1.

Record Nr.

UNINA9910713587403321

Titolo

Programmer's guide to MOBILE4 (Mobile Source Emission Factor Model)

Pubbl/distr/stampa

Ann Arbor, MI : , : U.S. Environmental Protection Agency, Office of Air and Radiation, Office of Mobile Sources, Emission Control Technology Division, Test and Evaluation Branch, , 1989

Descrizione fisica

1 online resource (various pagings)

Soggetti

Air - Pollution - Computer simulation

Automobiles - Motors - Exhaust gas - Measurement

Air - Pollution - Measurement

Air - Pollution - Mathematical models

Motor vehicles - Motors - Exhaust gas - Mathematical models

Handbooks and manuals.

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

"July 1989."

"EPA-AA-TEB-89-02."



2.

Record Nr.

UNICAMPANIAVAN00278897

Autore

Ke, Xizheng

Titolo

Spatial Optical-Fiber Coupling Technology in Optical-Wireless Communication / Xizheng Ke

Pubbl/distr/stampa

Singapore, : Springer, 2023

Descrizione fisica

X, 226 p. ; 24 cm

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

3.

Record Nr.

UNINA9910962195803321

Autore

Miller David R

Titolo

Security Administrator Street Smarts : A Real World Guide to CompTIA Security+ Skills

Pubbl/distr/stampa

Hoboken, : Wiley, 2011

ISBN

1-283-17720-X

9786613177209

1-118-11358-6

Edizione

[3rd ed.]

Descrizione fisica

1 online resource (625 p.)

Collana

Street smarts series

Sybex serious skills

Classificazione

COM055000

Altri autori (Persone)

GreggMichael

Disciplina

005.8

Soggetti

Computer networks --Security measures --Examinations --Study guides

Computer security --Examinations --Study guides

Electronic data processing personnel --Certification

Electronic data processing personnel - Certification

Computer security - Examinations

Computer networks - Examinations - Security measures

Engineering & Applied Sciences

Computer Science

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa



Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes index.

Nota di contenuto

CompTIA Discount Coupon; Security Administrator Street Smarts: A Real World Guide to CompTIA Security+TM Skills; Contents; Introduction; Phase 1: The Grunt Work of Security; Task 1.1: Performing an Initial Risk Assessment; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.2: Determining Which Security Policy Is Most Important; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.3: Establishing a User-Awareness Program; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.4: Reviewing a Physical-Security Checklist; Scenario; Scope of Task

ProcedureCriteria for Completion; Task 1.5: Understanding the Value of Documents; Scenario; Scope of Task; Procedure; Criteria for Completion; Phase 2: Hardening Systems; Task 2.1: Managing Services; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.2: Managing Ports; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.3: Patching the Operating System; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.4: Security Templates; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.5: Securing Autoruns; Scenario; Scope of Task

ProcedureCriteria for Completion; Task 2.6: Securing Hardware Devices; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.7: Virtualization; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.8: Locking the Computer Using an Idle Time-out; Scenario; Scope of Task; Procedure; Criteria for Completion; Phase 3: Malicious Software; Task 3.1: Installing, Updating, and Running Antivirus Software; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.2: Using a Rootkit Checker; Scenario; Scope of Task; Procedure; Criteria for Completion

Task 3.3: AdwareScenario; Scope of Task; Procedure; Criteria for Completion; Task 3.4: Using a Spyware Checker; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.5: Malicious Software Removal Tool; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.6: McAfee Site Advisor; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.7: ARP Poisoning with Cain & Abel; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.8: Attacking Authentication with Firesheep; Scenario; Scope of Task; Procedure; Criteria for Completion

Phase 4: Secure StorageTask 4.1: The Encrypting File System; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.2: EFS Data Recovery; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.3: Implementing Syskey; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.4: Converting FAT to NTFS; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.5: Implementing Disk Fault Tolerance with RAID; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.6: Backing Up Data; Scenario; Scope of Task; Procedure

Criteria for Completion

Sommario/riassunto

A step-by-step guide to the tasks involved in security administration If you aspire to a career in security administration, one of your greatest challenges will be gaining hands-on experience. This book takes you through the most common security admin tasks step by step, showing you the way around many of the roadblocks you can expect on the job. It offers a variety of scenarios in each phase of the security administrator's job, giving you the confidence of first-hand experience. In addition, this is an ideal complement to the brand-new, bestselling



CompTIA Security+ Study Guide,