Mostrando 1,961 - 1,980 Resultados de 2,220 Para Buscar '"virus"', tiempo de consulta: 0.13s Limitar resultados
  1. 1961
    Publicado 2019
    Tabla de Contenidos: “…-- Equipment failure -- Platform instability -- Database design flaws -- Data-entry errors -- Operator error -- Taking Advantage of RAID -- Striping -- RAID levels -- Backing Up Your System -- Preparation for the worst -- Full or incremental backup -- Frequency -- Backup maintenance -- Coping with Internet Threats -- Viruses -- Trojan horses -- Worms -- Denial-of-service attacks -- SQL injection attacks -- Phishing scams -- Zombie spambots -- Installing Layers of Protection -- Network-layer firewalls -- Application-layer firewalls -- Antivirus software -- Vulnerabilities, exploits, and patches -- Education -- Alertness -- Chapter 2 Protecting Against User Errors and Conflicts -- Reducing Data-Entry Errors -- Data types: The first line of defense -- Constraints: The second line of defense -- Sharp-eyed humans: The third line of defense -- Coping with Errors in Database Design -- Handling Programming Errors -- Solving Concurrent-Operation Conflicts -- Passing the ACID Test: Atomicity, Consistency, Isolation, and Durability -- Operating with Transactions -- Using the SET TRANSACTION statement -- Starting a transaction -- Committing a transaction…”
    Libro electrónico
  2. 1962
    Publicado 2023
    Tabla de Contenidos: “…Impersonation -- Phishing -- Spear phishing -- CEO fraud -- Smishing -- Vishing -- Pharming -- Whaling: Going for the "big fish" -- Messing around with Other People's Stuff: Tampering -- Captured in Transit: Interception -- Man-in-the-middle attacks -- Taking What Isn't Theirs: Data Theft -- Personal data theft -- Business data theft -- Data exfiltration -- Compromised credentials -- Forced policy violations -- Cyberbombs That Sneak into Your Devices: Malware -- Viruses -- Worms -- Trojans -- Ransomware -- Scareware -- Spyware -- Cryptocurrency miners -- Adware -- Blended malware -- Zero-day malware -- Fake malware on computers -- Fake malware on mobile devices -- Fake security subscription renewal notifications -- Poisoned Web Service Attacks -- Network Infrastructure Poisoning -- Malvertising…”
    Libro electrónico
  3. 1963
    Publicado 2010
    Tabla de Contenidos: “…Quiz -- Security Fundamentals -- Secure and Insecure File Systems -- Authentication Technologies -- Protection Against Viruses and Malware -- Software Firewalls -- Hardware Recycling and Deconstruction -- Securing Wireless Networks -- WEP and WPA Encryption -- Access Point Configuration for Maximum Security -- Data and Physical Security -- Data Access Local Security Policy -- Encryption Technologies -- Backups -- Data Migration -- Data and Data Remnant Removal -- Password Management -- Locking a Workstation -- Incident Reporting -- Social Engineering -- Access Control Purposes and Principles -- Operating System Access Control -- Components -- Restricted Spaces -- Auditing and Event Logging -- Installing, Configuring, and Troubleshooting Security Features -- BIOS Security Features -- Software Firewalls -- Wireless Client Configuration -- Unused Wireless Connections -- File Systems (Converting From FAT32 To NTFS) -- Malicious Software Protection -- Chapter 11 Printers -- Do I Know This Already?" …”
    Libro electrónico
  4. 1964
    Cybersecurity
    Cybersecurity For Dummies
    Publicado 2022
    Tabla de Contenidos: “…Impersonation -- Phishing -- Spear phishing -- CEO fraud -- Smishing -- Vishing -- Pharming -- Whaling: Going for the "big fish" -- Messing around with Other People's Stuff: Tampering -- Captured in Transit: Interception -- Man-in-the-middle attacks -- Taking What Isn't Theirs: Data Theft -- Personal data theft -- Business data theft -- Data exfiltration -- Compromised credentials -- Forced policy violations -- Cyberbombs That Sneak into Your Devices: Malware -- Viruses -- Worms -- Trojans -- Ransomware -- Scareware -- Spyware -- Cryptocurrency miners -- Adware -- Blended malware -- Zero-day malware -- Fake malware on computers -- Fake malware on mobile devices -- Fake security subscription renewal notifications -- Poisoned Web Service Attacks -- Network Infrastructure Poisoning…”
    Libro electrónico
  5. 1965
    por Bevilacqua, Carmelina
    Publicado 2023
    Tabla de Contenidos: “…2.2 Technological Resilience as a Factor of Neighborhoods Green Transition Before and During the Pandemic -- 3 The Case Study of Boston -- 3.1 Assessing Boston as a Case Study Towards a Net Zero Carbon, Equitable and Resilient Built Environment -- 3.2 Previous Strategies and Climate Plans in Boston to Understand Green Transition -- 4 Scope, Methods and Data Collection -- 5 Research Findings and Discussion -- 6 Conclusion -- 7 Limitations of the Study -- References -- Renewable Energy Communities: Enabling Technologies and Regenerative Models for the Green and Digital Transition in the Inner Areas -- 1 Introduction -- 2 Key Topics of the Reference Scenario -- 2.1 Policies for the Green Transition -- 2.2 The Renewable Energy Communities -- 2.3 Renewable Energy Communities in Inner Areas: A Study Cases Overview -- 3 The Methodological Approach: Advanced Impact Design for the Renewable Energy Communities -- 4 Preliminary Findings for Living Lab Experimentation in Grecanica Area -- 5 Discussion of Innovative Aspects for the Experimentation in the Inner Areas -- 6 Conclusions and Future Steps -- References -- A Methodology Toward a Just, Digital and Ecological Transition for Resilient and Sustainable Scenarios -- 1 Introduction -- 2 Literature -- 2.1 Latest Contributions on Water Management for Climate Change Resilient Scenarios -- 2.2 Latest Contributions on Water Management for a Just Transition -- 2.3 Lacks and Gaps -- 3 Experimental Context -- 4 Methodology -- 4.1 Construction of the Integrated Methodology -- 4.2 Surrogate Strategies of Methodology Applications for Transition Scenarios -- 5 Experimentation: Application and Validation of the Proposed Methodology -- 5.1 Application on Biochar-Based Water Filtration System on Mobility Infrastructure [Virus Reduction] -- 5.2 Application on Nature-Based Solutions for Urban Periphery…”
    Libro electrónico
  6. 1966
    Publicado 2019
    Tabla de Contenidos: “…- Kommunikation im Support -- 15.1 Aufgaben des IT-Supports -- 15.2 Die Supportstufen -- 15.3 Support-Systeme -- 15.4 Dokumente für den Support-Einsatz -- 15.4.1 Hinweise zur Telefonnotiz -- 15.4.2 Störungsprotokolle -- 15.4.3 Übung: Konrad und der Virus -- 15.5 Support hat immer Kunden - reden Sie mit ihnen -- 15.5.1 Kommunikation mit dem Kunden -- 15.5.2 Die Pyramide der Kundenzufriedenheit -- 15.5.3 Reden ist alles? …”
    Libro electrónico
  7. 1967
    Publicado 2013
    “…This book is a collection of chapters dealing with examples of RNA and DNA viruses, and issues such as how these gene packages have learnt to take advantage of their hosts, molecular recognition events that hosts may use to counterattack the viruses, and how researchers have developed strategies to use viruses or their parts as tools for different purposes…”
    Libro electrónico
  8. 1968
    Publicado 2011
    Tabla de Contenidos: “…Infecciones del sistema nervioso -- Capítulo 24 Infecciones bacterianas -- Capítulo 25 Infecciones focales -- Capítulo 26 Infecciones víricas y síndromes posvíricos -- Capítulo 27 Virus de la inmunodeficiencia humana y sida -- Capítulo 28 Infecciones fúngicas -- Capítulo 29 Neurosarcoidosis -- Capítulo 30 Neurosífilis -- Capítulo 31 Leptospirosis -- Capítulo 32 Enfermedad de Lyme -- Capítulo 33 Infecciones parasitarias -- Capítulo 34 Toxinas bacterianas -- Capítulo 35 Enfermedades por priones -- Capítulo 36 Enfermedad de Whipple -- Sección IV. …”
    Libro electrónico
  9. 1969
    Publicado 2022
    Tabla de Contenidos: “…Understanding Those Annoying Permission Messages -- Staying Safe with Windows Security -- Avoiding and removing viruses -- Avoiding phishing scams -- Setting up controls for children -- Part 4: Customizing and Upgrading Windows 11 -- Chapter 12: Customizing Settings in Windows -- Finding the Right Switch -- Flipping Switches with the Windows Settings App -- Adjusting the System settings -- Connecting and adjusting Bluetooth and other devices -- Connecting to nearby Wi-Fi networks and internet -- Personalizing your PC's look and feel -- Fixing and removing apps -- Creating and changing accounts for others -- Changing date, time, and language settings quickly -- Setting up for video games -- Adapting Windows for your special physical needs -- Managing your privacy and security -- Staying current and safe with Windows Update -- Chapter 13: Keeping Windows from Breaking -- Backing Up Your Computer with File History -- Finding Technical Information about Your Computer -- Freeing Up Space on Your Hard Drive -- Setting Up Devices That Don't Work (Fiddling with Drivers) -- Chapter 14: Sharing One Computer with Several People -- Understanding User Accounts -- Changing or Adding User Accounts -- Adding an account for a family member or friend -- Changing existing accounts -- Switching Quickly between Users -- Changing a User Account's Picture -- Setting Up Passwords and Security -- Signing in with Windows Hello -- Chapter 15: Connecting Computers with a Network -- Understanding a Network's Parts -- Setting Up a Small Network -- Buying parts for a network -- Setting up a wireless router -- Setting up Windows computers to connect to a network -- Sharing Files with Your Networked Computers -- Setting your home network to private -- Sharing files and folders on your private network -- Accessing what others have shared -- Sharing a printer on the network…”
    Libro electrónico
  10. 1970
    Publicado 2025
    Tabla de Contenidos: “…-- Air power -- Airplane mode -- In-flight Wi-Fi -- Arriving at your destination -- Café Computing -- Find a good seat -- Other tips 'n' stuff -- In a Hotel Room -- Mind the Laptop's Temperature -- Chapter 20 A More Secure Laptop -- The Hot Laptop -- Before Your Laptop Is Stolen -- Attaching the laptop to something sturdy -- Marking your laptop -- Registering the laptop and its software -- Paying attention to your environment -- Protect Your Data with a Strong Password -- The Laptop Reset -- Part 5 Security and Maintenance -- Chapter 21 System Security -- The Windows Security Center -- The Malware Scourge -- Doing a virus scan -- Dealing with a quarantined file -- Paying attention to the UAC warnings -- Keep Windows Up-to-Date -- Checking the update status -- Postponing a Windows update -- Exploring other updates and upgrades -- Your Privacy -- Locking the screen -- Reviewing Windows privacy settings -- Chapter 22 An All-Important Safety Copy -- Back Up Your Data -- Obtaining backup storage -- Configuring File History -- Checking the backup schedule -- Using cloud backup -- The Restore Operation -- Restoring an older version…”
    Libro electrónico
  11. 1971
    Publicado 2004
    Tabla de Contenidos: “…Projects versus streams -- Special-purpose streams -- Slightly-parallel development -- Physical VOB definition -- Baseline naming conventions -- Integrating ClearQuest with UCM -- UCM with and without ClearQuest -- Customizing the change management lifecycle -- ClearQuest UCM policy customization -- Defining parent-child activities -- ClearQuest security control -- Multiple user databases -- ClearQuest design constraints -- UCM watch list of common design problems -- Moving to private streams too early -- Moving to private streams too late -- Too many UCM projects -- Letting streams go stale -- Over-complicated state models -- Using substreams or new projects -- UCM infrastructure -- Administrative considerations for UCM -- Managing UCM datasets -- Manage old views -- Project creation process -- Managing old objects -- Getting started: setting up a UCM playground -- Playground overview -- Step 1-Infrastructure setup -- Set up an account on developerWorks -- Collect installation prerequisites -- Download the latest ClearCase software -- Turn off any virus scanning software -- Install the Microsoft Loopback Adapter -- Install ClearCase -- Step 2-Establish UCM repositories and components -- Create storage locations for VOBs and views -- Create a VOB, view, and a couple of components -- Step 3-Create a UCM project -- Step 4-Walk through the standard UCM development lifecycle -- Step 5-Install ClearQuest and create a data set -- Fetch ClearQuest software and license -- Install the Rational license server and ClearQuest -- Create a ClearQuest data set -- Set the code page for the data set -- Document the ClearQuest database definitions -- Step 6-Integrate the UCM project with ClearQuest -- Converting activity records to UCM -- Creating activities in a ClearQuest-enabled project -- Next steps -- Additional information -- Chapter 11. …”
    Libro electrónico
  12. 1972
    Publicado 2011
    Tabla de Contenidos: “…14 Protecting SharePoint with Advanced Antivirus and Edge Security Solutions -- Understanding the Forefront Edge Line of Products -- Outlining the Need for the Forefront Edge Line for SharePoint Environments -- Outlining the Inherent Threat in SharePoint Web Traffic -- Securing SharePoint Sites with Forefront TMG 2010 -- Securing SharePoint Sites Using Forefront UAG -- Protecting SharePoint 2010 from Viruses Using Forefront Protection 2010 for SharePoint -- Summary -- Best Practices -- 15 Implementing and Validating SharePoint 2010 Security -- Identifying Isolation Approaches to SharePoint Security -- Physically Securing SharePoint Servers -- Securing SharePoint's SQL Server Installation -- Utilizing Security Templates to Secure a SharePoint Server -- File-Level Security for SharePoint Servers -- Verifying Security Using the Microsoft Baseline Security Analyzer -- Deploying Transport-Level Security for SharePoint -- Examining Integration Points Between SharePoint and Public Key Infrastructure -- Using IPsec for Internal SharePoint Encryption -- Summary -- Best Practices -- 16 Configuring Email-Enabled Content, Presence, and Exchange Server Integration -- Enabling Incoming Email Functionality in SharePoint -- Working with Email-Enabled Content in SharePoint 2010 -- Understanding Microsoft Exchange Server 2010 -- Planning for an Exchange Server 2010 Environment -- Integrating Exchange 2010 with SharePoint 2010 -- Enabling Presence Information in SharePoint with Microsoft Communications Server 2010 -- Summary -- Best Practices -- 17 Safeguarding Confidential Data in SharePoint 2010 -- Understanding the Threats to SharePoint Data -- SQL Server Database Mirroring for SharePoint Farms -- Examining Supported Topologies -- Outlining Database Mirroring Requirements -- Enabling SQL Database Mirroring -- Using SQL Transparent Data Encryption (TDE)…”
    Libro electrónico
  13. 1973
    Publicado 2019
    “…Examples of these viruses include Dengue, Chikungunya, Zika, Mayaro, and encephalitis viruses. …”
    Libro electrónico
  14. 1974
    por Martínez Sánchez, Rubén
    Publicado 2014
    Tabla de Contenidos: “…8.2.1 TIPOS DE IDS -- 8.2.2 COMPONENTES DE LOS IDS -- 8.3.3 INSTALACIÓN EN ENTORNOS VIRTUALES -- 8.3 UNTANGLE -- 8.3.1 COMPONENTES DE UNTANGLE -- 8.3.2 REQUISITOS MÍNIMOS -- 8.3.3 INSTALACIÓN EN ENTORNOS VIRTUALES -- 8.3.4 INSTALACIÓN EN ENTORNOS FÍSICOS -- 8.3.5 CONFIGURACIÓN INICIAL DE UNTANGLE -- 8.4 MÓDULOS Y SERVICIOS EN UNTANGLE -- 8.4.1 WEB FILTER -- 8.4.2 VIRUS BLOCKER -- 8.4.3 SPAM BLOCKER -- 8.4.4 ATTACK BLOCKER -- 8.4.5 PHISH BLOCKER 8.4.5 PHISH BLOCKER -- 8.4.6 SPYWARE BLOCKER -- 8.4.7 FIREWALL -- 8.4.8 INTRUSION PREVENTION -- 8.4.9 PROTOCOL CONTROL -- 8.4.10 CAPTIVE PORTAL -- 8.4.11 OPENVPN -- 8.4.12 REPORTS -- 8.5 IPTABLES -- 8.5.1 CONFIGURACIÓN IPTABLES -- 8.5.2 CONFIGURACIÓN TABLAS -- 8.5.3 ESTABLECIMIENTO DE RUTAS DE ACCESO A FIREWALL CON IPTABLES -- 8.5.4 EJEMPLOS IPTABLES -- 8.6 CONCLUSIONES -- 9 HACKING EN SISTEMAS WIFI -- 9.1 ADQUIRIENDO EL HARDWARE APROPIADO -- 9.4.1 IMAGEN VIRTUAL DE BACKTRACK 9.4.1 IMAGEN VIRTUAL DE BACKTRACK -- 9.4.2 COMPROBACIÓN DEL SISTEMA Y CONFIGURACIÓN -- 9.4.3 DIRECCIONAMIENTO DE RED -- 9.2 TERMINOLOGÍA EN REDES INALÁMBRICAS -- 9.3 PROTOCOLOS DE SEGURIDAD -- 9.3.1 WEP -- 9.3.2 WPA -- 9.4 PREPARÁNDOSE PARA EL ATAQUE -- 9.4.1 IMAGEN VIRTUAL DE BACKTRACK -- 9.4.2 COMPROBACIÓN DEL SISTEMA Y CONFIGURACIÓN -- 9.4.3 DIRECCIONAMIENTO DE RED -- 9.4.4 BUSCANDO EL OBJETIVO -- 9.4.5 ALINEACIÓN DE LA ANTENA -- 9.4.6 LA INYECCIÓN DE PAQUETES 9.4.6 LA INYECCIÓN DE PAQUETES -- 9.4.7 MAC SPOOFING -- 9.5 METODOLOGÍAS DE ATAQUE A REDES WEP -- 9.5.1 CAPTURA PASIVA DE DATOS (...) -- 9.5.2 REINYECCIÓN DE PAQUETES ARP 9.5.2 REINYECCIÓN DE PAQUETES ARP -- 9.5.3 ATAQUE DE PREDICCIÓN CRC32 -- 9.5.4 ATAQUE DE FRAGMENTACIÓN -- 9.5.5 ATAQUE CAFÉ-LATTE -- 9.5.6 ATAQUE HIRTE -- 9.6 EL ATAQUE A WPA -- 9.6.1 ATAQUES DE DICCIONARIO -- 9.7 OBTENCIÓN DE CLAVES EN CACHE -- 9.8 CONCLUSIONES -- 10 CIFRADO DE DATOS -- 10.1 INTRODUCCIÓN…”
    Libro electrónico
  15. 1975
    Publicado 2017
    Tabla de Contenidos: “…Los posgrados y la investigación en virología y genética -- Vida estudiantil, experiencias y percepciones -- El movimiento universitario -- Tiempo de decisiones: de la costa al llano, el ejercicio docente -- El regreso al alma mater -- Las dificultades del inicio del programa de maestría, anécdotas y fantasmas -- Trabajando con virus animales, rinotraqueitis infecciosa bovina, diarrea viral bovina, consolidación del grupo -- El doctorado. …”
    Libro electrónico
  16. 1976
    Publicado 2018
    Tabla de Contenidos: “…5.5 Database Access Control -- 5.6 Inference -- 5.7 Database Encryption -- 5.8 Data Center Security -- 5.9 Key Terms, Review Questions, and Problems -- Chapter 6 Malicious Software -- 6.1 Types of Malicious Software (Malware) -- 6.2 Advanced Persistent Threat -- 6.3 Propagation-Infected Content-Viruses -- 6.4 Propagation-Vulnerability Exploit-Worms -- 6.5 Propagation-Social Engineering-Spam E-mail, Trojans -- 6.6 Payload-System Corruption -- 6.7 Payload-Attack Agent-Zombie, Bots -- 6.8 Payload-Information Theft-Keyloggers, Phishing, Spyware -- 6.9 Payload-Stealthing-Backdoors, Rootkits -- 6.10 Countermeasures -- 6.11 Key Terms, Review Questions, and Problems -- Chapter 7 Denial-of-Service Attacks -- 7.1 Denial-of-Service Attacks -- 7.2 Flooding Attacks -- 7.3 Distributed Denial-of-Service Attacks -- 7.4 Application-Based Bandwidth Attacks -- 7.5 Reflector and Amplifier Attacks -- 7.6 Defenses Against Denial-of-Service Attacks -- 7.7 Responding to a Denial-of-Service Attack -- 7.8 Key Terms, Review Questions, and Problems -- Chapter 8 Intrusion Detection -- 8.1 Intruders -- 8.2 Intrusion Detection -- 8.3 Analysis Approaches -- 8.4 Host-Based Intrusion Detection -- 8.5 Network-Based Intrusion Detection -- 8.6 Distributed or Hybrid Intrusion Detection -- 8.7 Intrusion Detection Exchange Format -- 8.8 Honeypots -- 8.9 Example System: Snort -- 8.10 Key Terms, Review Questions, and Problems -- Chapter 9 Firewalls and Intrusion Prevention Systems -- 9.1 The Need for Firewalls -- 9.2 Firewall Characteristics and Access Policy -- 9.3 Types of Firewalls -- 9.4 Firewall Basing -- 9.5 Firewall Location and Configurations -- 9.6 Intrusion Prevention Systems -- 9.7 Example: Unified Threat Management Products -- 9.8 Key Terms, Review Questions, and Problems -- Part Two Software and System Security -- Chapter 10 Buffer Overflow -- 10.1 Stack Overflows…”
    Libro electrónico
  17. 1977
    Publicado 2023
    Tabla de Contenidos: “…4.2.2 Microorganism-Based Biotemplates -- 4.2.2.1 Bacteria -- 4.2.2.2 Fungi -- 4.2.2.3 Yeast -- 4.2.2.4 Algae -- 4.3 Synthesis Routes -- 4.3.1 Effect of pH -- 4.3.2 Effect of Temperature -- 4.3.3 Effect of Biomolecules -- 4.3.3.1 Plant-Based -- 4.3.3.2 Microorganism-Based -- 4.4 Applications -- 4.4.1 Biomedical Application -- 4.4.1.1 Antimicrobial Activity -- 4.4.1.2 Biomedication -- 4.4.1.3 Vaccines -- 4.4.1.4 Antidiabetic -- 4.4.1.5 Diagnostic Applications -- 4.4.2 Environmental Application -- 4.4.2.1 Environmental Remediation -- 4.4.2.2 Catalytic Removal of Textile Dyes -- 4.4.2.3 Wastewater Treatment -- 4.4.2.4 Agriculture -- 4.5 Conclusion and Outlook -- References -- Chapter 5 Green Conversion Methods to Prepare Nanoparticle -- 5.0 Introduction -- 5.1 Bacteria -- 5.2 Fungi -- 5.3 Yeast -- 5.4 Viruses -- 5.5 Algae -- 5.6 Plants -- 5.7 Conclusion and Perspectives -- References -- Chapter 6 Bioinspired Green Synthesis of Nanomaterials From Algae -- 6.1 Introduction -- 6.2 Algal System-Mediated Nanomaterial Synthesis -- 6.3 Factors Affecting the Green Synthesis of Nanomaterials -- 6.3.1 Light -- 6.3.2 Temperature -- 6.3.3 Incubation Period -- 6.3.4 pH -- 6.3.5 Precursor Concentration and Bioactive Catalyst -- 6.4 Applications of the Green Synthesized Nanomaterials -- 6.4.1 Antimicrobial Agents -- 6.4.2 Anticancerous -- 6.4.3 Biosensing -- 6.4.4 Bioremediation -- 6.5 Future Perspectives -- 6.6 Conclusion -- References -- Chapter 7 Interactions of Nanoparticles with Plants: Accumulation and Effects -- 7.1 Introduction -- 7.2 Uptake and Translocation of Nanoparticles and Nanocarriers in Plants -- 7.3 Nanoparticle-Mediated Sensing and Biosensing in Plants -- 7.4 Tolerance Versus Toxicity of Nanoparticles in Plants -- 7.5 Nanoparticle-Mediated Delivery of Fertilizers, Pesticides, Other Agrochemicals in Plants…”
    Libro electrónico
  18. 1978
    Publicado 2023
    Tabla de Contenidos: “…10.2.11 Precision Medicine -- 10.3 AI and ML-Based Manufacturing -- 10.3.1 Continuous Manufacturing -- 10.3.2 Process Improvement and Fault Detection -- 10.3.3 Predictive Maintenance (PdM) -- 10.3.4 Quality Control and Yield -- 10.3.5 Troubleshooting -- 10.3.6 Supply Chain Management -- 10.3.7 Warehouse Management -- 10.3.8 Predicting Remaining Useful Life -- 10.3.9 Challenges -- 10.4 AI and ML-Based Drug Product Marketing -- 10.4.1 Product Launch -- 10.4.2 Real-Time Personalization and Consumer Behavior -- 10.4.3 Better Customer Relationships -- 10.4.4 Enhanced Marketing Measurement -- 10.4.5 Predictive Marketing Analytics -- 10.4.6 Price Dynamics -- 10.4.7 Market Segmentation -- 10.4.8 Challenges -- 10.5 Future Prospects and Way Forward -- 10.6 Conclusion -- References -- Chapter 11 Artificial Intelligence and Machine Learning Applications in Vaccine Development -- 11.1 Introduction -- 11.2 Prioritizing Proteins as Vaccine Candidates -- 11.3 Predicting Binding Scores of Candidate Proteins -- 11.4 Predicting Potential Epitopes -- 11.5 Design of Multi-Epitope Vaccine -- 11.6 Tracking the RNA Mutations of a Virus -- Conclusion -- References -- Chapter 12 AI, ML and Other Bioinformatics Tools for Preclinical and Clinical Development of Drug Products -- Abbreviations -- 12.1 Introduction -- 12.2 AI and ML for Pandemic -- 12.3 Advanced Analytical Tools Used in Preclinical and Clinical Development -- 12.3.1 Spectroscopic Techniques -- 12.3.2 Chromatographic Techniques -- 12.3.3 Electrochemical Techniques -- 12.3.4 Electrophoretic Techniques -- 12.3.5 Hyphenated Techniques -- 12.4 AI, ML, and Other Bioinformatics Tools for Preclinical Development of Drug Products -- 12.4.1 Various Computational Tools Used in Pre-Clinical Drug Development -- 12.5 AI, ML, and Other Bioinformatics Tools for Clinical Development of Drug Products…”
    Libro electrónico
  19. 1979
    Publicado 2010
    Tabla de Contenidos: “…Protecting Windows from viruses and spyware -- Malicious software : ignorance is not bliss -- Antimalware strategy : defense in depth -- 31. …”
    Libro electrónico
  20. 1980
    Publicado 2014
    “…Printed Edition of the Special Issue Published in Viruses…”
    Libro electrónico