Mostrando 461 - 480 Resultados de 502 Para Buscar '"Worms"', tiempo de consulta: 0.07s Limitar resultados
  1. 461
    Publicado 2009
    991001910789706719
  2. 462
    por Peikari, Cyrus
    Publicado 2004
    “…The sophistication of attacks against computer systems increases with each new Internet worm. What's the worst an attacker can do to you? …”
    Libro electrónico
  3. 463
    Publicado 2003
    Tabla de Contenidos: “…Verification commands and methods -- 10.1 Key concepts -- 10.2 Introduction to Cluster 1600 system checking -- 10.3 Key commands -- 10.3.1 Verify installation of software -- 10.3.2 Verify system partitions -- 10.3.3 Verifying the authentication services -- 10.3.4 Checking subsystems -- 10.3.5 Monitoring hardware status -- 10.3.6 Monitoring node LEDs: spmon -L, spled -- 10.3.7 Extracting SDR contents -- 10.3.8 Checking IP connectivity: ping/telnet/rlogin -- 10.3.9 SMIT access to verification commands -- 10.4 Graphical user interface -- 10.5 Key daemons -- 10.5.1 Sdrd -- 10.5.2 Hardmon -- 10.5.3 Worm…”
    Libro electrónico
  4. 464
    Publicado 2024
    Tabla de Contenidos: “…Elections -- 8.1.3.4 2022 Albanian Cyber Attack by Iran -- 8.1.4 Iranian Cyber Operations Wrap-up -- 8.A Cost of Iranian Cyber Attacks -- Bibliography -- Chapter 9 Independent Cyber Operators -- 9.1 Independent Cyber Operations -- 9.1.1 Hackers -- 9.1.1.1 Star Wars, Computer Networks, and the Former Soviet Union's KGB (mid-1980s) -- 9.1.1.2 Morris Worm (1988) -- 9.1.1.3 Jester - Air Traffic Control and Telephone Service (1997) -- 9.1.1.4 Chinese Hacktivists (1998) -- 9.1.1.5 Maroochy Shire (2000)…”
    Libro electrónico
  5. 465
    Publicado 2024
    Tabla de Contenidos: “…Scenarios -- 5.2.2 Scenario: Physical destruction of the transformer -- 5.2.2.1 Practical demonstration of physical damage -- 5.2.2.2 Skepticism about reports is recommended -- 5.2.3 Water treatment/sanitation systems -- 5.2.4 Gas and oil -- 5.2.4.1 Siberian pipeline - give it no credence -- 5.3 Securing critical infrastructure -- 5.4 Hacking physical elements -- 5.4.1 Ransomware for industrial systems and PLC worm -- 5.5 Physical effects -- 5.5.1 Stuxnet -- 5.5.2 German steel mill -- 5.6 Transportation systems -- 5.7 What do the States do about it? …”
    Libro electrónico
  6. 466
    por Lewis, Ted G.
    Publicado 2023
    Tabla de Contenidos: “…-- 7.6 Discussion -- References -- Chapter 8 Communications and the Internet -- 8.1 Early Years -- 8.1.1 The Natural Monopoly -- 8.1.2 The Communications Act of 1996 -- 8.2 Regulatory Structure -- 8.2.1 The Most Important Person in Modern History -- 8.2.2 The First (Modern) Critical Infrastructure -- 8.3 The Architecture of the Communications Sector -- 8.3.1 Physical Infrastructure -- 8.3.2 Wireless Networks -- 8.3.3 Extra-Terrestrial Communication -- 8.3.4 Land Earth Stations -- 8.3.5 Cellular Networks -- 8.3.6 Cell Phone Generations -- 8.3.7 Wi-Fi Technology -- 8.4 Risk and Resilience Analysis -- 8.4.1 Importance of Carrier Hotels -- 8.4.2 The Submarine Cable Network -- 8.4.3 HPM Threats -- 8.4.4 Cellular Network Threats -- 8.4.5 Physical Threats -- 8.5 The Monoculture Internet -- 8.5.1 The Internet Self-Organized -- 8.5.2 The Original Sins -- 8.5.2.1 The DNS -- 8.5.2.2 More Original Sin -- 8.5.3 The Hierarchical Internet -- 8.5.4 Too Many Open Ports -- 8.6 Internet Governance -- 8.6.1 IAB and IETF -- 8.6.2 ICANN Wars -- 8.6.3 ISOC -- 8.6.4 W3C -- 8.6.5 Internationalization -- 8.6.6 Regulation and Balkanization -- 8.6.6.1 Rise of Regulation -- 8.6.6.2 Criticality of the Internet -- 8.7 Green Communications -- 8.7.1 Solar Computing -- 8.7.2 Quantum Communications -- 8.7.3 Adiabatic Logic -- 8.8 Discussion -- References -- Chapter 9 Cyber Threats -- 9.1 Threat Surface -- 9.1.1 Script-kiddies -- 9.1.2 Black Hats -- 9.1.3 Weaponized Exploits -- 9.1.4 Ransomware and the NSA -- 9.2 Basic Vulnerabilities -- 9.2.1 The First Exploit -- 9.2.2 TCP/IP Flaws -- 9.2.3 Open Ports -- 9.2.4 Buffer Overflow Exploits -- 9.2.5 DDoS Attacks -- 9.2.6 Email Exploits -- 9.2.7 Flawed Application and System Software -- 9.2.8 Trojans, Worms, Viruses, and Keyloggers…”
    Libro electrónico
  7. 467
    Publicado 2011
    “…The last section of the book is devoted to multicellular pathogen as human Filaria Loa Loa - a filarial worm restricted to the West Africa…”
    Libro electrónico
  8. 468
    Publicado 2005
    “…Peter Szor systematically covers everything you need to know, including virus behavior and classification, protection strategies, antivirus and worm-blocking techniques, and much more. Szor presents the state-of-the-art in both malware and protection, providing the full technical detail that professionals need to handle increasingly complex attacks. …”
    Libro electrónico
  9. 469
    por Sullivan, Chad
    Publicado 2005
    “…It also has the ability to prevent a day-zero attack, which is a worm that spreads from system to system, taking advantage of vulnerabilities in networks where either the latest patches have not been installed or for which patches are not yet available. …”
    Libro electrónico
  10. 470
    por Gupta, Ajay
    Publicado 2004
    “…Meanwhile, viruses and worms continue to take down organizations for days. …”
    Libro electrónico
  11. 471
    “…Five or more treatment levels in a geometric series and, at least, ten replicates (one worm per vial) for each treatment should be used. …”
    Libro electrónico
  12. 472
    por Bartholin, Thomas, 1616-1680
    Publicado 1676
    Microfilme
  13. 473
    Publicado 2019
    “…Does the early bird always catch the worm? Society largely praises early risers while maligning so-called "night owls." …”
    Libro electrónico
  14. 474
    Publicado 2015
    “…In this report, you'll learn how: Big data solutions from other industries can't be easily applied to oil and gas Much innovation is in the discovery and exploration phase, where risk and uncertainty are high Outside companies such as Hortonworks, SparkBeyond, and WellWiki are making a difference Oil companies now run some of the largest private supercomputing facilities in the world Security tools such as rapid detection are important to an industry with memories of the Stuxnet worm and Shamoon virus…”
    Libro electrónico
  15. 475
    Publicado 2016
    “…You will learn how hackers and malware, such as the infamous Stuxnet worm, can exploit them and disrupt critical processes, compromise safety, and bring production to a halt. …”
    Libro electrónico
  16. 476
    Publicado 2020
    Tabla de Contenidos: “…Level II oChapter 77: Schizophrenia: A Thousand Worms Inside My Body Level I oChapter 78: Major Depression: A Life Worth Living Level I oChapter 79: Bipolar Disorder: Up All Night Level II oChapter 80: Generalized Anxiety Disorder: Nervous Neddie Level I oChapter 81: Obsessive-Compulsive Disorder: Five Is the Magic Number Level I oChapter 82: Insomnia: Poor Adherence and Poor Sleep Level II *Section 8: Endocrinologic Disorders Section Editor: Julia M. …”
    Libro electrónico
  17. 477
    por Carr, Jeffrey
    Publicado 2012
    “…"When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small glimpse into modern cyber warfare--without truly realizing the scope of this global conflict. …”
    Libro electrónico
  18. 478
    Publicado 2016
    Revista digital
  19. 479
    Publicado 2022
    “…Highlights include IBM TS7700 Advanced Object Store, an all flash TS7770, grid resiliency enhancements, and Logical WORM retention. By using the same hierarchical storage techniques, the TS7700 (TS7770 and TS7760) can also off load to object storage. …”
    Libro electrónico
  20. 480
    Publicado 2009
    “…It's usually upper management asking these questions, and the last thing you want them to do is actually go into the application to get this information; that opens up a whole new can of worms. Crystal Reports for .NET truly is a magnificent tool to polish off your application and keep your mangers happy while keeping the users productive…”
    Libro electrónico