Catálogo de publicaciones

Compartir en
redes sociales


Navegación

Tipo

Acceso

Plataformas

Temática

Mostrando 10 de 10.062 registro(s)

Filtros plataforma quitar todos

How to Cheat at VoIP Security

Más información

978-1-59749-169-3 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2007 ScienceDirect

Cobertura temática: Ciencias de la computación e información - Ingeniería de los materiales  

The Perfect Reference for the Multitasked SysAdmin
This is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure.
* VoIP Isn’t Just Another Data Protocol
IP telephony uses the Internet architecture, similar to any other data application. However, from a security administrator’s point of view, VoIP is different. Understand why.
* What Functionality Is Gained, Degraded, or Enhanced on a VoIP Network?
Find out the issues associated with quality of service, emergency 911 service, and the major benefits of VoIP.
* The Security Considerations of Voice Messaging
Learn about the types of security attacks you need to protect against within your voice messaging system.
* Understand the VoIP Communication Architectures
Understand what PSTN is and what it does as well as the H.323 protocol specification, and SIP Functions and features.
* The Support Protocols of VoIP Environments
Learn the services, features, and security implications of DNS, TFTP, HTTP, SNMP, DHCP, RSVP, SDP, and SKINNY.
* Securing the Whole VoIP Infrastructure
Learn about Denial-of-Service attacks, VoIP service disruption, call hijacking and interception, H.323-specific attacks, and SIP-specific attacks.
* Authorized Access Begins with Authentication
Learn the methods of verifying both the user identity and the device identity in order to secure a VoIP network.
* Understand Skype Security
Skype does not log a history like other VoIP solutions; understand the implications of conducting business over a Skype connection.
* Get the Basics of a VoIP Security Policy
Use a sample VoIP Security Policy to understand the components of a complete policy.

*Provides system administrators with hundreds of tips, tricks, and scripts to complete administration tasks more quickly and efficiently
*Short on theory, history, and technical data that ultimately is not helpful in performing their jobs
*Avoid the time drains associated with securing VoIP

How to Cheat at Windows System Administration Using Command Line Scripts: Using Command Line Scripts

Más información

978-1-59749-105-1 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2006 ScienceDirect

Cobertura temática: Ciencias de la computación e información - Ciencias biológicas - Ciencias agrícolas y veterinarias  

How to Cheat at Windows Systems Administrators using Command line scripts teaches system administrators hundreds of powerful, time-saving tips for automating daily system administration tasks using Windows command line scripts.

With every new version of Windows, Microsoft is trying to ease the administration jobs by adding more and more layers of graphical user interface (GUI) or configuration wizards (dialog boxes). While these ‘wizards’ are interactive and make the administrator’s job easier, they are not always the most convenient and efficient way to accomplish the everyday administration tasks. These wizards are time consuming and, at times, may seem a bit confusing. The purpose of the book is to teach administrators how to use command-line scripts to complete everyday administration jobs, solve recurring network problems and at the same time improve their efficiency.

*Provides system administrators with hundreds of tips, tricks, and scripts to complete administration tasks more quickly and efficiently.

*No direct competition for a core tool for Windows administrators.

*Builds on success of other books in the series including How to Cheat at Managing Windows Small Business Server 2003 and How to Cheat at Managing Microsoft Operations Manager 2005.

How to Define and Build an Effective Cyber Threat Intelligence Capability

Más información

978-0-12-802730-1 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2015 ScienceDirect

Cobertura temática: Ciencias de la computación e información - Ciencias químicas  

Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental.

Among thought leaders and advanced organizations, the consensus is now clear. Defensive security measures: antivirus software, firewalls, and other technical controls and post-attack mitigation strategies are no longer sufficient. To adequately protect company assets and ensure business continuity, organizations must be more proactive. Increasingly, this proactive stance is being summarized by the phrase Intelligence-Led Security: the use of data to gain insight into what can happen, who is likely to be involved, how they are likely to attack and, if possible, to predict when attacks are likely to come. In this book, the authors review the current threat-scape and why it requires this new approach, offer a clarifying definition of what Cyber Threat Intelligence is, describe how to communicate its value to business, and lay out concrete steps toward implementing Intelligence-Led Security.

  • Learn how to create a proactive strategy for digital security
  • Use data analysis and threat forecasting to predict and prevent attacks before they start
  • Understand the fundamentals of today's threatscape and how best to organize your defenses

How to Develop Robust Solid Oral Dosage Forms from Conception to Post-Approval

Más información

ISBNs: 978-0-12-804731-6 (impreso)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2017 ScienceDirect

Cobertura temática: Ciencias biológicas - Ingeniería química - Ciencias agrícolas y veterinarias  


How to Own a Shadow: The Chase for Knuth

Más información

978-1-59749-081-8 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2006 ScienceDirect

Cobertura temática: Ciencias de la computación e información - Ciencias biológicas - Ciencias de la salud - Ciencias sociales - Economía y negocios  

The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet.

Stealing the Network: How to Own a Shadow is the final book in Syngress’ ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The book’s companion Web site will also provide special, behind-the-scenes details and hacks for the reader to join in the chase for Knuth.

· The final book in the Stealing the Network series will be a must read for the 50,000 readers worldwide of the first three titles

· The companion Web site to the book will provide challenging scenarios from the book to allow the reader to track down Knuth

· Law enforcement and security professionals will gain practical, technical knowledge for apprehending the most supplicated cyber-adversaries

How to Scale-Up a Wet Granulation End Point Scientifically

Más información

978-0-12-803522-1 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2016 ScienceDirect

Cobertura temática: Medicina básica - Medios de comunicación  

How to Scale-Up a Wet Granulation End Point Scientifically provides a single-source devoted to all relevant information on the scale-up of a wet granulation end point.

Contents include a general description, problem identification, and theoretical background with supporting literature, case studies, potential solutions, and more. By outlining issues related to scale-up and end-point determination, and then using practical examples and advice to address these issues, How to Scale-Up a Wet Granulation End Point Scientifically is a valuable and essential resource for all those pharmaceutical scientists and technologists engaged in the granulation process.

  • Thoroughly referenced and based on the latest research and literature
  • Part of the Expertise in Pharmaceutical Process Technology Series edited by internationally respected expert, Michael Levin
  • Illustrates the most common problems related to scale-up of a wet granulation end point and provides valuable insights on how to solve these problems in a practical way

How to Validate a Pharmaceutical Process: Part of the Expertise in Pharmaceutical Process Technology Series

Más información

978-0-12-804148-2 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2016 ScienceDirect

Cobertura temática: Matemáticas - Medicina básica - Otras ciencias sociales  

How to Validate a Pharmaceutical Process provides a “how to” approach to developing and implementing a sustainable pharmaceutical process validation program. The latest volume in the Expertise in Pharmaceutical Process Technology Series, this book illustrates the methods and reasoning behind processes and protocols.  It also addresses practical problems and offers solutions to qualify and validate a pharmaceutical process. Understanding the “why” is critical to a successful and defensible process validation, making this book an essential research companion for all practitioners engaged in pharmaceutical process validation.

  • Thoroughly referenced and based on the latest research and literature
  • Illustrates the most common issues related to developing and implementing a sustainable process validation program and provides examples on how to be successful
  • Covers important topics such as the lifecycle approach, quality by design, risk assessment, critical process parameters, US and international regulatory guidelines, and more

HPB: The Official Journal of the International Hepato Pacreato Biliary Association

Más información

ISSNs 1365-182X (impreso)

Disponibilidad
Institución detectada Período Navegá Descargá Solicitá
No detectada desde ene. 1999 / ScienceDirect

Cobertura temática: Medicina clínica  


HSPA Evolution: The Fundamentals for Mobile Broadband

Más información

978-0-08-099969-2 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2015 ScienceDirect

Cobertura temática: Ciencias químicas - Ingeniería eléctrica, electrónica e informática - Ingeniería mecánica - Ingeniería de los materiales - Otras ciencias sociales  

This book is essential reading for those wishing to obtain a systems perspective and a broad view on the background, performance and application of the latest developments in HSPA in the context of the demands on today’s mobile broadband devices and networks. It takes the reader behind the scenes of 3GPP and provides an easily accessible understanding of the basic principles, the latest steps in the standard’s evolution, and the motivations behind the development of standardized features. It covers important topics such as smartphone related features, multi-carrier and multi-antenna operation, interface architecture, heterogeneous networks and HSPA system performance. Offering full coverage of recent developments in HSPA up to Release 13, this book will provide a comprehensive description of one of the dominating standards for mobile broadband.

With this book, you will:

  • Get a guided and consistent tour through the evolutionary stages of HSPA
  • Gain an understanding of the 3GPP standardization process, the driving forces behind it, and the need for evolution
  • Learn about the fundamental technology components of a modern wireless communication system, such as basic link level architecture, cellular system behavior, traffic management and scheduling and system management
  • Learn in detail the features of the latest HSPA development up to Release 13
  • Gain a deep insight into the means by which HSPA performance can be simulated and characterized, the factors that drive the performance of networks and user experience, and the performance expectations for the technology
  • Obtain insight into the telecommunications market and its evolution  
  • Learn about current trends and the future direction of HSPA
  • A full insight into the 3GPP and regulatory standardisation processes and the factors that drive evolution of the specification
  • A walk through of the fundamental technology principles that lie behind HSPA
  • A structured overview of the WCDMA/HSPA feature set, offering insider coverage starting from the core release 5/6 technologies and reviewing each of the added features up to and including the most recent developments in the area
  • An overview of the frequency bands available for HSPA
  • An insight into the radio performance requirements, their background and implications for mobiles and networks
  • A tutorial on simulation principles for HSPA
  • A description of the performance of HSPA features within the context of a tutorial on the factors that drive performance

Human Chorionic Gonadotropin (hCG)

Más información

978-0-12-800749-5 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2015 ScienceDirect

Cobertura temática: Ciencias biológicas - Ingeniería de los materiales - Ciencias de la salud  

Human chorionic gonadotropin (hCG) is produced during pregnancy by the embryo. It promotes progesterone production by corpus luteal cells. It also functions in pregnancy to promote angiogenesis in uterine vasculature, it immuno-blands the invading placental tissue so it is not rejected by the maternal uterine tissues, promotes the growth of the uterus in line with the growth of the fetus, promotes the differentiation of growing cytotrophoblast cells, promotes the quiescence of contractions in the uterine myometrium during the course of pregnancy, and also has function in growth and development of fetal organs.

The first edition described the detailed biology, clinical chemistry, and clinical perspectives of hCG and associated molecules, and examines hCG, hyperglycosylated hCG and hCG free ß-subunit, 3 separate and independent molecules with totally sovereign physiological functions.

The second edition will include coverage of the many new discoveries that have been made in the last five years: hCG analogues may be the actual driving signal of all human cancers. The editor estimates that 40% of the out of date material will be excluded and replaced with 40% of the exciting new findings. The book will also have a much clearer pregnancy and cancer focus.

  • It provides comprehensive information on hCG from basic science to clinical medicine
  • The second edition will include coverage of the many new discoveries that have been made in the last five years
  • Updated material with new findings in the field