Mostrando 321 - 340 Resultados de 502 Para Buscar '"Worms"', tiempo de consulta: 0.06s Limitar resultados
  1. 321
    “…For the elimination phase, the worms are transferred to a soil free of test substance. …”
    Libro electrónico
  2. 322
    “…The test is conducted with at least 10 worms for each replicate. The report should include the total number and the dry weight of the worms, the observations of abnormal behaviour, of mortalities, the water characteristics within the test vessels and the total organic content…”
    Libro electrónico
  3. 323
    Publicado 2005
    “…Linux systems are even less vulnerable to attacks by computer viruses and worms. Not surprisingly, businesses, government agencies, schools, and a wealth of other institutions are all looking to Linux to replace the Windows desktop for these same benefits. …”
    Libro electrónico
  4. 324
    por Landau, Peter, 1935-2019
    Publicado 2013
    “…., Cölestin II. oder Lucius III. sowie Kirchenrechtler wie Burchard von Worms und Gratian können nur einen kleinen Eindruck vermitteln, mit welchen Thematiken sich der Autor in seinen Aufsätzen auseinandersetzt. …”
    Libro
  5. 325
    Publicado 2010
    Tabla de Contenidos: “….-- Interweaving Substance Trajectories: Tiryaq, Circulation and Therapeutic Transformation in the Nineteenth Century / Guy Attewell.-- Winter Worm, Summer Grass: Cordyceps, Colonial Chinese Medicine, and the Formation of Historical Objects / Carla Nappi.-- Researching Amok in Malaysia / Thomas Williamson.-- Russian Imperial Medicine: The Case of the Kazakh Steppe / Anna Afanasyeva.-- Multiple Colonizations: State Formation, Public Health and the Yucatec Maya, 1891-1960 / David Sowell.-- Medical Pluralism as a Historical Phenomenon: A Regional and Multi-Level Approach to Health Care in German, British and Independent East Africa / Walter Bruchhausen.-- Crossing Colonial and Medical Boundaries: Plural Medicine on Java, 1850-1910 / Liesbeth Hesselink.-- Towards a Cultural History of Medicine(s) in Colonial Central Africa / Markku Hokkanen.-- Crossing Colonies and Empires: The Health Services of the Diamond Company of Angola / Jorge Varanda.-- Medicine, Colonial Order and Local Action in Goa / Cristiana Bastos.-- Loosening the Bonds of Historical Prejudice: Traditional Practitioners as Agents of Reconciliation and Change in Contemporary South Africa / Jo Wreford…”
    Enlace del recurso
    Libro electrónico
  6. 326
    por Brenton, Chris
    Publicado 2003
    Tabla de Contenidos: “…Setting Up a VPN Summary; Chapter 10: Viruses, Trojans, and Worms; Viruses: The Statistics; What Is a Virus?; Worms; Trojan Horses; Preventive Measures; Deploying Virus Protection; Summary; Chapter 11: Disaster Prevention and Recovery; Disaster Categories; Network Disasters; Topology; Server Disasters; Extreme Disasters; VERITAS Storage Replicator; Summary; Chapter 12: The Wide World of Windows; NT Overview; Active Directory; The Domain Structure; User Accounts; The File System; Logging; Security Patches; Available IP Services; Packet Filtering with Windows NT; Securing DCOM…”
    Libro electrónico
  7. 327
    Publicado 2013
    “…This book constructs an eclectic variant of geophilosophy through engagements with digging machines, nuclear waste, cyclones and volcanoes, giant worms, secret vessels, decay, subterranean cities, hell, demon souls, black suns, and xenoarcheaology, via continental theory (Nietzsche, Schelling, Deleuze, et alia) and various cultural objects such as horror films, videogames, and weird Lovecraftian fictions, with special attention to Speculative Realism and the work of Reza Negarestani. …”
    Libro electrónico
  8. 328
    por Bott, Ed
    Publicado 2010
    “…Master security essentials to help protect against viruses, worms, and spyware. Troubleshoot errors and fine-tune performance. …”
    Libro electrónico
  9. 329
    Publicado 2006
    “…In direct correlation with the number of weaknesses discovered, the number of viruses, worms, and security attacks has also exploded across the Internet. …”
    Libro electrónico
  10. 330
    por Shema, Mike
    Publicado 2012
    “…Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. …”
    Libro electrónico
  11. 331
    Publicado 2014
    Tabla de Contenidos: “…The luggable computer ; The HP way and the Xerox worm ; IBM -- The PC industry. Losing their religion ; Clones ; Consolidation ; Commoditization ; Cyberspace ; Apple without Jobs -- The post-PC era. …”
    Libro electrónico
  12. 332
    por Mammeri, Zoubir Z.
    Publicado 2024
    Tabla de Contenidos: “…-- 1.1.4 Security vs Safety -- 1.1.5 Cybersecurity vs IT Security -- 1.2 Security Terms and Definitions -- 1.2.1 Assets and Attackers -- 1.2.2 Vulnerabilities, Threats, and Risks -- 1.3 Security Services -- 1.3.1 Confidentiality and Privacy -- 1.3.2 Integrity -- 1.3.3 Availability -- 1.3.4 Authentication and Authenticity -- 1.3.5 Non-repudiation and Accountability -- 1.3.6 Authorization -- 1.4 Attacks -- 1.4.1 Taxonomy of Attacks -- 1.4.1.1 Attacks According to Their Origin -- 1.4.1.2 Passive vs Active Attacks -- 1.4.1.3 Attacks According to Their Objectives -- 1.4.2 Taxonomy of Attackers -- 1.4.3 Malware Taxonomy -- 1.4.3.1 Virus -- 1.4.3.2 Worm -- 1.4.3.3 Trojan…”
    Libro electrónico
  13. 333
    Publicado 1993
    Tabla de Contenidos: “…/ China doll / Shotgun Boogie / Bimbo / Bonaparte's retreat / The world is waiting for the sunrise / Scarlet Ribbons (For her hair) / Life gits tee-jus' don't do it / When you and I were Young Maggie / You don't have to be a baby to cry / A dear John Letter / Careless hands / How high the moon / Riders in the sky / Oh oh I'm falling in love again / Banana boat song (Day 0) / Mexican Joe / Over the rainbow / Rum and Coca-Cola / String of pearls / On the sunny side of the street / Glow worm / Elmer's Tune / Cheek to cheek / September song / The loveliest night of the year / Sam's song (The happy tune) / Pennsylvania 6-5000 / To each his own / On a slow boat to China / You made me love you / I've Heard that song befote / Arrivederci Roma / Tuxedo Junction…”
    CDROM
  14. 334
    Publicado 2019
    Tabla de Contenidos: “…Principles -- Living a Counterfeit Life -- The Big Swim -- One Moment Please -- Past and Future Tense -- Part 5 Yogi, Boo-Boo, and the Homos -- The Worm that Turned -- The Rise of the Homo -- Acknowledgements -- About the Author -- Advert -- EULA…”
    Libro electrónico
  15. 335
    Publicado 2017
    Tabla de Contenidos: “…-- Chapter 11: How to Flick a Virtual Switch -- Chapter 12: Around and Around It Goes -- Chapter 13: Piles of Files: Dealing with Information Overload -- Chapter 14: Creating Loops within Loops -- Chapter 15: The Old Runaround -- Chapter 16: Using Loops and Arrays -- Part 4: Using Program Units -- Chapter 17: Programming with Objects and Classes -- Chapter 18: Using Methods and Fields from a Java Class -- Chapter 19: Creating New Java Methods -- Chapter 20: Oooey GUI Was a Worm -- Part 5: The Part of Tens -- Chapter 21: Ten Websites for Java -- Chapter 22: Ten Useful Classes in the Java API -- Index…”
    Libro electrónico
  16. 336
    Publicado 2006
    Tabla de Contenidos: “…Yengoyan -- Frazer, Leach, and Virgil: the popularity (and unpopularity) of The Golden Bough / Mary Beard ; Afterword / Mary Beard -- Cowries and conquest: toward a subalternate quality theory of money / Chris Gregory -- Cowries and conquest: prelude to a postscript / Chris Gregory -- Global violence and nationalizing wars in Eurasia and America: the geopolitics of war in the mid-nineteenth century / Michael Geyer and Charles Bright -- Postscript: on regional transformation, globalization, and war, with some afterthoughts on comparative and global history / Charles Bright and Michael Geyer -- Testing paradigms with comparative perspectives: British India and patterns of scientific and technology transfer in the age of European global hegemony / Michael Adas -- Race, ethnicity, species, and breed: totemism and horse-breed classification in America / John Borneman -- Postscript: reflections on totemism tomorrow: horse breeds and breeding in the United States and France / John Borneman -- The cities of Avignon and Worms as expressions of European community, 1945-1975 / Beverly Heckart -- Flowers and bones: approaches to the dead in Anglo-American and Italian cemeteries / Jack Goody and Cesare Poppi -- Flowers and bones: posthumous reflections / Cesare Poppi…”
    Sumario
    Libro
  17. 337
    por Shinder, Thomas W.
    Publicado 2007
    Tabla de Contenidos: “…; Protecting your network against social engineers; Denial of Service (DOS) Attacks; Distributed Denial of Service attacks; DNS DOS attack; SYN attack/LAND attack; Ping of Death; Teardrop; Ping Flood (ICMP flood); SMURF attack; UDP bomb or UDP flood; UDP Snork attack; WinNuke (Windows out-of-band attack); Mail bomb attack; Scanning and Spoofing; Port scan; IP half scan attack; IP Spoofing; Source Routing attack; Other protocol exploits; System and software exploits; Trojans, viruses and worms; Trojans…”
    Libro electrónico
  18. 338
    por Russell, Ryan, 1969-
    Publicado 2009
    Tabla de Contenidos: “…IT'S ALWAYS THE WEB; KISS, OR KEEP IT SIMPLE, STUPID; THE JACKPOT; WITH CUSTOMERS LIKE ME...; CHAPTER 2 The Worm Turns; MR. WORM; YOU CAN GET IT IF YOU REALLY WANT; NO LIFE 'TIL LEATHER; IT'S POURING, IT'S RAINING; I LIVE MY LIFE LIKE THERE'S NO TOMORROW…”
    Libro electrónico
  19. 339
    Publicado 2008
    Tabla de Contenidos: “…Chapter 3: Maliciou Macs: Malware and the MacIntroduction; Taxonomy of Malware; Viruses; Worms; Trojan Horses; Rootkits and Stealthkits; Bots and Botnets; Memetic Malware; Pre-OS X Mac Malware; HyperCard Infectors; Application and System Viruses; Trojans; Macro Malware; Heterogeneous Malware Transmission; Worms: AutoStart and After; OS X and Malware; Case Study-OSX/DNSChanger; Self-launching vs. …”
    Libro electrónico
  20. 340
    por Dubrawsky, Ido
    Publicado 2009
    Tabla de Contenidos: “…Systems Security Overview; Introduction; Security Threats; Privilege Escalation; Viruses and Worms; Trojan; Spyware and Adware; Rootkits and Botnets; Logic Bombs; Hardware and Peripheral Security Risks; BIOS; USB Devices; Cell Phones; Removable Storage Devices; Network-Attached Storage; Summary of Exam Objectives; Exam Objectives Fast Track; Security Threats; Hardware and Peripheral Security Risks; Exam Objectives Frequently Asked Questions; Self Test…”
    Libro electrónico