Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
83,588
result(s) for
"Computer viruses."
Sort by:
Combating computer viruses
by
Shea, John M
in
Computer viruses Juvenile literature.
,
Firewalls (Computer security) Juvenile literature.
,
Computer viruses.
2013
Explains electronic infections and viruses, including Trojan horses and worms, and includes safety guidelines to help combat and prevent the spread of these damaging computer programs.
Learn Kubernetes Security
2020,2024
Secure your container environment against cyberattacks and deliver robust deployments with this practical guide
Key Features
* Explore a variety of Kubernetes components that help you to prevent cyberattacks
* Perform effective resource management and monitoring with Prometheus and built-in Kubernetes tools
* Learn techniques to prevent attackers from compromising applications and accessing resources for crypto-coin mining
Book Description
Kubernetes is an open source orchestration platform for managing containerized applications. Despite widespread adoption of the technology, DevOps engineers might be unaware of the pitfalls of containerized environments. With this comprehensive book, you'll learn how to use the different security integrations available on the Kubernetes platform to safeguard your deployments in a variety of scenarios.
Learn Kubernetes Security starts by taking you through the Kubernetes architecture and the networking model. You'll then learn about the Kubernetes threat model and get to grips with securing clusters. Throughout the book, you'll cover various security aspects such as authentication, authorization, image scanning, and resource monitoring. As you advance, you'll learn about securing cluster components (the kube-apiserver, CoreDNS, and kubelet) and pods (hardening image, security context, and PodSecurityPolicy). With the help of hands-on examples, you'll also learn how to use open source tools such as Anchore, Prometheus, OPA, and Falco to protect your deployments.
By the end of this Kubernetes book, you'll have gained a solid understanding of container security and be able to protect your clusters from cyberattacks and mitigate cybersecurity threats.
What you will learn
* Understand the basics of Kubernetes architecture and networking
* Gain insights into different security integrations provided by the Kubernetes platform
* Delve into Kubernetes' threat modeling and security domains
* Explore different security configurations from a variety of practical examples
* Get to grips with using and deploying open source tools to protect your deployments
* Discover techniques to mitigate or prevent known Kubernetes hacks
Who this book is for
This book is for security consultants, cloud administrators, system administrators, and DevOps engineers interested in securing their container deployments. If you're looking to secure your Kubernetes clusters and cloud-based deployments, you'll find this book useful. A basic understanding of cloud computing and containerization is necessary to make the most of this book.
SQL Injection Strategies
by
Galluccio, Ettore
,
Lombari, Gabriele
,
Caselli, Edoardo
in
Computer security
,
COMPUTERS / Security / General
,
Database management
2020,2024
Learn to exploit vulnerable database applications using SQL injection tools and techniques, while understanding how to effectively prevent attacks
Key Features
* Understand SQL injection and its effects on websites and other systems
* Get hands-on with SQL injection using both manual and automated tools
* Explore practical tips for various attack and defense strategies relating to SQL injection
Book Description
SQL injection (SQLi) is probably the most infamous attack that can be unleashed against applications on the internet. SQL Injection Strategies is an end-to-end guide for beginners looking to learn how to perform SQL injection and test the security of web applications, websites, or databases, using both manual and automated techniques. The book serves as both a theoretical and practical guide to take you through the important aspects of SQL injection, both from an attack and a defense perspective.
You'll start with a thorough introduction to SQL injection and its impact on websites and systems. Later, the book features steps to configure a virtual environment, so you can try SQL injection techniques safely on your own computer. These tests can be performed not only on web applications but also on web services and mobile applications that can be used for managing IoT environments. Tools such as sqlmap and others are then covered, helping you understand how to use them effectively to perform SQL injection attacks.
By the end of this book, you will be well-versed with SQL injection, from both the attack and defense perspective.
What you will learn
* Focus on how to defend against SQL injection attacks
* Understand web application security
* Get up and running with a variety of SQL injection concepts
* Become well-versed with different SQL injection scenarios
* Discover SQL injection manual attack techniques
* Delve into SQL injection automated techniques
Who this book is for
This book is ideal for penetration testers, ethical hackers, or anyone who wants to learn about SQL injection and the various attack and defense strategies against this web security vulnerability. No prior knowledge of SQL injection is needed to get started with this book.
Analysis of computer virus propagation behaviors over complex networks: a case study of Oregon routing network
by
Zhang, Zufan
,
Gan, Chenquan
,
Feng, Qingdong
in
Automotive Engineering
,
Classical Mechanics
,
Computer simulation
2020
This paper mainly aims to explore the propagation behaviors of computer virus over complex networks under the combined effects of network topology and removable storage media. To this end, a dynamical model is established and analyzed theoretically, including the outbreak threshold, equilibria and their global dynamics. It is found from the systematic analysis that the virus will die out or persist in the network depending on the outbreak threshold, which is associated with the network topology and removable storage media. Moreover, a set of well-designed experiments are performed over the Oregon routing network to verify the proposed model and its theoretical analysis results. Experimental results show that the predicted results of the model are in good agreement with the simulation results over the above network, and the removable storage media have a great effect on viral spread. To this regard, some preventive measures against virus infection are recommended.
Journal Article
Rules of engagement
\"Rafiq Roshed is one of the most wanted men in the world. A terrorist with a virulent grudge against the West, he's disappeared into North Korea where he quietly launches cyber sneak attacks in service of Kim Jong-un. But now he's about to unleash his virtual masterpiece--a computer virus that, once inserted into the command systems of a military, not only takes over, but also learns the art of war.\"-- Publisher's description.
Stochastic fractional order model for the computational analysis of computer virus
by
Ayaz, Armughan
,
Rehamn, Muhammad Aziz Ur
,
Iqbal, Muhammad Sajid
in
Algorithms
,
Computer Simulation
,
Computer virus
2025
This work presents a novel mathematical framework for analyzing the propagation dynamics of computer viruses by formulating a fractional-order model. The classical integer-order differential model of computer virus spread is reformulated using Caputo fractional derivatives, yielding a fractional computer virus model that captures the inherent memory and persistence characteristics of digital infection processes. A comprehensive analytical investigation is conducted, including the verification of fundamental properties such as positivity and boundedness of the system. The existence and uniqueness of the solutions are rigorously established using the Banach fixed-point theorem. The model exhibits two equilibrium states whose global stability is thoroughly analyzed. To incorporate the stochastic behavior of networked systems, such as fluctuating traffic, random user activity, and unpredictable system responses, the fractional computer virus model is extended into a stochastic fractional computer virus model by introducing white noise terms. Unlike previous studies, which often neglect the combined impact of stochasticity and memory, this research provides a rigorous treatment of both, ensuring the unique solvability of the stochastic fractional computer virus model. A Grunwald–Letnikov-based nonstandard finite difference scheme is developed to obtain reliable numerical approximations of the model while preserving essential qualitative features such as solution positivity and boundedness. Numerical simulations, based on realistic test scenarios, support the theoretical findings and illustrate the complex dynamics introduced by both fractional-order behavior and stochastic influences. This study provides a robust and realistic framework for understanding and predicting the spread of computer viruses in complex digital environments.
Journal Article
A Numerical Study Based on Haar Wavelet Collocation Methods of Fractional-Order Antidotal Computer Virus Model
by
Humphries, Usa Wannasingha
,
Zarin, Rahat
,
Ahmed, Iftikhar
in
Algorithms
,
Calculus
,
Collocation methods
2023
Computer networks can be alerted to possible viruses by using kill signals, which reduces the risk of virus spreading. To analyze the effect of kill signal nodes on virus propagation, we use a fractional-order SIRA model using Caputo derivatives. In our model, we show how a computer virus spreads in a vulnerable system and how it is countered by an antidote. Using the Caputo operator, we fractionalized the model after examining it in deterministic form. The fixed point theory of Schauder and Banach is applied to the model under consideration to determine whether there exists at least one solution and whether the solution is unique. In order to calculate the approximate solution to the model, a general numerical algorithm is established primarily based on Haar collocations and Broyden’s method. In addition to being mathematically fast, the proposed method is also straightforward and applicable to different mathematical models.
Journal Article