Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Virus 108
- Computer security 83
- Security measures 66
- Medicine 63
- Computer networks 62
- Engineering & Applied Sciences 49
- VIH (Virus) 43
- Enfermedades víricas 41
- Operating systems (Computers) 41
- Medicina 38
- Microsoft Windows (Computer file) 38
- Computer Science 35
- Viruses 31
- Research 30
- Sida 30
- SIDA 29
- virus 29
- Enfermedades por virus 27
- Medical 27
- Prevention 27
- Historia 26
- Research & information: general 26
- Virología 26
- Virus Diseases 26
- COVID-19 25
- Technology 25
- Virus diseases 25
- Microbiology 24
- epidemiology 23
- Tecnología 22
-
1981Publicado 2015“…Human T-cell leukemia viruses 1 and 2 (HTLV-1 and HTLV-2) have similar genomic structure but differ in pathogenicity. …”
Libro electrónico -
1982por Multidisciplinary Digital Publishing Institute“…These studies reiterate that the global fight against human cancers will continue to receive great support from our tremendous efforts in searching for new tumor-causing viruses and in understanding the basic biology of tumor viruses. …”
Publicado 2015
Libro electrónico -
1983Publicado 2015Tabla de Contenidos: “…3.2.4.2 McCabe's Design Predicate Approach to Integration -- 3.2.4.3 Hex Converter Example -- 3.2.4.4 McCabe Design Predicate Exercise -- 3.2.4.5 McCabe Design Predicate Exercise Debrief -- 3.3 Dynamic Analysis -- 3.3.1 Memory Leak Detection -- 3.3.2 Wild Pointer Detection -- 3.3.3 Dynamic Analysis Exercise -- 3.3.4 Dynamic Analysis Exercise Debrief -- 3.4 Sample Exam Questions -- 4 Quality Characteristics for Technical Testing -- 4.1 Introduction -- 4.2 Security Testing -- 4.2.1 Security Issues -- 4.2.1.1 Piracy -- 4.2.1.2 Buffer Overflow -- 4.2.1.3 Denial of Service -- 4.2.1.4 Data Transfer Interception -- 4.2.1.5 Breaking Encryption -- 4.2.1.6 Logic Bombs/Viruses/Worms -- 4.2.1.7 Cross-Site Scripting -- 4.2.1.8 Timely Information -- 4.2.1.9 Internal Security Metrics -- 4.2.1.10 External Security Metrics -- 4.2.1.11 Exercise: Security -- 4.2.1.12 Exercise: Security Debrief -- 4.3 Reliability Testing -- 4.3.1 Maturity -- 4.3.1.1 Internal Maturity Metrics -- 4.3.1.2 External Maturity Metrics -- 4.3.2 Fault Tolerance -- 4.3.2.1 Internal Fault Tolerance Metrics -- 4.3.2.2 External Fault Tolerance Metrics -- 4.3.3 Recoverability -- 4.3.3.1 Internal Recoverability Metrics -- 4.3.3.2 External Recoverability Metrics -- 4.3.4 Compliance -- 4.3.4.1 Internal Compliance Metrics -- 4.3.4.2 External Compliance Metrics -- 4.3.5 An Example of Good Reliability Testing -- 4.3.6 Exercise: Reliability Testing -- 4.3.7 Exercise: Reliability Testing Debrief -- 4.4 Efficiency Testing -- 4.4.1 Multiple Flavors of Efficiency Testing -- 4.4.2 Modeling the System -- 4.4.2.1 Identify the Test Environment -- 4.4.2.2 Identify the Performance Acceptance Criteria -- 4.4.2.3 Plan and Design Tests -- 4.4.2.4 Configure the Test Environment -- 4.4.2.5 Implement the Test Design -- 4.4.2.6 Execute the Test -- 4.4.2.7 Analyze the Results, Tune and Retest -- 4.4.3 Time Behavior…”
Libro electrónico -
1984
-
1985Publicado 2018“…Multicellular organism have employed apoptotic mechanisms during host defence in response to viral infection to limit or prevent viral spread and replication. Consequently, viruses have evolved sophisticated molecular countermeasures to disarm host apoptotic defences, and this series of reviews and primary research articles in this Special Issue explores the intricate molecular interplay between viruses and their hosts when they battle for control of host apoptotic check-points…”
Libro electrónico -
1986por Gray, Matthew J.“…These viruses are emerging and increasingly responsible for population declines of ectothermic vertebrates. …”
Publicado 2025
Libro electrónico -
1987por Institute of Medicine (U.S.)“…Some strains of bacteria and viruses are now resistant to all but a single drug, while others have no effective treatments at all. …”
Publicado 2010
Libro electrónico -
1988por National Institute for Health and Care Excellence (Great Britain)“…It may also have a role in the body's immune response to respiratory viruses…”
Publicado 2020
Libro electrónico -
1989Publicado 2010Tabla de Contenidos: “…-- 10.2 Operations Systems -- 10.3 TMN Conceptual Model -- 10.4 TMN Standards -- 10.5 TMN Architecture -- 10.5.1 Functional Architecture -- 10.5.2 Physical Architecture -- 10.5.3 Information Architecture -- 10.6 TMN Management Service Architecture -- 10.7 TMN Integrated View -- 10.8 TMN Implementation -- 10.8.1 OMNI Point -- 10.8.2 eTOM -- Summary -- Exercises -- Chapter 11: Network Management Applications -- 11.1 Configuration Management -- 11.1.1 Network Provisioning -- 11.1.2 Inventory Management -- 11.1.3 Network Topology -- 11.2 Fault Management -- 11.2.1 Fault Detection -- 11.2.2 Fault Location and Isolation Techniques -- 11.3 Performance Management -- 11.3.1 Performance Metrics -- 11.3.2 Data Monitoring -- 11.3.3 Problem Isolation -- 11.3.4 Performance Statistics -- 11.4 Event Correlation Techniques -- 11.4.1 Rule-Based Reasoning -- 11.4.2 Model-Based Reasoning -- 11.4.3 Case-Based Reasoning -- 11.4.4 Codebook Correlation Model -- 11.4.5 State Transition Graph Model -- 11.4.6 Finite State Machine Model -- 11.5 Security Management -- 11.5.1 Policies and Procedures -- 11.5.2 Resources to Prevent Security Breaches -- 11.5.3 Firewalls -- 11.5.4 Cryptography -- 11.5.5 Authentication and Authorization -- 11.5.6 Client-Server Authentication Systems -- 11.5.7 Message Transfer Security -- 11.5.8 Network Protection from Virus Attacks -- 11.6 Accounting Management -- 11.7 Report Management -- 11.8 Policy-Based Management -- 11.9 Service Level Management -- Summary -- Exercises -- Part IV: Broadband Network Management -- Chapter 12: Broadband Network Management: WAN -- 12.1 Broadband Network and Services -- 12.2 ATM Technology -- 12.2.1 Virtual Path-Virtual Circuit -- 12.2.2 ATM Packet Size -- 12.2.3 Integrated Service -- 12.2.4 WAN/SONET -- 12.2.5 ATM LAN Emulation…”
Libro electrónico -
1990Publicado 2024Tabla de Contenidos: “…Cover -- Half Title -- Endorsement Page -- Title Page -- Copyright Page -- Table of Contents -- Preface -- Authors -- Chapter 1: Introduction to the philosophy of cybersecurity -- 1.1 A few words about history -- 1.1.1 The history of viruses and malware -- 1.1.2 Interest groups and hacker groups -- 1.1.3 Why cybersecurity has become important -- 1.2 The gradual increase in the role and importance of cybersecurity -- 1.2.1 The problem of scale -- 1.3 The international and military dimension -- 1.4 What is the philosophy of cybersecurity - how do we understand it? …”
Libro electrónico -
1991por Herbert, Alan“…Both Z-DNA and the Z-RNA sensing proteins are critical for protecting hosts against both viruses and cancers…”
Publicado 2024
Libro electrónico -
1992Publicado 2019“…Adenoviruses are among the most studied and at the same time most mysterious of viruses. In this book, the authors highlight the achievements in the study of animal and human adenoviruses, chemotherapy of adenovirus infections, and the development in adenoviral vector-based vaccines and gene therapy. …”
Libro electrónico -
1993por Thomas, Thomas M.“…With the proliferation of Internet viruses and worms, many people and companies are considering increasing their network security. …”
Publicado 2004
Libro electrónico -
1994Publicado 2017“…Retrotransposons are currently distinguished from viruses, since the process of retrotransposition is not infectious. …”
Libro electrónico -
1995Publicado 2012“…In this webcast, Mike Halsey, the author of Troubleshooting Windows 7 Inside Out, walks you through the process of keeping your children and your family safe online from viruses, criminals and inappropriate content with simple to use free tools…”
-
1996Publicado 2021“…This book examines new technological developments to improve optical fiber technology, with applications in communications systems, optoelectronics integration, and the scientific study of live microorganisms such as bacteria, viruses, fungi, and protozoa…”
Libro electrónico -
1997por Koonin, Eugene V.“…The book examines a broad range of topics in evolutionary biology including the inadequacy of natural selection and adaptation as the only or even the main mode of evolution; the key role of horizontal gene transfer in evolution and the consequent overhaul of the Tree of Life concept; the central, underappreciated evolutionary importance of viruses; the origin of eukaryotes as a result of endosymbiosis; the concomitant origin of cells and viruses on the primordial earth; universal dependences between genomic and molecular-phenomic variables; and the evolving landscape of constraints that shape the evolution of genomes and molecular phenomes. …”
Publicado 2011
Libro electrónico -
1998Publicado 2011“…"The Journal of Microbiology, Biotechnology and Food Sciences is an Open Access, peer-reviewed scientific journal for publishing of scientific articles from agriculture, animals and plants microbiology including bacteria, fungi, yeats, algae, protozoa and viruses. Microbial, animal and plants biotechnology and physiology, modern biotechnologies, genetics, molecular biology, agriculture and food chemistry, food control, evaluation and processing of food, food biochemistry and environmental science of agriculture."…”
Revista digital -
1999Publicado 2023“…Special attention is given to the isolation and detection of circulating tumor cells and exosomes, the generation of concentration dilutions, the rapid sensing and detection of single molecules and viruses, and the innovations in inertial microfluidics, electrical impedance, magnetic biosensors, and droplet microfluidics…”
Libro electrónico -
2000Publicado 2020“…As in biological warfare, bioterrorism agents can be viruses, fungi, bacteria, toxins, insects or any other number of naturally occurring or synthetic agents. …”
Libro electrónico