Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 49
- Computer security 48
- Computer networks 42
- Engineering & Applied Sciences 25
- Filosofía 22
- Historia 22
- Computer Science 14
- Electrical & Computer Engineering 12
- Telecommunications 12
- Ciencias sociales 11
- Certification 9
- Bergson, Henri 8
- Examinations 8
- Operating systems (Computers) 8
- Arquitectura 7
- Electronic data processing personnel 7
- Firewalls (Computer security) 7
- Internet 7
- Luther, Martin 7
- Computer crimes 6
- Computers 6
- Environment 6
- History 6
- Programming 6
- Access control 5
- Computer programs 5
- Derecho canónico 5
- Educación 5
- Història 5
- Protestantismo 5
-
461Publicado 2009991001910789706719
-
462por Peikari, Cyrus“…The sophistication of attacks against computer systems increases with each new Internet worm. What's the worst an attacker can do to you? …”
Publicado 2004
Libro electrónico -
463Publicado 2003Tabla de Contenidos: “…Verification commands and methods -- 10.1 Key concepts -- 10.2 Introduction to Cluster 1600 system checking -- 10.3 Key commands -- 10.3.1 Verify installation of software -- 10.3.2 Verify system partitions -- 10.3.3 Verifying the authentication services -- 10.3.4 Checking subsystems -- 10.3.5 Monitoring hardware status -- 10.3.6 Monitoring node LEDs: spmon -L, spled -- 10.3.7 Extracting SDR contents -- 10.3.8 Checking IP connectivity: ping/telnet/rlogin -- 10.3.9 SMIT access to verification commands -- 10.4 Graphical user interface -- 10.5 Key daemons -- 10.5.1 Sdrd -- 10.5.2 Hardmon -- 10.5.3 Worm…”
Libro electrónico -
464Publicado 2024Tabla de Contenidos: “…Elections -- 8.1.3.4 2022 Albanian Cyber Attack by Iran -- 8.1.4 Iranian Cyber Operations Wrap-up -- 8.A Cost of Iranian Cyber Attacks -- Bibliography -- Chapter 9 Independent Cyber Operators -- 9.1 Independent Cyber Operations -- 9.1.1 Hackers -- 9.1.1.1 Star Wars, Computer Networks, and the Former Soviet Union's KGB (mid-1980s) -- 9.1.1.2 Morris Worm (1988) -- 9.1.1.3 Jester - Air Traffic Control and Telephone Service (1997) -- 9.1.1.4 Chinese Hacktivists (1998) -- 9.1.1.5 Maroochy Shire (2000)…”
Libro electrónico -
465Publicado 2024Tabla de Contenidos: “…Scenarios -- 5.2.2 Scenario: Physical destruction of the transformer -- 5.2.2.1 Practical demonstration of physical damage -- 5.2.2.2 Skepticism about reports is recommended -- 5.2.3 Water treatment/sanitation systems -- 5.2.4 Gas and oil -- 5.2.4.1 Siberian pipeline - give it no credence -- 5.3 Securing critical infrastructure -- 5.4 Hacking physical elements -- 5.4.1 Ransomware for industrial systems and PLC worm -- 5.5 Physical effects -- 5.5.1 Stuxnet -- 5.5.2 German steel mill -- 5.6 Transportation systems -- 5.7 What do the States do about it? …”
Libro electrónico -
466por Lewis, Ted G.Tabla de Contenidos: “…-- 7.6 Discussion -- References -- Chapter 8 Communications and the Internet -- 8.1 Early Years -- 8.1.1 The Natural Monopoly -- 8.1.2 The Communications Act of 1996 -- 8.2 Regulatory Structure -- 8.2.1 The Most Important Person in Modern History -- 8.2.2 The First (Modern) Critical Infrastructure -- 8.3 The Architecture of the Communications Sector -- 8.3.1 Physical Infrastructure -- 8.3.2 Wireless Networks -- 8.3.3 Extra-Terrestrial Communication -- 8.3.4 Land Earth Stations -- 8.3.5 Cellular Networks -- 8.3.6 Cell Phone Generations -- 8.3.7 Wi-Fi Technology -- 8.4 Risk and Resilience Analysis -- 8.4.1 Importance of Carrier Hotels -- 8.4.2 The Submarine Cable Network -- 8.4.3 HPM Threats -- 8.4.4 Cellular Network Threats -- 8.4.5 Physical Threats -- 8.5 The Monoculture Internet -- 8.5.1 The Internet Self-Organized -- 8.5.2 The Original Sins -- 8.5.2.1 The DNS -- 8.5.2.2 More Original Sin -- 8.5.3 The Hierarchical Internet -- 8.5.4 Too Many Open Ports -- 8.6 Internet Governance -- 8.6.1 IAB and IETF -- 8.6.2 ICANN Wars -- 8.6.3 ISOC -- 8.6.4 W3C -- 8.6.5 Internationalization -- 8.6.6 Regulation and Balkanization -- 8.6.6.1 Rise of Regulation -- 8.6.6.2 Criticality of the Internet -- 8.7 Green Communications -- 8.7.1 Solar Computing -- 8.7.2 Quantum Communications -- 8.7.3 Adiabatic Logic -- 8.8 Discussion -- References -- Chapter 9 Cyber Threats -- 9.1 Threat Surface -- 9.1.1 Script-kiddies -- 9.1.2 Black Hats -- 9.1.3 Weaponized Exploits -- 9.1.4 Ransomware and the NSA -- 9.2 Basic Vulnerabilities -- 9.2.1 The First Exploit -- 9.2.2 TCP/IP Flaws -- 9.2.3 Open Ports -- 9.2.4 Buffer Overflow Exploits -- 9.2.5 DDoS Attacks -- 9.2.6 Email Exploits -- 9.2.7 Flawed Application and System Software -- 9.2.8 Trojans, Worms, Viruses, and Keyloggers…”
Publicado 2023
Libro electrónico -
467Publicado 2011“…The last section of the book is devoted to multicellular pathogen as human Filaria Loa Loa - a filarial worm restricted to the West Africa…”
Libro electrónico -
468Publicado 2005“…Peter Szor systematically covers everything you need to know, including virus behavior and classification, protection strategies, antivirus and worm-blocking techniques, and much more. Szor presents the state-of-the-art in both malware and protection, providing the full technical detail that professionals need to handle increasingly complex attacks. …”
Libro electrónico -
469por Sullivan, Chad“…It also has the ability to prevent a day-zero attack, which is a worm that spreads from system to system, taking advantage of vulnerabilities in networks where either the latest patches have not been installed or for which patches are not yet available. …”
Publicado 2005
Libro electrónico -
470por Gupta, Ajay“…Meanwhile, viruses and worms continue to take down organizations for days. …”
Publicado 2004
Libro electrónico -
471por Organisation for Economic Co-operation and Development.“…Five or more treatment levels in a geometric series and, at least, ten replicates (one worm per vial) for each treatment should be used. …”
Publicado 1984
Libro electrónico -
472
-
473Publicado 2019“…Does the early bird always catch the worm? Society largely praises early risers while maligning so-called "night owls." …”
Libro electrónico -
474Publicado 2015“…In this report, you'll learn how: Big data solutions from other industries can't be easily applied to oil and gas Much innovation is in the discovery and exploration phase, where risk and uncertainty are high Outside companies such as Hortonworks, SparkBeyond, and WellWiki are making a difference Oil companies now run some of the largest private supercomputing facilities in the world Security tools such as rapid detection are important to an industry with memories of the Stuxnet worm and Shamoon virus…”
Libro electrónico -
475Publicado 2016“…You will learn how hackers and malware, such as the infamous Stuxnet worm, can exploit them and disrupt critical processes, compromise safety, and bring production to a halt. …”
Libro electrónico -
476Publicado 2020Tabla de Contenidos: “…Level II oChapter 77: Schizophrenia: A Thousand Worms Inside My Body Level I oChapter 78: Major Depression: A Life Worth Living Level I oChapter 79: Bipolar Disorder: Up All Night Level II oChapter 80: Generalized Anxiety Disorder: Nervous Neddie Level I oChapter 81: Obsessive-Compulsive Disorder: Five Is the Magic Number Level I oChapter 82: Insomnia: Poor Adherence and Poor Sleep Level II *Section 8: Endocrinologic Disorders Section Editor: Julia M. …”
Libro electrónico -
477por Carr, Jeffrey“…"When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small glimpse into modern cyber warfare--without truly realizing the scope of this global conflict. …”
Publicado 2012
Libro electrónico -
478
-
479Publicado 2022“…Highlights include IBM TS7700 Advanced Object Store, an all flash TS7770, grid resiliency enhancements, and Logical WORM retention. By using the same hierarchical storage techniques, the TS7700 (TS7770 and TS7760) can also off load to object storage. …”
Libro electrónico -
480Publicado 2009“…It's usually upper management asking these questions, and the last thing you want them to do is actually go into the application to get this information; that opens up a whole new can of worms. Crystal Reports for .NET truly is a magnificent tool to polish off your application and keep your mangers happy while keeping the users productive…”
Libro electrónico