antivirus gefunden in Unterhaltung
✖
Produkt merken zur Merkliste
CHF 28.80
Rising AntiVirus
Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online.Rising is a Chinese software company that produces the anti-virus software Rising Antivirus, a firewall, UTM and spam-blocking products.Founded in 1991, Rising is a privately-owned company, with its global headquarters based in Zhongguancun in Beijing, China. ... zur Produkt-Seite
5167181 {"price-changing":null,"image":"https:\/\/image.vergleiche.ch\/small\/aHR0cHM6Ly9jNC1zdGF0aWMuZG9kYXguY29tL3YyLzE4MC0xODAtMTI4MzA0NzQ4X1FSeWJKLXBuZw==!aHR0cHM6Ly9jNC1zdGF0aWMuZG9kYXguY29tL3YyLzE4MC0xODAtMTI4MzA0NzQ4X1FSeWJKLXBuZw==","post_title":"Rising AntiVirus","deeplink":"https:\/\/www.awin1.com\/pclick.php?p=27402158737&a=401125&m=11816&pref1=9786130891886","labels":[],"brand_id":1,"post_content":"Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online.Rising is a Chinese software company that produces the anti-virus software Rising Antivirus, a firewall, UTM and spam-blocking products.Founded in 1991, Rising is a privately-owned company, with its global headquarters based in Zhongguancun in Beijing, China. The company has subsidiaries and branch offices in Shanghai, Guangzhou, Australia and Beijing. It is one of China''s largest anti-virus software companies, with over 500 employees and an estimated 50% Chinese home users (of more than 100 million computer users).Primary products are Rising Antivirus, Rising Personal Firewall, Rising UTM and Rising IS.","merchants_number":1,"ean":9786130891886,"category_id":103,"size":null,"min_price":28.800000000000000710542735760100185871124267578125,"low_price_merchant_id":1087639,"ID":5167181,"merchants":["dodax"],"brand":"undefined","slug":"rising-antivirus","url":"\/unterhaltung\/produkt\/rising-antivirus\/","low_price_merchant_name":null}
Produkt merken zur Merkliste
CHF 80.10
An Artificial Immune Antivirus System
In this book, we consider the aspects of designing a computer immune system for virus detection and elimination using components and techniques found in the biological immune system. In the modeling of the biological immune system, we consider the use of three different kinds of loose matching: Hamming Distance, R-Contiguous Symbols, and Hidden Markov M odels (HMMs). Experiments with ... zur Produkt-Seite
4589321 {"price-changing":null,"image":"https:\/\/image.vergleiche.ch\/small\/aHR0cHM6Ly9jNC1zdGF0aWMuZG9kYXguY29tL3YyLzE4MC0xODAtMTQ4ODQzMTM5X2RFcVE5LXBuZw==!aHR0cHM6Ly9jNC1zdGF0aWMuZG9kYXguY29tL3YyLzE4MC0xODAtMTQ4ODQzMTM5X2RFcVE5LXBuZw==","post_title":"An Artificial Immune Antivirus System","deeplink":"https:\/\/www.awin1.com\/pclick.php?p=23175244911&a=401125&m=11816&pref1=9783659814570","labels":[],"brand_id":1,"post_content":"In this book, we consider the aspects of designing a computer immune system for virus detection and elimination using components and techniques found in the biological immune system. In the modeling of the biological immune system, we consider the use of three different kinds of loose matching: Hamming Distance, R-Contiguous Symbols, and Hidden Markov M odels (HMMs). Experiments with virus infected programs and HMMs are presented. HMMs are trained on static code from non-infected programs and on traces of systems calls generated by executions of non- infected programs. The programs are infected with a virus and the HMMs ability to detect the infections is tested. It is concluded that HMMs can successfully detect virus infections in programs from static code and from traces of system calls generated by executions of programs.","merchants_number":1,"ean":9783659814570,"category_id":103,"size":null,"min_price":80.099999999999994315658113919198513031005859375,"low_price_merchant_id":1087639,"ID":4589321,"merchants":["dodax"],"brand":"undefined","slug":"an-artificial-immune-antivirus-system","url":"\/unterhaltung\/produkt\/an-artificial-immune-antivirus-system\/","low_price_merchant_name":null}
Produkt merken zur Merkliste
CHF 59.00
Foundations and Practice of Security
Malware and Anomaly Detection.- Intrusion Response.- Vulnerability Analysis and Security Metrics.- Privacy and Verification.- Crypto and Communication Security.- Malware and Antivirus.- Web, Cloud, and Delegation.- Physical Security. zur Produkt-Seite
4841686 {"price-changing":0,"image":"https:\/\/image.vergleiche.ch\/small\/aHR0cHM6Ly9pLndlbHRiaWxkLmRlL3AvZm91bmRhdGlvbnMtYW5kLXByYWN0aWNlLW9mLXNlY3VyaXR5LTM3NTM0MjY4OC5qcGc=!aHR0cHM6Ly9pLndlbHRiaWxkLmRlL3AvZm91bmRhdGlvbnMtYW5kLXByYWN0aWNlLW9mLXNlY3VyaXR5LTM3NTM0MjY4OC5qcGd8fnxodHRwczovL29zMS5tZWluZWNsb3VkLmlvL2IxMDE1OC9tZWRpYS9pbWFnZS9lNi80ZC81MS82MTA2MzAyMzAwMDAxQV82MDB4NjAwLmpwZw==","post_title":"Foundations and Practice of Security","deeplink":"https:\/\/track.adtraction.com\/t\/t?a=1632201226&as=1592767275&t=2&tk=1&url=https:\/\/www.weltbild.ch\/artikel\/x\/_22398283-1","labels":[],"brand_id":1,"post_content":"Malware and Anomaly Detection.- Intrusion Response.- Vulnerability Analysis and Security Metrics.- Privacy and Verification.- Crypto and Communication Security.- Malware and Antivirus.- Web, Cloud, and Delegation.- Physical Security.","merchants_number":2,"ean":9783319519654,"category_id":103,"size":null,"min_price":59,"low_price_merchant_id":27291482,"ID":4841686,"merchants":["weltbild","euniverse"],"brand":"undefined","slug":"foundations-and-practice-of-security-2","url":"\/unterhaltung\/produkt\/foundations-and-practice-of-security-2\/","low_price_merchant_name":"Weltbild"}
Produkt merken zur Merkliste
CHF 57.90
Malware Detection in Cloud Computing
This book advocates a new model for malware detection on end hosts based on providing antivirus as an in-cloud network service. This model enables identification of malicious and unwanted software by multiple detection engines Respectively,This approach provides several important benefits including better detection of malicious software, enhanced forensics capabilities and improved de... zur Produkt-Seite
4484769 {"price-changing":0,"image":"https:\/\/image.vergleiche.ch\/small\/aHR0cHM6Ly9vczEubWVpbmVjbG91ZC5pby9iMTAxNTgvbWVkaWEvaW1hZ2UvYmEvZWEvY2QvNjMxODM1NzIwMDAwMUFEbXFqNTFYa1M3Z2Z0XzYwMHg2MDAuanBn!aHR0cHM6Ly9vczEubWVpbmVjbG91ZC5pby9iMTAxNTgvbWVkaWEvaW1hZ2UvYmEvZWEvY2QvNjMxODM1NzIwMDAwMUFEbXFqNTFYa1M3Z2Z0XzYwMHg2MDAuanBn","post_title":"Malware Detection in Cloud Computing","deeplink":"https:\/\/cct.connects.ch\/tc.php?t=116298C1969900829T&subid=9783330053250&deepurl=https%3A%2F%2Feuniverse.ch%2Fbuecher%2Fmathematik-naturwissenschaft-technik%2Finformatik-edv%2F514537%2Fmalware-detection-in-cloud-computing%3FsPartner%3Dtoppreise","labels":[],"brand_id":1,"post_content":"This book advocates a new model for malware detection on end hosts based on providing antivirus as an in-cloud network service. This model enables identification of malicious and unwanted software by multiple detection engines Respectively,This approach provides several important benefits including better detection of malicious software, enhanced forensics capabilities and improved deployability. Malware detection in cloud computing includes a lightweight, cross-Storge host agent and a network service.It is Combines detection techniques, static signatures analyze and Dynamic analysis detection. Using this mechanism we find that cloud- malware detection provides 35% better detection coverage against recent threats compared to a single antivirus engine and a 98% detection rate across the cloud environment.","merchants_number":1,"ean":9783330053250,"category_id":103,"size":null,"min_price":57.89999999999999857891452847979962825775146484375,"low_price_merchant_id":70255345,"ID":4484769,"merchants":["euniverse"],"brand":"undefined","slug":"malware-detection-in-cloud-computing","url":"\/unterhaltung\/produkt\/malware-detection-in-cloud-computing\/","low_price_merchant_name":"eUniverse"}
Produkt merken zur Merkliste
CHF 8.00
Gin Tama. Bd.29
Auch Maschinen können krank werden - das müssen Gintoki und Co lernen, als Otose-sans Mechanicon-Maid Tama sich plötzlich einen Computervirus einfängt. Um sie zu retten, lässt sich die Alles-Agentur mithilfe eines Wunderhammers schrumpfen und dringt in Tamas Inneres vor. Und dort wartet auf sie ein großes Abenteuer, denn in Tamas Inneren hat sich inzwischen ein ganzes Königreich von A... zur Produkt-Seite
5089324 {"price-changing":0,"image":"https:\/\/image.vergleiche.ch\/small\/aHR0cHM6Ly9vczEubWVpbmVjbG91ZC5pby9iMTAxNTgvbWVkaWEvaW1hZ2UvODEvMTEvOWEvNDg1MDExNDUwMDAwMUFfNjAweDYwMC5qcGc=!aHR0cHM6Ly9vczEubWVpbmVjbG91ZC5pby9iMTAxNTgvbWVkaWEvaW1hZ2UvODEvMTEvOWEvNDg1MDExNDUwMDAwMUFfNjAweDYwMC5qcGd8fnw=","post_title":"Gin Tama. Bd.29","deeplink":"https:\/\/cct.connects.ch\/tc.php?t=116298C1969900829T&subid=9783842011403&deepurl=https%3A%2F%2Feuniverse.ch%2Fbuecher%2Fbelletristik-unterhaltung%2Fcomics-cartoons-humor-satire%2F409948%2Fgin-tama.-bd.29-spinne-am-abend-bringt-kummer-und-sorgen%3FsPartner%3Dtoppreise","labels":[],"brand_id":1,"post_content":"Auch Maschinen k\u00f6nnen krank werden - das m\u00fcssen Gintoki und Co lernen, als Otose-sans Mechanicon-Maid Tama sich pl\u00f6tzlich einen Computervirus einf\u00e4ngt. Um sie zu retten, l\u00e4sst sich die Alles-Agentur mithilfe eines Wunderhammers schrumpfen und dringt in Tamas Inneres vor. Und dort wartet auf sie ein gro\u00dfes Abenteuer, denn in Tamas Inneren hat sich inzwischen ein ganzes K\u00f6nigreich von Antiviren gebildet! Der Kampf Virus vs. Antivirus kann beginnen!","merchants_number":2,"ean":9783842011403,"category_id":103,"size":null,"min_price":8,"low_price_merchant_id":70255345,"ID":5089324,"merchants":["euniverse","orell-fuessli"],"brand":"undefined","slug":"gin-tama-bd29","url":"\/unterhaltung\/produkt\/gin-tama-bd29\/","low_price_merchant_name":"eUniverse"}
Produkt merken zur Merkliste
CHF 76.95
Metamorphic Computer Virus Detection
A metamorphic computer virus employs different obfuscation techniques to mutate its code, in its new instance in the new infected file. The mutated instance has the similar behavior and function of the original virus, but the binary pattern of the code is entirely different from its parent. Therefore, metamorphic variants of a virus family cannot be simply detected by most of commerci... zur Produkt-Seite
4457339 {"price-changing":null,"image":"https:\/\/image.vergleiche.ch\/small\/aHR0cHM6Ly9jNC1zdGF0aWMuZG9kYXguY29tL3YyLzE4MC0xODAtMTUxNTc5NDgxX0IycTQ0LXBuZw==!aHR0cHM6Ly9jNC1zdGF0aWMuZG9kYXguY29tL3YyLzE4MC0xODAtMTUxNTc5NDgxX0IycTQ0LXBuZw==","post_title":"Metamorphic Computer Virus Detection","deeplink":"https:\/\/www.awin1.com\/pclick.php?p=22944415367&a=401125&m=11816&pref1=9783659936135","labels":[],"brand_id":1,"post_content":"A metamorphic computer virus employs different obfuscation techniques to mutate its code, in its new instance in the new infected file. The mutated instance has the similar behavior and function of the original virus, but the binary pattern of the code is entirely different from its parent. Therefore, metamorphic variants of a virus family cannot be simply detected by most of commercial antivirus products, because their solutions depend on a signature database and employ string signature-based detection methods. Hence, the antivirus detection engine can be evaded by obfuscation techniques, easily. This book is a technical report of a PhD research on the metamorphic computer viruses, their characteristics and features, and detection methods. In this research, a machine learning based model (Hidden Markov Model) has been developed to classify and detect this type of malware. In the proposed method, a HMM is designed and trained on the statistical features of opcodes of executable viral files. This model can be employed to recognize the similar patterns and detect other variants of the same family of metamorphic viruses. The evaluation of the proposed method is discussed in details.","merchants_number":1,"ean":9783659936135,"category_id":103,"size":null,"min_price":76.9500000000000028421709430404007434844970703125,"low_price_merchant_id":1087639,"ID":4457339,"merchants":["dodax"],"brand":"undefined","slug":"metamorphic-computer-virus-detection","url":"\/unterhaltung\/produkt\/metamorphic-computer-virus-detection\/","low_price_merchant_name":null}
Produkt merken zur Merkliste
CHF 28.80
Unified Threat Management
High Quality Content by WIKIPEDIA articles! Unified Threat Management (UTM) is a comprehensive solution that has recently emerged in the network security industry and since 2004, has gained widespread currency as a primary network gateway defense solution for organizations. In theory, it is the evolution of the traditional firewall into an all-inclusive security product that has the a... zur Produkt-Seite
5127086 {"price-changing":null,"image":"https:\/\/image.vergleiche.ch\/small\/aHR0cHM6Ly9jNC1zdGF0aWMuZG9kYXguY29tL3YyLzE4MC0xODAtMTI4MjA5NzMwXzY1MlA3LXBuZw==!aHR0cHM6Ly9jNC1zdGF0aWMuZG9kYXguY29tL3YyLzE4MC0xODAtMTI4MjA5NzMwXzY1MlA3LXBuZw==","post_title":"Unified Threat Management","deeplink":"https:\/\/www.awin1.com\/pclick.php?p=24464548921&a=401125&m=11816&pref1=9786130497781","labels":[],"brand_id":1,"post_content":"High Quality Content by WIKIPEDIA articles! Unified Threat Management (UTM) is a comprehensive solution that has recently emerged in the network security industry and since 2004, has gained widespread currency as a primary network gateway defense solution for organizations. In theory, it is the evolution of the traditional firewall into an all-inclusive security product that has the ability to perform multiple security functions in one single appliance: network firewalling, network intrusion prevention and gateway antivirus (AV), gateway anti-spam, VPN, content filtering, load balancing and on-appliance reporting.","merchants_number":1,"ean":9786130497781,"category_id":103,"size":null,"min_price":28.800000000000000710542735760100185871124267578125,"low_price_merchant_id":1087639,"ID":5127086,"merchants":["dodax"],"brand":"undefined","slug":"unified-threat-management","url":"\/unterhaltung\/produkt\/unified-threat-management\/","low_price_merchant_name":null}
Produkt merken zur Merkliste
CHF 177.00
Economics of Information Security and Privacy III
The Impact of Immediate Disclosure on Attack Diffusion and Volume.- Where Do All the Attacks Go?.- Sex, Lies and Cyber-Crime Surveys.- The Underground Economy of Fake Antivirus Software.- The Inconvenient Truth about Web Certificates.- Resilience of the Internet Interconnection Ecosystem.- Modeling Internet-Scale Policies for Cleaning up Malware.- Fixed Costs, Investment Rigidities, a... zur Produkt-Seite
4416802 {"price-changing":0,"image":"https:\/\/image.vergleiche.ch\/small\/aHR0cHM6Ly9pLndlbHRiaWxkLmRlL3AvZWNvbm9taWNzLW9mLWluZm9ybWF0aW9uLXNlY3VyaXR5LWFuZC1wcml2YWN5LWlpaS0zNzI3MTI0NDkuanBn!aHR0cHM6Ly9pLndlbHRiaWxkLmRlL3AvZWNvbm9taWNzLW9mLWluZm9ybWF0aW9uLXNlY3VyaXR5LWFuZC1wcml2YWN5LWlpaS0zNzI3MTI0NDkuanBnfH58aHR0cHM6Ly9vczEubWVpbmVjbG91ZC5pby9iMTAxNTgvbWVkaWEvaW1hZ2UvYzAvY2IvMGQvNDg5MzQxOTAwMDAwMUFfNjAweDYwMC5qcGc=","post_title":"Economics of Information Security and Privacy III","deeplink":"https:\/\/track.adtraction.com\/t\/t?a=1632201226&as=1592767275&t=2&tk=1&url=https:\/\/www.weltbild.ch\/artikel\/x\/_25003918-1","labels":[],"brand_id":1,"post_content":"The Impact of Immediate Disclosure on Attack Diffusion and Volume.- Where Do All the Attacks Go?.- Sex, Lies and Cyber-Crime Surveys.- The Underground Economy of Fake Antivirus Software.- The Inconvenient Truth about Web Certificates.- Resilience of the Internet Interconnection Ecosystem.- Modeling Internet-Scale Policies for Cleaning up Malware.- Fixed Costs, Investment Rigidities, and Risk Aversion in Information Security.- Are Home Internet Users Willing to Pay ISPs for Improvements in Cyber Security?.- Economic Methods and Decision Making by Security Professionals.- Real Name Verification Law on the Internet: A Poison or Cure for Privacy.- The Privacy Landscape: Product Differentiation on Data Collection.","merchants_number":2,"ean":9781493900367,"category_id":103,"size":null,"min_price":177,"low_price_merchant_id":27291482,"ID":4416802,"merchants":["weltbild","euniverse"],"brand":"undefined","slug":"economics-of-information-security-and-privacy-iii","url":"\/unterhaltung\/produkt\/economics-of-information-security-and-privacy-iii\/","low_price_merchant_name":"Weltbild"}
Produkt merken zur Merkliste
CHF 32.55
Vundo
Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Vundo, or the Vundo Trojan (also known as Virtumonde or Virtumondo and sometimes referred to as MS Juan) is a Trojan horse that is known to cause popups and advertising for rogue antispyware programs, and sporadically other misbehavior including performance d... zur Produkt-Seite
5076488 {"price-changing":null,"image":"https:\/\/image.vergleiche.ch\/small\/aHR0cHM6Ly9jNC1zdGF0aWMuZG9kYXguY29tL3YyLzE4MC0xODAtMTI4MzE1ODUyX3IyeXBsLXBuZw==!aHR0cHM6Ly9jNC1zdGF0aWMuZG9kYXguY29tL3YyLzE4MC0xODAtMTI4MzE1ODUyX3IyeXBsLXBuZw==","post_title":"Vundo","deeplink":"https:\/\/www.awin1.com\/pclick.php?p=24447212415&a=401125&m=11816&pref1=9786131246104","labels":[],"brand_id":1,"post_content":"Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Vundo, or the Vundo Trojan (also known as Virtumonde or Virtumondo and sometimes referred to as MS Juan) is a Trojan horse that is known to cause popups and advertising for rogue antispyware programs, and sporadically other misbehavior including performance degradation and denial of service with some websites including Google and Facebook.A Vundo infection is typically caused either by opening an e-mail attachment carrying the trojan, or through a variety of browser exploits, including vulnerabilities in popular browser plug-ins, such as Java. Many of the popups advertise fraudulent programs such as AntiSpywareMaster, WinFixer, AntiVirus 2009.","merchants_number":1,"ean":9786131246104,"category_id":103,"size":null,"min_price":32.5499999999999971578290569595992565155029296875,"low_price_merchant_id":1087639,"ID":5076488,"merchants":["dodax"],"brand":"undefined","slug":"vundo","url":"\/unterhaltung\/produkt\/vundo\/","low_price_merchant_name":null}
Produkt merken zur Merkliste
CHF 32.55
Rogue Security Software
Rogue security software (or rogueware) is a form of computer malware that deceives or misleads users into paying for the fake or simulated removal of malware, or that installs other malware. Rogue security software, in recent years (2008 2011), has become a growing and serious security threat in desktop computing.Rogue security software mainly relies on social engineering (fraud) in o... zur Produkt-Seite
5427527 {"price-changing":null,"image":"https:\/\/image.vergleiche.ch\/small\/aHR0cHM6Ly9jNC1zdGF0aWMuZG9kYXguY29tL3YyLzE4MC0xODAtMTI4MzA0OTY4XzhHNFk5LXBuZw==!aHR0cHM6Ly9jNC1zdGF0aWMuZG9kYXguY29tL3YyLzE4MC0xODAtMTI4MzA0OTY4XzhHNFk5LXBuZw==","post_title":"Rogue Security Software","deeplink":"https:\/\/www.awin1.com\/pclick.php?p=27297797585&a=401125&m=11816&pref1=9786138584377","labels":[],"brand_id":1,"post_content":"Rogue security software (or rogueware) is a form of computer malware that deceives or misleads users into paying for the fake or simulated removal of malware, or that installs other malware. Rogue security software, in recent years (2008 2011), has become a growing and serious security threat in desktop computing.Rogue security software mainly relies on social engineering (fraud) in order to defeat the security built into modern operating system and browser software and install itself onto victims' computers. A website may, for example, display a fictitious warning dialog stating that someone's machine is infected with a computer virus, and encourage them through social engineering to install or purchase scareware in the belief that they are purchasing genuine antivirus software.","merchants_number":1,"ean":9786138584377,"category_id":103,"size":null,"min_price":32.5499999999999971578290569595992565155029296875,"low_price_merchant_id":1087639,"ID":5427527,"merchants":["dodax"],"brand":"undefined","slug":"rogue-security-software","url":"\/unterhaltung\/produkt\/rogue-security-software\/","low_price_merchant_name":null}
Produkt merken zur Merkliste
CHF 118.00
Mathematical and Engineering Methods in Computer Science
Programming Support for Future Parallel Architectures.- Flexible Interpolation for Efficient Model Checking.- Understanding Transparent and Complicated Users as Instances of Preference Learning for Recommender Systems.- Span-Program-Based Quantum Algorithms for Graph Bipartiteness and Connectivity.- Fitting Aggregation Operators.- Practical Exhaustive Generation of Small Multiway Cuts... zur Produkt-Seite
4880518 {"price-changing":0,"image":"https:\/\/image.vergleiche.ch\/small\/aHR0cHM6Ly9pLndlbHRiaWxkLmRlL3AvbWF0aGVtYXRpY2FsLWFuZC1lbmdpbmVlcmluZy1tZXRob2RzLWluLWNvbXB1dGVyLTM3Mjc0MDg2OC5qcGc=!aHR0cHM6Ly9pLndlbHRiaWxkLmRlL3AvbWF0aGVtYXRpY2FsLWFuZC1lbmdpbmVlcmluZy1tZXRob2RzLWluLWNvbXB1dGVyLTM3Mjc0MDg2OC5qcGd8fnxodHRwczovL29zMS5tZWluZWNsb3VkLmlvL2IxMDE1OC9tZWRpYS9pbWFnZS9mMy84ZC8yOC81NjE4NDkzMTAwMDAxQV82MDB4NjAwLmpwZw==","post_title":"Mathematical and Engineering Methods in Computer Science","deeplink":"https:\/\/track.adtraction.com\/t\/t?a=1632201226&as=1592767275&t=2&tk=1&url=https:\/\/www.weltbild.ch\/artikel\/x\/_21267602-1","labels":[],"brand_id":1,"post_content":"Programming Support for Future Parallel Architectures.- Flexible Interpolation for Efficient Model Checking.- Understanding Transparent and Complicated Users as Instances of Preference Learning for Recommender Systems.- Span-Program-Based Quantum Algorithms for Graph Bipartiteness and Connectivity.- Fitting Aggregation Operators.- Practical Exhaustive Generation of Small Multiway Cuts in Sparse Graphs.- Self-adaptive Architecture for Multi-sensor Embedded Vision System.- Exceptional Configurations of Quantum Walks with Grover's Coin.- Performance Analysis of Distributed Stream Processing Applications Through Colored Petri Nets.- GPU-Accelerated Real-Time Mesh Simplification Using Parallel Half Edge Collapses.- Classifier Ensemble by Semi-supervised Learning: Local Aggregation Methodology.- The Challenge of Increasing Safe Response of Antivirus Software Users.- Weak Memory Models as LLVM-to-LLVM Transformations.","merchants_number":2,"ean":9783319298160,"category_id":103,"size":null,"min_price":118,"low_price_merchant_id":27291482,"ID":4880518,"merchants":["weltbild","euniverse"],"brand":"undefined","slug":"mathematical-and-engineering-methods-in-computer-science-1","url":"\/unterhaltung\/produkt\/mathematical-and-engineering-methods-in-computer-science-1\/","low_price_merchant_name":"Weltbild"}
Produkt merken zur Merkliste
CHF 66.65
Evaluation of Diff. VPN Tunneling Techniques in Virtualized Datacenter
The security of VPN mostly relies on authentication and encryption. The best tunneling protocol must be in use for achieving good results and maintaining better security. The latest type of VPN introduces SSL, which only supported in web servers and browsers. The purpose of SSL is to reduce the complexity of IPsec. IPsec is the best tunnel for encryption because it is in use in differ... zur Produkt-Seite
5439344 {"price-changing":null,"image":"https:\/\/image.vergleiche.ch\/small\/aHR0cHM6Ly9jNC1zdGF0aWMuZG9kYXguY29tL3YyLzE4MC0xODAtMTUwMTY5NzAzXzZ2THlnLXBuZw==!aHR0cHM6Ly9jNC1zdGF0aWMuZG9kYXguY29tL3YyLzE4MC0xODAtMTUwMTY5NzAzXzZ2THlnLXBuZw==","post_title":"Evaluation of Diff. VPN Tunneling Techniques in Virtualized Datacenter","deeplink":"https:\/\/www.awin1.com\/pclick.php?p=27297822209&a=401125&m=11816&pref1=9786202007047","labels":[],"brand_id":1,"post_content":"The security of VPN mostly relies on authentication and encryption. The best tunneling protocol must be in use for achieving good results and maintaining better security. The latest type of VPN introduces SSL, which only supported in web servers and browsers. The purpose of SSL is to reduce the complexity of IPsec. IPsec is the best tunnel for encryption because it is in use in different ways like smart cards, keys and certificates. Traffic monitoring is best possible from end-to-end of the tunnel. All client PCs must remain up to date with security updates. In addition, end users should be in picture about what exercises are viable to perform and the client can use what sort of programs. A VPN protects both ends in such a way that server and clients with proper antivirus installed and windows apprise security features. If client machine is malicious, that could create a loophole, for avoiding this real-time monitoring done. Mostly loophole occurs in VPN due to security updates viruses or worms. Earlier types of VPN not providing enough protection like PPTP and L2TP, later on IPsec encryption introduced which secure traffic.","merchants_number":1,"ean":9786202007047,"category_id":103,"size":null,"min_price":66.650000000000005684341886080801486968994140625,"low_price_merchant_id":1087639,"ID":5439344,"merchants":["dodax"],"brand":"undefined","slug":"evaluation-of-diff-vpn-tunneling-techniques-in-virtualized-datacenter","url":"\/unterhaltung\/produkt\/evaluation-of-diff-vpn-tunneling-techniques-in-virtualized-datacenter\/","low_price_merchant_name":null}
Produkt merken zur Merkliste
CHF 41.25
Metasploit
The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metaspl... zur Produkt-Seite
4418453 {"price-changing":null,"image":"https:\/\/image.vergleiche.ch\/small\/aHR0cHM6Ly9jNC1zdGF0aWMuZG9kYXguY29tL3YyLzE4MC0xODAtMTI0MDQyNjc5X2o3T05WQi1wbmc=!aHR0cHM6Ly9jNC1zdGF0aWMuZG9kYXguY29tL3YyLzE4MC0xODAtMTI0MDQyNjc5X2o3T05WQi1wbmc=","post_title":"Metasploit","deeplink":"https:\/\/www.awin1.com\/pclick.php?p=28479992309&a=401125&m=11816&pref1=9781593272883","labels":[],"brand_id":1,"post_content":"The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.Once you've built your foundation for penetration testing, you'll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.Learn how to:- Find and exploit unmaintained, misconfigured, and unpatched systems- Perform reconnaissance and find valuable information about your target- Bypass antivirus technologies and circumvent security controls- Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery- Use the Meterpreter shell to launch further attacks from inside the network- Harness stand-alone Metasploit utilities, third-party tools, and plug-ins- Learn how to write your own Meterpreter post-exploitation modules and scriptsYou'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test, Metasploit: The Penetration Tester's Guide will take you there and beyond.","merchants_number":1,"ean":9781593272883,"category_id":103,"size":null,"min_price":41.25,"low_price_merchant_id":1087639,"ID":4418453,"merchants":["dodax"],"brand":"undefined","slug":"metasploit","url":"\/unterhaltung\/produkt\/metasploit\/","low_price_merchant_name":null}
Produkt merken zur Merkliste
CHF 46.90
Cybersecurity Essentials
Introduction xixPART I SECURING THE INFRASTRUCTURE 1Chapter 1 Infrastructure Security in the Real World 3Security Challenges 3Infrastructure Security Scenario 1 4Infrastructure Security Scenario 2 6Summary 8Chapter 2 Understanding Access-Control and Monitoring Systems 9A Quick Primer on Infrastructure Security 9Access Control 12Security Policies 14Physical Security Controls 15Locks an... zur Produkt-Seite
5511997 {"price-changing":0,"image":"https:\/\/image.vergleiche.ch\/small\/aHR0cHM6Ly9vczEubWVpbmVjbG91ZC5pby9iMTAxNTgvbWVkaWEvaW1hZ2UvMDgvZjMvN2MvNjI5MjA1MjYwMDAwMUFfNjAweDYwMC5qcGc=!aHR0cHM6Ly9vczEubWVpbmVjbG91ZC5pby9iMTAxNTgvbWVkaWEvaW1hZ2UvMDgvZjMvN2MvNjI5MjA1MjYwMDAwMUFfNjAweDYwMC5qcGd8fnxodHRwczovL2kud2VsdGJpbGQuZGUvcC9jeWJlcnNlY3VyaXR5LWVzc2VudGlhbHMtMzcxMDcyMzgyLmpwZw==","post_title":"Cybersecurity Essentials","deeplink":"https:\/\/cct.connects.ch\/tc.php?t=116298C1969900829T&subid=9781119362395&deepurl=https%3A%2F%2Feuniverse.ch%2Fbuecher%2Fmathematik-naturwissenschaft-technik%2Finformatik-edv%2F337354%2Fcybersecurity-essentials%3FsPartner%3Dtoppreise","labels":[],"brand_id":1,"post_content":"Introduction xixPART I SECURING THE INFRASTRUCTURE 1Chapter 1 Infrastructure Security in the Real World 3Security Challenges 3Infrastructure Security Scenario 1 4Infrastructure Security Scenario 2 6Summary 8Chapter 2 Understanding Access-Control and Monitoring Systems 9A Quick Primer on Infrastructure Security 9Access Control 12Security Policies 14Physical Security Controls 15Locks and Keys 16Standard Key-Locking Deadbolts 17Solenoid-Operated Deadbolt Locks 18Cipher Locks 19Access-Control Gates 20Sliding Gates 20Swinging Gates 21Control Relays 21Authentication Systems 23Magnetic Stripe Readers 24Smart Cards 25RFID Badges 26Biometric Scanners 27Remote-Access Monitoring 29Opened- and Closed-Condition Monitoring 30Automated Access-Control Systems 32Hands-On Exercises 33Discussion 34Procedure 35Review Questions 43Chapter 3 Understanding Video Surveillance Systems 45Video Surveillance Systems 45Cameras 46Hands-On Exercises 60Discussion 61Procedure 61Review Questions 69Chapter 4 Understanding Intrusion-Detection and Reporting Systems 71Intrusion-Detection and Reporting Systems 71Security Controllers 74Sensors 77Vehicle-Detection Sensors 82Fire-Detection Sensors 85Output Devices 87Hands-On Exercises 90Discussion 90Procedure 92Review Questions 94Chapter 5 Infrastructure Security: Review Questions and Hands-On Exercises 97Summary Points 97Security Challenge Scenarios 101Infrastructure Security Scenario 1 101Infrastructure Security Scenario 2 102Professional Feedback 102Review Questions 107Exam Questions 109PART II SECURING LOCAL HOSTS 113Chapter 6 Local Host Security in the Real World 115Security Challenges 115Computing Device Security Scenario 1 116Computing Device Security Scenario 2 117Summary 120Chapter 7 Securing Devices 121The Three Layers of Security 121Securing Host Devices 123Securing Outer-Perimeter Portals 124Additional Inner-Perimeter Access Options 127Hands-On Exercises 137Objectives 137Procedure 137Review Questions 148Chapter 8 Protecting the Inner Perimeter 149The Inner Perimeter 149Operating Systems 151Operating System Security Choices 168Common Operating System Security Tools 169Using Local Administrative Tools 177Implementing Data Encryption 182Hands-On Exercises 188Objectives 188Resources 188Discussion 189Procedures 190Tables 200Lab Questions 201Chapter 9 Protecting Remote Access 203Protecting Local Computing Devices 203Using a Secure Connection 204Establishing and Using a Firewall 204Installing and Using Anti-Malware Software 205Removing Unnecessary Software 205Disabling Nonessential Services 205Disabling Unnecessary OS Default Features 205Securing the Web Browser 205Applying Updates and Patches 206Requiring Strong Passwords 206Implementing Local Protection Tools 206Software-Based Local Firewalls 207Using Local Intrusion-Detection Tools 209Profile-Based Anomaly-Detection Systems 210Threshold-Based Anomaly-Detection Systems 211Configuring Browser Security Options 211Configuring Security Levels 213Configuring Script Support 214Defending Against Malicious Software 218Using Antivirus Programs 220Using Antispyware 221Hardening Operating Systems 222Service Packs 222Patches 222Updates 223Overseeing Application Software Security 223Software Exploitation 223Applying Software Updates and Patches 224Hands-On Exercises 225Objectives 225Resources 225Discussion 225Procedures 226Tables 241Lab Questions 242Chapter 10 Local Host Security: Review Questions and Hands-On Exercises 243Summary Points 243Security Challenge Scenarios 248Computing Device Security Scenario 1 248Computing Device Security Scenario 2 248Professional Feedback 248Review Questions 257Exam Questions 259PART III SECURING LOCAL NETWORKS 263Chapter 11 Local Network Security in the Real World 265Security Challenges 266Local Network Security Scenario 1 266Local Network Security Scenario 2 270Summary 272Chapter 12 Networking Basics 273Understanding the Basics of Networking 273Campus Area Networks or Corporate Area Networks (CANs) 274Metropolitan Area Networks (MANs) 274Wireless Local Area Networks (WLANs) 274Storage Area Networks (SANs) 274The OSI Networking Model 275Layer 1: Physical 276Layer 2: Data Link 276Layer 3: Network 276Layer 4: Transport 276Layer 5: Session 276Layer 6: Presentation 277Layer 7: Application 277Data Transmission Packets 277OSI Layer Security 278Network Topologies 280Bus Topology 280Ring Topology 280Star Topology 281Mesh Topology 282Logical Topologies 282Hands-On Exercises 283Objectives 283Resources 283Discussion 283Procedure 284Lab Questions 295Lab Answers 295Chapter 13 Understanding Networking Protocols 297The Basics of Networking Protocols 297MAC Addresses 298TCP\/IP 299Ethernet 309Network Control Strategies 311Hands-On Exercises 313Objectives 313Discussion 313Procedures 314Lab Questions 325Lab Answers 326Chapter 14 Understanding Network Servers 327The Basics of Network Servers 327Server Security 330Network Administrators 331Server Software Security 335User Accounts 341Network Authentication Options 347Establishing Resource Controls 348Maintaining Server Security 352Vulnerability Scanning 358Hands-On Exercises 361Objectives 361Resources 361Discussion 362Procedures 362Lab Questions 382Lab Answers 382Chapter 15 Understanding Network Connectivity Devices 385Network Switches 386Routers 388Gateways 390Network Bridges 391Wireless Network Connectivity 392Network Connectivity Device Vulnerabilities 392Network Connectivity Device Attacks 393Network Connectivity Defense 397Network Hardening 398Hands-On Exercises 399Objectives 399Resources 399Procedures 399Lab Questions 404Lab Answers 404Chapter 16 Understanding Network Transmission Media Security 407The Basics of Network Transmission Media 407Copper Wire 408Light Waves 410Wireless Signals 412Transmission Media Vulnerabilities 415Securing Wireless Networks 415Hands-On Exercises 417Objectives 417Resources 417Procedure 417Lab Questions 421Lab Answers 421Chapter 17 Local Network Security: Review Questions 423Summary Points 423Security Challenge Scenarios 432Local Network Security Scenario 1 432Local Network Security Scenario 2 432Professional Feedback 432Review Questions 443PART IV SECURING THE PERIMETER 449Chapter 18 Perimeter Security in the Real World 451Security Challenges 451Internet Security Scenario 1 451Internet Security Scenario 2 454Summary 455Chapter 19 Understanding the Environment 457The Basics of Internet Security 457Understanding the Environment 460Basic Internet Concepts 461Internet Services 468Standards and RFCs 470Hands-On Exercises 471Objectives 471Resources 472Discussion 472Procedures 472Lab Questions 486Lab Answers 486Chapter 20 Hiding the Private Network 487Understanding Private Networks 487Network Address Translation 488Port Address Translation 489Port Forwarding or Mapping 490Network Segmentation 492Software-Defined Networking 494Hands-On Exercises 496Objectives 496Resources 496Discussion 496Procedure 497Lab Questions 508Lab Answers 509Chapter 21 Protecting the Perimeter 511Understanding the Perimeter 511Firewalls 515Firewall Considerations 517Network Appliances 519Proxy Servers 520Demilitarized Zones (DMZs) 522Single-Firewall DMZs 523Dual-Firewall DMZs 524Honeypots 525Extranets 526Hands-On Exercises 528Objectives 528Resources 528Procedures 528Lab Questions 534Lab Answers 534Chapter 22 Protecting Data Moving Through the Internet 535Securing Data in Motion 535Authentication 536Encryption 542Cryptography 543Digital Certificates 545Hash Tables 548Cookies 548CAPTCHAs 549Virtual Private Networks 550Hands-On Exercises 552Objectives 552Resources 552Discussion 552Procedures 552Lab Questions 563Lab Answers 563Chapter 23 Tools and Utilities 565Using Basic Tools 565IFconfig\/IPconfig 565Whois 566Nslookup 567PING 567Traceroute 568Telnet 569Secure Shell 570Monitoring Tools and Software 570Nagios 572SolarWinds 572Microsoft Network Monitor 572Wireshark 572Snort 573Nmap 575Nikto 575OpenVAS 575Metasploit 575The Browser Exploitation Framework (BeEF) 576Other Products 576Hands-On Exercises 578Objectives 578Resources 578Discussion 578Procedures 579Capturing a PING 583Lab Questions 589Lab Answers 589Chapter 24 Identifying and Defending Against Vulnerabilities 591Zero Day Vulnerabilities 591Software Exploits 592SQL Injection 594Java 597Other Software Exploits 599Social Engineering Exploits 600Phishing Attacks 600Network Threats and Attacks 603Broadcast Storms 603Session-Hijacking Attacks 604Dictionary Attacks 606Denial of Service (DoS) Attacks 606Tarpitting 611Spam 612Protecting Against Spam Exploits 613Other Exploits 614Transport Layer Security (TLS) Exploits 614FREAK Exploits 615Logjam Exploits 615Hands-On Exercises 616Objectives 616Resources 616Discussion 616Procedures 616Chapter 25 Perimeter Security: Review Questions and Hands-On Exercises 627Summary Points 627Security Scenario Review 637Network Security Scenario 1 637Network Security Scenario 2 637Professional Feedback 637Review Questions 644Exam Questions 647Appendix A 651Appendix B 703Appendix C 715Index 727","merchants_number":2,"ean":9781119362395,"category_id":103,"size":null,"min_price":46.89999999999999857891452847979962825775146484375,"low_price_merchant_id":70255345,"ID":5511997,"merchants":["euniverse","weltbild"],"brand":"undefined","slug":"cybersecurity-essentials","url":"\/unterhaltung\/produkt\/cybersecurity-essentials\/","low_price_merchant_name":"eUniverse"}
undefined
Rising AntiVirus
Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online.Rising is a Chinese ...
undefined
An Artificial Immune Antivirus System
In this book, we consider the aspects of designing a computer immune system for virus detection and elimination using components and techniques fou...
undefined
Foundations and Practice of Security
Malware and Anomaly Detection.- Intrusion Response.- Vulnerability Analysis and Security Metrics.- Privacy and Verification.- Crypto and Communicat...
undefined
Malware Detection in Cloud Computing
This book advocates a new model for malware detection on end hosts based on providing antivirus as an in-cloud network service. This model enables ...
undefined
Gin Tama. Bd.29
Auch Maschinen können krank werden - das müssen Gintoki und Co lernen, als Otose-sans Mechanicon-Maid Tama sich plötzlich einen Computervirus einfä...
undefined
Metamorphic Computer Virus Detection
A metamorphic computer virus employs different obfuscation techniques to mutate its code, in its new instance in the new infected file. The mutated...
undefined
Unified Threat Management
High Quality Content by WIKIPEDIA articles! Unified Threat Management (UTM) is a comprehensive solution that has recently emerged in the network se...
undefined
Economics of Information Security and Priv...
The Impact of Immediate Disclosure on Attack Diffusion and Volume.- Where Do All the Attacks Go?.- Sex, Lies and Cyber-Crime Surveys.- The Undergro...
undefined
Vundo
Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Vundo, or the Vundo...
undefined
Rogue Security Software
Rogue security software (or rogueware) is a form of computer malware that deceives or misleads users into paying for the fake or simulated removal ...
undefined
Mathematical and Engineering Methods in Co...
Programming Support for Future Parallel Architectures.- Flexible Interpolation for Efficient Model Checking.- Understanding Transparent and Complic...
undefined
Evaluation of Diff. VPN Tunneling Techniqu...
The security of VPN mostly relies on authentication and encryption. The best tunneling protocol must be in use for achieving good results and maint...
undefined
Metasploit
The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by ...
undefined
Cybersecurity Essentials
Introduction xixPART I SECURING THE INFRASTRUCTURE 1Chapter 1 Infrastructure Security in the Real World 3Security Challenges 3Infrastructure Securi...