Mostrando 1,921 - 1,940 Resultados de 2,220 Para Buscar '"virus"', tiempo de consulta: 0.11s Limitar resultados
  1. 1921
    Publicado 2012
    Tabla de Contenidos: “…Spear Phishing and Whaling -- Vishing -- Smishing -- Pharming -- Social Networking Attacks -- Raising User Awareness Through Training -- Questions -- Answers -- Chapter 6 Malicious Code and Activity -- Identifying Malicious Code -- Virus -- Worm -- Trojan Horse -- Logic Bomb -- Keylogger -- Rootkits -- Mobile Code -- Trapdoors and Backdoors -- Spyware -- Malware Hoaxes -- Understanding Malicious Web Activity -- Software Security -- Injection -- Cross Site Scripting -- Cross Site Request Forgery -- Implementing Malicious Code Countermeasures -- Antivirus Software -- Keeping AV Signatures Up to Date -- Keep Operating Systems Up to Date -- Spam Filters -- Content-Filtering Appliances -- Least Privilege -- Educate Users -- Beware of Shortened Links -- Sign Up for E-mail Alerts -- Common Vulnerabilities and Exposures -- Questions -- Answers -- Chapter 7 Risk, Response, and Recovery -- Defining Risk -- Identifying Threats -- Understanding Vulnerabilities -- Understanding Impact -- Managing Risk -- Residual Risk -- Identifying Assets -- Performing Risk Assessments -- Risk Assessment Steps -- Quantitative Analysis -- Qualitative Analysis -- Address Findings -- Responding to Incidents -- Preparation -- Detection and Analysis -- Containment, Eradication, and Recovery -- Post-incident Activity -- Questions -- Answers -- Chapter 8 Monitoring and Analysis -- Intrusion Detection Systems -- IDS Alerts -- Network-based Intrusion Detection Systems -- Host-based Intrusion Detection Systems -- Intrusion Prevention Systems -- Detection Methods -- Detection Systems and Logs -- Detecting Unauthorized Changes -- SEMs, SIMs, and SIEMs -- Security Assessments -- Vulnerability Assessments -- Penetration Tests -- Questions -- Answers -- Chapter 9 Controls and Countermeasures -- Using Controls, Safeguards, and Countermeasures -- Understanding the Goals of Controls -- Preventive…”
    Libro electrónico
  2. 1922
    Publicado 2004
    Tabla de Contenidos: “…3.6.4 Ximian Evolution -- 3.6.5 Mozilla Mail -- 3.6.6 KMail -- 3.7 Virus detection and prevention -- 3.8 Manageability -- 3.8.1 Telnet -- 3.8.2 SSH -- 3.8.3 Hummingbird Exceed -- 3.8.4 Reflection X -- 3.8.5 Webmin -- 3.8.6 VNC -- 3.9 File systems -- 3.10 Financial device support -- 3.11 Summary -- Chapter 4. …”
    Libro electrónico
  3. 1923
  4. 1924
    por World Health Organization
    Publicado 2022
    Tabla de Contenidos: “…Microbial fact sheets -- 11.1 Bacterial pathogens -- Acinetobacter -- Aeromonas -- Burkholderia pseudomallei -- Campylobacter -- Enterobacter sakazakii -- Escherichia coli pathogenic strains -- Helicobacter pylori -- Klebsiella -- Legionella -- Leptospira -- Mycobacterium -- Pseudomonas aeruginosa -- Salmonella -- Shigella -- Staphylococcus aureus -- Tsukamurella -- Vibrio -- Yersinia -- 11.2 Viral pathogens -- Adenoviruses -- Astroviruses -- Caliciviruses -- Enteroviruses -- Hepatitis A virus -- Hepatitis E virus -- Rotaviruses and orthoreoviruses -- 11.3 Protozoan pathogens -- Acanthamoeba -- Balantidium coli -- Blastocystis…”
    Libro electrónico
  5. 1925
    por Chakraverty, Snehashish
    Publicado 2024
    Tabla de Contenidos: “…9 A dynamical study of the fractional order King Cobra model -- 9.1 Introduction -- 9.2 Basic definitions -- 9.3 Mathematical model -- Stability analysis of the iteration approach -- 9.3.1 Numerical technique for the Caputo model -- 9.4 King Cobra model with fractional conformable derivative -- 9.4.1 Numerical approach for the fractional conformable derivative -- 9.5 Numerical simulation -- 9.6 Conclusion -- References -- 10 The fractional perturbed nonlinear Schrödinger equation in nanofibers: soliton solutions and dynamical behaviors -- 10.1 Introduction -- 10.2 Conformable derivative -- 10.3 Mathematical analysis of the model -- 10.4 Implementation of the exp(−Φ(ξ))-expansion method -- 10.4.1 Kerr law nonlinearity -- 10.4.2 Parabolic law nonlinearity -- 10.4.3 Power-law nonlinearity -- 10.5 Dynamical behaviors -- 10.6 Conclusions -- References -- 11 On some recent advances in fractional order modeling in engineering and science -- 11.1 Introduction -- 11.2 Preliminaries and fundamentals -- 11.3 Fractional COVID-19 model -- 11.3.1 COVID-19 model formulation -- 11.3.2 Vieta-Lucas shifted polynomials -- 11.3.3 Simulation of the model (11.3.1.2) -- 11.3.4 Symmetry and invariance of COVID-19 model -- 11.3.5 Simulation outcomes for model (11.3.1.2) -- 11.4 Modeling of the nonlinear fractional Zika model -- 11.4.1 Zika virus model formulation -- 11.4.2 Basic definitions of fractional Sumudu transform -- 11.4.3 Homotopy Sumudu transform method -- 11.4.4 Symmetry, invariance, and dissipation of the nonlinear fractional Zika model -- 11.4.5 Optimal control for fractional order network model for Zika virus -- 11.4.6 Numerical simulation and outcomes -- 11.5 Conclusion -- References -- 12 Symbolic computations for exact solutions of fractional partial differential equations with reaction term -- 12.1 Introduction -- 12.2 Methods…”
    Libro electrónico
  6. 1926
    Publicado 2020
    Tabla de Contenidos: “…PART I: Basic Science of Pulmonary Development and Pulmonary Arterial Disease -- 1 Perspective for Part I -- 2 The alveolar stem cell niche of the mammalian lung -- 3 Lung development and Notch signalling -- 4 Specialized smooth muscle cell progenitors in pulmonary hypertension -- 5 Diverse Pharmacology of Prostacyclin Mimetics: Implications for Pulmonary Hypertension -- 6 Endothelial-to-mesenchymal transition in pulmonary hypertension -- 7 Extracellular vesicles, MicroRNAs and Pulmonary Hypertension -- 8 Roles of Tbx4 in the lung mesenchyme for airway and vascular development -- 9 A lacZ reporter transgenic mouse line revealing the development of pulmonary artery -- 10 Roles of stem cell antigen-1 in the pulmonary endothelium -- 11 Morphological characterization of pulmonary microvascular disease in bronchopulmonary dysplasia caused by hyperoxia in newborn mice -- 12 Involvement of CXCR4 and stem cells in a rat model of pulmonary arterial hypertension -- 13 Ca2+ signal through inositol trisphosphate receptors for cardiovascular development and pathophysiology of pulmonary arterial hypertension -- PART II: Abnormal pulmonary circulation in the developing lung and heart -- 14 Perspective for Part II -- 15 Pathophysiology of Pulmonary Circulation in Congenital Heart Disease -- 16 Development of Novel Therapies for Pulmonary Hypertension by Clinical Application of Basic Research -- 17 Using Patient-Specific Induced Pluripotent Stem Cells to Understand and Treat Pulmonary Arterial Hypertension -- 18 Modeling pulmonary arterial hypertension using induced pluripotent stem cells -- 19 Dysfunction and restoration of endothelial cell communications in Pulmonary Arterial Hypertension: Therapeutic implications -- 20 Inflammatory Cytokines in the Pathogenesis of Pulmonary Arterial Hypertension -- 21 Genotypes and Phenotypes of Chinese Pediatric Patients with Idiopathic and Heritable Pulmonary Arterial Hypertension- Experiences from A Single Center -- 22 Fundamental Insight into Pulmonary Vascular Disease : Perspectives from Pediatric PAH in Japan -- 23 Risk stratification in paediatric pulmonary arterial hypertension -- 24 The Adaptive Right Ventricle in Eisenmenger Syndrome: Potential Therapeutic Targets for Pulmonary Hypertension -- 25 Impaired right coronary vasodilator function in pulmonary hypertensive rat assessed by in vivo synchrotron microangiography -- 26 Relationship between mutations in ENG and ALK1 gene and the affected organs in hereditary hemorrhagic telangiectasia -- 27 A genetic analysis for patients with pulmonary arterial hypertension -- 28 Evaluation and visualization of right ventricle using three dimensional echocardiography -- 29 Pulmonary hypertension associated with post-operative Tetralogy of Fallot -- 30 Microscopic Lung Airway Abnormality and Pulmonary Vascular Disease Associated with Congenital Systemic to Pulmonary Shunt -- 31 Respiratory syncytial virus infection in infants with heart and lung diseases -- PART III: Ductus arteriosus: bridge over troubled vessels -- 32 Perspective for Part III -- 33 The ductus arteriosus, a vascular outsider, in relation to the pulmonary circulation -- 34 Molecular, genetic, and pharmacological modulation of the ductus arteriosus: KATP channels as novel drug targets -- 35 New mediators in the biology of the ductus arteriosus: Lessons from the chicken embryo -- 36 Constriction of the Ductus Arteriosus with KATP Channel Inhibitors -- 37 New insights on how to treat patent ductus arteriosus -- 38 Antenatal Administration of Betamethasone Contributes to Intimal thickening of the Ductus Arteriosus -- 39 Prostaglandin E-EP4-mediated fibulin-1 up-regulation plays a role in intimal thickening of the ductus arteriosus -- 40 Transcriptional profiles in the chicken ductus arteriosus during hatching -- 41 Inhibition of Cyclooxygenase Contracts Chicken Ductus Arteriosus -- 42 Prostaglandin E2 receptor EP4 inhibition constricts the rat ductus arteriosus -- 43 Dilatation of the Ductus Arteriosus by Diazoxide in Fetal and Neonatal Rats -- 44 The Effect of Long-term Administration of Plostaglandin E1 on Morphological Changes in Ductus Arteriosus -- 45 Significance of SGK1 as a protein kinase transcriptionally regulated by ALK1 signaling in vascular endothelial cells -- 46 Fabrication of Implantable Human Arterial Graft by Periodic Hydrostatic Pressure -- 47 Optimum preparation of Candida albicans cell wall extra (CAWE) for the mouse model of Kawasaki disease -- PART IV: Development and Regeneration of the Cardiovascular System -- 48 Perspective for Part IV -- 49 Advances in the second heart field -- 50 Novel cardiac progenitors for all components of the heart except for the right ventricle -- 51 Regional and TBX5-dependent gene expression in the atria: Implications for pulmonary vein development and atrial fibrillation -- 52 The Endocardium as a Master Regulator of Ventricular Trabeculation -- 53 The Role of Alternative mRNA Splicing in Heart Development -- 54 Progress in the Generation of Multiple Lineage Human-iPSC-derived 3D Engineered Cardiac Tissues for Cardiac Repair -- 55 Quantification of contractility in stem cell derived cardiomyocytes -- 56 A neurotrophic factor receptor GFRA2, a specific surface antigen for cardiac progenitor cells, regulates the process of myocardial compaction -- 57 Cardiac cell specification and differentiation by the defined factors -- 58 A Temporo-Spatial Regulation of Sema3c is Essential for Interaction of Progenitor Cells during Cardiac Outflow Tract Development -- 59 Spatiotemporally restricted developmental alterations in the anterior and secondary heart fields cause distinct conotruncal heart defects -- 60 Significance of transcription factors in the mechanisms of great artery malformations -- 61 The different c-kit expression in human induced pluripotent stem (iPS) cells between with feeder cells and without feeder cells -- 62 Establishment of induced pluripotent stem cells from immortalized B cell lines and their differentiation into cardiomyocytes -- 63 Establishment of an in vitro LQT3 model, using induced pluripotent stem cells from LQT3 patient-derived cardiomyocytes -- 64 Genetic Assessments for clinical courses of Left ventricle noncompaction -- 65 Elucidating the pathogenesis of congenital heart disease in the era of next-generation sequencing…”
    Libro electrónico
  7. 1927
    Publicado 2012
    Tabla de Contenidos: “…Analgesia, Anesthesia, and Surgery -- Treatment Protocols and Formulary -- The Future -- Acknowledgments -- Some Websites Relating to Insects and their Study -- Chapter 16 HONEYBEES -- Introduction -- Natural History and Taxonomy -- Anatomy -- Introduction to Honeybee Pathology -- Environmental Disorders -- Viruses and Honeybees -- Bacterial Diseases -- Parasitic Diseases -- Fungal Disease -- Predators and Enemies of Colonies and Hives -- Acknowledgments -- Chapter 17 BUTTERFLY HOUSES -- Introduction -- Purpose Value and Justifications -- Legal Status of Butterfly Houses -- Design and Management -- Breeding -- Staff -- Health and Safety and Risk Assessment -- Disease Exclusion and Control -- Education, Research, and Conservation Activities -- Other Types of Invertebrate Management -- Acknowledgments -- Additional Resource -- Chapter 18 NEMATODES -- Natural History and Taxonomy -- Anatomy and Physiology -- Environmental Disorders and Preventive Medicine -- Infectious Diseases -- Neoplasia -- Miscellaneous Disorders -- Anesthesia, Analgesia, and Surgery -- Miscellaneous -- Treatment Protocols and Formulary -- Chapter 19 CHAETOGNATHS (ARROWWORMS) -- Natural History and Taxonomy -- Anatomy -- Physiology -- Environmental Disorders -- Infectious Diseases -- Neoplasia -- Miscellaneous Disorders -- Analgesia, Anesthesia, and Surgery -- Treatment Protocols and Formulary -- Chapter 20 ECHINODERMS -- Natural History and Taxonomy -- Anatomy and Physiology -- Environmental Disorders and Preventive Medicine -- Infectious Diseases -- Neoplasia -- Miscellaneous Conditions -- Clinical Procedures -- Treatment Protocols -- Human and Animal Health Hazards -- Chapter 21 UROCHORDATES -- Introduction -- Natural History and Taxonomy -- Anatomy and Physiology -- Infectious Diseases -- Cup Cell Disease -- Miscellaneous Conditions…”
    Libro electrónico
  8. 1928
    por Okereafor, Kenneth
    Publicado 2021
    Tabla de Contenidos: “…Ransomware -- 4.4.7. Computer Virus -- 4.4.8. Adware and Spyware -- 4.4.9. Computer Worm -- 4.4.10. …”
    Libro electrónico
  9. 1929
    Publicado 2017
    Tabla de Contenidos: “…. -- Going hunting for viruses -- Getting started -- How to do it... -- How it works... -- Gathering intel -- Getting started -- How to do it... -- How it works... -- Totally passive -- Getting started -- How to do it... -- How it works... -- Chapter 6: Reading Emails and Taking Names Recipes -- Introduction -- Parsing EML files -- Getting started -- How to do it... -- How it works... -- Viewing MSG files -- Getting started -- How to do it…”
    Libro electrónico
  10. 1930
    Publicado 2024
    Tabla de Contenidos: “…Health Care -- Lean the Virus -- Lack of a System to Face a Global Pandemic -- An Unlean Non-System -- Wasted Expertise and Effort -- Universality Applied to Health Care -- What Would a Cohesive Health Care System Look Like? …”
    Libro electrónico
  11. 1931
    por Institute of Medicine (U.S.).
    Publicado 1997
    Tabla de Contenidos: “…Appendix: Maternal and Child Health Care and Computer-Based Patient Records -- 5 Improving Patient Records: Conclusions and Recommendations -- CONCLUSIONS -- RECOMMENDATIONS -- Data Acquisition -- Data and Security Standards -- Data Standards -- Security Standards -- Networking Support -- Cost-Benefit Analysis -- Quality Assurance -- Structure and Format of the Patient Record -- SUMMARY -- Appendix A Subcommittees -- USERS AND USES SUBCOMMITTEE MEMBERS -- TECHNOLOGY SUBCOMMITTEE MEMBERS -- STRATEGY AND IMPLEMENTATION SUBCOMMITTEE -- Appendix B Legal Aspects of Computer-based Patient Records and Record Systems -- STATE LICENSURE LAWS -- Hospital Licensure Laws as Barriers to Full Automation -- Other State Licensure Laws -- Medicare Regulations -- Hospital Accreditation Requirements -- PATIENT RIGHTS ISSUES -- Right of Privacy -- Right of Access to Health Records -- Ownership of Patient Data and of the Patient Record -- Ownership of the Patient Record -- Rights in Information Contained in the Record -- EVIDENTIARY ISSUES -- Importance of Admissibility of Patient Records as Evidence -- Rule Against Hearsay -- Definition of Hearsay -- Business Records Exception -- Best Evidence Rule -- RISKS ARISING FROM COMPUTER-BASED PATIENT RECORD SYSTEMS -- Breaches of Confidentiality and Unauthorized Access -- Computer Viruses and Other Computer Sabotage -- Potential for Inaccessibility -- Questions of Durability -- Accuracy Issues -- Selected Legal Issues in Computer Contracting -- OVERCOMING LEGAL BARRIERS TO COMPUTER-BASED PATIENT RECORDS AND RECORD SYSTEMS -- Adoption of Uniform National Licensure Standards and Health Information Laws -- Overcoming Special Legal Risks Related to Computer-based Patient Records -- CONCLUSION -- Index…”
    Libro electrónico
  12. 1932
    por Pac Salas, David
    Publicado 2020
    Tabla de Contenidos: “…UN FENÓMENO INABARCABLE CARACTERIZADO POR LA INCERTIDUMBRE -- 16.4. EL VIRUS SE EXTIENDE POR LAS LÍNEAS VISIBLES E INVISIBLES DE LA INTERACCIÓN SOCIAL -- 16.5. …”
    Libro electrónico
  13. 1933
    por Grant, Rickford
    Publicado 2010
    Tabla de Contenidos: “…-- The First Line of Defense -- Software Firewalls -- ClamAV: Antivirus Software, Linux Style -- Project 19A: Virus Scanning with avast! -- Project 19B: Encrypting Your Files -- Project 19C: Shredding Documents Digitally -- 20: A Colony of Penguins - The Ubuntu Community -- Take Me to Your SABDFL -- Launchpad: Your Passport to the Ubuntu Community -- Bugs, Bugs, Glorious Bugs -- Sharing Ideas on How to Improve Ubuntu -- The Ubuntu Forums -- Chatting on IRC -- Keeping Up with the News -- LoCos and LUGs -- Stickers and Other Goodies -- Getting Involved -- 21: Wounded Wings - Fixing Common Problems -- I Can't Get Ubuntu Installed -- Something Goes Wrong Before Ubuntu Finishes Booting -- Sound and Video Problems -- Internet and Network Connection Problems -- Problems with the Display and Graphics Cards -- Hard Disks and Storage Problems -- Software Installation Problems -- Common Problems with Applications -- My Computer Is Running Slowly -- Lost Files -- Where Can I Go to Get More Help? …”
    Libro electrónico
  14. 1934
    Publicado 2015
    “…New topics in the book include vLANs, setting up RRAS, anti-virus installs, key management, moving from plaintext to encrypted values in an existing application, securing Analysis Services Objects, Managed Service Accounts, OS rights needed by the DBA, SQL Agent Security, Table Permissions, Views, Stored Procedures, Functions, Service Broker Objects, and much more. …”
    Libro electrónico
  15. 1935
    Publicado 2023
    Tabla de Contenidos: “…The Windows Security Center -- Virus and Threat Protection -- Excluded Items -- Controlled Folder Access -- Reputation-Based Protection -- Exploit Protection -- Device Security -- Protection History -- The Windows Advanced Firewall -- Troubleshooting and Repairing the Windows Firewall -- Summary -- Chapter 4: Configuring Windows 11 -- Using Group Policy to Manage Configuration and Settings -- Hiding Settings -- Hiding Control Panel Items and Windows Tools -- Using the Registry to Restrict Windows Tools Access -- Managing Programs and Apps -- Managing User Accounts -- Local vs. …”
    Libro electrónico
  16. 1936
    Publicado 2023
    Tabla de Contenidos: “…Empire -- Inveigh -- PowerUpSQL -- AADInternals -- Red team cookbook -- Reconnaissance -- Execution -- Persistence -- Defense evasion -- Credential access -- Discovery -- Lateral movement -- Command and Control (C2) -- Exfiltration -- Impact -- Summary -- Further reading -- Chapter 9: Blue Team Tasks and Cookbook -- Technical requirements -- Protect, detect, and respond -- Protection -- Detection -- Response -- Common PowerShell blue team tools -- PSGumshoe -- PowerShellArsenal -- AtomicTestHarnesses -- PowerForensics -- NtObjectManager -- DSInternals -- PSScriptAnalyzer and InjectionHunter -- Revoke-Obfuscation -- Posh-VirusTotal -- EventList -- JEAnalyzer -- Blue team cookbook -- Checking for installed updates -- Checking for missing updates -- Reviewing the PowerShell history of all users -- Inspecting the event log of a remote host -- Monitoring to bypass powershell.exe -- Getting specific firewall rules -- Allowing PowerShell communication only for private IP address ranges -- Isolating a compromised system -- Checking out installed software remotely -- Starting a transcript -- Checking for expired certificates -- Checking the digital signature of a file or a script -- Checking file permissions of files and folders -- Displaying all running services -- Stopping a service -- Displaying all processes -- Stopping a process -- Disabling a local account -- Enabling a local account -- Disabling a domain account -- Enabling a domain account -- Retrieving all recently created domain users -- Checking whether a specific port is open -- Showing TCP connections and their initiating processes -- Showing UDP connections and their initiating processes -- Searching for downgrade attacks using the Windows event log -- Preventing downgrade attacks -- Summary -- Further reading -- Part 3: Securing PowerShell - Effective Mitigations In Detail…”
    Libro electrónico
  17. 1937
    Publicado 2018
    Tabla de Contenidos: “…. -- How it works... -- Checking for viruses in Windows Server 2016 -- Getting ready…”
    Libro electrónico
  18. 1938
    Publicado 2021
    Tabla de Contenidos: “…Chapter 4 Footprinting and Reconnaissance -- Open Source Intelligence -- Companies -- People -- Social Networking -- Domain Name System -- Name Lookups -- Zone Transfers -- Passive DNS -- Passive Reconnaissance -- Website Intelligence -- Technology Intelligence -- Google Hacking -- Internet of Things (IoT) -- Summary -- Review Questions -- Chapter 5 Scanning Networks -- Ping Sweeps -- Using fping -- Using MegaPing -- Port Scanning -- Nmap -- masscan -- MegaPing -- Metasploit -- Vulnerability Scanning -- OpenVAS -- Nessus -- Looking for Vulnerabilities with Metasploit -- Packet Crafting and Manipulation -- hping -- packETH -- fragroute -- Evasion Techniques -- Protecting and Detecting -- Summary -- Review Questions -- Chapter 6 Enumeration -- Service Enumeration -- Remote Procedure Calls -- SunRPC -- Remote Method Invocation -- Server Message Block -- Built-in Utilities -- nmap Scripts -- NetBIOS Enumerator -- Metasploit -- Other Utilities -- Simple Network Management Protocol -- Simple Mail Transfer Protocol -- Web-Based Enumeration -- Summary -- Review Questions -- Chapter 7 System Hacking -- Searching for Exploits -- System Compromise -- Metasploit Modules -- Exploit-DB -- Gathering Passwords -- Password Cracking -- John the Ripper -- Rainbow Tables -- Kerberoasting -- Client-Side Vulnerabilities -- Living Off the Land -- Fuzzing -- Post Exploitation -- Evasion -- Privilege Escalation -- Pivoting -- Persistence -- Covering Tracks -- Summary -- Review Questions -- Chapter 8 Malware -- Malware Types -- Virus -- Worm -- Trojan -- Botnet -- Ransomware -- Dropper -- Malware Analysis -- Static Analysis -- Dynamic Analysis -- Creating Malware -- Writing Your Own -- Using Metasploit -- Obfuscating -- Malware Infrastructure -- Antivirus Solutions -- Persistence -- Summary -- Review Questions -- Chapter 9 Sniffing -- Packet Capture -- tcpdump -- tshark…”
    Libro electrónico
  19. 1939
    Publicado 2016
    Tabla de Contenidos: “…A Breakout Board for Beginners -- The Desktop Novena's Power Pass-Through Board -- Custom Battery Pack Problems -- Choosing a Hard Drive -- Finalizing Firmware -- Building a Community -- Closing Thoughts -- Chapter 8. chibitronics: creating circuit stickers -- Crafting with Circuits -- Developing a New Process -- Visiting the Factory -- Performing a Process Capability Test -- Delivering on a Promise -- Why On-Time Delivery Is Important -- Lessons Learned -- Not All Simple Requests Are Simple for Everyone -- Never Skip a Check Plot -- If a Component Can Be Placed Incorrectly, It Will Be -- Some Concepts Don't Translate into Chinese Well -- Eliminate Single Points of Failure -- Some Last-Minute Changes Are Worth It -- Chinese New Year Impacts the Supply Chain -- Shipping Is Expensive and Difficult -- You're Not Out of the Woods Until You Ship -- Closing Thoughts -- part 4: a hacker's perspective -- Chapter 9. hardware hacking -- Hacking the PIC18F1320 -- Decapping the IC -- Taking a Closer Look -- Erasing the Flash Memory -- Erasing the Security Bits -- Protecting the Other Data -- Hacking SD Cards -- How SD Cards Work -- Reverse Engineering the Card's Microcontroller -- Potential Security Issues -- A Resource for Hobbyists -- Hacking HDCP-Secured Links to Allow Custom Overlays -- Background and Context -- How NeTV Worked -- Hacking a Shanzhai Phone -- The System Architecture -- Reverse Engineering the Boot Structure -- Building a Beachhead -- Attaching a Debugger -- Booting an OS -- Building a New Toolchain -- Fernvale Results -- Closing Thoughts -- Chapter 10. biology and bioinformatics -- Comparing H1N1 to a Computer Virus -- DNA and RNA as Bits -- Organisms Have Unique Access Ports -- Hacking Swine Flu -- Adaptable Influenza -- A Silver Lining -- Reverse Engineering Superbugs -- The O104:H4 DNA Sequence -- Reversing Tools for Biology…”
    Libro electrónico
  20. 1940
    Publicado 1990
    Tabla de Contenidos: “…Reduce Unexplained Variations in Medical Practice -- Affect Policy Decisions -- Enhance the national capacity for technology assessment -- Chronic Obstructive Pulmonary Disease -- Improve Individual Patient Outcome -- Affect a Large Patient Population -- Reduce Unit or Aggregate Cost -- Reduce Unexplained Variations in Medical Practice -- Address Social and Ethical Implications -- Enhance the National Capacity for Technology Assessment -- Coronary Artery Disease -- Improve Individual Patient Outcome -- Affect a Large Patient Population -- Reduce Unit or Aggregate Cost -- Reduce Unexplained Variations in Medical Practice -- Advance Medical Knowledge -- Gallbladder Disease -- Improve Individual Patient Outcome -- Affect a Large Patient Population -- Reduce Unit or Aggregate Cost -- Reduce Unexplained Variations in Medical Practice -- Advance Medical Knowledge -- Gastrointestinal Bleeding -- Improve Individual Patient Outcome -- Affect a Large Patient Population -- Reduce Unit or Aggregate Cost -- Reduce Unexplained Variations in Medical Practice -- Affect Policy Decisions -- Human Immunodeficiency Virus Infection -- Improve Individual Patient Outcome -- Affect a Large Patient Population -- Reduce Unit or Aggregate Cost -- Reduce Unexplained Variations in Medical Practice -- Advance Medical Knowledge -- Address Social and Ethical Implications -- Affect Policy Decisions -- Enhance the National Capacity for Assessment -- Joint Disease and Injury -- Improve Individual Patient Outcome -- Affect a Large Patient Population -- Reduce Unit or Aggregate Cost -- Reduce Unexplained Variations in Medical Practice -- Advance Medical Knowledge -- Low Back Pain -- Improve Individual Patient Outcome -- Affect a Large Patient Population -- Reduce Unit or Aggregate Cost -- Reduce Unexplained Variations in Medical Practice -- Advance Medical Knowledge…”
    Libro electrónico