Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 49
- Computer security 48
- Computer networks 42
- Engineering & Applied Sciences 25
- Filosofía 22
- Historia 22
- Computer Science 14
- Electrical & Computer Engineering 12
- Telecommunications 12
- Ciencias sociales 11
- Certification 9
- Bergson, Henri 8
- Examinations 8
- Operating systems (Computers) 8
- Arquitectura 7
- Electronic data processing personnel 7
- Firewalls (Computer security) 7
- Internet 7
- Luther, Martin 7
- Computer crimes 6
- Computers 6
- Environment 6
- History 6
- Programming 6
- Access control 5
- Computer programs 5
- Derecho canónico 5
- Educación 5
- Història 5
- Protestantismo 5
-
401Animating SwiftUI applications create visually stunning and engaging animations for IOS with SwiftUIpor DeStefano, StephenTabla de Contenidos: “…Gathering and slicing images -- Adding the animating variables -- Adding the images to the scene -- Adding the background -- Adding the right leg -- Adding the girl -- Adding the left leg -- Bringing the images together -- Using the mask modifier -- Summary -- Chapter 7: Building a Series of Belts and Gears -- Technical requirements -- Animating our first circular gear -- Animating a worm gear using shadows -- Using a marching ants effect to create a gear belt -- Animating a gear shaft image -- Animating a fan image -- Bringing everything together in ContentView -- Adding the motor -- Adding the gears along the x-, y-, and z-axes -- Adding the worm gear -- Adding the belts -- Adding the gear shafts -- Adding the fan -- Adding the background -- Summary -- Chapter 8: Animating a Bouquet of Flowers -- Technical requirements -- Adding the variables and a winter background -- Animating the text labels -- Using the blur modifier to create a vapor effect -- Animating flower petals in an arc -- Adding the flower bouquet and the animated breath -- Creating falling snow in the scene -- Adding the UIViewRepresentable protocol -- Dealing with methods and errors -- Adding the CAEmitter class -- Summary -- Chapter 9: Animating Strokes around Shapes -- Technical requirements -- Converting images into Swift code -- Removing the image backgrounds -- Vectorizing the images -- Translating the SVG file into Swift code -- Animating images with the stroke modifier -- Creating a stroke animation on the "WE" image -- Creating a stroke animation on the heart image -- Creating a stroke animation on the SwiftUI logo image -- Combining the animated strokes -- Summary -- Chapter 10: Creating an Ocean Scene -- Technical requirements -- Adding the wave's offset property -- Creating a wave shape using the Shape protocol and Path function…”
Publicado 2023
Libro electrónico -
402Publicado 2016Tabla de Contenidos: “…5.3 Malware Diffusion Modeling Based on MRFs5.4 Regular Networks; 5.4.1 Chain Networks; 5.4.2 Regular Lattices: Finite and Infinite Grids; 5.5 Complex Networks with Stochastic Topologies; 5.5.1 Random Networks; 5.5.2 Small-world Networks; 5.5.3 Scale-free Networks; 5.5.4 Random Geometric Networks; 5.5.5 Comparison of Malware Diffusion in Complex Topologies; 6 Optimal Control Based Techniques; 6.1 Introduction; 6.2 Example---an Optimal Dynamic Attack: Seek and Destroy; 6.2.1 Dynamics of State Evolution; 6.2.2 Objective Functional; 6.3 Worm's Optimal Control…”
Libro electrónico -
403Publicado 2015Tabla de Contenidos: “…Safety first; Phishing for inphormation; Don't take the bait; Web bugs track the ads you read; Cookies can be good; We know where you are; Security: How People Can Take Over Your PC; Viruses arrive by email; Worms come right over the Net; Spyware arrives via websites; Pop-up browser windows pop up all over the place; What's the secret word, Harry?…”
Libro electrónico -
404Publicado 2019Tabla de Contenidos: “…-- Cloud Computing -- Data Transfer Rates -- Internet Security -- Malware -- Virus -- Worm -- Trojan -- Rootkit -- Ransomware -- Social Engineering -- Phishing -- Pharming -- Pretexting -- Shouldering -- Threat Prevention -- Biometric Measures -- Strong Passwords -- 2-Factor Authentication -- Public Key Cryptography -- Firewalls -- Index -- Blank Page…”
Libro electrónico -
405Publicado 1992Tabla de Contenidos: “…NEEM -- Copyright -- Preface -- Contents -- Foreword -- 1 The Vision -- 2 The Reality -- DISADVANTAGES -- Lack of Experience -- Genetic Variability -- Lack of Registration -- Lack of Standards -- Conflicting Approaches -- Economic Uncertainties -- Handling Difficulties -- Geographical Limitations -- Planting Difficulties -- Silviculture Difficulties -- Instability -- Health Hazards -- Environmental Safety -- Slow Action -- Damage to Plants -- Method of Application -- Protecting the Tree -- Medical Limitations -- Synthetic Competition -- 3 The Tree -- DESCRIPTION -- DISTRIBUTION -- PROPAGATION -- GROWTH -- PROBLEMS -- Pests -- Diseases -- Nutrient Deficiencies -- Other Problems -- 4 What's in a Neem -- LIMONOIDS -- Azadirachtin -- Meliantriol -- Salannin -- Nimbin and Nimbidin -- Others -- PRODUCTION -- Water Extraction -- Hexane Extraction -- Pentane Extraction -- Alcohol Extraction -- FORMULATIONS -- Additives -- METHODS OF APPLICATION -- SYSTEMIC EFFECT -- 5 Effects on Insects -- INSECTS AFFECTED -- Orthoptera -- Homoptera -- Thysanoptera -- Coleoptera -- Lepidoptera -- Diptera -- Hymenoptera -- Heteroptera -- EXAMPLES -- Desert Locust -- Cockroach -- Brown Planthopper -- Stored-Product Insects -- Armyworm -- Colorado Potato Beetle -- Leafminers -- European Corn Borer -- Mosquitoes -- Aphids -- Fruit Flies -- Gypsy Moth -- Horn Flies -- Blowflies -- 6 Effects on Other Organisms -- NEMATODES -- SNAILS -- CRUSTACEANS -- FUNGI -- Aflatoxin -- PLANT VIRUSES -- NONTARGET SPECIES -- Earthworms -- Beneficial Insects -- 7 Medicinals -- FUNGICIDES -- ANTIBACTERIALS -- ANTIVIRAL AGENTS -- DERMATOLOGICAL INSECTS -- DENTAL TREATMENTS -- CHAGAS' DISEASE -- MALARIA -- PAIN RELIEF AND FEVER REDUCTION -- BIRTH CONTROL -- VETERINARY MEDICINE -- Controlling Insects -- Controlling Bacteria -- Controlling Intestinal Worms -- A WORD OF CAUTION…”
Libro electrónico -
406Publicado 2017Tabla de Contenidos: “…Neumes in manuscripts of the Decretum of Burchard of worms / Stephan Dusil and Katherine Hill -- Reading for ritual : liturgy and ritual in southern Italian chronicles / Richard Gyug -- A contested conception : Jocelin of Furness and the local traditions about St Kentigern in twelfth-century Glasgow / Mairi Cowan -- Becket and the wolves : imagining the lupine Welsh in a thirteenth-century Latin preaching exemplum from Llanthony Secunda Priory / David R. …”
Libro -
407Publicado 2008Tabla de Contenidos: “…3.4 Security and Privacy Administration3.5 Security and Privacy Mechanisms; 3.6 Architectural Considerations; 3.7 Conclusion; CHAPTER 4 Network Security Algorithms; 4.1 Searching for Multiple Strings in Packet Payloads; 4.2 Approximate String Matching; 4.3 IP Traceback via Probabilistic Marking; 4.4 IP Traceback via Logging; 4.5 Detecting Worms; 4.6 Conclusion; CHAPTER 5 Concepts in IP Security; 5.1 The Need for Security; 5.2 Choosing Where to Apply Security; 5.3 Components of Security Models; 5.4 IPsec; 5.5 Transport-Layer Security; 5.6 Securing the Hypertext Transfer Protocol…”
Libro electrónico -
408Publicado 2016Tabla de Contenidos: “…Brouwer1, T. Dijkstra1, H. Worm1, Y. Van Der Vorst2 and G. Van Schaik1; Digital dermatitis in dairy cattle: infectivity of the different stages; F. …”
Libro electrónico -
409por Beckmann, Gustav Adolf, author“…Auch hier greifen sie meist sogar ineinander: Personennamen wie Audegarius (+ Oscheri) ~ Oggero Spatacurta ~ Ogier, Malduit der Schatzmeister, (Ricardus) Baligan, Nikephóros ~ Hugue li Forz, Witburg ~ Wigburg ~ Guibourc, Alpais, A(da)lgis (→ Malgis/Amalgis), Toponyme wie Belin, Lucena ~ Luiserne, Worms ~ Garmaise, Dortmund ~ Tremoigne, Esch-sur-Sûre ~ Ascane, Avroy ~ Auridon ~ Oridon ~ Dordone, Pierrepont sowie das doppelte Hydronym Rura ~ Rune und Erunia ~ Rune bringen jeweils ein Stück ihrer aufschlussreichen Geschichte mit sich. …”
Publicado 2019
Libro electrónico -
410Publicado 2016“…You will learn how Google Maps and Google Earth provide pinpoint military accuracy, see how bad guys can manipulate Google to create super worms, and see how they can "mash up" Google with Facebook, LinkedIn, and more for passive reconnaissance. …”
Libro electrónico -
411Publicado 2023Tabla de Contenidos: “…Virtualization -- Serverless -- High-Performance Computing (HPC) and Grid Computing -- Peer-to-Peer -- Thin Clients -- Diskless Workstations -- Thin Client Applications -- Embedded Systems and The Internet of Things (IoT) -- Distributed Systems and Edge Computing Systems -- Industrial Control Systems (ICS) -- System Vulnerabilities, Threats, and Countermeasures -- Emanations -- Covert Channels -- Covert Storage Channels -- Covert Timing Channels -- Backdoors -- Malicious Code (Malware) -- Computer Viruses -- Worms -- Trojans -- Rootkits -- Packers -- Logic Bombs -- Antivirus Software -- Server-Side Attacks -- Client-Side Attacks -- Web Architecture and Attacks -- Applets -- Java -- ActiveX -- OWASP -- XML -- Service Oriented Architecture (SOA) -- Database Security -- Polyinstantiation -- Inference and Aggregation -- Inference and Aggregation Controls -- Data Mining -- Data Analytics -- Countermeasures -- Mobile Device Attacks -- Mobile Device Defenses -- Cornerstone Cryptographic Concepts -- Key Terms -- Confidentiality, Integrity, Authentication, and Non-repudiation -- Confusion, Diffusion, Substitution, and Permutation -- Cryptographic Strength -- Monoalphabetic and Polyalphabetic Ciphers -- Modular Math -- Exclusive Or (XOR) -- Data at Rest and Data in Motion -- Protocol Governance -- Types of Cryptography -- Symmetric Encryption -- Stream and Block Ciphers -- Initialization Vectors and Chaining -- DES -- Modes of DES -- Electronic Code Book (ECB) -- Cipher Block Chaining (CBC) -- Cipher Feedback (CFB) -- Output Feedback (OFB) -- Counter Mode (CTR) -- Single DES -- Triple DES -- International Data Encryption Algorithm (IDEA) -- Advanced Encryption Standard (AES) -- Choosing AES…”
Libro electrónico -
412Tabla de Contenidos: “…-- Securing the Control Plane on a Switch -- Implementing Hardware-Based CoPP -- Implementing Software-Based CoPP -- Mitigating Attacks Using CoPP -- Summary -- References -- Chapter 14 Disabling Control Plane Protocols -- Configuring Switches Without Control Plane Protocols -- Summary -- Chapter 15 Using Switches to Detect a Data Plane DoS -- Detecting DoS with NetFlow -- Securing Networks with RMON -- Other Techniques That Detect Active Worms -- Summary -- References -- Part III: Using Switches to Augment the Network Security -- Chapter 16 Wire Speed Access Control Lists -- ACLs or Firewalls? …”
Libro electrónico -
413por Khlebnikov, Alexei“…The modern internet is full of worms, Trojan horses, men-in-the-middle, and other threats. …”
Publicado 2022
Libro electrónico -
414por Gómez Vieites, ÁlvaroTabla de Contenidos: “…VIRUS INFORMÁTICOS Y OTROS CÓDIGOS DAÑINOS; 3.1 CARACTERÍSTICAS GENERALES DE LOS VIRUS INFORMÁTICOS; 3.2 TIPOS DE VIRUS Y OTROS PROGRAMAS DAÑINOS; 3.2.1 Virus de Boot (sector de arranque); 3.2.2 Virus de ficheros ejecutables; 3.2.3 Virus del lenguaje Java; 3.2.4 Virus de macros; 3.2.5 Troyanos; 3.2.6 Rootkits; 3.2.7 Gusanos (worms); 3.2.8 Bacterias; 3.2.9 Bombas lógicas; 3.2.10 Hoaxes (bulos); 3.2.11 Jokes (Bromas); 3.2.12 Programas que permiten construir virus…”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
415por Castets, GustavoTabla de Contenidos: “…Information gathering format -- 2.1 Present environment -- 2.1.1 Hardware -- 2.1.2 Software -- 2.1.3 Data environment -- 2.1.4 Library sharing -- 2.2 Future environment -- 2.2.1 Hardware -- 2.2.2 Software -- 2.2.3 Data environment -- 2.3 Backup -- 2.3.1 Current backup environment -- 2.3.2 Predicted trends -- 2.3.3 WORM data -- 2.4 Restore -- 2.4.1 Current restore environment -- 2.4.2 Predicted trends -- 2.5 Financial considerations -- 2.5.1 Budget timetable -- 2.6 Importance of data -- 2.6.1 Disaster Recovery considerations -- 2.6.2 Time to restore: Requirements -- 2.7 Other considerations -- 2.7.1 Support structure -- 2.7.2 Conversions -- Chapter 3. …”
Publicado 2004
Libro electrónico -
416Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Foreword -- What the experts say -- Contributors -- Table of Contents -- Preface -- Part 1- Introduction -- Chapter 1: Malware Science Life Cycle Overview -- Combining malware -- Worms and Trojans combination -- Ransomware and spyware combination -- Macro malware and ransomware -- Managing malware -- Collection -- Analysis -- Detection -- Prevention -- Mitigation -- Reporting -- Summary -- Chapter 2: An Overview of the International History of Cyber Malware Impacts -- The evolution of cyber threats and malware -- Impacts on international relations and security -- Impacts on the economy and cybercrime -- The future of malware -- Expanded viewpoint on the impacts on international relations and security -- Expansion on cybercrime impacts on the general economy -- Direct financial impacts of malware - a global overview -- Ransomware's global economic impact - a continental overview -- Ransomware's economic impact in North America - a deeper look -- Ransomware's economic impact in Asia - a detailed examination -- Ransomware's economic impact in Africa - an in-depth analysis -- Ransomware's economic impact in South America - an extensive exploration -- Economic impacts versus socio-economic impacts -- Ransomware attacks and their impact on employment - an in-depth perspective -- Ransomware attacks and their impact on public services - an elaborate examination -- Ransomware and inequality - a closer look at the impact on small businesses -- Policy, regulations, and their downstream impact on smaller businesses and public services -- Regulatory changes due to malware impacts on small and mid-scale businesses -- A deeper dive into the operational challenges -- Translating operational challenges into increased cost -- Expansion of economic and socio-economic impacts on key industries globally…”
Libro electrónico -
417por Ligh, Michael W.“…Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. …”
Publicado 2011
Libro electrónico -
418por Pogue, David, 1963-“…Learning to use a Mac is not a piece of cake, but once you do, the rewards are oh-so-much better. No viruses, worms, or spyware. No questionab…”
Publicado 2009
Libro electrónico -
419por Cox, KerryTabla de Contenidos: “…Disgruntled Current and Former Employees and Contractors; 4.1.4. Robots and Worms; 4.2. Anatomy of an Attack: The Five Ps; 4.2.1.2. …”
Publicado 2004
Libro electrónico -
420Tabla de Contenidos: “…Server enhancements -- 2.1 ACSLS support -- 2.2 SAN device mappings for UNIX servers -- 2.3 Activity log management -- 2.4 Checkin and checkout enhancements -- 2.5 Collocation by group -- 2.6 Database reorganization -- 2.7 Disk device enhancements -- 2.8 DEVCLASS and PATH changes -- 2.9 Server migration and reclamation processes -- 2.10 3592 WORM support -- 2.11 Improved defaults -- 2.12 Validating LAN-free environment configuration -- 2.13 NDMP operations -- 2.14 NetApp SnapLock support -- 2.15 Scheduling flexibility -- Chapter 3. …”
Libro electrónico