Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
1,542
result(s) for
"Computer worms"
Sort by:
A Government Librarian's Guide to Information Governance and Data Privacy
This book provides a concise and usable overview of the practical implications of important public sector United States federal, state, and municipal laws and standards related to information governance, as they pertain to librarians, research staff, universities, corporate regulatory managers, and public-sector information governance professionals. It is the first in a series of two volumes addressing public sector information governance compliance matters from the perspective of our target audience.
Topics addressed in the book include:
* the evolving role of librarians and the need for librarians and legal researchers to understand the principles of information governance,
* the importance of broad-based regulatory IG principles such as the Federal Records Act, the Paperwork Reduction Act of 1980 and 36 CFR Chapter XII, Subchapter B – Records Management, that have been promulgated by various federal government agencies in framing public-sector IG principles,
* a survey of interpretive surveys from the Office of Management and Budget (OMB) that further elucidate the core IG principles applicable to public sector stakeholders,
* case studies detailing the application of important IG principles by federal agencies and bodies, and
* a survey of important IG issues facing state and local governments.
Learn Kubernetes Security
2020
Secure your container environment against cyberattacks and deliver robust deployments with this practical guide
Key Features
* Explore a variety of Kubernetes components that help you to prevent cyberattacks
* Perform effective resource management and monitoring with Prometheus and built-in Kubernetes tools
* Learn techniques to prevent attackers from compromising applications and accessing resources for crypto-coin mining
Book Description
Kubernetes is an open source orchestration platform for managing containerized applications. Despite widespread adoption of the technology, DevOps engineers might be unaware of the pitfalls of containerized environments. With this comprehensive book, you'll learn how to use the different security integrations available on the Kubernetes platform to safeguard your deployments in a variety of scenarios.
Learn Kubernetes Security starts by taking you through the Kubernetes architecture and the networking model. You'll then learn about the Kubernetes threat model and get to grips with securing clusters. Throughout the book, you'll cover various security aspects such as authentication, authorization, image scanning, and resource monitoring. As you advance, you'll learn about securing cluster components (the kube-apiserver, CoreDNS, and kubelet) and pods (hardening image, security context, and PodSecurityPolicy). With the help of hands-on examples, you'll also learn how to use open source tools such as Anchore, Prometheus, OPA, and Falco to protect your deployments.
By the end of this Kubernetes book, you'll have gained a solid understanding of container security and be able to protect your clusters from cyberattacks and mitigate cybersecurity threats.
What you will learn
* Understand the basics of Kubernetes architecture and networking
* Gain insights into different security integrations provided by the Kubernetes platform
* Delve into Kubernetes' threat modeling and security domains
* Explore different security configurations from a variety of practical examples
* Get to grips with using and deploying open source tools to protect your deployments
* Discover techniques to mitigate or prevent known Kubernetes hacks
Who this book is for
This book is for security consultants, cloud administrators, system administrators, and DevOps engineers interested in securing their container deployments. If you're looking to secure your Kubernetes clusters and cloud-based deployments, you'll find this book useful. A basic understanding of cloud computing and containerization is necessary to make the most of this book.
SQL Injection Strategies
by
Galluccio, Ettore
,
Lombari, Gabriele
,
Caselli, Edoardo
in
COM053000 COMPUTERS / Security / General
,
Computer security
,
COMPUTERS / Programming Languages / SQL
2020
Learn to exploit vulnerable database applications using SQL injection tools and techniques, while understanding how to effectively prevent attacks
Key Features
* Understand SQL injection and its effects on websites and other systems
* Get hands-on with SQL injection using both manual and automated tools
* Explore practical tips for various attack and defense strategies relating to SQL injection
Book Description
SQL injection (SQLi) is probably the most infamous attack that can be unleashed against applications on the internet. SQL Injection Strategies is an end-to-end guide for beginners looking to learn how to perform SQL injection and test the security of web applications, websites, or databases, using both manual and automated techniques. The book serves as both a theoretical and practical guide to take you through the important aspects of SQL injection, both from an attack and a defense perspective.
You'll start with a thorough introduction to SQL injection and its impact on websites and systems. Later, the book features steps to configure a virtual environment, so you can try SQL injection techniques safely on your own computer. These tests can be performed not only on web applications but also on web services and mobile applications that can be used for managing IoT environments. Tools such as sqlmap and others are then covered, helping you understand how to use them effectively to perform SQL injection attacks.
By the end of this book, you will be well-versed with SQL injection, from both the attack and defense perspective.
What you will learn
* Focus on how to defend against SQL injection attacks
* Understand web application security
* Get up and running with a variety of SQL injection concepts
* Become well-versed with different SQL injection scenarios
* Discover SQL injection manual attack techniques
* Delve into SQL injection automated techniques
Who this book is for
This book is ideal for penetration testers, ethical hackers, or anyone who wants to learn about SQL injection and the various attack and defense strategies against this web security vulnerability. No prior knowledge of SQL injection is needed to get started with this book.
A state feedback impulse model for computer worm control
by
Song, Guohua
,
Zhang, Meng
,
Chen, Lansun
in
Automotive Engineering
,
Classical Mechanics
,
Computer simulation
2016
Computer worm is a worldwide threat to the safety of Internet, which caused billions of dollars in damages over the past decade. Software patches have been widely used as one of approaches to protect computers against computer worms. In this study, an impulsive state feedback model was employed to study the transmission of computer worm and the preventive effect of operating system patching. The existence of order-1 periodic solution and its stability were proved with a novel method. The results demonstrated that the application of software patches is an effective approach to constrain the deluge of computer worm. Numerical simulation results were presented to support the theoretical analysis.
Journal Article
Group Policy
by
Moskowitz, Jeremy
in
Computer security
,
Microsoft Windows (Computer file)
,
Operating systems (Computers)
2015
Get up to speed on the latest Group Policy tools, features, and best practices Group Policy, Fundamentals, Security, and the Managed Desktop, 3rd Edition helps you streamline Windows and Windows Server management using the latest Group Policy tools and techniques. This updated edition covers Windows 10 and Windows Server vNext, bringing you up to speed on all the newest settings, features, and best practices. Microsoft Group Policy MVP Jeremy Moskowitz teaches you the major categories of Group Policy, essential troubleshooting techniques, and how to manage your Windows desktops. This is your complete guide to the latest Group Policy features and functions for all modern Windows clients and servers, helping you manage more efficiently and effectively. Perform true desktop and server management with the Group Policy Preferences, ADMX files, and additional add-ons Use every feature of the GPMC and become a top-notch administrator Troubleshoot Group Policy using tools, enhanced logs, Resource Kit utilities, and third-party tools Manage printers, drive maps, restrict hardware, and configure Internet Explorer Deploy software to your desktops, set up roaming profiles, and configure Offline Files for all your Windows clients-and manage it all with Group Policy settings Secure your desktops and servers with AppLocker, Windows Firewall with Advanced Security, and the Security Configuration Manager This is your comprehensive resource to staying current, with expert tips, techniques, and insight.
Biohackers
2015,2013
Biohackers explores fundamental changes occuring in the circulation and ownership of scientific information. Alessandro Delfanti argues that the combination of the ethos of 20th century science, the hacker movement and the free software movement is producing an open science culture which redefines the relationship between researchers, scientific institutions and commercial companies. Biohackers looks at the emergence of the citizen biology community ‘DIYbio’, the shift to open access by the American biologist Craig Venter and the rebellion of the Italian virologist Ilaria Capua against WHO data-sharing policies. Delfanti argues that these biologists and many others are involved in a transformation of both life sciences and information systems, using open access tools and claiming independence from both academic and corporate institutions.
Ethical Hacking Implementation for Lime Worm Ransomware Detection
2020
Nowadays, computer worms become one of the most dangerous types of malwares threats. Computer worms have evolved during the time with sophisticated forms such as crypto type ransomware. Lime worm is one of these worm kinds. The researchers apply this worm on real environment in lab (ethically and for education purposes) and this paper presents the capabilities of this worm. This paper also presents static analysis by applying many tools, which are used to obtain the key information of lime worm. This paper discovers that applying static analysis on this type of worms is very effective and accurate. The obtained key information are used to develop a software for detecting lime worm and the ability to erase it.
Journal Article
Network Protocol Vulnerability Assessment: A Comparative Analysis of SMB Vulnerabilities in Windows Network Environments
This study explained the development of Server Message Block (SMB) and its composition and role as a communication protocol, and delved into the SMBGhost vulnerability (CVE-2020-0796) in Windows network environments. Through strictly controlled experimental variables, it systematically quantifies the exploit success rate under different configurations and evaluates the protective effectiveness of Microsoft’s KB4551762 patch. The experimental results indicate that the exploit success rate for unpatched systems reaches 90%, while applying the patch results in a 37% decline in file transfer performance. To balance security and performance, this paper proposes a lightweight Convolutional Neural Network-Long Short-Term Memory (CNN-LSTM) hybrid detection model, which reduces the false positive rate by 63% compared to traditional Snort rules, achieves a detection accuracy of 96%, and has an inference latency of only 1.8 ms. Key findings include precise delineation of the memory corruption boundaries in the srv2.sys driver, as well as empirical validation of a worm propagation rate of 3.2 devices per second, providing an optimized solution for enterprise network defense that considers both security and performance.
Journal Article
Privacy, Confidentiality, and Health Research
2012
The potential of the e-health revolution, increased data sharing, database linking, biobanks and new techniques such as geolocation and genomics to advance human health is immense. For the full potential to be realized, though, privacy and confidentiality will have to be dealt with carefully. Problematically, many conventional approaches to such pivotal matters as consent, identifiability, and safeguarding and security are inadequate. In many places, research is impeded by an overgrown thicket of laws, regulations, guidance and governance. The challenges are being heightened by the increasing use of biospecimens, and by the globalization of research in a world that has not globalized privacy protection. Drawing on examples from many developed countries and legal jurisdictions, the book critiques the issues, summarizes various ethics, policy, and legal positions (and revisions underway), describes innovative solutions, provides extensive references and suggests ways forward.
Controlling worm propagation in wireless sensor networks: Through fractal-fractional mathematical perspectives
2025
Wireless Sensor Networks (WSNs) are particularly vulnerable to malware attacks due to their limited processing power, memory, and energy, which makes defending against such threats especially challenging. To mitigate these serious security issues caused by malware infection, various preventive measures can be implemented, such as honeypots, robust security protocols, hardware-based protections, regular updates, firewalls, and intrusion detection systems (IDS). Considering these security concerns, we adopt an advanced version of the existing susceptible–infectious–protected–recovered SIPR model that incorporates a fractional-fractal derivative (FFD) defined in the Atangana-Baleanu-Caputo (ABC) sense, which offers a more realistic representation than the classical model. Furthermore, this research work introduced a new isolated nodes compartment 1 , along with parameters γ 2 and δ 1 , defining the recovery and isolation rates of 1 , respectively, in the existing SIPR model. Moreover, this study focuses on the existence and uniqueness of solutions, stability analysis, control theory and numerical approximation for the proposed generalized susceptible–infectious isolated-protected–recovered S I I 1 P R model. Additionally, nonlinear and fixed-point theory are used to obtain the results of existence and stability analysis. On the same line, Newton polynomial-based numerical scheme was established for the proposed modified model. The dynamics of desired results are visualized using MATLAB.
Journal Article