Catálogo de publicaciones

Compartir en
redes sociales


Navegación

Tipo

Acceso

Plataformas

Temática

Mostrando 10 de 11.986 registro(s)

Filtros temática quitar todos

Orthodontic Applications of Biomaterials

Más información

ISBNs: 978-0-08-100383-1 (impreso)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2017 ScienceDirect

Cobertura temática: Ciencias biológicas - Ciencias agrícolas y veterinarias  


Orthogonal Waveforms and Filter Banks for Future Communication Systems

Más información

ISBNs: 978-0-12-810384-5 (impreso)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2017 ScienceDirect

Cobertura temática: Ciencias biológicas - Ciencias agrícolas y veterinarias  


Orthopedic: Secrets

Más información

978-0-323-07191-8 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2015 ScienceDirect

Cobertura temática: Ciencias biológicas - Medicina clínica  

Quickly reference the answers you need to the most important clinical questions in orthopedics with Orthopedic Secrets. Fully updated throughout, this classic medical reference book covers the entire range of essential topics in orthopedics, organized by subspecialty, for rapid access to the knowledge you need for success both in practice and on board and recertification exams.


Orthopoxviruses Pathogenic for Humans

Más información
Autores/as: S. N. Shchelkunov ; S. S. Marennikova ; R. W. Moyer

ISBNs: 978-0-387-25300-8 (impreso) 978-0-387-25306-0 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2005 SpringerLink

Cobertura temática: Ciencias biológicas - Ciencias de la salud  


revistas Acceso Abierto
Agregar a Mi catálogo

ISSNs 0030-6053 (impreso) 1365-3008 (en línea)

Disponibilidad
Institución detectada Período Navegá Descargá Solicitá
No requiere desde ene. 2021 / hasta ene. 2024 Directory of Open Access Journals acceso abierto

Cobertura temática: Ciencias biológicas  


OS X Exploits and Defense

Más información

978-1-59749-254-6 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2008 ScienceDirect

Cobertura temática: Ciencias de la computación e información - Ciencias biológicas  

Contrary to popular belief, there has never been any shortage of Macintosh-related security issues. OS9 had issues that warranted attention. However, due to both ignorance and a lack of research, many of these issues never saw the light of day. No solid techniques were published for executing arbitrary code on OS9, and there are no notable legacy Macintosh exploits. Due to the combined lack of obvious vulnerabilities and accompanying exploits, Macintosh appeared to be a solid platform. Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post-compromise concealment or disturbed denial of service, knowing why the system is vulnerable and understanding how to defend it is critical to computer security.

* Macintosh OS X Boot Process and Forensic Software All the power, all the tools, and all the geekery of Linux is present in Mac OS X. Shell scripts, X11 apps, processes, kernel extensions...it's a UNIX platform....Now, you can master the boot process, and Macintosh forensic software.

* Look Back Before the Flood and Forward Through the 21st Century Threatscape Back in the day, a misunderstanding of Macintosh security was more or less industry-wide. Neither the administrators nor the attackers knew much about the platform. Learn from Kevin Finisterre how and why that has all changed!

* Malicious Macs: Malware and the Mac As OS X moves further from desktops, laptops, and servers into the world of consumer technology (iPhones, iPods, and so on), what are the implications for the further spread of malware and other security breaches? Find out from David Harley.

* Malware Detection and the Mac Understand why the continuing insistence of vociferous Mac zealots that it "can't happen here" is likely to aid OS X exploitationg

* Mac OS X for Pen Testers With its BSD roots, super-slick graphical interface, and near-bulletproof reliability, Apple's Mac OS X provides a great platform for pen testing.

* WarDriving and Wireless Penetration Testing with OS X Configure and utilize the KisMAC WLAN discovery tool to WarDrive. Next, use the information obtained during a WarDrive, to successfully penetrate a customer's wireless network.

* Leopard and Tiger Evasion Follow Larry Hernandez through exploitation techniques, tricks, and features of both OS X Tiger and Leopard, using real-world scenarios for explaining and demonstrating the concepts behind them.

* Encryption Technologies and OS X Apple has come a long way from the bleak days of OS9. THere is now a wide array of encryption choices within Mac OS X. Let Gareth Poreus show you what they are.

* Cuts through the hype with a serious discussion of the security
vulnerabilities of the Mac OS X operating system
* Reveals techniques by which OS X can be "owned"
* Details procedures to defeat these techniques
* Offers a sober look at emerging threats and trends

revistas Acceso Abierto
Agregar a Mi catálogo

ISSNs 2031-8804 (impreso) 2727-3806 (en línea)

Disponibilidad
Institución detectada Período Navegá Descargá Solicitá
No requiere desde ene. 2020 / hasta ene. 2024 Directory of Open Access Journals acceso abierto

Cobertura temática: Ciencias biológicas  


OSSEC Host-Based Intrusion Detection Guide

Más información

978-1-59749-240-9 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2008 ScienceDirect

Cobertura temática: Ciencias de la computación e información - Ciencias biológicas - Ciencias agrícolas y veterinarias  

This book is the definitive guide on the OSSEC Host-based Intrusion Detection system and frankly, to really use OSSEC you are going to need a definitive guide. Documentation has been available since the start of the OSSEC project but, due to time constraints, no formal book has been created to outline the various features and functions of the OSSEC product. This has left very important and powerful features of the product undocumented...until now! The book you are holding will show you how to install and configure OSSEC on the operating system of your choice and provide detailed examples to help prevent and mitigate attacks on your systems. -- Stephen Northcutt OSSEC determines if a host has been compromised in this manner by taking the equivalent of a picture of the host machine in its original, unaltered state. This "picture" captures the most relevant information about that machine's configuration. OSSEC saves this "picture" and then constantly compares it to the current state of that machine to identify anything that may have changed from the original configuration. Now, many of these changes are necessary, harmless, and authorized, such as a system administrator installing a new software upgrade, patch, or application. But, then there are the not-so-harmless changes, like the installation of a rootkit, trojan horse, or virus. Differentiating between the harmless and the not-so-harmless changes determines whether the system administrator or security professional is managing a secure, efficient network or a compromised network which might be funneling credit card numbers out to phishing gangs or storing massive amounts of pornography creating significant liability for that organization. Separating the wheat from the chaff is by no means an easy task. Hence the need for this book. The book is co-authored by Daniel Cid, who is the founder and lead developer of the freely available OSSEC host-based IDS. As such, readers can be certain they are reading the most accurate, timely, and insightful information on OSSEC.

All disc-based content for this title is now available on the Web.



* Nominee for Best Book Bejtlich read in 2008!
* http://taosecurity.blogspot.com/2008/12/best-book-bejtlich-read-in-2008.html


• Get Started with OSSEC
Get an overview of the features of OSSEC including commonly used terminology, pre-install preparation, and deployment considerations.
• Follow Steb-by-Step Installation Instructions
Walk through the installation process for the "local”, “agent”, and "server" install types on some of the most popular operating systems available.
• Master Configuration
Learn the basic configuration options for your install type and learn how to monitor log files, receive remote messages, configure email notification, and configure alert levels.
• Work With Rules
Extract key information from logs using decoders and how you can leverage rules to alert you of strange occurrences on your network.
• Understand System Integrity Check and Rootkit Detection
Monitor binary executable files, system configuration files, and the Microsoft Windows registry.
• Configure Active Response
Configure the active response actions you want and bind the actions to specific rules and sequence of events.
• Use the OSSEC Web User Interface
Install, configure, and use the community-developed, open source web interface available for OSSEC.
• Play in the OSSEC VMware Environment Sandbox
• Dig Deep into Data Log Mining
Take the “high art” of log analysis to the next level by breaking the dependence on the lists of strings or patterns to look for in the logs.

libros Acceso Abierto
Agregar a Mi catálogo

Osseointegrated Oral implants: Mechanisms of Implant Anchorage, Threats and Long-Term Survival Rates

Más información

978-3-03936-641-5 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No requiere Directory of Open access Books acceso abierto

Cobertura temática: Ciencias biológicas - Biotecnología industrial - Ciencias médicas y de la salud - Medicina clínica  


libros Acceso Abierto
Agregar a Mi catálogo

Osteoarthritis: Osteoarthritis

Más información

978-3-0365-3463-3 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No requiere Directory of Open access Books acceso abierto

Cobertura temática: Ciencias naturales - Ciencias biológicas - Ingenieria ambiental - Medios de comunicación