Mostrando 401 - 420 Resultados de 502 Para Buscar '"Worms"', tiempo de consulta: 0.08s Limitar resultados
  1. 401
    por DeStefano, Stephen
    Publicado 2023
    Tabla de Contenidos: “…Gathering and slicing images -- Adding the animating variables -- Adding the images to the scene -- Adding the background -- Adding the right leg -- Adding the girl -- Adding the left leg -- Bringing the images together -- Using the mask modifier -- Summary -- Chapter 7: Building a Series of Belts and Gears -- Technical requirements -- Animating our first circular gear -- Animating a worm gear using shadows -- Using a marching ants effect to create a gear belt -- Animating a gear shaft image -- Animating a fan image -- Bringing everything together in ContentView -- Adding the motor -- Adding the gears along the x-, y-, and z-axes -- Adding the worm gear -- Adding the belts -- Adding the gear shafts -- Adding the fan -- Adding the background -- Summary -- Chapter 8: Animating a Bouquet of Flowers -- Technical requirements -- Adding the variables and a winter background -- Animating the text labels -- Using the blur modifier to create a vapor effect -- Animating flower petals in an arc -- Adding the flower bouquet and the animated breath -- Creating falling snow in the scene -- Adding the UIViewRepresentable protocol -- Dealing with methods and errors -- Adding the CAEmitter class -- Summary -- Chapter 9: Animating Strokes around Shapes -- Technical requirements -- Converting images into Swift code -- Removing the image backgrounds -- Vectorizing the images -- Translating the SVG file into Swift code -- Animating images with the stroke modifier -- Creating a stroke animation on the "WE" image -- Creating a stroke animation on the heart image -- Creating a stroke animation on the SwiftUI logo image -- Combining the animated strokes -- Summary -- Chapter 10: Creating an Ocean Scene -- Technical requirements -- Adding the wave's offset property -- Creating a wave shape using the Shape protocol and Path function…”
    Libro electrónico
  2. 402
    Publicado 2016
    Tabla de Contenidos: “…5.3 Malware Diffusion Modeling Based on MRFs5.4 Regular Networks; 5.4.1 Chain Networks; 5.4.2 Regular Lattices: Finite and Infinite Grids; 5.5 Complex Networks with Stochastic Topologies; 5.5.1 Random Networks; 5.5.2 Small-world Networks; 5.5.3 Scale-free Networks; 5.5.4 Random Geometric Networks; 5.5.5 Comparison of Malware Diffusion in Complex Topologies; 6 Optimal Control Based Techniques; 6.1 Introduction; 6.2 Example---an Optimal Dynamic Attack: Seek and Destroy; 6.2.1 Dynamics of State Evolution; 6.2.2 Objective Functional; 6.3 Worm's Optimal Control…”
    Libro electrónico
  3. 403
    Publicado 2015
    Tabla de Contenidos: “…Safety first; Phishing for inphormation; Don't take the bait; Web bugs track the ads you read; Cookies can be good; We know where you are; Security: How People Can Take Over Your PC; Viruses arrive by email; Worms come right over the Net; Spyware arrives via websites; Pop-up browser windows pop up all over the place; What's the secret word, Harry?…”
    Libro electrónico
  4. 404
    Publicado 2019
    Tabla de Contenidos: “…-- Cloud Computing -- Data Transfer Rates -- Internet Security -- Malware -- Virus -- Worm -- Trojan -- Rootkit -- Ransomware -- Social Engineering -- Phishing -- Pharming -- Pretexting -- Shouldering -- Threat Prevention -- Biometric Measures -- Strong Passwords -- 2-Factor Authentication -- Public Key Cryptography -- Firewalls -- Index -- Blank Page…”
    Libro electrónico
  5. 405
    Publicado 1992
    Tabla de Contenidos: “…NEEM -- Copyright -- Preface -- Contents -- Foreword -- 1 The Vision -- 2 The Reality -- DISADVANTAGES -- Lack of Experience -- Genetic Variability -- Lack of Registration -- Lack of Standards -- Conflicting Approaches -- Economic Uncertainties -- Handling Difficulties -- Geographical Limitations -- Planting Difficulties -- Silviculture Difficulties -- Instability -- Health Hazards -- Environmental Safety -- Slow Action -- Damage to Plants -- Method of Application -- Protecting the Tree -- Medical Limitations -- Synthetic Competition -- 3 The Tree -- DESCRIPTION -- DISTRIBUTION -- PROPAGATION -- GROWTH -- PROBLEMS -- Pests -- Diseases -- Nutrient Deficiencies -- Other Problems -- 4 What's in a Neem -- LIMONOIDS -- Azadirachtin -- Meliantriol -- Salannin -- Nimbin and Nimbidin -- Others -- PRODUCTION -- Water Extraction -- Hexane Extraction -- Pentane Extraction -- Alcohol Extraction -- FORMULATIONS -- Additives -- METHODS OF APPLICATION -- SYSTEMIC EFFECT -- 5 Effects on Insects -- INSECTS AFFECTED -- Orthoptera -- Homoptera -- Thysanoptera -- Coleoptera -- Lepidoptera -- Diptera -- Hymenoptera -- Heteroptera -- EXAMPLES -- Desert Locust -- Cockroach -- Brown Planthopper -- Stored-Product Insects -- Armyworm -- Colorado Potato Beetle -- Leafminers -- European Corn Borer -- Mosquitoes -- Aphids -- Fruit Flies -- Gypsy Moth -- Horn Flies -- Blowflies -- 6 Effects on Other Organisms -- NEMATODES -- SNAILS -- CRUSTACEANS -- FUNGI -- Aflatoxin -- PLANT VIRUSES -- NONTARGET SPECIES -- Earthworms -- Beneficial Insects -- 7 Medicinals -- FUNGICIDES -- ANTIBACTERIALS -- ANTIVIRAL AGENTS -- DERMATOLOGICAL INSECTS -- DENTAL TREATMENTS -- CHAGAS' DISEASE -- MALARIA -- PAIN RELIEF AND FEVER REDUCTION -- BIRTH CONTROL -- VETERINARY MEDICINE -- Controlling Insects -- Controlling Bacteria -- Controlling Intestinal Worms -- A WORD OF CAUTION…”
    Libro electrónico
  6. 406
    Publicado 2017
    Tabla de Contenidos: “…Neumes in manuscripts of the Decretum of Burchard of worms / Stephan Dusil and Katherine Hill -- Reading for ritual : liturgy and ritual in southern Italian chronicles / Richard Gyug -- A contested conception : Jocelin of Furness and the local traditions about St Kentigern in twelfth-century Glasgow / Mairi Cowan -- Becket and the wolves : imagining the lupine Welsh in a thirteenth-century Latin preaching exemplum from Llanthony Secunda Priory / David R. …”
    Libro
  7. 407
    Publicado 2008
    Tabla de Contenidos: “…3.4 Security and Privacy Administration3.5 Security and Privacy Mechanisms; 3.6 Architectural Considerations; 3.7 Conclusion; CHAPTER 4 Network Security Algorithms; 4.1 Searching for Multiple Strings in Packet Payloads; 4.2 Approximate String Matching; 4.3 IP Traceback via Probabilistic Marking; 4.4 IP Traceback via Logging; 4.5 Detecting Worms; 4.6 Conclusion; CHAPTER 5 Concepts in IP Security; 5.1 The Need for Security; 5.2 Choosing Where to Apply Security; 5.3 Components of Security Models; 5.4 IPsec; 5.5 Transport-Layer Security; 5.6 Securing the Hypertext Transfer Protocol…”
    Libro electrónico
  8. 408
    Publicado 2016
    Tabla de Contenidos: “…Brouwer1, T. Dijkstra1, H. Worm1, Y. Van Der Vorst2 and G. Van Schaik1; Digital dermatitis in dairy cattle: infectivity of the different stages; F. …”
    Libro electrónico
  9. 409
    por Beckmann, Gustav Adolf, author
    Publicado 2019
    “…Auch hier greifen sie meist sogar ineinander: Personennamen wie Audegarius (+ Oscheri) ~ Oggero Spatacurta ~ Ogier, Malduit der Schatzmeister, (Ricardus) Baligan, Nikephóros ~ Hugue li Forz, Witburg ~ Wigburg ~ Guibourc, Alpais, A(da)lgis (→ Malgis/Amalgis), Toponyme wie Belin, Lucena ~ Luiserne, Worms ~ Garmaise, Dortmund ~ Tremoigne, Esch-sur-Sûre ~ Ascane, Avroy ~ Auridon ~ Oridon ~ Dordone, Pierrepont sowie das doppelte Hydronym Rura ~ Rune und Erunia ~ Rune bringen jeweils ein Stück ihrer aufschlussreichen Geschichte mit sich. …”
    Libro electrónico
  10. 410
    Publicado 2016
    “…You will learn how Google Maps and Google Earth provide pinpoint military accuracy, see how bad guys can manipulate Google to create super worms, and see how they can "mash up" Google with Facebook, LinkedIn, and more for passive reconnaissance. …”
    Libro electrónico
  11. 411
    Publicado 2023
    Tabla de Contenidos: “…Virtualization -- Serverless -- High-Performance Computing (HPC) and Grid Computing -- Peer-to-Peer -- Thin Clients -- Diskless Workstations -- Thin Client Applications -- Embedded Systems and The Internet of Things (IoT) -- Distributed Systems and Edge Computing Systems -- Industrial Control Systems (ICS) -- System Vulnerabilities, Threats, and Countermeasures -- Emanations -- Covert Channels -- Covert Storage Channels -- Covert Timing Channels -- Backdoors -- Malicious Code (Malware) -- Computer Viruses -- Worms -- Trojans -- Rootkits -- Packers -- Logic Bombs -- Antivirus Software -- Server-Side Attacks -- Client-Side Attacks -- Web Architecture and Attacks -- Applets -- Java -- ActiveX -- OWASP -- XML -- Service Oriented Architecture (SOA) -- Database Security -- Polyinstantiation -- Inference and Aggregation -- Inference and Aggregation Controls -- Data Mining -- Data Analytics -- Countermeasures -- Mobile Device Attacks -- Mobile Device Defenses -- Cornerstone Cryptographic Concepts -- Key Terms -- Confidentiality, Integrity, Authentication, and Non-repudiation -- Confusion, Diffusion, Substitution, and Permutation -- Cryptographic Strength -- Monoalphabetic and Polyalphabetic Ciphers -- Modular Math -- Exclusive Or (XOR) -- Data at Rest and Data in Motion -- Protocol Governance -- Types of Cryptography -- Symmetric Encryption -- Stream and Block Ciphers -- Initialization Vectors and Chaining -- DES -- Modes of DES -- Electronic Code Book (ECB) -- Cipher Block Chaining (CBC) -- Cipher Feedback (CFB) -- Output Feedback (OFB) -- Counter Mode (CTR) -- Single DES -- Triple DES -- International Data Encryption Algorithm (IDEA) -- Advanced Encryption Standard (AES) -- Choosing AES…”
    Libro electrónico
  12. 412
    por Vyncke, Eric, Paggen, Christopher
    Publicado 2008
    Tabla de Contenidos: “…-- Securing the Control Plane on a Switch -- Implementing Hardware-Based CoPP -- Implementing Software-Based CoPP -- Mitigating Attacks Using CoPP -- Summary -- References -- Chapter 14 Disabling Control Plane Protocols -- Configuring Switches Without Control Plane Protocols -- Summary -- Chapter 15 Using Switches to Detect a Data Plane DoS -- Detecting DoS with NetFlow -- Securing Networks with RMON -- Other Techniques That Detect Active Worms -- Summary -- References -- Part III: Using Switches to Augment the Network Security -- Chapter 16 Wire Speed Access Control Lists -- ACLs or Firewalls? …”
    Libro electrónico
  13. 413
    por Khlebnikov, Alexei
    Publicado 2022
    “…The modern internet is full of worms, Trojan horses, men-in-the-middle, and other threats. …”
    Libro electrónico
  14. 414
    por Gómez Vieites, Álvaro
    Publicado 2014
    Tabla de Contenidos: “…VIRUS INFORMÁTICOS Y OTROS CÓDIGOS DAÑINOS; 3.1 CARACTERÍSTICAS GENERALES DE LOS VIRUS INFORMÁTICOS; 3.2 TIPOS DE VIRUS Y OTROS PROGRAMAS DAÑINOS; 3.2.1 Virus de Boot (sector de arranque); 3.2.2 Virus de ficheros ejecutables; 3.2.3 Virus del lenguaje Java; 3.2.4 Virus de macros; 3.2.5 Troyanos; 3.2.6 Rootkits; 3.2.7 Gusanos (worms); 3.2.8 Bacterias; 3.2.9 Bombas lógicas; 3.2.10 Hoaxes (bulos); 3.2.11 Jokes (Bromas); 3.2.12 Programas que permiten construir virus…”
    Libro electrónico
  15. 415
    por Castets, Gustavo
    Publicado 2004
    Tabla de Contenidos: “…Information gathering format -- 2.1 Present environment -- 2.1.1 Hardware -- 2.1.2 Software -- 2.1.3 Data environment -- 2.1.4 Library sharing -- 2.2 Future environment -- 2.2.1 Hardware -- 2.2.2 Software -- 2.2.3 Data environment -- 2.3 Backup -- 2.3.1 Current backup environment -- 2.3.2 Predicted trends -- 2.3.3 WORM data -- 2.4 Restore -- 2.4.1 Current restore environment -- 2.4.2 Predicted trends -- 2.5 Financial considerations -- 2.5.1 Budget timetable -- 2.6 Importance of data -- 2.6.1 Disaster Recovery considerations -- 2.6.2 Time to restore: Requirements -- 2.7 Other considerations -- 2.7.1 Support structure -- 2.7.2 Conversions -- Chapter 3. …”
    Libro electrónico
  16. 416
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Foreword -- What the experts say -- Contributors -- Table of Contents -- Preface -- Part 1- Introduction -- Chapter 1: Malware Science Life Cycle Overview -- Combining malware -- Worms and Trojans combination -- Ransomware and spyware combination -- Macro malware and ransomware -- Managing malware -- Collection -- Analysis -- Detection -- Prevention -- Mitigation -- Reporting -- Summary -- Chapter 2: An Overview of the International History of Cyber Malware Impacts -- The evolution of cyber threats and malware -- Impacts on international relations and security -- Impacts on the economy and cybercrime -- The future of malware -- Expanded viewpoint on the impacts on international relations and security -- Expansion on cybercrime impacts on the general economy -- Direct financial impacts of malware - a global overview -- Ransomware's global economic impact - a continental overview -- Ransomware's economic impact in North America - a deeper look -- Ransomware's economic impact in Asia - a detailed examination -- Ransomware's economic impact in Africa - an in-depth analysis -- Ransomware's economic impact in South America - an extensive exploration -- Economic impacts versus socio-economic impacts -- Ransomware attacks and their impact on employment - an in-depth perspective -- Ransomware attacks and their impact on public services - an elaborate examination -- Ransomware and inequality - a closer look at the impact on small businesses -- Policy, regulations, and their downstream impact on smaller businesses and public services -- Regulatory changes due to malware impacts on small and mid-scale businesses -- A deeper dive into the operational challenges -- Translating operational challenges into increased cost -- Expansion of economic and socio-economic impacts on key industries globally…”
    Libro electrónico
  17. 417
    por Ligh, Michael W.
    Publicado 2011
    “…Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. …”
    Libro electrónico
  18. 418
    por Pogue, David, 1963-
    Publicado 2009
    “…Learning to use a Mac is not a piece of cake, but once you do, the rewards are oh-so-much better. No viruses, worms, or spyware. No questionab…”
    Libro electrónico
  19. 419
    por Cox, Kerry
    Publicado 2004
    Tabla de Contenidos: “…Disgruntled Current and Former Employees and Contractors; 4.1.4. Robots and Worms; 4.2. Anatomy of an Attack: The Five Ps; 4.2.1.2. …”
    Libro electrónico
  20. 420
    Tabla de Contenidos: “…Server enhancements -- 2.1 ACSLS support -- 2.2 SAN device mappings for UNIX servers -- 2.3 Activity log management -- 2.4 Checkin and checkout enhancements -- 2.5 Collocation by group -- 2.6 Database reorganization -- 2.7 Disk device enhancements -- 2.8 DEVCLASS and PATH changes -- 2.9 Server migration and reclamation processes -- 2.10 3592 WORM support -- 2.11 Improved defaults -- 2.12 Validating LAN-free environment configuration -- 2.13 NDMP operations -- 2.14 NetApp SnapLock support -- 2.15 Scheduling flexibility -- Chapter 3. …”
    Libro electrónico