Mostrando 2,001 - 2,020 Resultados de 2,220 Para Buscar '"virus"', tiempo de consulta: 0.07s Limitar resultados
  1. 2001
    Publicado 2019
    “…The role of plant RIPs may be related to plant defense against predators and viruses, plant senescence or bacterial pathogenesis. …”
    Libro electrónico
  2. 2002
    por Lewis, Ted G.
    Publicado 2023
    Tabla de Contenidos: “…-- 7.6 Discussion -- References -- Chapter 8 Communications and the Internet -- 8.1 Early Years -- 8.1.1 The Natural Monopoly -- 8.1.2 The Communications Act of 1996 -- 8.2 Regulatory Structure -- 8.2.1 The Most Important Person in Modern History -- 8.2.2 The First (Modern) Critical Infrastructure -- 8.3 The Architecture of the Communications Sector -- 8.3.1 Physical Infrastructure -- 8.3.2 Wireless Networks -- 8.3.3 Extra-Terrestrial Communication -- 8.3.4 Land Earth Stations -- 8.3.5 Cellular Networks -- 8.3.6 Cell Phone Generations -- 8.3.7 Wi-Fi Technology -- 8.4 Risk and Resilience Analysis -- 8.4.1 Importance of Carrier Hotels -- 8.4.2 The Submarine Cable Network -- 8.4.3 HPM Threats -- 8.4.4 Cellular Network Threats -- 8.4.5 Physical Threats -- 8.5 The Monoculture Internet -- 8.5.1 The Internet Self-Organized -- 8.5.2 The Original Sins -- 8.5.2.1 The DNS -- 8.5.2.2 More Original Sin -- 8.5.3 The Hierarchical Internet -- 8.5.4 Too Many Open Ports -- 8.6 Internet Governance -- 8.6.1 IAB and IETF -- 8.6.2 ICANN Wars -- 8.6.3 ISOC -- 8.6.4 W3C -- 8.6.5 Internationalization -- 8.6.6 Regulation and Balkanization -- 8.6.6.1 Rise of Regulation -- 8.6.6.2 Criticality of the Internet -- 8.7 Green Communications -- 8.7.1 Solar Computing -- 8.7.2 Quantum Communications -- 8.7.3 Adiabatic Logic -- 8.8 Discussion -- References -- Chapter 9 Cyber Threats -- 9.1 Threat Surface -- 9.1.1 Script-kiddies -- 9.1.2 Black Hats -- 9.1.3 Weaponized Exploits -- 9.1.4 Ransomware and the NSA -- 9.2 Basic Vulnerabilities -- 9.2.1 The First Exploit -- 9.2.2 TCP/IP Flaws -- 9.2.3 Open Ports -- 9.2.4 Buffer Overflow Exploits -- 9.2.5 DDoS Attacks -- 9.2.6 Email Exploits -- 9.2.7 Flawed Application and System Software -- 9.2.8 Trojans, Worms, Viruses, and Keyloggers…”
    Libro electrónico
  3. 2003
    Publicado 2018
    “…Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to outwit antivirus defenses and to go undetected. …”
    Libro electrónico
  4. 2004
    Publicado 2012
    “…As one can see from the chapters, endocytosis regulates diverse processes such as homeostasis of the cell, signal transduction, entry of pathogens and viruses. In addition to the experimental techniques embedded in each chapter, entire chapters are dedicated to experimental approaches that will be useful to all scientists and their model systems. …”
    Electrónico
  5. 2005
    Publicado 2014
    “…Biocides represent a range of products that help destroy and control viruses, bacteria, algae etc. such as disinfectants, wood preservatives and rodenticides…”
    Seriada digital
  6. 2006
    Publicado 2011
    “…Additional topics include denial of service, viruses, worms, phishing, and virtual honeypots and forensics. …”
    Libro electrónico
  7. 2007
    por Mowbray, Thomas J.
    Publicado 2014
    “…It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. …”
    Libro electrónico
  8. 2008
    Publicado 2007
    “…As a result, worms and viruses continue to disrupt business, causing downtime and continual patching. …”
    Libro electrónico
  9. 2009
    Publicado 2020
    “…Current Research in Microbial Sciences topics covered include: Genetics, metabolism: bacteria, fungi, protozoa, viruses; Environmental microbiology; Host-microbe interactions; Antimicrobials; Microbial systems biology; Biofilms; Microbiota"--Publisher…”
    Seriada digital
  10. 2010
    por Clarke, Justin
    Publicado 2009
    “…Such attacks can be used to deface or disable public websites, spread viruses and other malware, or steal sensitive information such as credit card numbers, Social Security Numbers, or passwords. …”
    Libro electrónico
  11. 2011
    por Glenn, Walter
    Publicado 2009
    “…It also includes four chapters on security policy, tools, and techniques to help protect messaging systems from viruses, spam, and phishing. Written by expert authors Walter Glenn and Scott Lowe, this reference deliv…”
    Libro electrónico
  12. 2012
    por Ferguson, Justin
    Publicado 2008
    “…Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored viruses, worms, Trojans, and botnets. IDA Pro's interactive interface and programmable development language provide you with complete control over code disassembly and debugging. …”
    Libro electrónico
  13. 2013
    Publicado 2010
    “…Maximize isolation, lockdown internal and removable storage, work with sandboxing and signing, and encrypt sensitive user information. Safeguards against viruses, worms, malware, and buffer overflow exploits are also covered in this comprehensive resource"--Resource description page…”
    Libro electrónico
  14. 2014
    Publicado 2020
    “…Pathogenesis and immune responses for deadly pathogens, such as Ebola and newly emerged viruses like Zika are also being studied, adding a new twist and generating new knowledge in the context of human target cells in an in vivo setting…”
    Libro electrónico
  15. 2015
    Publicado 2013
    “…Impending environmental catastrophe, threat of terrorism, viruses both biological and virtual, disease: there seem to be so many reasons to panic today. …”
    Libro electrónico
  16. 2016
    Publicado 2012
    “…It will report discoveries of emerging microbes (bacteria, viruses, fungi and other pathogens) including their previously unknown phenotypic or genotypic characteristics, as well as cutting edge information associated with microbial mechanisms of pathogenesis, immune evasion and protection, clinical presentation and outcome, drug efficacy and its resistance, epidemiology and other issues important to global health."…”
    Revista digital
  17. 2017
    Publicado 2015
    “…Ranaviruses are are double-stranded DNA viruses that cause hemorrhagic disease in amphibians, reptiles, and fish. …”
    Libro electrónico
  18. 2018
    Publicado 1988
    “…Areas of interest include, but are not limited to, the structure, expression, or function of genes or gene products associated with normal growth and differentiation and alterations in neoplasia; characterization of genes or gene products expressed in preneoplastic or neoplastic cells; molecular studies that define a specific function of a tumor-associated protein or its effects on cellular function; virtually all research on molecular aspects of oncogenes, tumor suppressor genes, and their gene products; carcinogenesis studies in transgenic mice; and research on human tumor viruses…”
    Revista digital
  19. 2019
    Publicado 2008
    “…Businesses can no longer afford for their systems to go down because of viruses, malware, bugs, trojans, or other attacks. …”
    Libro electrónico
  20. 2020
    Publicado 2014
    “…Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and viruses that usually attack indiscriminately, targeted attacks involve intelligence-gathering and planning to a degree that drastically changes its profile. …”
    Libro electrónico