Mostrando 421 - 440 Resultados de 502 Para Buscar '"Worms"', tiempo de consulta: 0.10s Limitar resultados
  1. 421
    Publicado 2014
    “…Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and viruses that usually attack indiscriminately, targeted attacks involve intelligence-gathering and planning to a degree that drastically changes its profile. …”
    Libro electrónico
  2. 422
    Publicado 2024
    Tabla de Contenidos: “…13.4 Four Investigation Priorities -- Gastropod Molluscs -- Nematode Worms -- Spiders -- Insect Larvae -- 13.5 Neither Sentience Candidates nor Investigation Priorities: Plants and Unicellular Organisms -- 13.6 Summary of Chapter 13 -- 14: Frontiers of Proportionality -- 14.1 Taking Invertebrates Seriously -- 14.2 Codes of Good Practice and Licensing Schemes -- 14.3 Against Octopus Farming -- 14.4 Towards Humane Slaughter -- 14.5 Summary of Chapter 14 -- Part V: Preparing for Artificial Sentience -- 15: Against Complacency -- 15.1 A Case against Complacency -- 15.2 Sources of Risk 1: Whole-Brain Emulation -- 15.3 Sources of Risk 2: Artificial Evolution -- 15.4 Sources of Risk 3: Minimal Implementations of Cognitive Theories of Consciousness -- 15.5 Summary of Chapter 15 -- 16: Large Language Models and the Gaming Problem -- 16.1 The Gaming Problem: When the System Knows the Criteria -- 16.2 Boxing the AI: Schneider and Turner's 'Artificial Consciousness Test' -- 16.3 The Need for Deep Computational Markers -- 16.4 Summary of Chapter 16 -- 17: The Run-Ahead Principle -- 17.1 Metzinger's Call for a Moratorium -- 17.2 A Moderate Alternative -- 17.3 Will We Soon Need an AI Welfare Law? …”
    Libro electrónico
  3. 423
    Tabla de Contenidos: “…Introduction to IBM Tivoli Storage Manager -- 1.1 IBM Tivoli Storage Manager -- 1.1.1 IBM Tivoli Storage Manager overview -- 1.1.2 IBM Tivoli Storage Manager architecture -- 1.1.3 IBM Tivoli Storage Manager server -- 1.1.4 IBM Tivoli Storage Manager Backup/Archive client -- 1.1.5 IBM Tivoli Storage Manager storage agent -- 1.1.6 IBM Tivoli Storage Manager Extended edition -- 1.2 IBM Tivoli Storage Manager complementary products -- 1.2.1 IBM Tivoli Storage Manager for Space Management -- 1.2.2 IBM Tivoli Storage Manager for Storage Area Network -- 1.2.3 IBM Tivoli Storage Manager for backup and recovery -- 1.2.4 IBM Tivoli Storage Manager for Data protection -- 1.3 New features and changes with Version 5.3 -- 1.3.1 ACSLS library support enhancements -- 1.3.2 Activity log management -- 1.3.3 Collocation by group -- 1.3.4 Communications options -- 1.3.5 Database reorganization -- 1.3.6 Disk-only backup -- 1.3.7 Enhancements for server migration -- 1.3.8 IBM 3592 WORM (Write Once Read Many) support -- 1.3.9 Increased block size for writing to tape -- 1.3.10 LAN-free environment configuration -- 1.3.11 NDMP operations -- 1.3.12 New interface to manage servers: Administration Center -- 1.3.13 SCSI library enhancements -- 1.3.14 Simultaneous write inheritance improvements -- 1.3.15 Support for multiple IBM Tivoli Storage Manager client nodes -- 1.3.16 IBM Tivoli Storage Manager scheduling flexibility -- 1.4 Summary -- Chapter 2. …”
    Libro electrónico
  4. 424
    Publicado 2024
    Tabla de Contenidos: “…An Anatolian Source and Etymology -- ‎3. The Shamir Worm -- ‎Chapter 16. ‮ ָבִי ‬‎ Gāḇīš &amp -- ‮אֶלְ ָבִי ‬‎ ʾelgāḇīš-Crystal Quartz, Gypsum &amp -- Hail -- ‎1. …”
    Libro electrónico
  5. 425
    Publicado 2023
    Tabla de Contenidos: “…-- Data sources -- The Malicious Software Removal Tool -- Real-time anti-malware tools -- Non-security data sources -- About malware -- How malware infections spread -- Trojans -- Potentially unwanted software -- Exploits and exploit kits -- Worms -- Ransomware -- Viruses -- Browser modifiers -- Measuring malware prevalence -- Global Windows malware infection analysis -- Regional Windows malware infection analysis -- The threat landscape in the Middle East and Northern Africa -- 10-year regional report card for the Middle East and Northern Africa -- The threat landscape in the European Union and Eastern Europe -- 10-year regional report card for the European Union -- 10-year regional report card for select Eastern European locations -- The threat landscape in select locations in Asia and Oceania -- 10-year regional report card for Asia and Oceania -- The threat landscape in select locations in the Americas -- 10-year regional report card for the Americas -- Regional Windows malware infection analysis conclusions -- What does this all mean for CISOs and enterprise security teams? …”
    Libro electrónico
  6. 426
    por Okereafor, Kenneth
    Publicado 2021
    Tabla de Contenidos: “…Adware and Spyware -- 4.4.9. Computer Worm -- 4.4.10. Trojan Horse -- 4.4.11. Logic Bomb -- 4.4.12. …”
    Libro electrónico
  7. 427
    Publicado 2022
    Tabla de Contenidos: “…Cover -- About the Authors -- Title Page -- Copyright Page -- Acknowledgments -- About this Book -- Contents at a Glance -- Contents -- Foreword -- Preface -- Introduction -- Instructor Website -- Chapter 1 Introduction and Security Trends -- The Computer Security Problem -- Definition of Computer Security -- Historical Security Incidents -- The Current Threat Environment -- Infrastructure Attacks -- Ransomware -- Threats to Security -- Viruses and Worms -- Intruders -- Insiders -- Criminal Organizations -- Nation-States, Terrorists, and Information Warfare -- Brand-Name Attacks -- Attributes of Actors -- Internal/External -- Level of Sophistication -- Resources/Funding -- Intent/Motivation -- Security Trends -- Targets and Attacks -- Specific Target -- Opportunistic Target -- Minimizing Possible Avenues of Attack -- Approaches to Computer Security -- Cybersecurity Kill Chain -- Threat Intelligence -- Open Source Intelligence -- Ethics -- Additional References -- Chapter 1 Review -- Chapter 2 General Security Concepts -- Basic Security Terminology -- Security Basics -- Security Tenets -- Security Approaches -- Security Principles -- Formal Security Models -- Confidentiality Models -- Integrity Models -- Additional References -- Chapter 2 Review -- Chapter 3 Operational and Organizational Security -- Policies, Procedures, Standards, and Guidelines -- Organizational Policies -- Change Management Policy -- Change Control -- Asset Management -- Security Policies -- Data Policies -- Credential Policies -- Password and Account Policies -- Human Resources Policies -- Code of Ethics -- Job Rotation -- Separation of Duties -- Employee Hiring (Onboarding) and Promotions -- Retirement, Separation, or Termination (Offboarding) -- Exit Interviews -- Onboarding/Offboarding Business Partners -- Adverse Actions -- Mandatory Vacations -- Acceptable Use Policy…”
    Libro electrónico
  8. 428
    Publicado 2023
    Tabla de Contenidos: “…7.6 Continuous Improvement -- Summary -- References -- Chapter 8 Future Threats and Conclusion -- 8.1 Emerging Technologies -- 8.1.1 Smart Buildings -- 8.1.1.1 Software Errors -- 8.1.1.2 Example - Maroochy Shire Incident -- 8.1.2 Health Care -- 8.1.2.1 Example - Conti Attack Against Irish Health Sector -- 8.1.3 Transport Systems -- 8.2 Emerging Attacks -- 8.2.1 Threat Actor Evolutions -- 8.2.1.1 Criminal Threat Actors -- 8.2.1.2 Nation State Threat Actors -- 8.2.1.3 Other Threat Actors -- 8.3 Emerging Workforce -- 8.3.1 Job Roles and Skills -- 8.3.2 Diversity in Hiring -- 8.3.3 Growing the Profession -- 8.4 Conclusion -- References -- Chapter 9 Case Studies -- 9.1 Target Compromise 2013 -- 9.1.1 Background -- 9.1.2 The Attack -- 9.2 WannaCry 2017 -- 9.2.1 Background -- 9.2.1.1 Guardians of Peace -- 9.2.1.2 The Shadow Brokers -- 9.2.1.3 Threat Landscape - Worms and Ransomware -- 9.2.2 The Attack -- 9.2.2.1 Prelude -- 9.2.2.2 Malware -- 9.3 NotPetya 2017 -- 9.3.1 Background -- 9.3.2 The Attack -- 9.3.2.1 Distribution -- 9.3.2.2 Payload -- 9.3.2.3 Spread and Consequences -- 9.4 VPNFilter 2018 -- 9.4.1 Background -- 9.4.2 The Attack -- 9.5 SUNBURST and SUNSPOT 2020 -- 9.5.1 Background -- 9.5.2 The Attack -- 9.6 Macron Leaks 2017 -- 9.6.1 Background -- 9.6.2 The Attack -- References -- Index -- EULA…”
    Libro electrónico
  9. 429
    Publicado 2021
    Tabla de Contenidos: “…Chapter 4 Footprinting and Reconnaissance -- Open Source Intelligence -- Companies -- People -- Social Networking -- Domain Name System -- Name Lookups -- Zone Transfers -- Passive DNS -- Passive Reconnaissance -- Website Intelligence -- Technology Intelligence -- Google Hacking -- Internet of Things (IoT) -- Summary -- Review Questions -- Chapter 5 Scanning Networks -- Ping Sweeps -- Using fping -- Using MegaPing -- Port Scanning -- Nmap -- masscan -- MegaPing -- Metasploit -- Vulnerability Scanning -- OpenVAS -- Nessus -- Looking for Vulnerabilities with Metasploit -- Packet Crafting and Manipulation -- hping -- packETH -- fragroute -- Evasion Techniques -- Protecting and Detecting -- Summary -- Review Questions -- Chapter 6 Enumeration -- Service Enumeration -- Remote Procedure Calls -- SunRPC -- Remote Method Invocation -- Server Message Block -- Built-in Utilities -- nmap Scripts -- NetBIOS Enumerator -- Metasploit -- Other Utilities -- Simple Network Management Protocol -- Simple Mail Transfer Protocol -- Web-Based Enumeration -- Summary -- Review Questions -- Chapter 7 System Hacking -- Searching for Exploits -- System Compromise -- Metasploit Modules -- Exploit-DB -- Gathering Passwords -- Password Cracking -- John the Ripper -- Rainbow Tables -- Kerberoasting -- Client-Side Vulnerabilities -- Living Off the Land -- Fuzzing -- Post Exploitation -- Evasion -- Privilege Escalation -- Pivoting -- Persistence -- Covering Tracks -- Summary -- Review Questions -- Chapter 8 Malware -- Malware Types -- Virus -- Worm -- Trojan -- Botnet -- Ransomware -- Dropper -- Malware Analysis -- Static Analysis -- Dynamic Analysis -- Creating Malware -- Writing Your Own -- Using Metasploit -- Obfuscating -- Malware Infrastructure -- Antivirus Solutions -- Persistence -- Summary -- Review Questions -- Chapter 9 Sniffing -- Packet Capture -- tcpdump -- tshark…”
    Libro electrónico
  10. 430
    Publicado 2024
    Tabla de Contenidos: “…Part 3: Math and Cryptography in Malware -- Chapter 9: Exploring Hash Algorithms -- Technical requirements -- Understanding the role of hash algorithms in malware -- Cryptographic hash functions -- Applying hashing in malware analysis -- A deep dive into common hash algorithms -- MD5 -- SHA-1 -- Bcrypt -- Practical use of hash algorithms in malware -- Hashing WINAPI calls -- MurmurHash -- Summary -- Chapter 10: Simple Ciphers -- Technical requirements -- Introduction to simple ciphers -- Caesar cipher -- ROT13 cipher -- ROT47 cipher -- Decrypting malware - a practical implementation of simple ciphers -- Caesar cipher -- ROT13 -- ROT47 -- The power of the Base64 algorithm -- Base64 in practice -- Summary -- Chapter 11: Unveiling Common Cryptography in Malware -- Technical requirements -- Overview of common cryptographic techniques in malware -- Encryption resources such as configuration files -- Practical example -- Cryptography for secure communication -- Practical example -- Payload protection - cryptography for obfuscation -- Practical example -- Summary -- Chapter 12: Advanced Math Algorithms and Custom Encoding -- Technical requirements -- Exploring advanced math algorithms in malware -- Tiny encryption algorithm (TEA) -- A5/1 -- Madryga algorithm -- Practical example -- The use of prime numbers and modular arithmetic in malware -- Practical example -- Implementing custom encoding techniques -- Practical example -- Elliptic curve cryptography (ECC) and malware -- Practical example -- Summary -- Part 4: Real-World Malware Examples -- Chapter 13: Classic Malware Examples -- Historical overview of classic malware -- Early malware -- The 1980s-2000s - the era of worms and mass propagation -- Malware of the 21st century -- Modern banking Trojans -- The evolution of ransomware -- Analysis of the techniques used by classic malware…”
    Libro electrónico
  11. 431
    Publicado 2018
    Tabla de Contenidos: “…5.5 Database Access Control -- 5.6 Inference -- 5.7 Database Encryption -- 5.8 Data Center Security -- 5.9 Key Terms, Review Questions, and Problems -- Chapter 6 Malicious Software -- 6.1 Types of Malicious Software (Malware) -- 6.2 Advanced Persistent Threat -- 6.3 Propagation-Infected Content-Viruses -- 6.4 Propagation-Vulnerability Exploit-Worms -- 6.5 Propagation-Social Engineering-Spam E-mail, Trojans -- 6.6 Payload-System Corruption -- 6.7 Payload-Attack Agent-Zombie, Bots -- 6.8 Payload-Information Theft-Keyloggers, Phishing, Spyware -- 6.9 Payload-Stealthing-Backdoors, Rootkits -- 6.10 Countermeasures -- 6.11 Key Terms, Review Questions, and Problems -- Chapter 7 Denial-of-Service Attacks -- 7.1 Denial-of-Service Attacks -- 7.2 Flooding Attacks -- 7.3 Distributed Denial-of-Service Attacks -- 7.4 Application-Based Bandwidth Attacks -- 7.5 Reflector and Amplifier Attacks -- 7.6 Defenses Against Denial-of-Service Attacks -- 7.7 Responding to a Denial-of-Service Attack -- 7.8 Key Terms, Review Questions, and Problems -- Chapter 8 Intrusion Detection -- 8.1 Intruders -- 8.2 Intrusion Detection -- 8.3 Analysis Approaches -- 8.4 Host-Based Intrusion Detection -- 8.5 Network-Based Intrusion Detection -- 8.6 Distributed or Hybrid Intrusion Detection -- 8.7 Intrusion Detection Exchange Format -- 8.8 Honeypots -- 8.9 Example System: Snort -- 8.10 Key Terms, Review Questions, and Problems -- Chapter 9 Firewalls and Intrusion Prevention Systems -- 9.1 The Need for Firewalls -- 9.2 Firewall Characteristics and Access Policy -- 9.3 Types of Firewalls -- 9.4 Firewall Basing -- 9.5 Firewall Location and Configurations -- 9.6 Intrusion Prevention Systems -- 9.7 Example: Unified Threat Management Products -- 9.8 Key Terms, Review Questions, and Problems -- Part Two Software and System Security -- Chapter 10 Buffer Overflow -- 10.1 Stack Overflows…”
    Libro electrónico
  12. 432
    Publicado 2015
    Tabla de Contenidos: “…3.2.4.2 McCabe's Design Predicate Approach to Integration -- 3.2.4.3 Hex Converter Example -- 3.2.4.4 McCabe Design Predicate Exercise -- 3.2.4.5 McCabe Design Predicate Exercise Debrief -- 3.3 Dynamic Analysis -- 3.3.1 Memory Leak Detection -- 3.3.2 Wild Pointer Detection -- 3.3.3 Dynamic Analysis Exercise -- 3.3.4 Dynamic Analysis Exercise Debrief -- 3.4 Sample Exam Questions -- 4 Quality Characteristics for Technical Testing -- 4.1 Introduction -- 4.2 Security Testing -- 4.2.1 Security Issues -- 4.2.1.1 Piracy -- 4.2.1.2 Buffer Overflow -- 4.2.1.3 Denial of Service -- 4.2.1.4 Data Transfer Interception -- 4.2.1.5 Breaking Encryption -- 4.2.1.6 Logic Bombs/Viruses/Worms -- 4.2.1.7 Cross-Site Scripting -- 4.2.1.8 Timely Information -- 4.2.1.9 Internal Security Metrics -- 4.2.1.10 External Security Metrics -- 4.2.1.11 Exercise: Security -- 4.2.1.12 Exercise: Security Debrief -- 4.3 Reliability Testing -- 4.3.1 Maturity -- 4.3.1.1 Internal Maturity Metrics -- 4.3.1.2 External Maturity Metrics -- 4.3.2 Fault Tolerance -- 4.3.2.1 Internal Fault Tolerance Metrics -- 4.3.2.2 External Fault Tolerance Metrics -- 4.3.3 Recoverability -- 4.3.3.1 Internal Recoverability Metrics -- 4.3.3.2 External Recoverability Metrics -- 4.3.4 Compliance -- 4.3.4.1 Internal Compliance Metrics -- 4.3.4.2 External Compliance Metrics -- 4.3.5 An Example of Good Reliability Testing -- 4.3.6 Exercise: Reliability Testing -- 4.3.7 Exercise: Reliability Testing Debrief -- 4.4 Efficiency Testing -- 4.4.1 Multiple Flavors of Efficiency Testing -- 4.4.2 Modeling the System -- 4.4.2.1 Identify the Test Environment -- 4.4.2.2 Identify the Performance Acceptance Criteria -- 4.4.2.3 Plan and Design Tests -- 4.4.2.4 Configure the Test Environment -- 4.4.2.5 Implement the Test Design -- 4.4.2.6 Execute the Test -- 4.4.2.7 Analyze the Results, Tune and Retest -- 4.4.3 Time Behavior…”
    Libro electrónico
  13. 433
    Publicado 2019
    Tabla de Contenidos: “…3.2 Security Issues in e-Business -- 3.2.1 Vulnerabilities -- 3.2.2 Security Attacks -- 3.2.3 Malware as a Threat -- 3.3 Common Vulnerabilities in e-Business -- 3.3.1 Phishing -- 3.3.2 Cross-Site Scripting (XSS) -- 3.4 Threats in e-Business -- 3.4.1 Ransomware -- 3.4.2 Spyware -- 3.4.3 Worms -- 3.4.4 Trojan Horse -- 3.5 Prevention Mechanism -- 3.6 Conclusion -- References -- 4 e-Commerce Security: Threats, Issues, andMethods -- 4.1 Introduction -- 4.2 Literature Review -- 4.3 e-Commerce -- 4.3.1 Characteristics of e-Commerce Technology -- 4.3.2 Architectural Framework of e-Commerce -- 4.3.2.1 Two-Tier Architecture -- 4.3.2.2 Three-Tier Architecture -- 4.3.3 Advantages and Disadvantages of e-Commerce -- 4.4 Security Overview in e-Commerce -- 4.4.1 Purpose of Security in e-Commerce -- 4.4.2 Security Element at Different Levels of e-Commerce System -- 4.4.2.1 Hardware -- 4.4.2.2 Software -- 4.4.2.3 Environment -- 4.5 Security Issues in e-Commerce -- 4.5.1 Client Level -- 4.5.2 Front-End Servers and Software Application Level -- 4.5.3 Network and Server Level -- 4.6 Security Threats in e-Commerce -- 4.7 Security Approaches in e-Commerce -- 4.8 Comparative Analysis of Various Security Threats in e-Commerce -- 4.9 e-Commerce Security Life-Cycle Model -- 4.10 Conclusion -- References -- 5 Cyberwar is Coming -- 5.1 Introduction -- 5.2 Ransomware Attacks -- 5.2.1 Petya -- 5.2.2 WannaCry -- 5.2.3 Locky -- 5.3 Are Nations Ready? …”
    Libro electrónico
  14. 434
    por Ceylan, Sanver
    Publicado 2005
    Tabla de Contenidos: “…Introduction to IBM Tivoli Storage Manager -- 1.1 IBM Tivoli Storage Manager -- 1.1.1 Tivoli Storage Manager overview -- 1.1.2 Tivoli Storage Manager architecture -- 1.1.3 Tivoli Storage Manager server -- 1.1.4 IBM Tivoli Storage Manager Backup/Archive client -- 1.1.5 Tivoli Storage Manager storage agent -- 1.1.6 IBM Tivoli Storage Manager Extended Edition -- 1.2 Solution design for disaster recovery purposes -- 1.2.1 Types of contingency plans -- 1.2.2 Disaster Recovery Plan -- 1.2.3 Seven tiers of recovery -- 1.3 Tivoli Storage Manager complementary products -- 1.3.1 IBM Tivoli Storage Manager for Space Management -- 1.3.2 IBM Tivoli Storage Manager for Storage Area Network -- 1.3.3 Tivoli Storage Manager for backup and recovery -- 1.3.4 Tivoli Storage Manager for data protection -- 1.4 Key changes in Version 5.3 -- 1.4.1 ACSLS library support enhancements -- 1.4.2 Activity log management -- 1.4.3 Collocation by group -- 1.4.4 Communications options -- 1.4.5 Database reorganization -- 1.4.6 Disk-only backup -- 1.4.7 Enhancements for server migration -- 1.4.8 IBM 3592 WORM (Write Once Read Many) support -- 1.4.9 Increased block size for writing to tape -- 1.4.10 LAN-free environment configuration -- 1.4.11 NDMP operations -- 1.4.12 New interface to manage servers: Administration Center -- 1.4.13 SCSI library enhancements -- 1.4.14 Simultaneous write inheritance improvements -- 1.4.15 Support for multiple Tivoli Storage Manager client nodes -- 1.4.16 Tivoli Storage Manager scheduling flexibility -- 1.5 Summary -- Chapter 2. …”
    Libro electrónico
  15. 435
    por Chapple, Mike
    Publicado 2024
    Tabla de Contenidos: “…Building an Incident Response Team -- Team Composition -- Training and Testing -- Incident Communications Plan -- Internal Communications -- External Communications -- Secure Communications -- Incident Identification and Response -- Security Data Sources -- Correlating Security Information -- Receiving Incident Reports -- Responding to Incidents -- Part III Domain 3: Access Controls Concepts -- Chapter 11 Physical Access Controls: Objective 3.1 Understand Physical Access Controls -- Physical Facilities -- Data Centers -- Server Rooms -- Media Storage Facilities -- Evidence Storage Rooms -- Wiring Closets -- Designing for Security -- Visitor Management -- Physical Security Personnel -- Security Personnel -- Security Protocols -- Chapter 12 Logical Access Controls: Objective 3.2 Understand Logical Access Controls -- Authorization -- Least Privilege -- Segregation of Duties -- Authorization Models -- Account Types -- User Accounts -- Administrator Accounts -- Guest Accounts -- Shared/Generic Accounts -- Service Accounts -- Non-repudiation -- Part IV Domain 4: Network Security -- Chapter 13 Computer Networking: Objective 4.1 Understand Computer Networking -- Network Types -- TCP/IP Networking -- Internet Protocol -- Transmission Control Protocol -- User Datagram Protocol -- Internet Control Message Protocol -- OSI Model -- IP Addressing -- Identifying Valid IPv4 Addresses -- Domain Name System -- Network Ports and Applications -- Securing Wi-Fi Networks -- Disable SSID Broadcasting -- Change Default Passwords -- Authenticate Wi-Fi Users -- Wireless Encryption -- Chapter 14 Network Threats and Attacks: Objective 4.2 Understand Network Threats and Attacks -- Malware -- Viruses -- Worms -- Trojan Horses -- Eavesdropping Attacks -- On-Path Attacks -- Denial-of-Service Attacks -- Side-Channel Attacks…”
    Libro electrónico
  16. 436
    Publicado 1996
    Tabla de Contenidos: “…DRACUNCULIASIS (GUINEA WORM) -- Dracunculiasis in Children and Adolescents -- Dracunculiasis in Adult Females -- ONCHOCERCIASIS AND LYMPHATIC FILARIASIS -- Onchocerciasis in Children -- Onchocerciasis in Adolescents -- Onchocerciasis in Adult Females -- LEISHMANIASIS AND LEPROSY -- CONCLUSIONS -- RESEARCH NEEDS -- References -- 11 Sexually Transmitted Diseases and HIV Infection -- OVERVIEW -- STDs, Including HIV Infection, and their Complications -- Complications of STDs -- Gender Differentials in STDs and HIV Infection -- Control Over the Circumstances of Sexual Intercourse -- Acquisition of STDs and HIV Infection and Development of Complications -- Health-Seeking Behavior -- Detection and Treatment of STDs -- The Social Implications of STDs and HIV Infection -- STDs and HIV Infection Throughout the Female Life Span -- Infancy, Childhood, and Adolescence -- MAGNITUDE OF THE PROBLEM -- Morbidity -- Prevalence -- Mortality -- Economic Impact -- SOCIETAL DETERMINANTS OF STDS AND HIV INFECTION -- Population-Age Composition -- Urbanization, Sex Ratio, and Population Mobility -- War and Social Unrest -- Sexual Norms, Women's Social Status, and Patterns of Sexual Behavior -- Availability and Utilization of Health Services -- CONCLUSIONS -- RESEARCH NEEDS -- Operational Research -- Technology Development -- Behavioral Research -- Clinical Research and Epidemiology -- Notes -- References -- APPENDIX -- Appendix A Demographic Overview and State of the Data -- DATA ON FEMALE MORTALITY AND MORBIDITY ACROSS THE LIFE SPAN -- Data on Mortality -- Sources and Measures -- Gender Differences in Mortality -- Levels of Mortality -- Trends in Mortality over Time -- Cause-Specific Mortality Across the Life Span -- Data on Morbidity -- Sources and Quality -- Estimates of Morbidity -- Disability-Adjusted Life Years…”
    Libro electrónico
  17. 437
    Publicado 2012
    Tabla de Contenidos: “…Spear Phishing and Whaling -- Vishing -- Smishing -- Pharming -- Social Networking Attacks -- Raising User Awareness Through Training -- Questions -- Answers -- Chapter 6 Malicious Code and Activity -- Identifying Malicious Code -- Virus -- Worm -- Trojan Horse -- Logic Bomb -- Keylogger -- Rootkits -- Mobile Code -- Trapdoors and Backdoors -- Spyware -- Malware Hoaxes -- Understanding Malicious Web Activity -- Software Security -- Injection -- Cross Site Scripting -- Cross Site Request Forgery -- Implementing Malicious Code Countermeasures -- Antivirus Software -- Keeping AV Signatures Up to Date -- Keep Operating Systems Up to Date -- Spam Filters -- Content-Filtering Appliances -- Least Privilege -- Educate Users -- Beware of Shortened Links -- Sign Up for E-mail Alerts -- Common Vulnerabilities and Exposures -- Questions -- Answers -- Chapter 7 Risk, Response, and Recovery -- Defining Risk -- Identifying Threats -- Understanding Vulnerabilities -- Understanding Impact -- Managing Risk -- Residual Risk -- Identifying Assets -- Performing Risk Assessments -- Risk Assessment Steps -- Quantitative Analysis -- Qualitative Analysis -- Address Findings -- Responding to Incidents -- Preparation -- Detection and Analysis -- Containment, Eradication, and Recovery -- Post-incident Activity -- Questions -- Answers -- Chapter 8 Monitoring and Analysis -- Intrusion Detection Systems -- IDS Alerts -- Network-based Intrusion Detection Systems -- Host-based Intrusion Detection Systems -- Intrusion Prevention Systems -- Detection Methods -- Detection Systems and Logs -- Detecting Unauthorized Changes -- SEMs, SIMs, and SIEMs -- Security Assessments -- Vulnerability Assessments -- Penetration Tests -- Questions -- Answers -- Chapter 9 Controls and Countermeasures -- Using Controls, Safeguards, and Countermeasures -- Understanding the Goals of Controls -- Preventive…”
    Libro electrónico
  18. 438
    Publicado 2024
    Tabla de Contenidos: “…-- Exploring types of malware -- Virus -- Worms -- Trojans -- Ransomware -- Bots/botnets -- Adware -- Spyware -- Malvertising -- Fileless malware -- Backdoors -- Rootkits -- How does malware get onto machines? …”
    Libro electrónico
  19. 439
    por Vanderburg, Eric A.
    Publicado 2021
    Tabla de Contenidos: “…Off-Premises Hosting -- Orchestration Platforms -- Multicloud -- Cloud Characteristics and Terms -- Elasticity -- Demand-Driven Service -- Pay-as-You-Grow -- Chargeback -- Ubiquitous Access -- Metering -- Multitenancy -- Cloud Bursting -- Baselines -- Source and Target Hosts -- Existing Systems -- Cloud Elements -- Advanced Cloud Services -- Machine Learning and Artificial Intelligence -- Serverless -- Exercise 1-1: Creating a Basic Serverless Application on AWS Lambda -- Internet of Things -- Chapter Review -- Questions -- Answers -- Chapter 2 Disk Storage Systems -- Disk Types and Configurations -- Rotational Media -- Solid State Drive -- USB Drive -- Tape -- Interface Types -- Access Speed -- Redundant Array of Independent Disks (RAID) -- Write Once, Read Many (WORM) -- Tiering -- Performance Levels of Each Tier -- Policies -- File System Types -- Unix File System -- Extended File System -- File Allocation Table File System -- New Technology File System -- Exercise 2-1: Formatting a Disk with the NTFS Partition in Windows -- Resilient File System -- Virtual Machine File System -- Z File System -- Chapter Review -- Questions -- Answers -- Chapter 3 Storage Networking -- Storage Types and Technologies -- Direct Attached Storage -- Storage Area Network…”
    Libro electrónico
  20. 440
    Publicado 2019
    Tabla de Contenidos: “…-- Equipment failure -- Platform instability -- Database design flaws -- Data-entry errors -- Operator error -- Taking Advantage of RAID -- Striping -- RAID levels -- Backing Up Your System -- Preparation for the worst -- Full or incremental backup -- Frequency -- Backup maintenance -- Coping with Internet Threats -- Viruses -- Trojan horses -- Worms -- Denial-of-service attacks -- SQL injection attacks -- Phishing scams -- Zombie spambots -- Installing Layers of Protection -- Network-layer firewalls -- Application-layer firewalls -- Antivirus software -- Vulnerabilities, exploits, and patches -- Education -- Alertness -- Chapter 2 Protecting Against User Errors and Conflicts -- Reducing Data-Entry Errors -- Data types: The first line of defense -- Constraints: The second line of defense -- Sharp-eyed humans: The third line of defense -- Coping with Errors in Database Design -- Handling Programming Errors -- Solving Concurrent-Operation Conflicts -- Passing the ACID Test: Atomicity, Consistency, Isolation, and Durability -- Operating with Transactions -- Using the SET TRANSACTION statement -- Starting a transaction -- Committing a transaction…”
    Libro electrónico