Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 49
- Computer security 48
- Computer networks 42
- Engineering & Applied Sciences 25
- Filosofía 22
- Historia 22
- Computer Science 14
- Electrical & Computer Engineering 12
- Telecommunications 12
- Ciencias sociales 11
- Certification 9
- Bergson, Henri 8
- Examinations 8
- Operating systems (Computers) 8
- Arquitectura 7
- Electronic data processing personnel 7
- Firewalls (Computer security) 7
- Internet 7
- Luther, Martin 7
- Computer crimes 6
- Computers 6
- Environment 6
- History 6
- Programming 6
- Access control 5
- Computer programs 5
- Derecho canónico 5
- Educación 5
- Història 5
- Protestantismo 5
-
441Publicado 2023Tabla de Contenidos: “…Impersonation -- Phishing -- Spear phishing -- CEO fraud -- Smishing -- Vishing -- Pharming -- Whaling: Going for the "big fish" -- Messing around with Other People's Stuff: Tampering -- Captured in Transit: Interception -- Man-in-the-middle attacks -- Taking What Isn't Theirs: Data Theft -- Personal data theft -- Business data theft -- Data exfiltration -- Compromised credentials -- Forced policy violations -- Cyberbombs That Sneak into Your Devices: Malware -- Viruses -- Worms -- Trojans -- Ransomware -- Scareware -- Spyware -- Cryptocurrency miners -- Adware -- Blended malware -- Zero-day malware -- Fake malware on computers -- Fake malware on mobile devices -- Fake security subscription renewal notifications -- Poisoned Web Service Attacks -- Network Infrastructure Poisoning -- Malvertising…”
Libro electrónico -
442CybersecurityCybersecurity For DummiesPublicado 2022Tabla de Contenidos: “…Impersonation -- Phishing -- Spear phishing -- CEO fraud -- Smishing -- Vishing -- Pharming -- Whaling: Going for the "big fish" -- Messing around with Other People's Stuff: Tampering -- Captured in Transit: Interception -- Man-in-the-middle attacks -- Taking What Isn't Theirs: Data Theft -- Personal data theft -- Business data theft -- Data exfiltration -- Compromised credentials -- Forced policy violations -- Cyberbombs That Sneak into Your Devices: Malware -- Viruses -- Worms -- Trojans -- Ransomware -- Scareware -- Spyware -- Cryptocurrency miners -- Adware -- Blended malware -- Zero-day malware -- Fake malware on computers -- Fake malware on mobile devices -- Fake security subscription renewal notifications -- Poisoned Web Service Attacks -- Network Infrastructure Poisoning…”
Libro electrónico -
443
-
444por Ceyland, SanverTabla de Contenidos: “…Introduction to IBM Tivoli Storage Manager -- 2.1 IBM Tivoli Storage Manager -- 2.1.1 IBM Tivoli Storage Manager overview -- 2.1.2 IBM Tivoli Storage Manager architecture -- 2.1.3 IBM Tivoli Storage Manager server -- 2.1.4 IBM Tivoli Storage Manager Backup/Archive client -- 2.1.5 IBM Tivoli Storage Manager storage agent -- 2.1.6 IBM Tivoli Storage Manager Extended edition -- 2.2 IBM Tivoli Storage Manager complementary products -- 2.2.1 IBM Tivoli Storage Manager for Space Management -- 2.2.2 IBM Tivoli Storage Manager for Storage Area Network -- 2.2.3 IBM Tivoli Storage Manager for Backup and Recovery -- 2.2.4 IBM Tivoli Storage Manager for data protection -- 2.3 New features and changes with Version 5.3 -- 2.3.1 ACSLS library support enhancements -- 2.3.2 Activity log management -- 2.3.3 Collocation by group -- 2.3.4 Communications options -- 2.3.5 Database reorganization -- 2.3.6 Disk-only backup -- 2.3.7 Enhancements for server migration -- 2.3.8 IBM 3592 WORM (Write Once Read Many) support -- 2.3.9 Increased block size for writing to tape -- 2.3.10 LAN-free environment configuration -- 2.3.11 NDMP operations -- 2.3.12 New interface to manage servers: Administration Center -- 2.3.13 SCSI library enhancements…”
Publicado 2005
Libro electrónico -
445por Mischel, MagnusTabla de Contenidos: “…-- Speed -- Stability -- Flexibility -- Cost-effectiveness -- Creating a virtual patch -- From vulnerability discovery to virtual patch: An example -- Creating the patch -- Changing the web application for additional security -- Testing your patches -- Real-life examples -- Geeklog -- Patching Geeklog -- Cross-site scripting -- Real-life example: The Twitter worm -- Summary -- 6. Blocking Common Attacks -- HTTP fingerprinting -- How HTTP fingerprinting works -- Server banner -- Response header -- HTTP protocol responses -- Issuing an HTTP DELETE request -- Bad HTTP version numbers -- Bad protocol name -- The ETag HTTP header -- Using ModSecurity to defeat HTTP fingerprinting -- Blocking proxied requests -- Cross-site scripting -- Preventing XSS attacks -- PDF XSS protection -- HttpOnly cookies to prevent XSS attacks -- Session identifiers -- Cross-site request forgeries -- Protecting against cross-site request forgeries -- Shell command execution attempts -- Null byte attacks -- ModSecurity and null bytes -- Source code revelation -- Directory traversal attacks -- Blog spam -- SQL injection -- Standard injection attempts -- Retrieving data from multiple tables with UNION -- Multiple queries in one call -- Reading arbitrary files -- Writing data to files -- Preventing SQL injection attacks -- What to block -- Website defacement -- Brute force attacks -- Directory indexing -- Detecting the real IP address of an attacker -- Summary -- 7. …”
Publicado 2009
Libro electrónico -
446Publicado 2012Tabla de Contenidos: “…-- Going Connection Shopping -- Objective 8.03 Using Remote Access -- Dial-up to the Internet -- Private Dial-Up -- Dedicated Connection -- DSL and Cable -- Cable Issues -- Remote Terminal -- VoIP -- RTP -- SIP and H.323 -- Skype -- Streaming Media with RSTP -- Checkpoint -- Review Questions -- Review Answers -- Chapter 9: Network Security -- Objective 9.01 Common Threats -- System Crash/Hardware Failure -- Administrative Access Control -- Malware -- Virus -- Worm -- Macro Virus -- Trojan -- Rootkit -- Adware/Spyware -- Dealing with Malware -- Antimalware Programs -- Social Engineering -- Phishing -- Man in the Middle -- Denial of Service -- Physical Intrusion -- Attacks on Wireless Connections -- Leeching -- Cracking Wireless Encryption -- Rogue Access Points -- Evil Twin -- Objective 9.02 Securing User Accounts -- Authentication -- Authentication Principles -- Authentication Protocols -- Authorization -- Logon and Access Security -- Implementing Share-Level Security -- Implementing User-Level Security -- Using Passwords -- Objective 9.03 Firewalls -- Hiding the IPs -- Port Filtering -- Packet Filtering -- MAC Filtering -- Personal Firewalls -- Network Zones -- Vulnerability Scanners -- Objective 9.04 Securing Remote Connections -- IPsec -- Virtual Private Networks -- PPTP VPNs -- L2TP VPNs -- SSL VPNs -- Checkpoint -- Review Questions -- Review Answers -- Chapter 10: The Complete Network -- Objective 10.01 Designing and Implementing a SOHO Network -- Define the Network Needs -- Network Design -- Compatibility Issues…”
Libro electrónico -
447por Benedetelli, DanieleTabla de Contenidos: “…LEGO recipes -- the angular beams unveiled -- triangles vs. rectangles -- extending beams -- bracing -- cross blocks -- gears revisited -- getting gears to mesh together well -- assembling gears -- gear combinations -- 90-degree-coupled gears -- gear trains -- the worm gear -- motion transformation -- building ideas for the motors -- medium motor with front output #1 -- medium motor with front output #2 -- medium motor with single lateral output -- medium motor with double lateral output -- medium motor with single geared-down lateral output -- medium motor with gearbox -- medium motor with multiple outputs -- large motor with horizontal output -- large motor gearing options -- conclusion -- Comic continued -- 9. building WATCHGOOZ3 -- how does WATCHGOOZ3 walk? …”
Publicado 2013
Libro electrónico -
448por Duan, WenhuiTabla de Contenidos: “…Role of Aggregate Reactivity, Binder Composition, and Curing Temperature on the Delayed Ettringite Formation and Associated Durability Loss in Concrete -- 1 Introduction -- 1.1 Project Outline -- 2 Methods -- 3 Results and Discussion -- 3.1 DEF in Concrete -- 3.2 ASR-DEF in Concrete -- 4 Conclusions -- References -- Effect of Blending Alum Sludge and Ground Granulated Blast-Furnace Slag as Cement Replacement to Mitigate Alkali-Silica Reaction -- 1 Introduction -- 2 Methods -- 2.1 Materials -- 2.2 Experimental Protocol -- 3 Results and Discussion -- 3.1 Compressive Strength -- 3.2 ASR-Induced Expansion -- 3.3 Phase Analysis of the Mortars -- 3.4 Microstructural Characteristics and Elemental Analysis -- 4 Conclusions -- References -- Optimisation of Limestone Calcined Clay Cement Based on Response Surface Method -- 1 Introduction -- 2 Methods -- 2.1 Materials -- 2.2 Design of Mixtures -- 3 Mathematical Modelling and Statistical Analysis -- 3.1 ANOVA and Adequacy Checking -- 3.2 Interaction Effects on Response -- 3.3 Response Surface Optimization Analysis -- 4 Conclusion -- References -- Designing Waterborne Protective Coatings Through Manipulating the Nanostructure of Acrylic-Based Nanocomposites -- 1 Introduction -- 2 Methods -- 2.1 Materials -- 2.2 Preparation of Waterborne Acrylic Copolymer, Acrylic-Based Coatings and Coating Films -- 2.3 Characterization -- 3 Results and Discussion -- 3.1 Enhanced UV Protection Through the Formation of an Acrylic-Based Nanocomposite -- 3.2 Enhanced Corrosion Resistance of Acrylic-Alkyd Coating with Worm-Like Nanostructure -- 3.3 Multifunctional Acrylic-PDMS Coating with Spherical-Like Nanostructure -- 4 Conclusion -- 5 Data Availability Statement -- References -- Analysis of Categories That Delay Global Construction Projects -- 1 Introduction -- 2 Literature Review -- 3 Research Method…”
Publicado 2023
Libro electrónico -
449Publicado 2012“…Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of its code with the Stuxnet worm, emerge with increasing frequency. …”
Libro electrónico -
450
-
451
-
452
-
453
-
454Publicado 2005“…Best-practice QoS designs for protecting voice, video, and critical data while mitigating network denial-of-service attacks Understand the service-level requirements of voice, video, and data applications Examine strategic QoS best practices, including Scavenger-class QoS tactics for DoS/worm mitigation Learn about QoS tools and the various interdependencies and caveats of these tools that can impact design considerations Learn how to protect voice, video, and data traffic using various QoS mechanisms Evaluate design recommendations for protecting voice, video, and multiple classes of data while mitigating DoS/worm attacks for the following network infrastructure architectures: campus LAN, private WAN, MPLS VPN, and IPSec VPN Quality of Service (QoS) has already proven itself as the enabling technology for the convergence of voice, video, and data networks. …”
Libro electrónico -
455
-
456Publicado 2008991001910159706719
-
457Publicado 2006991001910689706719
-
458Publicado 2023Tabla de Contenidos: “…Design and Kinematic Analysis of Gears -- 8.1 Introduction -- 8.2 Gear Types -- 8.3 SPUR-Gear Nomenclature and Relationships of Mating Gears -- 8.3.1 Spur-Gear Nomenclature -- 8.3.2 Pressure Angle and Involute Tooth Profile -- 8.3.3 Gear Center Distance and Contact Ratio -- 8.3.4 Gear-Tooth Interference and Undercutting -- 8.3.5 Backlash -- 8.4 Helical-Gear Nomenclature -- 8.5 Gear Kinematics -- 8.5.1 Spur Gears and Gear Trains -- 8.5.2 Planetary Gear Trains -- 8.5.3 Rack and Pinion Gears -- 8.5.4 Helical Gears -- 8.5.5 Bevel Gears -- 8.5.6 Worm Gears -- 8.6 Summary -- References -- Additional Reading -- Problems -- 9. …”
Libro electrónico -
459
-
460por Amos, S. W.“…So if you think you know the meaning of ADDER, LAP, FIB, SPICE or WORM, we recommend you check in the Newnes Dictionary of Electronics first.…”
Publicado 1999
Libro electrónico