Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Virus 108
- Computer security 83
- Security measures 66
- Medicine 63
- Computer networks 62
- Engineering & Applied Sciences 49
- VIH (Virus) 43
- Enfermedades víricas 41
- Operating systems (Computers) 41
- Medicina 38
- Microsoft Windows (Computer file) 38
- Computer Science 35
- Viruses 31
- Research 30
- Sida 30
- SIDA 29
- virus 29
- Enfermedades por virus 27
- Medical 27
- Prevention 27
- Historia 26
- Research & information: general 26
- Virología 26
- Virus Diseases 26
- COVID-19 25
- Technology 25
- Virus diseases 25
- Microbiology 24
- epidemiology 23
- Tecnología 22
-
2161por Pan American Health Organization“…The consolidated guidelines include policy recommendations on treatment regimens for isoniazid-resistant TB (Hr-TB) and MDR/RR-TB, including longer and shorter regimens, culture monitoring of patients on treatment, the timing of antiretroviral therapy (ART) in MDR/RR-TB patients infected with the human immunodeficiency virus (HIV), use of surgery for patients receiving MDR-TB treatment, and optimal models of patient support and care…”
Publicado 2020
Libro electrónico -
2162por Lekkerkerker, Henk N. W.“…These include colloid—polymer mixtures, binary colloidal mixtures, and anisotropic particles such as clay platelets, cubes and rod-like viruses. Conceptual explanations are accompanied by experimental and computer simulation results throughout. …”
Publicado 2024
Libro electrónico -
2163por World Health Organization“…The consolidated guidelines include policy recommendations on treatment regimens for isoniazid-resistant TB (Hr-TB) and MDR/RR-TB, including longer and shorter regimens, culture monitoring of patients on treatment, the timing of antiretroviral therapy (ART) in MDR/RR-TB patients infected with the human immunodeficiency virus (HIV), use of surgery for patients receiving MDR-TB treatment, and optimal models of patient support and care…”
Publicado 2019
Libro electrónico -
2164Publicado 2024“…The invented paradigm evolved into Spatial Grasp Technology resulted in European Patent and eight books which were oriented on concrete applications in graph and network theory, defence and social systems, crises management, simulation of global viruses, gestalt theory, collective robotics, space research, and others. …”
Libro electrónico -
2165Publicado 2021“…In this way, we routinely transform reality into things already outside of direct human experience, things we hardly comprehend even as we speak of DNA, climate effects, toxic molecules, and viruses. How do we find ourselves with these disorienting layers of scale? …”
Libro -
2166Publicado 2015“…Topics may include signal transduction pathways and genes/proteins regulating them; different stress stimuli (DNA damage, viruses, metabolic stress, hormones and others); cell cycle checkpoints, DNA repair, autophagy, apoptosis and other forms of cell death; mechanisms of resistance against cytotoxic drugs; novel strategies and drugs that interfere with cellular stress responses; and methods to study cellular stress responses. …”
Libro electrónico -
2167Publicado 2011“…Metasploit: A Penetration Tester's Guide will teach you how to: Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery Use the Meterpreter shell to launch further attacks from inside the network Harness standalone Metasploit utilities, third-party tools, and plug-ins Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. …”
Libro electrónico -
2168Publicado 2017“…For courses in Cryptography, Computer Security, and Network Security The Principles and Practice of Cryptography and Network Security Stallings' Cryptography and Network Security introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. …”
Libro electrónico -
2169Publicado 2015“…., protein and species evolution; niche adaptation, ecology, taxonomy, genomics, metagenomics, horizontal gene transfer, gene regulation; DNA replication, repair and recombination; signal transduction; community assembly and species distribution; astrobiology; biotechnological applications; adaptation to radiation, desiccation, osmotic stress) into a single forum for the integration and synthesis of ideas and data from all three domains of life, and their viruses, yet from a single environment; salt concentrations greater than seawater. …”
Libro electrónico -
2170Publicado 2004“…With the release of Windows XP Service Pack 2 (SP2), Microsoft latest and most reliable corporate desktop operating system now provides better protection against viruses, worms, and malicious hackers. SP2 includes Windows Firewall, Pop-up Blocker for Internet Explorer, and the new Windows Security Center. …”
Libro electrónico -
2171Publicado 2003“…Practically every day, we read about a new type of attack on computer systems and networks. Viruses, worms, denials of service, and password sniffers are attacking all types of systems -- from banks to major e-commerce sites to seemingly impregnable government and military computers --at an alarming rate. …”
Libro electrónico -
2172por Whitaker, Andrew“…The practical guide to simulating, detecting, and responding to network attacks Create step-by-step testing plans Learn to perform social engineering and host reconnaissance Evaluate session hijacking methods Exploit web server vulnerabilities Detect attempts to breach database security Use password crackers to obtain access information Circumvent Intrusion Prevention Systems (IPS) and firewall protections and disrupt the service of routers and switches Scan and penetrate wireless networks Understand the inner workings of Trojan Horses, viruses, and other backdoor applications Test UNIX, Microsoft, and Novell servers for vulnerabilities Learn the root cause of buffer overflows and how to prevent them Perform and prevent Denial of Service attacks Penetration testing is a growing field but there has yet to be a definitive resource that instructs ethical hackers on how to perform a penetration test with the ethics and responsibilities of testing in mind. …”
Publicado 2005
Libro electrónico -
2173Publicado 2019“…Secret military buildups. Hackers and viruses. Weapons deployed in space. China and Russia (and Iran and North Korea) spark news stories here by carrying out bold acts of aggression and violating international laws and norms. …”
Libro -
2174Publicado 2016“…Since the partners frequently belong to different kingdoms, e.g. bacteria, fungi, protists and viruses living in association with animal and plant hosts, their shared “language” should be a basic and ancient form of communication able to effectively blur the boundaries between extremely different living entities. …”
Libro electrónico -
2175Publicado 2020“…This second edition includes: improved R code throughout the text, as well as new procedures, packages and interfaces; updated and additional examples, exercises and projects covering recent developments of computing; an introduction to bivariate discrete distributions together with the R functions used to handle large matrices of conditional probabilities, which are often needed in machine translation; an introduction to linear regression with particular emphasis on its application to machine learning using testing and training data; a new section on spam filtering using Bayes theorem to develop the filters; an extended range of Poisson applications such as network failures, website hits, virus attacks and accessing the cloud; use of new allocation functions in R to deal with hash table collision, server overload and the general allocation problem. …”
Libro electrónico -
2176por Miller, Michael, 1958-“…He walks through setting up a new computer; connecting to the Internet; working with digital media; burning custom CDs; watching DVD movies; using Microsoft Office and other popular software; managing money online; setting up home networks; keeping PCs running reliably; and protecting them from spam, viruses, and spyware. This is the one indispensable book for today's PC novice…”
Publicado 2010
Libro electrónico -
2177por Prowse, David L.“…· Understand PC components, including motherboards, processors, memory, power, storage, audio, video, and I/O devices · Install, configure, maintain, troubleshoot, and fix desktop and notebook PC hardware · Install and configure Windows 7, Windows Vista, and other Windows operating systems · Use Windows utilities to troubleshoot and fix operating system problems · Understand essential networking technologies, devices, protocols, cabling, and connections · Set up small office/home office networks, including Internet and Wi-Fi connections · Troubleshoot and fix failed client-side network connections · Secure computers and networks, identify security problems, and eliminate viruses and malware · Detect and solve the most common printing problems · Perform essential preventive maintenance · Master essential safety and operational procedures for PC technicians · Prepare yourself effectively for exam day CD Features over 200 Practice Questions · Detailed explanations of correct and incorrect answers · Multiple test modes · Random questions and order of answers · Coverage of each A+ exam objective…”
Publicado 2011
Libro electrónico -
2178Publicado 2018“…Take a quick guided tour of everything that’s new in Windows 10 Get the most out of Edge, Microsoft’s modern web browser Navigate the Windows 10 interface (and customize it to make yourself more comfortable) Discover hidden shortcuts and timesavers you’d never find on your own Quickly locate and use files, media, apps, websites, and management tools Connect reliably and safely to networks, the Internet, and Wi-Fi hotspots Increase your efficiency by taking advantage of Windows 10’s virtual desktops Maximize the performance and reliability of your hardware and storage devices Set up a safe and effective network for your home or office Systematically protect yourself from viruses, spyware, snoops, fraud, and spam Use the most convenient and efficient interface for every task: keyboard, touch, pen, or voice Discover tweaks and customizations that are actually worth the effort Get more out of your Windows 10 laptop or tablet on the road Remotely use your Windows 10 computer and data from anywhere on earth Access even more power with Windows 10’s command-line utilities Use Hyper-V, the subsystem for Linux, and Windows containers to run other operating systems alongside Windows Troubleshoot the most common Windows 10 problems–and the toughest ones…”
Libro electrónico -
2179Publicado 2007“…Details security precautions you can take to prevent viruses, protect against malicious programs, and keep email secure. …”
Libro electrónico -
2180Publicado 2017“…Bioactive molecules produced by bacteria, yeasts and virus-infected cells proved to be important for improving or impairing human health. …”
Libro electrónico