING, IT'S RAINING; I LIVE MY LIFE LIKE THERE'S NO TOMORROW…”
Publicado 2009
Libro electrónico -
339Publicado 2008Tabla de Contenidos: “…Chapter 3: Maliciou Macs: Malware and the MacIntroduction; Taxonomy of Malware; Viruses; Worms; Trojan Horses; Rootkits and Stealthkits; Bots and Botnets; Memetic Malware; Pre-OS X Mac Malware; HyperCard Infectors; Application and System Viruses; Trojans; Macro Malware; Heterogeneous Malware Transmission; Worms: AutoStart and After; OS X and Malware; Case Study-OSX/DNSChanger; Self-launching vs. …”
Libro electrónico -
340por Dubrawsky, IdoTabla de Contenidos: “…Systems Security Overview; Introduction; Security Threats; Privilege Escalation; Viruses and Worms; Trojan; Spyware and Adware; Rootkits and Botnets; Logic Bombs; Hardware and Peripheral Security Risks; BIOS; USB Devices; Cell Phones; Removable Storage Devices; Network-Attached Storage; Summary of Exam Objectives; Exam Objectives Fast Track; Security Threats; Hardware and Peripheral Security Risks; Exam Objectives Frequently Asked Questions; Self Test…”
Publicado 2009
Libro electrónico