| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910456752803321 |
|
|
Autore |
Connelly Olly |
|
|
Titolo |
WordPress 3 ultimate security [[electronic resource] ] : protect your WordPress site and its network / / Olly Connelly |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Birmingham, U.K., : Packt Open Source, 2011 |
|
|
|
|
|
|
|
ISBN |
|
1-283-34924-8 |
9786613349248 |
1-84951-211-6 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (408 p.) |
|
|
|
|
|
|
Collana |
|
Community experience distilled |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Computer networks - Security measures |
World Wide Web - Security measures |
Data protection |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: So What's the Risk?; Calculated risk; An overview of our risk; Meet the hackers; White hat; Black hat; Botnets; Cybercriminals; Hacktivists; Scrapers; Script kiddies; Spammers; Misfits; Grey hat; Hackers and crackers; Physically hacked off; Social engineering; Phone calls; Walk-ins; Enticing URLs; Phishing; Social networking (and so on); Protecting against social engineering; Weighing up Windows, Linux, and Mac OS X; The deny-by-default permission model |
The open source advantageSystem security summary; Malwares dissected; Blended threats; Crimeware; Data loggers; At loggerheads with the loggers; Hoax virus; Rootkits; Spyware; Trojan horses; Viruses; Worms; Zero day; World wide worry; Old browser (and other app) versions; Unencrypted traffic; Dodgy sites, social engineering, and phish food; Infected public PCs; Sniffing out problems with wireless; Wireless hotspots; Evil twins; Ground zero; Overall risk to the site and server; Physical server vulnerabilities; Open ports with vulnerable |
|
|
|
|
|
|
|
|
|
|
|
services; Access and authentication issues |
Buffer overflow attacksIntercepting data with man-in-the-middle attacks; Cracking authentication with password attacks; The many dangers of cross-site scripting (XSS); Assorted threats with cross-site request forgery (CSRF); Accessible round-up; Lazy site and server administration; Vulnerable versions; Redundant files; Privilege escalation and jailbreak opportunities; Unchecked information leak; Content theft, SEO pillaging, and spam defacement; Scraping and media hotlinking; Damn spam, rants, and heart attacks; Summary; Chapter 2: Hack or Be Hacked; Introducing the hacker's methodology |
ReconnaissanceScanning; Gain access; Secure access; Cover tracks; Ethical hacking vs. doing time; The reconnaissance phase; What to look for; How to look for it; Google hacking; More on Google hacking; Scouting-assistive applications; Hacking Google hacking with SiteDigger; WHOIS whacking; Demystifying DNS; Resolving a web address; Domain name security; The scanning phase; Mapping out the network; Nmap: the Network Mapper; Secondary scanners; Scanning for server vulnerabilities; Nessus; OpenVAS; GFI Languard; Qualys; NeXpose and Metasploit; Scanning for web vulnerabilities; Wikto; Paros Proxy |
HackerTargetAlternative tools; Hack packs; Summary; Chapter 3: Securing the Local Box; Breaking Windows: considering alternatives; Windows security services; Security or Action Center; Windows Firewall; Windows Update; Internet Options; Windows Defender; User Account Control; Configuring UAC in Vista; Configuring UAC in Windows 7; Disabling UAC at the registry (Vista and 7); UAC problems with Vista Home and Premium; Proactive about anti-malware; The reactionary old guard: detection; Regular antivirus scanners; The proactive new guard: prevention; The almost perfect anti-malware solution |
Comodo Internet Security (CIS) |
|
|
|
|
|
|
Sommario/riassunto |
|
Protect your WordPress site and its network |
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910460507003321 |
|
|
Autore |
Bruweleit Stefan |
|
|
Titolo |
Aspect, tense and action in the Arabic dialect of Beirut / / by Stefan Bruweleit |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Leiden, The Netherlands : , : Koninklijke Brill, , 2015 |
|
©2015 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (283 p.) |
|
|
|
|
|
|
Collana |
|
Studies in Semitic Languages and Linguistics, , 0081-8461 ; ; Volume 79 |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Arabic language - Dialects |
Arabic language - Variation |
Urban dialects - Lebanon - Beirut |
Arabic language - Social aspects |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Preliminary Material -- 1 General Reflections on Universal Grammar -- 2 Tense -- 3 Aspect -- 4 Action -- 5 The Categorial Interplay -- 6 Negation -- 7 The Reference Point in Aspectual and Tense Languages -- 8 Introductory Remarks -- 9 Some Remarks on the Phonology and the Verb Forms -- 10 Anteriority to the Speech Time -- 11 Plural Situations -- 12 Simultaneity with a Reference Point in the Past -- 13 Anteriority to a Reference Point in the Past -- 14 Posteriority to a Reference Point in the Past -- 15 The Speech Time -- 16 Extratemporality -- 17 Posteriority to the Speech Time -- 18 Simultaneity with a Reference Point in the Future -- 19 Anteriority to a Reference Point in the Future -- 20 Verbs of Perception -- 21 Circumstantial Clauses -- 22 Conditional Clauses -- 23 Summary Arranged According to Chapter -- 24 Summary Arranged According to Verb Form -- 25 The Oppositions in the Verbal System -- 26 Some Remarks on the Evolution of the Arabic Verbal System -- 27 Aspects or Discussed and Narrated World? -- 28 Substitution Test -- 29 The Results of this Work -- Texts in the Dialect of Beirut -- Bibliography -- |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
The linguistic categories of aspect, tense and action are closely interrelated. In the first part of Aspect, Tense and Action in the Arabic dialect of Beirut , Stefan Bruweleit defines the three categories and describes the interplay between them at a metagrammatical level. In the next parts he applies the theoretical findings of the first part to the Arabic dialect of Beirut, investigates the ways temporal, aspectual and actional categories are expressed and shows how to decide whether the verb system of the dialect has to be regarded as aspectual or as temporal. One of the main results of the work is the fact that a thorough understanding of a verb system is only possible through an understanding of the categorial interplay of aspect, tense and action. |
|
|
|
|
|
|
|
| |