Mostrando 381 - 400 Resultados de 502 Para Buscar '"Worms"', tiempo de consulta: 0.07s Limitar resultados
  1. 381
    Publicado 2022
    Tabla de Contenidos: “…1 introduction 3 -- references 5 -- 2 intermediate filaments - from proteins to networks 9 -- 2.1 Structure and assembly of intermediate filament proteins 10 -- 2.2 Mechanical properties of single intermediate filaments 12 -- 2.2.1 Persistence length 12 -- 2.2.2 Stretching response . 13 -- 2.3 Networks of reconstituted intermediate filaments . 15 -- 2.4 Intermediate filament networks in cells . 16 -- 2.4.1 Structure and function of intermediate filament networks in cells 16 -- 2.4.2 Intermediate filament networks and cell mechanics 16 -- 2.4.3 Keratin networks in cells under load . 17 -- references 17 -- 3 biopolymer mechanics - theoretical and experimental principles 29 -- 3.1 Optical tweezers . 29 -- 3.1.1 Particle trapping 30 -- 3.1.2 Force detection . 31 -- 3.2 Microrheology 34 -- 3.2.1 Rheology of viscoelastic materials 34 -- 3.2.2 Passive microrheology: microparticle tracking . 34 -- 3.2.3 Active microrheology: optical trapping . 36 -- 3.3 Polymer mechanics . 38 -- 3.3.1 Entropic stretching of worm-like chains . 38 -- 3.3.2 Worm-like bundles . 39 -- 3.3.3 Networks of semiflexible polymers . 39 -- 3.4 Molecular reactions . 43 -- 3.4.1 Step-growth polymerization . 43 -- 3.4.2 Molecular reaction kinetics - two state models . 43 -- references 44 -- 4 materials and methods 51 -- 4.1 Vimentin preparation 51 -- 4.2 Maleimide functionalization of polystyrene beads . 52 -- 4.3 Stretching single filaments by optical trapping . 53 -- 4.4 Analysis of single filament mechanics 54 -- 4.5 Force-strain Monte-Carlo simulations 56 -- 4.6 Optical trap measurements of individual filament-filament interactions . 56 -- 4.7 Analysis of the interaction data 58 -- 4.8 Microrhelogy of reconstituted vimentin networks . 60 -- 4.9 Analysis of microrheology experiments . 61 -- 4.10 Imaging filament networks 63 -- 4.11 Imaging single filaments 63 -- 4.12 Analysis of filament lengths 64 -- 4.13 Finite element simulation of the microfluidic flowcell . 64 -- 4.14 Stretching MDCK II cells on elastic substrates . 65 -- 4.15 Analysis of images of stretched cells . 68 -- references 70 -- 5 tuning intermediate filament mechanics by variation of -- ph and ion charges 75 -- 5.1 Introduction . 76 -- 5.2 Results and discussion . 77 -- 5.2.1 Cations stiffen single vimentin IFs 77 -- 5.2.2 Stretching vimentin filament bundles 81 -- 5.2.3 IF mechanics adapt to pH changes 82 -- 5.2.4 IF stiffening saturates at low pH . 83 -- 5.2.5 Variations in the free energy landscapes influence filament mechanics 85 -- 5.3 Conclusions . 90 -- references 91 -- 6 multiscale mechanics and temporal evolution of vimentin -- intermediate filament networks 97 -- 6.1 Introduction . 98 -- 6.2 Results and discussion . 98 -- 6.2.1 Vimentin filament networks mature and stiffen on time scales of days 98 -- 6.2.2 The filament length depends on elongation and lateral association 100 -- 6.2.3 Electrostatic and hydrophobic interactions lead to mechanically distinct networks 101 -- 6.2.4 Maturation of networks is concentration dependent 104 -- 6.2.5 Surface effects modify network structures . 105 -- 6.2.6 Single filament mechanics are unaffected by detergents or divalent ions . 107 -- 6.2.7 Electrostatics increase single filament-filament interactions108 -- 6.2.8 Interactions are independent of binding-site encounter rate112 -- 6.2.9 A two-state model accurately describes network mechanics112 -- 6.3 Conclusions . 113 -- 6.4 Outlook 115 -- 6.4.1 Entropic and elastic stretching of single vimentin filaments115 -- 6.4.2 Single interactions of pre-strained filaments 117 -- references 119 -- 7 response of actin and keratin structures to isotropic cell stretching 125 -- 7.1 Introduction . 125 -- 7.2 Results and Discussion . 126 -- 7.2.1 Equibiaxial stretching of PDMS devices . 126 -- 7.2.2 The cell area increases during isotropic stretching . 128 -- 7.2.3 Actin stress fibers disassemble at increasing cell extension 129 -- 7.2.4 The keratin structure adapts to increasing strains . 131 -- 7.3 Conclusion 133 -- references 133 -- 8 discussion and conclusion 137 -- references 140 -- appendix 145 -- a supporting information: tuning intermediate filament mechanics by variation of ph and ion charges 145 -- a.1 Flow simulations 145 -- a.2 Single force-strain curves . 147 -- b supporting information: multiscale mechanics and temporal evolution of vimentin intermediate filament networks 149 -- b.1 Additional information for elongation measurements . 149 -- b.2 Data analysis of microrheology measurements . 152 -- b.3 Modeling single interactions 161 -- c supporting information: response of actin and keratin structures to isotropic cell stretching 167 -- references 169 -- Acknowledgments 172 -- List of acronyms 174 -- Publications 176.…”
    Libro electrónico
  2. 382
    Tabla de Contenidos: “…Botnets -- A Closer Look at Spyware -- Trojans and Backdoors -- Rootkits -- Viruses and Worms -- Botnets -- Brief History of Viruses, Worms, and Trojans -- The Current Situation -- Anti-Virus Software -- Need for Anti-Virus Software -- Top 5 Commercially Available Anti-Virus Software -- Symantec Norton Anti-Virus Software -- McAfee Anti- Virus -- Kaspersky Anti- Virus -- Bitdefender Anti- Virus -- AVG Anti-Virus Software -- A Few Words of Caution -- Chapter Summary -- Chapter 8: Cryptography -- Introduction -- Cryptographic Algorithms -- Symmetric Key Cryptography -- Key Distribution -- Asymmetric Key Cryptography -- Public Key Cryptography -- RSA Algorithm -- Advantages of Public Key Cryptography -- Applications of PKC -- Public Key Infrastructure (PKI) -- Certificate Authority (CA) -- Digital Certificate -- Hash Function Cryptography -- Popular Hashes -- Digital Signatures -- Summary of Cryptography Standard Algorithms -- Disk / Drive Encryption -- Attacks on Cryptography -- Chapter Summary -- Part IV: Network Security -- Chapter 9: Understanding Networks and Network Security -- Introduction -- Networking Fundamentals -- Computer Communication -- Network and its Components -- Network Protocols -- OSI (Open Systems Interconnection) Reference Model -- TCP/IP Model -- Network Vulnerabilities and Threats -- Vulnerabilities -- Security Policy Weaknesses -- Technology Weaknesses -- Configuration Weaknesses -- Threats -- Attacks -- Reconnaissance -- Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) -- Other Attacks on Networks -- How to counter the Network Attacks -- Chapter Summary -- Chapter 10: Firewalls -- Introduction -- How Do You Protect a Network? …”
    Libro electrónico
  3. 383
    Publicado 2008
    Tabla de Contenidos: “…Authentication and Authorization of Wireless Users -- Lightweight Access Point Protocol (LWAPP) -- Wireless Intrusion Prevention System Integration -- Management Frame Protection (MFP) -- Precise Location Tracking -- Network Admission Control (NAC) in Wireless Networks -- Summary -- Chapter 9 IP Telephony Security -- Protecting the IP Telephony Infrastructure -- Securing the IP Telephony Applications -- Protecting Against Eavesdropping Attacks -- Summary -- Chapter 10 Data Center Security -- Protecting the Data Center Against Denial of Service (DoS) Attacks and Worms -- Data Center Segmentation and Tiered Access Control -- Deploying Network Intrusion Detection and Prevention Systems -- Deploying the Cisco Security Agent (CSA) in the Data Center -- Summary -- Chapter 11 IPv6 Security -- Reconnaissance -- Filtering in IPv6 -- Spoofing -- Header Manipulation and Fragmentation -- Broadcast Amplification or Smurf Attacks -- IPv6 Routing Security -- IPsec and IPv6 -- Summary -- Part IV Case Studies -- Chapter 12 Case Studies -- Case Study of a Small Business -- Case Study of a Medium-Sized Enterprise -- Case Study of a Large Enterprise -- Summary -- Index…”
    Libro electrónico
  4. 384
    por Bradley, Tony
    Publicado 2006
    Tabla de Contenidos: “…Passwords; Introduction; Password Power; Password Cracking; Storing Your Passwords; One Super-Powerful Password; Summary; Additional Resources; Chapter 3. Viruses, Worms, and Other Malware; Introduction; Malware Terms; The History of Malware; Chapter 4. …”
    Libro electrónico
  5. 385
    por Honeycutt, Jerry
    Publicado 2009
    Tabla de Contenidos: “…Security in Windows Vista; Help Desk Calls Related to Malware; Protecting Against Browser Exploit Malware Installations; Protecting Against Network Worms; Data Theft; Copying Confidential Files to Removable Media; Accidentally Printing, Copying, or Forwarding Confidential Documents; New and Improved Windows Vista Security Features…”
    Libro electrónico
  6. 386
    por Wright, Craig
    Publicado 2008
    Tabla de Contenidos: “…; Viruses; Bombs; Trojans; Worms; Policy > Procedure > Audit; Summary; Chapter 3: The Information Systems Audit Program; Introduction; Audit Checklists; Baselines; Baselines and Automation; Assurance; Testing Your Organization's Security; Objectivity; Standards and Ethics…”
    Libro electrónico
  7. 387
    Publicado 2008
    Tabla de Contenidos: “…Privacy versus SecuritySecurity versus Usability; Designing a Framework for Implementing Security; Predicting Threats to Your Network; Recognizing Internal Security Threats; Increasing Security Awareness; Recognizing External Threats; Denial-of-Service Attacks; Distributed Denial-of-Service Attacks; Viruses, Worms, and Trojan Horses; Software Vulnerabilities; Nontechnical Attacks; What Motivates External Attackers?…”
    Libro electrónico
  8. 388
    por Horton, Steve
    Publicado 2008
    Tabla de Contenidos: “…The Cardinal Rules of Good Manga LetteringCreating a Speech Balloon Manually; Creating a Speech Balloon Automatically; Creating a Tail for the Speech Balloon; Sound Effects and Lettering: Final Note; Chapter 9 Other Side of the Tracks; Chapter 10 Single Panel Elements; Establishing Shot; Close On: Breaking the Establishing Shot Rule; The Rest of the Scene; Close-Up; Medium Shot; Long Shot; Low Angle, High Angle; Bird's Eye View and Worm's Eye View; Single Panel Elements: Final Note; Chapter 11 Panel to Panel Storytelling; Page Composition; Splash Page; The Six-Panel Grid…”
    Libro electrónico
  9. 389
    Publicado 2007
    Tabla de Contenidos: “…Attack Detection and Defense; Introduction; The Juniper Security Research Team; Understanding Attacks; Worms, Viruses, and Other Automated Malware; TCP/IP Protocol Anomaly Detection; Using Attack Objects; Antivirus Rules…”
    Libro electrónico
  10. 390
    Publicado 2014
    Tabla de Contenidos:
    Libro electrónico
  11. 391
    Publicado 2016
    Tabla de Contenidos: “…Apple OS X application bundles.NET common language runtime (CLR) / Java; Debugging/disassembly; gdb/ddd; Ollydbg; Immunity Debugger; Decompilers; System calls and tracing; Finding the program impact; Playing Safely; Conclusions; Exercises; Bibliography; Chapter 10 - Malware; Introduction; Malware categories; Virus; Worm; Rootkit; Macro Virus; Trojan; Botnet; Construction Kits; Using research; Getting infected; Drive-by Attacks and Watering Holes; Code Injection and File Replacement; Droppers; Boot Infections; DLL Injection and API Hooking; Crypto Lockers and Ransomware…”
    Libro electrónico
  12. 392
    Publicado 2017
    Tabla de Contenidos: “…Bowker und Susan Leigh Star -- Das Ordnen der Dinge Von den Unbestimmtheiten und Unsichtbarkeiten des Klassifizierens / Cornelius Schubert -- Dies ist kein Grenzobjekt Reflexionen über den Ursprung eines Konzepts (2010) / Susan Leigh Star -- Die Struktur der Grenzobjekte Erhard Schüttpelz -- MARGINALITÄT UND ARBEIT -- Macht, Technik und die Phänomenologie von Konventionen Gegen Zwiebeln allergisch sein (1990/91) / Susan Leigh Star -- >>Another Person's Poison<< -- Zur Konzeptualisierung von Nahrungsmittelallergien und Grenzerfahrungen bei Susan Leigh Star / Nadine Taha -- Schichten des Schweigens, Arenen der Stimme Die Ökologie sichtbarer und unsichtbarer Arbeit (1999) / Susan Leigh Star und Anselm Strauss -- Reflexionen zur Ökologie sichtbarer und unsichtbarer Arbeit bei Susan Leigh Star und Anselm Strauss / Jörg Potthast -- Grounded Theory leben Kognitive und emotionale Formen des Pragmatismus (2007) / Susan Leigh Star -- Rotluchs in Garageneinfahrt Frontier und Fremde in Susan Leigh Stars >>Living Grounded Theory<< / Cora Bender -- INFRASTRUKTUREN UND PRAXISGEMEINSCHAFTEN -- Schritte zu einer Ökologie von Infrastruktur Design und Zugang für großangelegte Informationsräume (1995/1996) / Susan Leigh Star und Karen Ruhleder -- >>Worm World<< Infrastruktur, Ökologie und double binds bei Susan Leigh Star und Karen Ruhleder / Gabriele Schabacher -- Die Ethnografie von Infrastruktur (1999) / Susan Leigh Star -- Barrieren, Hinterbühnen, Infrastrukturen Susan Leigh Stars Packungsbeilagen zur Erforschung der Arbeit im Informationszeitalter / Monika Dommann -- Transparenz jenseits individueller Größenordnungen Konvergenz zwischen Informationsartefakten und Praxisgemeinschaften (2003) / Susan Leigh Star, Geoffrey C. …”
    Libro electrónico
  13. 393
    por O'Connor, T. J.
    Publicado 2013
    Tabla de Contenidos: “…Your Second Program, a Zip-File Password CrackerChapter Wrap-Up; References; 2 Penetration Testing with Python; Introduction: The Morris Worm-Would it Work Today?; Building a Port Scanner; TCP Full Connect Scan; Application Banner Grabbing; Threading the Scan; Integrating the Nmap Port Scanner; Building an SSH BotNet with Python; Interacting with SSH Through Pexpect; Brute Forcing SSH Passwords with Pxssh; Exploiting SSH Through Weak Private Keys; Constructing the SSH Botnet; Mass Compromise by Bridging FTP and Web; Building an Anonymous FTP Scanner with Python…”
    Libro electrónico
  14. 394
    Publicado 2015
    Tabla de Contenidos: “…Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Preface; Chapter 1: Engineering Notebook; The engineering design process; Content Editor features; New pages and page actions; Computer-aided Design and building instructions; LEGO Digital Designer; LDraw; Commenting on your code; Summary; Chapter 2: Mechanical Design; Mechanical advantage; Motors; Large motors and gears; Writing a program; Bevel gears at right angles; Worm gear; Using wires and parallel threads; Summary; Chapter 3: Drive Train and Chassis; Chassis; Skid-bot with the Retail kit…”
    Libro electrónico
  15. 395
    Publicado 2023
    Tabla de Contenidos: “…-- The Change Environment -- Case in Point -- Risk Tool -- Impact Calculator -- Summary -- 15 When the Early Bird Misses the Worm: Signals of When to Promote, Not to Promote and Transition Leaders Out -- Introduction -- Case Study -- Summary -- References -- 16 Out With the Old, In With the New: Expected Roles of the Top Leader for the 2020s and Beyond -- Introduction -- The Change Evolution -- The Leadership Evolution -- The Crucial Questions -- The Road Ahead -- Summary -- References -- 17 Leveraging Maturity Models as Operational Truth Serum -- Introduction -- The Case Study -- The Framework -- Summary -- Reference -- Conclusion -- Index…”
    Libro electrónico
  16. 396
    Publicado 2020
    Tabla de Contenidos: “…LA BIBLIA "ANABAPTISTA" DE WORMS -- 6. LA BIBLIA "CATÓLICO-HUMANISTA" DE JACQUES LEFÈVRE D'ÉTAPLES -- 7. …”
    Enlace del recurso
    Libro electrónico
  17. 397
    por Rollins, Mark, 1971-
    Publicado 2013
    Tabla de Contenidos: “…Project 5-2: Building a Flexible Steering MechanismCheck Your Tires; Making a LEGO Technic 4x4 Vehicle; Project 5-3: Assembling the H-Frame and Accessories; Reviewing the 4 X 4 Construction; Summary; CHAPTER 6 Technic Construction Vehicles and Equipment; LEGO Technic Excavation; Project 6-1: Creating a Track Hoe Swivel; Project 6-2: Creating a Scoop for a Bulldozer; Project 6-3: Building a Rack and Pinion Forklift; Creating the Rack Portion of the Forklift; Creating the Pinion Portion of the Forklift; Project 6-4: Building a Crane; Project 6-5: Raising the Crane with a Worm Gear; Summary…”
    Libro electrónico
  18. 398
    Publicado 2015
    Tabla de Contenidos: “…; Vicious Circles; Too Poor to Pollute; Bt Cotton Comes to China; The Worms Win; Part II: Made in China; 5 Cotton Comes to China; The Chinese Wall; Shanghai Number 36 Cotton Yarn Factory…”
    Libro electrónico
  19. 399
    Publicado 2014
    Tabla de Contenidos: “…3D Sound in GamesObstruction; Audio Engine Needs; Audio Middleware Structure; The Other Side of the Fence-The API; Current Middleware Tools; Other Middleware of Note; Level 9: The Early Bird Gets the Worm: Preparing Your Audio; Mixing for Games; Audio Preparation for Game Engines; Just So You Know. . . .; The Importance of Looping in Games; Creating Perfect Loops; Audio Format Choices; Level 10: 'Silly Human…”
    Libro electrónico
  20. 400
    Publicado 2015
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Dedication -- Contents -- Introduction -- About the Author -- About the Technical Editor -- Acknowledgments -- Chapter 1 - Understanding the threat -- Information in This Chapter: -- Introduction -- A brief of history of network security -- The Morris worm -- Firewalls -- Intrusion detection systems -- The desktop -- The mail filter and the proxy -- Distributed denial of service attacks -- Unified threat management -- Understanding the current threat -- The business of malware -- Commoditization of malware -- The king phish -- The attack surface is expanding -- The rise of the cloud -- The coming threats -- Conclusion -- References -- Chapter 2 - What is intelligence? …”
    Libro electrónico