Mostrando 481 - 500 Resultados de 502 Para Buscar '"Worms"', tiempo de consulta: 0.06s Limitar resultados
  1. 481
    por Kirsch, Donald R., 1950-
    Publicado 2017
    “…Otzi the Iceman, the five-thousand-year-old hunter frozen in the Italian Alps, was found to have whipworms in his intestines and Bronze-age medicine, a worm-killing birch fungus, knotted to his leggings. …”
    Libro
  2. 482
    Publicado 2018
    “…Find out how to: •Ensure operational, organizational, and physical security •Use cryptography and public key infrastructures (PKIs) •Secure remote access, wireless networks, and virtual private networks (VPNs) •Authenticate users and lock down mobile devices •Harden network devices, operating systems, and applications •Prevent network attacks, such as denial of service, spoofing, hijacking, and password guessing •Combat viruses, worms, Trojan horses, and rootkits •Manage e-mail, instant messaging, and web security •Explore secure software development requirements •Implement disaster recovery and business continuity measures •Handle computer forensics and incident response •Understand legal, ethical, and privacy issues Online content includes: •Test engine that provides full-length practice exams and customized quizzes by chapter or exam objective •200 practice exam questions Each chapter includes: •Learning objectives •Real-world examples •Try This! …”
    Libro electrónico
  3. 483
    Publicado 2005
    “…And, of course, this greatly expanded second edition also includes all the need-to-know details about the security technologies featured in SP 2, so you can better defend yourself against viruses, worms, and hackers. Readers even receive guidelines and instructions for installing SP2 on their PC, or across a network of computers. …”
    Libro electrónico
  4. 484
    Publicado 2011
    “…Plan and implement enterprise-scale MDM and Data Governance solutions Develop master data model Identify, match, and link master records for various domains through entity resolution Improve efficiency and maximize integration using SOA and Web services Ensure compliance with local, state, federal, and international regulations Handle security using authentication, authorization, roles, entitlements, and encryption Defend against identity theft, data compromise, spyware attack, and worm infection Synchronize components and test data quality and system performance…”
    Libro electrónico
  5. 485
    Publicado 2024
    “…Highlights include the IBM TS7700 Advanced Object Store, an all flash TS7770, grid resiliency enhancements, and Logical WORM retention. By using the same hierarchical storage techniques, the TS7700 (TS7770 and TS7760) can also off load to object storage. …”
    Libro electrónico
  6. 486
    Publicado 2016
    “…It shows how to use open source tools to test network configurations for malware attacks, DDoS, botnet, rootkit and worm attacks, and concludes with tactics on how to prepare and execute a mediation schedule of the who, what, where, when, and how, when an attack hits. …”
    Libro electrónico
  7. 487
    por Lucas, Julie, 1964-
    Publicado 2004
    “…When an intruder, worm, virus, or automated attack succeeds in targeting a computer system, having specific controls and a response plan in place can greatly lessen losses. …”
    Libro electrónico
  8. 488
    Publicado 2012
    “…Obstruct APTs and web-based meta-exploits Defend against UNIX-based root access and buffer overflow hacks Block SQL injection, spear phishing, and embedded-code attacks Detect and terminate rootkits, Trojans, bots, worms, and malware Lock down remote access using smartcards and hardware tokens Protect 802.11 WLANs with multilayered encryption and gateways Plug holes in VoIP, social networking, cloud, and Web 2.0 services Learn about the latest iPhone and Android attacks and how to protect yourself…”
    Libro electrónico
  9. 489
    Publicado 2016
    “…The following scholars have contributed to this volume: Ahmed Albaba, Johannes Becker, Hendrik Hinrichsen, Gabriele Rosenthal, Nicole Witte, Arne Worm and Rixta Wundrak. Gabriele Rosenthal is a sociologist and professor of Qualitative Methodology at the Center of Methods in Social Sciences, University of Göttingen. …”
    Libro electrónico
  10. 490
    Publicado 2008
    “…Ajax Security systematically debunks today’s most dangerous myths about Ajax security, illustrating key points with detailed case studies of actual exploited Ajax vulnerabilities, ranging from MySpace’s Samy worm to MacWorld’s conference code validator. Even more important, it delivers specific, up-to-the-minute recommendations for securing Ajax applications in each major Web programming language and environment, including .NET, Java, PHP, and even Ruby on Rails. …”
    Libro electrónico
  11. 491
    Publicado 2016
    “…Learn how to · Identify and prioritize potential threats to your network · Use basic networking knowledge to improve security · Get inside the minds of hackers, so you can deter their attacks · Implement a proven layered approach to network security · Resist modern social engineering attacks · Defend against today’s most common Denial of Service (DoS) attacks · Halt viruses, spyware, worms, Trojans, and other malware · Prevent problems arising from malfeasance or ignorance · Choose the best encryption methods for your organization · Compare security technologies, including the latest security appliances · Implement security policies that will work in your environment · Scan your network for vulnerabilities · Evaluate potential security consultants · Master basic computer forensics and know what to do if you’re attacked · Learn how cyberterrorism and information warfare are evolving…”
    Libro electrónico
  12. 492
    Publicado 2013
    “…Deals with Intrusion Detection System against worm/virus cyber attacks The book ideal for advanced undergraduate and postgraduate students enrolled in courses such as Wireless Access Networking, Mobile Internet Radio Communications. …”
    Libro electrónico
  13. 493
    Publicado 2012
    “…Coverage includes Understanding threats, vulnerabilities, and countermeasures Knowing when security is useful, and when it’s useless “security theater” Implementing effective identification and authentication systems Using modern cryptography and overcoming weaknesses in cryptographic systems Protecting against malicious code: viruses, Trojans, worms, rootkits, keyloggers, and more Understanding, preventing, and mitigating DOS and DDOS attacks Architecting more secure wired and wireless networks Building more secure application software and operating systems through more solid designs and layered protection Protecting identities and enforcing privacy Addressing computer threats in critical areas such as cloud comp..…”
    Libro electrónico
  14. 494
    por Trost, Ryan
    Publicado 2009
    “…Coverage includes Assessing the strengths and limitations of mainstream monitoring tools and IDS technologies Using Attack Graphs to map paths of network vulnerability and becoming more proactive about preventing intrusions Analyzing network behavior to immediately detect polymorphic worms, zero-day exploits, and botnet DoS attacks Understanding the theory, advantages, and disadvantages of the latest Web Application Firewalls Implementing IDS/IPS systems that protect wireless data traffic Enhancing your intrusion detection efforts by converging with physical security defenses Identifying attackers’ “geographical fingerprints” and using that information to respond more effectively Visualizing data traffic to identify suspicious patterns more quickly Revisiting intrusion detection ROI in light of new threats, compliance risks, and technical alternatives Includes contributions from these leading network security experts: Jeff Forristal, a.k.a. …”
    Libro electrónico
  15. 495
    Publicado 2017
    “…Mice deficient for individual DGK isoforms show defects in T and B cell functions, dendritic spine maintenance, osteoclast and mechanical-induced skeletal muscle formation. Studies in flies and worms link DGK mediated DAG metabolism with mTOR- mediated regulation of lifespan and stress responses. …”
    Libro electrónico
  16. 496
    Publicado 2018
    “…What You Will Learn Understand the characteristics that make a robot smart Grasp proportional beacon following and use proximity sensors to track an object Discover how mechanisms such as rack-and-pinion and the worm gear work Program a custom GUI to make a robot more user friendly Make a fun and quirky interactive robot that has its own personality Get to know the principles of remote control and programming car-style steering Understand some of the mechanisms that enable a car to drive Navigate to a destination with a GPS receiver In Detail Smart robots are an ever-increasing part of our daily lives. …”
    Libro electrónico
  17. 497
    por McClure, Stuart
    Publicado 2002
    “…sections show how and why different attacks succeed, including: Cyber graffiti and Web site defacements e-Shoplifting Database access and Web applications JavaTM application servers; how to harden your JavaTM Web Server Impersonation and session hijacking Buffer overflows, the most wicked of attacks Automated attack tools and worms Appendices include a listing of Web and database ports, cheat sheets for remote command execution, and source code disclosure techniques. …”
    Libro electrónico
  18. 498
    por Gregg, Michael
    Publicado 2014
    “…This study guide helps you master all the topics on the CEH v8 (312-50) exam, including Ethical hacking basics Technical foundations of hacking Footprinting and scanning Enumeration and system hacking Linux distros and automated assessment tools Trojans and backdoors Sniffers, session hijacking, and denial of service Web server hacking, web applications, and database attacks Wireless technologies, mobile security, and mobile attacks IDS, firewalls, and honeypots Buffer overflows, viruses, and worms Cryptographic attacks and defenses Physical security and social engineering Companion CD The CD contains two free, complete practice exams, plus memory tables and answers to help you study more efficiently and effectively. …”
    Libro electrónico
  19. 499
    Publicado 2019
    Libro electrónico
  20. 500