Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Target Audience
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
83,588 result(s) for "Computer viruses."
Sort by:
Combating computer viruses
Explains electronic infections and viruses, including Trojan horses and worms, and includes safety guidelines to help combat and prevent the spread of these damaging computer programs.
Learn Kubernetes Security
Secure your container environment against cyberattacks and deliver robust deployments with this practical guide Key Features * Explore a variety of Kubernetes components that help you to prevent cyberattacks * Perform effective resource management and monitoring with Prometheus and built-in Kubernetes tools * Learn techniques to prevent attackers from compromising applications and accessing resources for crypto-coin mining Book Description Kubernetes is an open source orchestration platform for managing containerized applications. Despite widespread adoption of the technology, DevOps engineers might be unaware of the pitfalls of containerized environments. With this comprehensive book, you'll learn how to use the different security integrations available on the Kubernetes platform to safeguard your deployments in a variety of scenarios. Learn Kubernetes Security starts by taking you through the Kubernetes architecture and the networking model. You'll then learn about the Kubernetes threat model and get to grips with securing clusters. Throughout the book, you'll cover various security aspects such as authentication, authorization, image scanning, and resource monitoring. As you advance, you'll learn about securing cluster components (the kube-apiserver, CoreDNS, and kubelet) and pods (hardening image, security context, and PodSecurityPolicy). With the help of hands-on examples, you'll also learn how to use open source tools such as Anchore, Prometheus, OPA, and Falco to protect your deployments. By the end of this Kubernetes book, you'll have gained a solid understanding of container security and be able to protect your clusters from cyberattacks and mitigate cybersecurity threats. What you will learn * Understand the basics of Kubernetes architecture and networking * Gain insights into different security integrations provided by the Kubernetes platform * Delve into Kubernetes' threat modeling and security domains * Explore different security configurations from a variety of practical examples * Get to grips with using and deploying open source tools to protect your deployments * Discover techniques to mitigate or prevent known Kubernetes hacks Who this book is for This book is for security consultants, cloud administrators, system administrators, and DevOps engineers interested in securing their container deployments. If you're looking to secure your Kubernetes clusters and cloud-based deployments, you'll find this book useful. A basic understanding of cloud computing and containerization is necessary to make the most of this book.
SQL Injection Strategies
Learn to exploit vulnerable database applications using SQL injection tools and techniques, while understanding how to effectively prevent attacks Key Features * Understand SQL injection and its effects on websites and other systems * Get hands-on with SQL injection using both manual and automated tools * Explore practical tips for various attack and defense strategies relating to SQL injection Book Description SQL injection (SQLi) is probably the most infamous attack that can be unleashed against applications on the internet. SQL Injection Strategies is an end-to-end guide for beginners looking to learn how to perform SQL injection and test the security of web applications, websites, or databases, using both manual and automated techniques. The book serves as both a theoretical and practical guide to take you through the important aspects of SQL injection, both from an attack and a defense perspective. You'll start with a thorough introduction to SQL injection and its impact on websites and systems. Later, the book features steps to configure a virtual environment, so you can try SQL injection techniques safely on your own computer. These tests can be performed not only on web applications but also on web services and mobile applications that can be used for managing IoT environments. Tools such as sqlmap and others are then covered, helping you understand how to use them effectively to perform SQL injection attacks. By the end of this book, you will be well-versed with SQL injection, from both the attack and defense perspective. What you will learn * Focus on how to defend against SQL injection attacks * Understand web application security * Get up and running with a variety of SQL injection concepts * Become well-versed with different SQL injection scenarios * Discover SQL injection manual attack techniques * Delve into SQL injection automated techniques Who this book is for This book is ideal for penetration testers, ethical hackers, or anyone who wants to learn about SQL injection and the various attack and defense strategies against this web security vulnerability. No prior knowledge of SQL injection is needed to get started with this book.
Analysis of computer virus propagation behaviors over complex networks: a case study of Oregon routing network
This paper mainly aims to explore the propagation behaviors of computer virus over complex networks under the combined effects of network topology and removable storage media. To this end, a dynamical model is established and analyzed theoretically, including the outbreak threshold, equilibria and their global dynamics. It is found from the systematic analysis that the virus will die out or persist in the network depending on the outbreak threshold, which is associated with the network topology and removable storage media. Moreover, a set of well-designed experiments are performed over the Oregon routing network to verify the proposed model and its theoretical analysis results. Experimental results show that the predicted results of the model are in good agreement with the simulation results over the above network, and the removable storage media have a great effect on viral spread. To this regard, some preventive measures against virus infection are recommended.
Rules of engagement
\"Rafiq Roshed is one of the most wanted men in the world. A terrorist with a virulent grudge against the West, he's disappeared into North Korea where he quietly launches cyber sneak attacks in service of Kim Jong-un. But now he's about to unleash his virtual masterpiece--a computer virus that, once inserted into the command systems of a military, not only takes over, but also learns the art of war.\"-- Publisher's description.
Stochastic fractional order model for the computational analysis of computer virus
This work presents a novel mathematical framework for analyzing the propagation dynamics of computer viruses by formulating a fractional-order model. The classical integer-order differential model of computer virus spread is reformulated using Caputo fractional derivatives, yielding a fractional computer virus model that captures the inherent memory and persistence characteristics of digital infection processes. A comprehensive analytical investigation is conducted, including the verification of fundamental properties such as positivity and boundedness of the system. The existence and uniqueness of the solutions are rigorously established using the Banach fixed-point theorem. The model exhibits two equilibrium states whose global stability is thoroughly analyzed. To incorporate the stochastic behavior of networked systems, such as fluctuating traffic, random user activity, and unpredictable system responses, the fractional computer virus model is extended into a stochastic fractional computer virus model by introducing white noise terms. Unlike previous studies, which often neglect the combined impact of stochasticity and memory, this research provides a rigorous treatment of both, ensuring the unique solvability of the stochastic fractional computer virus model. A Grunwald–Letnikov-based nonstandard finite difference scheme is developed to obtain reliable numerical approximations of the model while preserving essential qualitative features such as solution positivity and boundedness. Numerical simulations, based on realistic test scenarios, support the theoretical findings and illustrate the complex dynamics introduced by both fractional-order behavior and stochastic influences. This study provides a robust and realistic framework for understanding and predicting the spread of computer viruses in complex digital environments.
A Numerical Study Based on Haar Wavelet Collocation Methods of Fractional-Order Antidotal Computer Virus Model
Computer networks can be alerted to possible viruses by using kill signals, which reduces the risk of virus spreading. To analyze the effect of kill signal nodes on virus propagation, we use a fractional-order SIRA model using Caputo derivatives. In our model, we show how a computer virus spreads in a vulnerable system and how it is countered by an antidote. Using the Caputo operator, we fractionalized the model after examining it in deterministic form. The fixed point theory of Schauder and Banach is applied to the model under consideration to determine whether there exists at least one solution and whether the solution is unique. In order to calculate the approximate solution to the model, a general numerical algorithm is established primarily based on Haar collocations and Broyden’s method. In addition to being mathematically fast, the proposed method is also straightforward and applicable to different mathematical models.