Mostrando 441 - 460 Resultados de 502 Para Buscar '"Worms"', tiempo de consulta: 0.07s Limitar resultados
  1. 441
    Publicado 2023
    Tabla de Contenidos: “…Impersonation -- Phishing -- Spear phishing -- CEO fraud -- Smishing -- Vishing -- Pharming -- Whaling: Going for the "big fish" -- Messing around with Other People's Stuff: Tampering -- Captured in Transit: Interception -- Man-in-the-middle attacks -- Taking What Isn't Theirs: Data Theft -- Personal data theft -- Business data theft -- Data exfiltration -- Compromised credentials -- Forced policy violations -- Cyberbombs That Sneak into Your Devices: Malware -- Viruses -- Worms -- Trojans -- Ransomware -- Scareware -- Spyware -- Cryptocurrency miners -- Adware -- Blended malware -- Zero-day malware -- Fake malware on computers -- Fake malware on mobile devices -- Fake security subscription renewal notifications -- Poisoned Web Service Attacks -- Network Infrastructure Poisoning -- Malvertising…”
    Libro electrónico
  2. 442
    Cybersecurity
    Cybersecurity For Dummies
    Publicado 2022
    Tabla de Contenidos: “…Impersonation -- Phishing -- Spear phishing -- CEO fraud -- Smishing -- Vishing -- Pharming -- Whaling: Going for the "big fish" -- Messing around with Other People's Stuff: Tampering -- Captured in Transit: Interception -- Man-in-the-middle attacks -- Taking What Isn't Theirs: Data Theft -- Personal data theft -- Business data theft -- Data exfiltration -- Compromised credentials -- Forced policy violations -- Cyberbombs That Sneak into Your Devices: Malware -- Viruses -- Worms -- Trojans -- Ransomware -- Scareware -- Spyware -- Cryptocurrency miners -- Adware -- Blended malware -- Zero-day malware -- Fake malware on computers -- Fake malware on mobile devices -- Fake security subscription renewal notifications -- Poisoned Web Service Attacks -- Network Infrastructure Poisoning…”
    Libro electrónico
  3. 443
    por Worm, Piet
    Publicado 1964
    Libro
  4. 444
    por Ceyland, Sanver
    Publicado 2005
    Tabla de Contenidos: “…Introduction to IBM Tivoli Storage Manager -- 2.1 IBM Tivoli Storage Manager -- 2.1.1 IBM Tivoli Storage Manager overview -- 2.1.2 IBM Tivoli Storage Manager architecture -- 2.1.3 IBM Tivoli Storage Manager server -- 2.1.4 IBM Tivoli Storage Manager Backup/Archive client -- 2.1.5 IBM Tivoli Storage Manager storage agent -- 2.1.6 IBM Tivoli Storage Manager Extended edition -- 2.2 IBM Tivoli Storage Manager complementary products -- 2.2.1 IBM Tivoli Storage Manager for Space Management -- 2.2.2 IBM Tivoli Storage Manager for Storage Area Network -- 2.2.3 IBM Tivoli Storage Manager for Backup and Recovery -- 2.2.4 IBM Tivoli Storage Manager for data protection -- 2.3 New features and changes with Version 5.3 -- 2.3.1 ACSLS library support enhancements -- 2.3.2 Activity log management -- 2.3.3 Collocation by group -- 2.3.4 Communications options -- 2.3.5 Database reorganization -- 2.3.6 Disk-only backup -- 2.3.7 Enhancements for server migration -- 2.3.8 IBM 3592 WORM (Write Once Read Many) support -- 2.3.9 Increased block size for writing to tape -- 2.3.10 LAN-free environment configuration -- 2.3.11 NDMP operations -- 2.3.12 New interface to manage servers: Administration Center -- 2.3.13 SCSI library enhancements…”
    Libro electrónico
  5. 445
    por Mischel, Magnus
    Publicado 2009
    Tabla de Contenidos: “…-- Speed -- Stability -- Flexibility -- Cost-effectiveness -- Creating a virtual patch -- From vulnerability discovery to virtual patch: An example -- Creating the patch -- Changing the web application for additional security -- Testing your patches -- Real-life examples -- Geeklog -- Patching Geeklog -- Cross-site scripting -- Real-life example: The Twitter worm -- Summary -- 6. Blocking Common Attacks -- HTTP fingerprinting -- How HTTP fingerprinting works -- Server banner -- Response header -- HTTP protocol responses -- Issuing an HTTP DELETE request -- Bad HTTP version numbers -- Bad protocol name -- The ETag HTTP header -- Using ModSecurity to defeat HTTP fingerprinting -- Blocking proxied requests -- Cross-site scripting -- Preventing XSS attacks -- PDF XSS protection -- HttpOnly cookies to prevent XSS attacks -- Session identifiers -- Cross-site request forgeries -- Protecting against cross-site request forgeries -- Shell command execution attempts -- Null byte attacks -- ModSecurity and null bytes -- Source code revelation -- Directory traversal attacks -- Blog spam -- SQL injection -- Standard injection attempts -- Retrieving data from multiple tables with UNION -- Multiple queries in one call -- Reading arbitrary files -- Writing data to files -- Preventing SQL injection attacks -- What to block -- Website defacement -- Brute force attacks -- Directory indexing -- Detecting the real IP address of an attacker -- Summary -- 7. …”
    Libro electrónico
  6. 446
    Publicado 2012
    Tabla de Contenidos: “…-- Going Connection Shopping -- Objective 8.03 Using Remote Access -- Dial-up to the Internet -- Private Dial-Up -- Dedicated Connection -- DSL and Cable -- Cable Issues -- Remote Terminal -- VoIP -- RTP -- SIP and H.323 -- Skype -- Streaming Media with RSTP -- Checkpoint -- Review Questions -- Review Answers -- Chapter 9: Network Security -- Objective 9.01 Common Threats -- System Crash/Hardware Failure -- Administrative Access Control -- Malware -- Virus -- Worm -- Macro Virus -- Trojan -- Rootkit -- Adware/Spyware -- Dealing with Malware -- Antimalware Programs -- Social Engineering -- Phishing -- Man in the Middle -- Denial of Service -- Physical Intrusion -- Attacks on Wireless Connections -- Leeching -- Cracking Wireless Encryption -- Rogue Access Points -- Evil Twin -- Objective 9.02 Securing User Accounts -- Authentication -- Authentication Principles -- Authentication Protocols -- Authorization -- Logon and Access Security -- Implementing Share-Level Security -- Implementing User-Level Security -- Using Passwords -- Objective 9.03 Firewalls -- Hiding the IPs -- Port Filtering -- Packet Filtering -- MAC Filtering -- Personal Firewalls -- Network Zones -- Vulnerability Scanners -- Objective 9.04 Securing Remote Connections -- IPsec -- Virtual Private Networks -- PPTP VPNs -- L2TP VPNs -- SSL VPNs -- Checkpoint -- Review Questions -- Review Answers -- Chapter 10: The Complete Network -- Objective 10.01 Designing and Implementing a SOHO Network -- Define the Network Needs -- Network Design -- Compatibility Issues…”
    Libro electrónico
  7. 447
    por Benedetelli, Daniele
    Publicado 2013
    Tabla de Contenidos: “…LEGO recipes -- the angular beams unveiled -- triangles vs. rectangles -- extending beams -- bracing -- cross blocks -- gears revisited -- getting gears to mesh together well -- assembling gears -- gear combinations -- 90-degree-coupled gears -- gear trains -- the worm gear -- motion transformation -- building ideas for the motors -- medium motor with front output #1 -- medium motor with front output #2 -- medium motor with single lateral output -- medium motor with double lateral output -- medium motor with single geared-down lateral output -- medium motor with gearbox -- medium motor with multiple outputs -- large motor with horizontal output -- large motor gearing options -- conclusion -- Comic continued -- 9. building WATCHGOOZ3 -- how does WATCHGOOZ3 walk? …”
    Libro electrónico
  8. 448
    por Duan, Wenhui
    Publicado 2023
    Tabla de Contenidos: “…Role of Aggregate Reactivity, Binder Composition, and Curing Temperature on the Delayed Ettringite Formation and Associated Durability Loss in Concrete -- 1 Introduction -- 1.1 Project Outline -- 2 Methods -- 3 Results and Discussion -- 3.1 DEF in Concrete -- 3.2 ASR-DEF in Concrete -- 4 Conclusions -- References -- Effect of Blending Alum Sludge and Ground Granulated Blast-Furnace Slag as Cement Replacement to Mitigate Alkali-Silica Reaction -- 1 Introduction -- 2 Methods -- 2.1 Materials -- 2.2 Experimental Protocol -- 3 Results and Discussion -- 3.1 Compressive Strength -- 3.2 ASR-Induced Expansion -- 3.3 Phase Analysis of the Mortars -- 3.4 Microstructural Characteristics and Elemental Analysis -- 4 Conclusions -- References -- Optimisation of Limestone Calcined Clay Cement Based on Response Surface Method -- 1 Introduction -- 2 Methods -- 2.1 Materials -- 2.2 Design of Mixtures -- 3 Mathematical Modelling and Statistical Analysis -- 3.1 ANOVA and Adequacy Checking -- 3.2 Interaction Effects on Response -- 3.3 Response Surface Optimization Analysis -- 4 Conclusion -- References -- Designing Waterborne Protective Coatings Through Manipulating the Nanostructure of Acrylic-Based Nanocomposites -- 1 Introduction -- 2 Methods -- 2.1 Materials -- 2.2 Preparation of Waterborne Acrylic Copolymer, Acrylic-Based Coatings and Coating Films -- 2.3 Characterization -- 3 Results and Discussion -- 3.1 Enhanced UV Protection Through the Formation of an Acrylic-Based Nanocomposite -- 3.2 Enhanced Corrosion Resistance of Acrylic-Alkyd Coating with Worm-Like Nanostructure -- 3.3 Multifunctional Acrylic-PDMS Coating with Spherical-Like Nanostructure -- 4 Conclusion -- 5 Data Availability Statement -- References -- Analysis of Categories That Delay Global Construction Projects -- 1 Introduction -- 2 Literature Review -- 3 Research Method…”
    Libro electrónico
  9. 449
    Publicado 2012
    “…Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of its code with the Stuxnet worm, emerge with increasing frequency. …”
    Libro electrónico
  10. 450
    por Worm, Olao
    Publicado 1655
    Libro
  11. 451
    Publicado 2006
    991004121419706719
  12. 452
    Publicado 2001
    991004121329706719
  13. 453
    Publicado 2003
    991001910399706719
  14. 454
    Publicado 2005
    “…Best-practice QoS designs for protecting voice, video, and critical data while mitigating network denial-of-service attacks Understand the service-level requirements of voice, video, and data applications Examine strategic QoS best practices, including Scavenger-class QoS tactics for DoS/worm mitigation Learn about QoS tools and the various interdependencies and caveats of these tools that can impact design considerations Learn how to protect voice, video, and data traffic using various QoS mechanisms Evaluate design recommendations for protecting voice, video, and multiple classes of data while mitigating DoS/worm attacks for the following network infrastructure architectures: campus LAN, private WAN, MPLS VPN, and IPSec VPN Quality of Service (QoS) has already proven itself as the enabling technology for the convergence of voice, video, and data networks. …”
    Libro electrónico
  15. 455
    Publicado 2003
    991004121379706719
  16. 456
    Publicado 2008
    991001910159706719
  17. 457
    Publicado 2006
    991001910689706719
  18. 458
    Publicado 2023
    Tabla de Contenidos: “…Design and Kinematic Analysis of Gears -- 8.1 Introduction -- 8.2 Gear Types -- 8.3 SPUR-Gear Nomenclature and Relationships of Mating Gears -- 8.3.1 Spur-Gear Nomenclature -- 8.3.2 Pressure Angle and Involute Tooth Profile -- 8.3.3 Gear Center Distance and Contact Ratio -- 8.3.4 Gear-Tooth Interference and Undercutting -- 8.3.5 Backlash -- 8.4 Helical-Gear Nomenclature -- 8.5 Gear Kinematics -- 8.5.1 Spur Gears and Gear Trains -- 8.5.2 Planetary Gear Trains -- 8.5.3 Rack and Pinion Gears -- 8.5.4 Helical Gears -- 8.5.5 Bevel Gears -- 8.5.6 Worm Gears -- 8.6 Summary -- References -- Additional Reading -- Problems -- 9. …”
    Libro electrónico
  19. 459
    por Stoker, Bram, 1847-1912
    Publicado 2001
    Libro
  20. 460
    por Amos, S. W.
    Publicado 1999
    “…So if you think you know the meaning of ADDER, LAP, FIB, SPICE or WORM, we recommend you check in the Newnes Dictionary of Electronics first.…”
    Libro electrónico