Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Business and Economics 12
- Crimen real 12
- Negocios y economía 12
- True crime 12
- Security measures 8
- Computer networks 6
- History 5
- Computer security 4
- Certification 3
- Dinero y política monetaria 3
- Engaños y decepciones 3
- Engineering & Applied Sciences 3
- Examinations 3
- Money and monetary policy 3
- Politics and government 3
- hoaxes and deceptions 3
- Communism 2
- Computer Science 2
- Computer viruses 2
- Electronic data processing personnel 2
- Internet 2
- Jewish communists 2
- Jews 2
- Management 2
- Mobile computing 2
- Religion 2
- ADGD0108 1
- ADGD0208 1
- ADGD0308 1
- ADGG0208 1
-
61Publicado 2015Tabla de Contenidos: “…Chapter 13: Extraordinary Sample IssuesChapter 14: Field Collection Kits; Chapter 15: NDA Field RadioactivityDetection; Chapter 16: Laboratory Analyses; Chapter 17: Inferred Production Estimates; Chapter 18: Materials Profiling; Chapter 19: Source and Route Attribution; Chapter 20: Forensic Investigation of a Highly Enriched Uranium SampleI nterdicted in Bulgaria; Chapter 21: Counter forensic Investigation of U.S.Enrichment Plants; Chapter 22: Nuclear Smuggling Hoax D-38 Counterweight; Chapter 23: Nuclear Smuggling Hoax Sc Metal; Chapter 24: Fatal "Cold Fusion"Explosion…”
Libro electrónico -
62Publicado 2001Tabla de Contenidos: “…Intro -- copyright -- Table of Contents -- Preface -- Chapter 1: Introduction -- Chapter 2: DOS Computer Viruses -- Chapter 3: Windows Technologies -- Chapter 4: Viruses in a Windows World -- Chapter 5: Macro Viruses -- Chapter 6: Trojans and Worms -- Chapter 7: Instant Messaging Attacks -- Chapter 8: Internet Browser Technologies -- Chapter 9: Internet Browser Attacks -- Chapter 10: Malicious Java Applets -- Chapter 11: Malicious ActiveX Controls -- Chapter 12: Email Attacks -- Chapter 13: Hoax Viruses -- Chapter 14: Defense -- Chapter 15: The Future -- Index -- About the Author…”
Libro electrónico -
63por Lander, JamesTabla de Contenidos: “…Origins and education -- Voyages and the experience of slavery -- The racial background, personal encounters, and turning points in 1837 -- Religious reformation -- Career preparations and rivals, 1845-49 -- Mortality, invention, and geology -- Scientific racism -- The types of mankind and the Kansas-Nebraska Act, 1854-55 -- The politics of race -- Campaigning, 1856-58 -- Publications and crocodiles, 1859-60 -- More debates and new reviews -- Designers and inventors -- Inventions for a long war -- The Trent affair : a chemistry problem -- Delegation and control -- The rationality of colonization -- Colonization and emancipation -- Societies -- Mill workers and freedmen -- Testing hopes and hoaxes -- Spiritual forces -- Meeting Agassiz -- The descent of man -- An end to religion -- The dream of equality…”
Publicado 2010
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
64por Nobus, DanyTabla de Contenidos: “…5 Reading Seminar XVII: from the desire to know to the fall of knowledge6 Concluding the time for comprehending: the epistemological reversal of the knowledge at risk; 7 The game beneath the game: logical aspects of the artifice, the dummy and the hoax; 8 Epistemological regression and the problem of applied psychoanalysis; Coda: Conceptualizing the rigorous hole; Notes; References; Index…”
Publicado 2005
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
65Publicado 2006Tabla de Contenidos: “…PREVENTION AND PROTECTION TECHNIQUESNON-PC PLATFORM VIRUSES; CONCLUSION; GLOSSARY; CROSS REFERENCES; FURTHER READING; Trojan Horse Programs; INTRODUCTION; HISTORY OF TROJAN HORSES; TYPES OF TROJAN HORSE ATTACKS; COVERT TROJAN HORSE ATTACKS; OVERT TROJAN HORSE ATTACKS; DEFENSES AGAINST TROJAN HORSE PROGRAMS; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; Hoax Viruses and Virus Alerts; INTRODUCTION; RELATED ITEMS; VIRUS WARNING HOAXES; CHARACTERISTICS AND IDENTIFICATION; PROTECTION AND POLICY; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING…”
Libro electrónico -
66Publicado 2007Tabla de Contenidos: “…; Pump and Dump Scams; Hoaxes and Chain Letters; Why Do People Pass Hoaxes and Chain Letters On?…”
Libro electrónico -
67Publicado 2013Tabla de Contenidos: “…Trust, Cynicism, and Responsiveness: The Uneasy Situation of Journalism in Democracy / Kees Brants -- A Refractured Paradigm: Journalism, Hoaxes and the Challenge of Trust / Marcel Broersma -- Getting the Facts Straight in a Digital Era: Journalistic Accuracy and Trustworthiness / Colin Porlezza and Stephan Russ-Mohl -- The Postmodern Challenge to Journalism: Strategies for Constructing a Trustworthy Identity / Jo Bogaerts and Nico Carpentier -- Participatory Forms of Journalism. …”
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
68Publicado 2018Tabla de Contenidos: “…You won't believe how co-dependent they are, or: Media hype and the interaction of news media, social media, and the user -- 15. From racial hoaxes to media hypes : fake news' real consequences -- 16. …”
Libro electrónico -
69Publicado 2018“…Saranillio tracks these disparate stories by marshaling a variety of unexpected genres and archives: exhibits at world's fairs, political cartoons, propaganda films, a multimillion-dollar hoax on Hawai‘i’s tourism industry, water struggles, and stories of hauntings, among others. …”
Libro electrónico -
70por Kaszeta, DanTabla de Contenidos: “…CBRN and Hazmat Incidents at Major Public Events: Planning and Response; Acknowledgments; Contents; Foreword; PART I Introduction; CHAPTER 1 The Threat Environment; Adverse Effects; Causative Agents: The Spectrum of CBRN/HAZMAT Substances; Means of Dissemination; Causative Agents: the Perpetrator; Multipliers in the Major Event Environment; Nuisances, Hoaxes, and Communicated Threats; CBRN/HAZMAT Substances: Characteristics Significant as Planning Considerations; CHAPTER 2 Differing Perspectives and Philosophies on CBRN/HAZMAT Planning and Response; Fire Service and HAZMAT…”
Publicado 2013
Libro electrónico -
71Publicado 2012Tabla de Contenidos: “…3 News sourcesReporters; Contacts; Newsroom diary; Files; Check calls; Emergency services radio; Politicians; Pressure groups; Staged events; News releases; Syndicated recordings; Freelances; Tip-offs; Hoaxes; Wire services and news agencies; The network; Other news media; Shared material; Fieldwork; 4 Getting the story; Newsroom conference; Copytasting; Balance of news; Visuals and actuality; The brief; The angle; Chasing the contact; Staged news conferences; Beating the clock; Work to sequence; Don't panic; Fieldwork; WRITING FOR BROADCAST; 5 Conversational writing; Telling the story…”
Libro electrónico -
72por Wang, WallyTabla de Contenidos: “…PART 2: The PC Pioneers4: ANSI Bombs and Viruses; The Making of an ANSI Bomb; The Spread of Computer Viruses; How Viruses Avoid Detection; How Antivirus Programs Work; Why People Write Viruses; Finding Virus-Writing Tutorials; Virus-Writing Toolkits; Virus Myths and Hoaxes; Learning More About Viruses; The Future Virus Threat; 5: Trojan Horses and Worms; The World of Trojan Horses; Worms: Self-Replicating Viruses; Stopping Worms and Trojan Horses; Tracking the Threats; 6: Warez (Software Privacy); Copying Copy-Protected Software; Defeating Serial Numbers; Defeating Product Activation…”
Publicado 2006
Libro electrónico -
73por Knight, TimothyTabla de Contenidos: “…The Confederacy The Greybacks; Bonds before Bombs; Legal Tender; Gold and a Hoax; A Nation Transformed; Chapter 8 The Panic of 1893; The Robber Barons; Silver and Gold; Panic Sets in; Cleveland and Morgan; The Man behind the Curtain; Chapter 9 The Rich Man's Panic of 1907; A Simpler Time; The Copper Magnate; Cornering United; The Bank Runs Begin; The Stock Exchange Teeters; Roosevelt's Reluctant Aid; Jekyll Island; Chapter 10 Billion-Dollar Bread-The Weimar Hyperinflation; Funding a War; An Expensive Peace; The Printing Presses; Widespread Suffering; A Nation of Speculators…”
Publicado 2014
Libro electrónico -
74por Gómez Vieites, ÁlvaroTabla de Contenidos: “…VIRUS INFORMÁTICOS Y OTROS CÓDIGOS DAÑINOS; 3.1 CARACTERÍSTICAS GENERALES DE LOS VIRUS INFORMÁTICOS; 3.2 TIPOS DE VIRUS Y OTROS PROGRAMAS DAÑINOS; 3.2.1 Virus de Boot (sector de arranque); 3.2.2 Virus de ficheros ejecutables; 3.2.3 Virus del lenguaje Java; 3.2.4 Virus de macros; 3.2.5 Troyanos; 3.2.6 Rootkits; 3.2.7 Gusanos (worms); 3.2.8 Bacterias; 3.2.9 Bombas lógicas; 3.2.10 Hoaxes (bulos); 3.2.11 Jokes (Bromas); 3.2.12 Programas que permiten construir virus…”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
75Publicado 2024Tabla de Contenidos: “…Benefit of Security Controls -- Countermeasure Selection and Implementation -- Applicable Types of Controls -- Security Control Assessment -- Monitoring and Measurement -- Risk Reporting and Documentation -- Continuous Improvement -- Legacy Risk -- Risk Frameworks -- Social Engineering -- Social Engineering Principles -- Eliciting Information -- Prepending -- Phishing -- Spear Phishing -- Whaling -- Spam -- Shoulder Surfing -- Invoice Scams -- Hoax -- Impersonation and Masquerading -- Tailgating and Piggybacking -- Dumpster Diving -- Identity Fraud -- Typosquatting -- Influence Campaigns -- Establish and Maintain a Security Awareness, Education, and Training Program -- Awareness -- Training -- Education -- Improvements -- Effectiveness Evaluation -- Summary -- Study Essentials -- Written Lab -- Review Questions -- Chapter 3 Business Continuity Planning -- Planning for Business Continuity -- Project Scope and Planning -- Organizational Review -- BCP Team Selection -- Resource Requirements -- External Dependencies -- Business Impact Analysis -- Identifying Priorities -- Risk Identification -- Likelihood Assessment -- Impact Analysis -- Resource Prioritization -- Continuity Planning -- Strategy Development -- Provisions and Processes -- Plan Approval and Implementation -- Plan Approval -- Plan Implementation -- Communication, Training and Education -- BCP Documentation -- Summary -- Study Essentials -- Written Lab -- Review Questions -- Chapter 4 Laws, Regulations, and Compliance -- Categories of Laws -- Criminal Law -- Civil Law -- Administrative Law -- Laws -- Computer Crime -- Intellectual Property (IP) -- Software Licensing…”
Libro electrónico -
76Publicado 2018Tabla de Contenidos: “….: kostenlos, aber milliardenschwer -- Das Geschäftsmodell der Gratisdienste -- Im Visier von personalisierter Werbung -- In-App-Käufe, free2play-Spiele und Lootboxen -- Kostenfallen und Abzocke -- Was kann ich gegen Kostenfallen tun? -- Spam und Hoaxes -- Onlinebetrug -- Viren, Würmer und Trojaner -- Wie kann ich mich vor Schädlingen schützen? …”
Libro electrónico -
77Publicado 2022Tabla de Contenidos: “…Internet Usage Policy -- E-mail Usage Policy -- Social Media Analysis -- Clean Desk Policy -- Bring-Your-Own-Device (BYOD) Policy -- Privacy Policy -- Due Care and Due Diligence -- Due Process -- Incident Response Policies and Procedures -- Security Awareness and Training -- Diversity of Training Techniques -- Security Policy Training and Procedures -- User Training -- Role-Based Training -- Continuing Education -- Compliance with Laws, Best Practices, and Standards -- User Habits -- Training Metrics and Compliance -- Standard Operating Procedures -- Third-Party Risk Management -- Vendors -- Supply Chain -- Business Partners -- Interoperability Agreements -- Service Level Agreement (SLA) -- Memorandum of Understanding (MOU) -- Measurement Systems Analysis (MSA) -- Business Partnership Agreement (BPA) -- Interconnection Security Agreement (ISA) -- NDA -- End of Service Life (EOSL) -- End of Life (EOL) -- Chapter 3 Review -- Chapter 4 The Role of People in Security -- People-A Security Problem -- Social Engineering -- Tools -- Principles (Reasons for Effectiveness) -- Defenses -- Attacks -- Impersonation -- Phishing -- Smishing -- Vishing -- Spam -- Spam over Internet Messaging (SPIM) -- Spear Phishing -- Whaling -- Pharming -- Dumpster Diving -- Shoulder Surfing -- Tailgating/Piggybacking -- Eliciting Information -- Prepending -- Identity Fraud -- Invoice Scams -- Credential Harvesting -- Reverse Social Engineering -- Reconnaissance -- Hoax -- Watering Hole Attack -- Typo Squatting -- Influence Campaigns -- Poor Security Practices -- Password Selection -- Shoulder Surfing -- Piggybacking -- Dumpster Diving -- Installing Unauthorized Hardware and Software -- Data Handling -- Physical Access by Non-Employees -- Clean Desk Policies -- People as a Security Tool -- Security Awareness -- Security Policy Training and Procedures -- Chapter 4 Review…”
Libro electrónico -
78Publicado 2011Tabla de Contenidos: “…Selecting a Password -- Components of a Good Password -- Password Aging -- Operating System and Network Operating System Hardening -- Hardening Microsoft Operating Systems -- Hardening UNIX- or Linux-Based Operating Systems -- Network Hardening -- Software Updates -- Device Configuration -- Ports and Services -- Traffic Filtering -- Securing Management Interfaces -- VLAN Management -- IPv4 vsIPv6 -- Application Hardening -- Application Configuration Baseline -- Application Patches -- Patch Management -- Web Servers -- Mail Servers -- FTP Servers -- DNS Servers -- File and Print Services -- Active Directory -- Host Software Baselining -- Group Policies -- Security Templates -- Chapter Review -- Questions -- Answers -- Chapter 13 Types of Attacks and Malicious Software -- Avenues of Attack -- The Steps in an Attack -- Minimizing Possible Avenues of Attack -- Attacking Computer Systems and Networks -- Denial-of-Service Attacks -- Backdoors and Trapdoors -- Null Sessions -- Sniffing -- Spoofing -- Man-in-the-Middle Attacks -- Replay Attacks -- TCP/IP Hijacking -- Attacks on Encryption -- Address System Attacks -- Password Guessing -- Software Exploitation -- Client-Side Attacks -- Malicious Code -- Secure Software Development Lifecycle -- War-Dialing and War-Driving -- Social Engineering -- Auditing -- Chapter Review -- Questions -- Answers -- Chapter 14 E-Mail and Instant Messaging -- Security of E-Mail -- Malicious Code -- Hoax E-Mails -- Unsolicited Commercial E-Mail (Spam) -- Mail Encryption -- Instant Messaging -- Chapter Review -- Questions -- Answers -- Chapter 15 Web Components -- Current Web Components and Concerns -- Protocols -- Encryption (SSL and TLS) -- The Web (HTTP and HTTPS) -- Directory Services (DAP and LDAP) -- File Transfer (FTP and SFTP) -- Vulnerabilities -- Code-Based Vulnerabilities -- Buffer Overflows -- Java and JavaScript…”
Libro electrónico -
79Publicado 2012Tabla de Contenidos: “…Spear Phishing and Whaling -- Vishing -- Smishing -- Pharming -- Social Networking Attacks -- Raising User Awareness Through Training -- Questions -- Answers -- Chapter 6 Malicious Code and Activity -- Identifying Malicious Code -- Virus -- Worm -- Trojan Horse -- Logic Bomb -- Keylogger -- Rootkits -- Mobile Code -- Trapdoors and Backdoors -- Spyware -- Malware Hoaxes -- Understanding Malicious Web Activity -- Software Security -- Injection -- Cross Site Scripting -- Cross Site Request Forgery -- Implementing Malicious Code Countermeasures -- Antivirus Software -- Keeping AV Signatures Up to Date -- Keep Operating Systems Up to Date -- Spam Filters -- Content-Filtering Appliances -- Least Privilege -- Educate Users -- Beware of Shortened Links -- Sign Up for E-mail Alerts -- Common Vulnerabilities and Exposures -- Questions -- Answers -- Chapter 7 Risk, Response, and Recovery -- Defining Risk -- Identifying Threats -- Understanding Vulnerabilities -- Understanding Impact -- Managing Risk -- Residual Risk -- Identifying Assets -- Performing Risk Assessments -- Risk Assessment Steps -- Quantitative Analysis -- Qualitative Analysis -- Address Findings -- Responding to Incidents -- Preparation -- Detection and Analysis -- Containment, Eradication, and Recovery -- Post-incident Activity -- Questions -- Answers -- Chapter 8 Monitoring and Analysis -- Intrusion Detection Systems -- IDS Alerts -- Network-based Intrusion Detection Systems -- Host-based Intrusion Detection Systems -- Intrusion Prevention Systems -- Detection Methods -- Detection Systems and Logs -- Detecting Unauthorized Changes -- SEMs, SIMs, and SIEMs -- Security Assessments -- Vulnerability Assessments -- Penetration Tests -- Questions -- Answers -- Chapter 9 Controls and Countermeasures -- Using Controls, Safeguards, and Countermeasures -- Understanding the Goals of Controls -- Preventive…”
Libro electrónico -
80Publicado 2005Tabla de Contenidos: “…Subjective evaluations of the outcome of the hoax…”
Libro electrónico