Mostrando 2,181 - 2,200 Resultados de 2,220 Para Buscar '"virus"', tiempo de consulta: 0.09s Limitar resultados
  1. 2181
    Publicado 2016
    “…Learn how to · Identify and prioritize potential threats to your network · Use basic networking knowledge to improve security · Get inside the minds of hackers, so you can deter their attacks · Implement a proven layered approach to network security · Resist modern social engineering attacks · Defend against today’s most common Denial of Service (DoS) attacks · Halt viruses, spyware, worms, Trojans, and other malware · Prevent problems arising from malfeasance or ignorance · Choose the best encryption methods for your organization · Compare security technologies, including the latest security appliances · Implement security policies that will work in your environment · Scan your network for vulnerabilities · Evaluate potential security consultants · Master basic computer forensics and know what to do if you’re attacked · Learn how cyberterrorism and information warfare are evolving…”
    Libro electrónico
  2. 2182
    Publicado 2022
    “…What You Will Learn Understand your PC's ecosystem and how to connect the dots, so you can successfully track problems to their source Support home workers using PCs from your organization and family devices, and keep workers productive and online Make your PC safe and secure for family and everyone in your workplace, and ensure that data is kept secure from loss or attack Understand the threat from malware and viruses and a range of approaches to dealing with them, depending on the situation Know tips and tricks for researching difficult problems, including third-party tools and useful web resources Who This Book Is For Anyone using Windows 10 on a desktop, laptop, or hybrid device…”
    Libro electrónico
  3. 2183
    Publicado 2015
    “…Next, we'll show you cryptographic algorithms that can be used during forensic investigations to check for known files or to compare suspicious files with online services such as VirusTotal or Mobile-Sandbox. Moving on, you'll learn how to sniff on the network, generate and analyze network flows, and perform log correlation with the help of Python scripts and tools. …”
    Libro electrónico
  4. 2184
    Publicado 2018
    “…Aus dem Inhalt: Metasploit: Hintergrund und Historie Kali-Linux-Umgebung aufsetzen Pentesting-Grundlagen Schwachstellen und Exploits Nmap-Exkurs Metasploit-Basics Metasploit in der Verteidigung Hacking-Praxisbeispiele Anti-Virus-Evasion Nessus-Schwachstellenscanner Glossar…”
    Libro electrónico
  5. 2185
    Publicado 2016
    “…What You Will Learn See how to deploy CentOS easily and painlessly, even in multi-server environments Configure various methods of remote access to the server so you don't always have to be in the data center Make changes to the default configuration of many services to harden them and increase the security of the system Learn to manage DNS, emails and web servers Protect yourself from threats by monitoring and logging network intrusion and system intrusion attempts, rootkits, and viruses Take advantage of today's powerful hardware by running multiple systems using virtualization In Detail CentOS is derived from Red Hat Enterprise Linux (RHEL) sources and is widely used as a Linux server. …”
    Libro electrónico
  6. 2186
    Publicado 2013
    “…Deals with Intrusion Detection System against worm/virus cyber attacks The book ideal for advanced undergraduate and postgraduate students enrolled in courses such as Wireless Access Networking, Mobile Internet Radio Communications. …”
    Libro electrónico
  7. 2187
    Publicado 2014
    “…Though stories of WWII spying and codebreaking may seem worlds apart from social media security, computer viruses, and Internet surveillance, this book offers timeless lessons that may help today’s leaders avoid making the same mistakes that have helped bring at least one global power to its knees.The book includes a Foreword written by Bruce Schneier…”
    Libro electrónico
  8. 2188
    Publicado 2018
    “…What You Will Learn Develop advanced and sophisticated auxiliary modules Port exploits from PERL, Python, and many more programming languages Test services such as databases, SCADA, and many more Attack the client side with highly advanced techniques Test mobile and tablet devices with Metasploit Bypass modern protections such as an AntiVirus and IDS with Metasploit Simulate attacks on web servers and systems with Armitage GUI Script attacks in Armitage using CORTANA scripting In Detail We start by reminding you about the basic functionalities of Metasploit and its use in the most traditional ways. …”
    Libro electrónico
  9. 2189
    Publicado 2012
    “…Coverage includes Understanding threats, vulnerabilities, and countermeasures Knowing when security is useful, and when it’s useless “security theater” Implementing effective identification and authentication systems Using modern cryptography and overcoming weaknesses in cryptographic systems Protecting against malicious code: viruses, Trojans, worms, rootkits, keyloggers, and more Understanding, preventing, and mitigating DOS and DDOS attacks Architecting more secure wired and wireless networks Building more secure application software and operating systems through more solid designs and layered protection Protecting identities and enforcing privacy Addressing computer threats in critical areas such as cloud comp..…”
    Libro electrónico
  10. 2190
    por Villoro, Juan, 1956-
    Publicado 2020
    “…Después, aspiras a que el público y la crítica compartan ese planeta, a que los primeros estén ahí sin toser a causa de los virus de la Tierra y a que los segundos carezcan de una destructiva misión secreta». …”
    Libro
  11. 2191
    Publicado 2021
    “…El individualismo en nuestras sociedades se ha convertido en el virus más difícil de vencer. Y, sin duda, la mejor estrategia consistirá siempre en ser fieles a nuestra naturaleza vulnerable y necesitada de relacionalidad, fieles a nuestra esencia fraterna." -- Publisher's website…”
    Libro electrónico
  12. 2192
    Publicado 2018
    “….; rheumatoid arthritis, Bliddal et al.; Hepatitis C Virus and mixed cryoglobulinemia, Ferri et al.; and, psoriathic arthritis, Ruffilli et al.). …”
    Libro electrónico
  13. 2193
    por Knittel, Brian
    Publicado 2013
    “…• Take a quick guided tour of everything that’s new in Windows 8 • Survive without the Start menu • Navigate the new Windows 8 interface (and customize it to make yourself more comfortable) • Learn hidden shortcuts you’d never find on your own • Quickly locate and use files, media, apps, websites, and management tools • Set up your Web connection, and discover Internet Explorer 10’s latest improvements • Get comfortable with Windows 8’s built-in apps, from Calendar and Finance to Weather and Windows Store • Save time by monitoring Facebook, Twitter, and LinkedIn through one unified app • Make the most of Windows 8’s supercharged media and imaging tools • Profit from Windows 8’s built-in support for business presentations • Maximize the performance and efficiency of hardware, storage, and software • Protect yourself from viruses, spyware, data theft, fraud, spam, hackers, and snoops • Use SkyDrive to access your data from anywhere—and use Remote Desktop to access your computer, too • Get even more power with Windows 8’s command-line interface • Use Hyper-V to run other operating systems alongside Windows 8 • Troubleshoot the most common Windows 8 problems—and the toughest ones In Depth offers: • Comprehensive coverage, with detailed solutions • Breakthrough techniques and shortcuts that are unavailable elsewhere • Practical, real-world examples with nothing glossed over or left out • Troubleshooting help for tough problems you can’t fix on your own • Outstanding authors recognized worldwide for their expertise and teaching style • Quick information via sidebars, tips, reminders, notes, and warnings In Depth is the only tool you need to get more done in less time! …”
    Libro electrónico
  14. 2194
    Publicado 2023
    “…Learn how to deal with account hacks, data. breaches and viruses. Understand how computers, the internet, VPNs and encryption really work And much more!…”
    Libro electrónico
  15. 2195
    por Sullivan, Chad
    Publicado 2005
    “…At the endpoint, the deployment of a host IPS provides protection against both worms and viruses. Rather than focusing exclusively on reconnaissance phases of network attacks a host IPS approaches the problem from the other direction, preventing malicious activity on the host by focusing on behavior. …”
    Libro electrónico
  16. 2196
    Publicado 2007
    “…You’ll learn how to: • Recognize dangerous limitations in conventional endpoint security strategies • Identify the best products, tools, and processes to secure your specific devices and infrastructure • Configure new endpoints securely and reconfigure existing endpoints to optimize security • Rapidly identify and remediate compromised endpoint devices • Systematically defend against new endpoint-focused malware and viruses • Improve security at the point of integration between endpoints and your network Whether you’re a security engineer, consultant, administrator, architect, manager, or CSO, this book delivers what you’ve been searching for: a comprehensive endpoint security strategy that works. …”
    Libro electrónico
  17. 2197
    por Halleen, Gary, Kellogg, Greg
    Publicado 2007
    “…An even greater number of automated attacks from worms and viruses stress the same devices. The sheer volume of log messages or events generated by these attacks and probes, combined with the complexity of an analyst needing to use multiple monitoring tools, often makes it impossible to adequately investigate what is happening. …”
    Libro electrónico
  18. 2198
    por Seethaler, Sherry, 1970-
    Publicado 2010
    “…Your body’s oddities: knees to knuckles, itches to sneezes Surprising facts about how your body grows and works Our ingenious inventions The past, present, and future of our relentless human inventiveness Pesky pathogens: viruses, bacteria, and prions How they keep outsmarting us, and why it’s so hard to stay healthy Common chemical concoctions The science behind the everyday products that have transformed our lives Uniquely human: how we got here, how we’re unique New lessons from genetics, archaeology, and evolutionary biology…”
    Libro electrónico
  19. 2199
    Publicado 2012
    “…Here’s a small sample of what you’ll learn: • Discover Windows 8’s whole new approach to running a computer • Run Windows 8 the way that’s easiest for you: mouse, touch, or keyboard • Find and use the old Windows Desktop along with all your favorite Windows XP and 7 programs • Get online with Internet Explorer® 10 and master its new tools and shortcuts • Set up your home network, printer, and other devices • Master quick, easy new ways to use Facebook, Twitter, and LinkedIn® • Safeguard your personal information and keep it private • Enjoy all your digital photos, videos, movies, and music • Connect with anyone through email, messaging, and video chat • Discover and play new Windows 8 games, and use Windows to control your Xbox 360 • Manage even the most gigantic collections of data and media • Automatically back up your information to external drives, DVDs, or Microsoft SkyDrive® • Fix problems, protect yourself from viruses, and keep Windows 8 working reliably Paul Sanna is the author of almost two dozen computer books on topics such as Microsoft Windows, Internet Explorer, and Windows security. …”
    Libro electrónico
  20. 2200
    por Knittel, Brian
    Publicado 2014
    “…• Take a quick guided tour of everything that’s new in Windows 8.1 • Survive without the Start menu • Navigate the Windows 8.1 interface (and customize it to make yourself more comfortable) • Learn hidden shortcuts you’d never find on your own • Quickly locate and use files, media, apps, websites and management tools • Set up your Web connection, and discover Internet Explorer 11’s latest improvements • Get comfortable with Windows 8.1’s built-in apps, from Calendar and Finance to Weather and Windows Store • Save time by monitoring Facebook, Twitter, and LinkedIn through one unified app • Make the most of Windows’ supercharged media and imaging tools • Profit from Windows’ built-in support for business presentations • Maximize the performance and efficiency of hardware, storage, and software • Protect yourself from viruses, spyware, data theft, fraud, spam, hackers, and snoops • Use SkyDrive to access your data from anywhere—and use Remote Desktop to access your computer, too • Get even more power with Windows 8.1’s command-line interface • Use Hyper-V to run other operating systems alongside Windows • Troubleshoot the most common Windows 8.1’s problems—and the toughest ones In Depth offers: • Comprehensive coverage, with detailed solutions • Breakthrough techniques and shortcuts that are unavailable elsewhere • Practical, real-world examples with nothing glossed over or left out • Troubleshooting help for tough problems you can’t fix on your own • Outstanding authors recognized worldwide for their expertise and teaching styles • Quick information via sidebars, tips, reminders, notes, and warnings In Depth is the only tool you need to get more done in less time! …”
    Libro electrónico