Mostrando 1,981 - 2,000 Resultados de 2,220 Para Buscar '"virus"', tiempo de consulta: 0.08s Limitar resultados
  1. 1981
    Publicado 2015
    “…Human T-cell leukemia viruses 1 and 2 (HTLV-1 and HTLV-2) have similar genomic structure but differ in pathogenicity. …”
    Libro electrónico
  2. 1982
    “…These studies reiterate that the global fight against human cancers will continue to receive great support from our tremendous efforts in searching for new tumor-causing viruses and in understanding the basic biology of tumor viruses. …”
    Libro electrónico
  3. 1983
    Publicado 2015
    Tabla de Contenidos: “…3.2.4.2 McCabe's Design Predicate Approach to Integration -- 3.2.4.3 Hex Converter Example -- 3.2.4.4 McCabe Design Predicate Exercise -- 3.2.4.5 McCabe Design Predicate Exercise Debrief -- 3.3 Dynamic Analysis -- 3.3.1 Memory Leak Detection -- 3.3.2 Wild Pointer Detection -- 3.3.3 Dynamic Analysis Exercise -- 3.3.4 Dynamic Analysis Exercise Debrief -- 3.4 Sample Exam Questions -- 4 Quality Characteristics for Technical Testing -- 4.1 Introduction -- 4.2 Security Testing -- 4.2.1 Security Issues -- 4.2.1.1 Piracy -- 4.2.1.2 Buffer Overflow -- 4.2.1.3 Denial of Service -- 4.2.1.4 Data Transfer Interception -- 4.2.1.5 Breaking Encryption -- 4.2.1.6 Logic Bombs/Viruses/Worms -- 4.2.1.7 Cross-Site Scripting -- 4.2.1.8 Timely Information -- 4.2.1.9 Internal Security Metrics -- 4.2.1.10 External Security Metrics -- 4.2.1.11 Exercise: Security -- 4.2.1.12 Exercise: Security Debrief -- 4.3 Reliability Testing -- 4.3.1 Maturity -- 4.3.1.1 Internal Maturity Metrics -- 4.3.1.2 External Maturity Metrics -- 4.3.2 Fault Tolerance -- 4.3.2.1 Internal Fault Tolerance Metrics -- 4.3.2.2 External Fault Tolerance Metrics -- 4.3.3 Recoverability -- 4.3.3.1 Internal Recoverability Metrics -- 4.3.3.2 External Recoverability Metrics -- 4.3.4 Compliance -- 4.3.4.1 Internal Compliance Metrics -- 4.3.4.2 External Compliance Metrics -- 4.3.5 An Example of Good Reliability Testing -- 4.3.6 Exercise: Reliability Testing -- 4.3.7 Exercise: Reliability Testing Debrief -- 4.4 Efficiency Testing -- 4.4.1 Multiple Flavors of Efficiency Testing -- 4.4.2 Modeling the System -- 4.4.2.1 Identify the Test Environment -- 4.4.2.2 Identify the Performance Acceptance Criteria -- 4.4.2.3 Plan and Design Tests -- 4.4.2.4 Configure the Test Environment -- 4.4.2.5 Implement the Test Design -- 4.4.2.6 Execute the Test -- 4.4.2.7 Analyze the Results, Tune and Retest -- 4.4.3 Time Behavior…”
    Libro electrónico
  4. 1984
    por Erkoreka, Anton, 1950-
    Publicado 2010
    Libro
  5. 1985
    Publicado 2018
    “…Multicellular organism have employed apoptotic mechanisms during host defence in response to viral infection to limit or prevent viral spread and replication. Consequently, viruses have evolved sophisticated molecular countermeasures to disarm host apoptotic defences, and this series of reviews and primary research articles in this Special Issue explores the intricate molecular interplay between viruses and their hosts when they battle for control of host apoptotic check-points…”
    Libro electrónico
  6. 1986
    por Gray, Matthew J.
    Publicado 2025
    “…These viruses are emerging and increasingly responsible for population declines of ectothermic vertebrates. …”
    Libro electrónico
  7. 1987
    por Institute of Medicine (U.S.)
    Publicado 2010
    “…Some strains of bacteria and viruses are now resistant to all but a single drug, while others have no effective treatments at all. …”
    Libro electrónico
  8. 1988
    “…It may also have a role in the body's immune response to respiratory viruses…”
    Libro electrónico
  9. 1989
    Publicado 2010
    Tabla de Contenidos: “…-- 10.2 Operations Systems -- 10.3 TMN Conceptual Model -- 10.4 TMN Standards -- 10.5 TMN Architecture -- 10.5.1 Functional Architecture -- 10.5.2 Physical Architecture -- 10.5.3 Information Architecture -- 10.6 TMN Management Service Architecture -- 10.7 TMN Integrated View -- 10.8 TMN Implementation -- 10.8.1 OMNI Point -- 10.8.2 eTOM -- Summary -- Exercises -- Chapter 11: Network Management Applications -- 11.1 Configuration Management -- 11.1.1 Network Provisioning -- 11.1.2 Inventory Management -- 11.1.3 Network Topology -- 11.2 Fault Management -- 11.2.1 Fault Detection -- 11.2.2 Fault Location and Isolation Techniques -- 11.3 Performance Management -- 11.3.1 Performance Metrics -- 11.3.2 Data Monitoring -- 11.3.3 Problem Isolation -- 11.3.4 Performance Statistics -- 11.4 Event Correlation Techniques -- 11.4.1 Rule-Based Reasoning -- 11.4.2 Model-Based Reasoning -- 11.4.3 Case-Based Reasoning -- 11.4.4 Codebook Correlation Model -- 11.4.5 State Transition Graph Model -- 11.4.6 Finite State Machine Model -- 11.5 Security Management -- 11.5.1 Policies and Procedures -- 11.5.2 Resources to Prevent Security Breaches -- 11.5.3 Firewalls -- 11.5.4 Cryptography -- 11.5.5 Authentication and Authorization -- 11.5.6 Client-Server Authentication Systems -- 11.5.7 Message Transfer Security -- 11.5.8 Network Protection from Virus Attacks -- 11.6 Accounting Management -- 11.7 Report Management -- 11.8 Policy-Based Management -- 11.9 Service Level Management -- Summary -- Exercises -- Part IV: Broadband Network Management -- Chapter 12: Broadband Network Management: WAN -- 12.1 Broadband Network and Services -- 12.2 ATM Technology -- 12.2.1 Virtual Path-Virtual Circuit -- 12.2.2 ATM Packet Size -- 12.2.3 Integrated Service -- 12.2.4 WAN/SONET -- 12.2.5 ATM LAN Emulation…”
    Libro electrónico
  10. 1990
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Half Title -- Endorsement Page -- Title Page -- Copyright Page -- Table of Contents -- Preface -- Authors -- Chapter 1: Introduction to the philosophy of cybersecurity -- 1.1 A few words about history -- 1.1.1 The history of viruses and malware -- 1.1.2 Interest groups and hacker groups -- 1.1.3 Why cybersecurity has become important -- 1.2 The gradual increase in the role and importance of cybersecurity -- 1.2.1 The problem of scale -- 1.3 The international and military dimension -- 1.4 What is the philosophy of cybersecurity - how do we understand it? …”
    Libro electrónico
  11. 1991
    por Herbert, Alan
    Publicado 2024
    “…Both Z-DNA and the Z-RNA sensing proteins are critical for protecting hosts against both viruses and cancers…”
    Libro electrónico
  12. 1992
    Publicado 2019
    “…Adenoviruses are among the most studied and at the same time most mysterious of viruses. In this book, the authors highlight the achievements in the study of animal and human adenoviruses, chemotherapy of adenovirus infections, and the development in adenoviral vector-based vaccines and gene therapy. …”
    Libro electrónico
  13. 1993
    por Thomas, Thomas M.
    Publicado 2004
    “…With the proliferation of Internet viruses and worms, many people and companies are considering increasing their network security. …”
    Libro electrónico
  14. 1994
    Publicado 2017
    “…Retrotransposons are currently distinguished from viruses, since the process of retrotransposition is not infectious. …”
    Libro electrónico
  15. 1995
    Publicado 2012
    “…In this webcast, Mike Halsey, the author of Troubleshooting Windows 7 Inside Out, walks you through the process of keeping your children and your family safe online from viruses, criminals and inappropriate content with simple to use free tools…”
    Video
  16. 1996
    Publicado 2021
    “…This book examines new technological developments to improve optical fiber technology, with applications in communications systems, optoelectronics integration, and the scientific study of live microorganisms such as bacteria, viruses, fungi, and protozoa…”
    Libro electrónico
  17. 1997
    por Koonin, Eugene V.
    Publicado 2011
    “…The book examines a broad range of topics in evolutionary biology including the inadequacy of natural selection and adaptation as the only or even the main mode of evolution; the key role of horizontal gene transfer in evolution and the consequent overhaul of the Tree of Life concept; the central, underappreciated evolutionary importance of viruses; the origin of eukaryotes as a result of endosymbiosis; the concomitant origin of cells and viruses on the primordial earth; universal dependences between genomic and molecular-phenomic variables; and the evolving landscape of constraints that shape the evolution of genomes and molecular phenomes. …”
    Libro electrónico
  18. 1998
    Publicado 2011
    “…"The Journal of Microbiology, Biotechnology and Food Sciences is an Open Access, peer-reviewed scientific journal for publishing of scientific articles from agriculture, animals and plants microbiology including bacteria, fungi, yeats, algae, protozoa and viruses. Microbial, animal and plants biotechnology and physiology, modern biotechnologies, genetics, molecular biology, agriculture and food chemistry, food control, evaluation and processing of food, food biochemistry and environmental science of agriculture."…”
    Revista digital
  19. 1999
    Publicado 2023
    “…Special attention is given to the isolation and detection of circulating tumor cells and exosomes, the generation of concentration dilutions, the rapid sensing and detection of single molecules and viruses, and the innovations in inertial microfluidics, electrical impedance, magnetic biosensors, and droplet microfluidics…”
    Libro electrónico
  20. 2000
    Publicado 2020
    “…As in biological warfare, bioterrorism agents can be viruses, fungi, bacteria, toxins, insects or any other number of naturally occurring or synthetic agents. …”
    Libro electrónico