07843nam 22008415 450 99646621150331620201107132706.03-642-33675-210.1007/978-3-642-33675-1(CKB)3400000000086263(SSID)ssj0000767475(PQKBManifestationID)11429490(PQKBTitleCode)TC0000767475(PQKBWorkID)10740460(PQKB)10497920(DE-He213)978-3-642-33675-1(MiAaPQ)EBC3070300(PPN)168325128(EXLCZ)99340000000008626320120910d2012 u| 0engurnn#008mamaatxtccrComputer Safety, Reliability, and Security[electronic resource] SAFECOMP 2012 Workshops: Sassur, ASCoMS, DESEC4LCCI, ERCIM/EWICS, IWDE, Magdeburg, Germany, September 25-28, 2012, Proceedings /edited by Frank Ortmeier, Peter Daniel1st ed. 2012.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2012.1 online resource (XVI, 530 p. 198 illus.)Programming and Software Engineering ;7613International conference proceedings.3-642-33674-4 Includes bibliographical references and author index.Introduction to Sassur 2012 -- AdvoCATE: An Assurance Case Automation Toolset -- Towards a Case-Based Reasoning Approach for Safety Assurance Reuse -- Modeling for Safety in a Synthesis-Centric Systems Engineering Framework -- A Model Based Approach for Safety Analysis -- Towards a Model-Based Evolutionary Chain of Evidence for Compliance with Safety Standards -- A New Approach to Assessment of Confidence in Assurance Cases -- An Unified Meta-model for Trustworthy Systems Engineering -- A Preliminary Fault Injection Framework for Evaluating Multicore Systems -- Meeting Real-Time Requirements with Multi-core Processors -- Assessing Software Interference Management When Modifying Safety-Related Software -- Introduction to ASCoMS 2012 -- Towards Dependable and Stable Perception in Smart Environments with Timing and Value Faults -- An Approach Supporting Fault-Propagation Analysis for Smart Sensor Systems -- Use of Quality Metrics for Functional Safety in Systems of Cooperative Vehicles -- From Autonomous Vehicles to Safer Cars: Selected Challenges for the Software Engineering -- Modelling of Safety-Related Timing Constraints for Automotive Embedded Systems -- Introduction to DESEC4LCCI 2012 -- Quantitative Security Evaluation of a Multi-biometric Authentication System -- Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology -- On Securing Communications among Federated Health Information Systems -- How Secure Is ERTMS -- International Cooperation Experiences: Results Achieved, Lessons Learned, and Way Ahead -- A Federated Simulation Framework with ATN Fault Injection Module for Reliability Analysis of UAVs in Non-controlled Airspace -- HSIENA: A Hybrid Publish/Subscribe System -- WSDM-Enabled Autonomic Augmentation of Classical Multi-version Software Fault-Tolerance Mechanisms -- Formal Verification of a Safety Argumentation and Application to a Complex UAV System -- Electronic Reliability Estimation: How Reliable Are the Results -- Model-Based Assessment of Multi-region Electric Power Systems Showing Heterogeneous Characteristics.-Introduction to the ERCIM/EWICS Cyberphysical Systems Workshop 2012 -- The Cyber-Physical Attacker -- Dependable and Secure Embedded Node Demonstrator -- Towards Secure Time-Triggered Systems -- Towards a Framework for Simulation Based Design, Validation and Performance Analysis of Electronic Control Systems -- Compiling for Time Predictability -- Towards the Automated Qualification of Tool Chain Design -- A Systematic Elaboration of Safety Requirements in the Avionic Domain -- Parallel NuSMV: A NuSMV Extension for the Verification of Complex Embedded Systems -- Supporting Assurance by Evidence-Based Argument Services -- Towards Composable Robotics: The R3-COP Knowledge-Base Driven Technology Platform -- Addressing the Needs of an Aging Population: An Experiment for Monitoring Behaviour in a Domestic Environment -- Introduction to IWDE 2012 -- Modeling the Effects of Software on Safety and Reliability in Complex Embedded Systems -- Towards Artificial Perception -- A Case Study of Radio-Based Monitoring System for Enhanced Safety of Logistics Processes -- Visual Approach Facilitating the Importance Analysis of Component Fault Trees -- Simulation of Structural Effects in Embedded Systems and Visualization of Dependencies According to an Intended Attack or Manipulation -- From Discrete Event Simulation to Virtual Reality Environments -- Program Comprehension in Preprocessor-Based Software.This book constitutes the refereed proceedings of 5 workshops colocated with SAFECOMP 2012, the 31st International Conference on Computer Safety, Reliability, and Security, held in Magdeburg, Germany, in September 2012. The 49 revised full papers presented were carefully reviewed and selected from numerous submissions. According to the workshops covered, the papers are organized in topical sections on: next generation of system assurance approaches for safety-critical systems (Sassur), architecting safety in collaborative mobile systems (ASCoMS), dependable and secure computing for large-scale complex critical infrastructures (DESEC4LCCI), ERCIM/EWICS/cyberphysical systems (ERCIM/EWICS), and on digital engineering (IWDE).Programming and Software Engineering ;7613Computer securityComputer communication systemsComputer logicArtificial intelligenceSoftware engineeringComputers and civilizationSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Logics and Meanings of Programshttps://scigraph.springernature.com/ontologies/product-market-codes/I1603XArtificial Intelligencehttps://scigraph.springernature.com/ontologies/product-market-codes/I21000Software Engineeringhttps://scigraph.springernature.com/ontologies/product-market-codes/I14029Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Conference proceedings.fastComputer security.Computer communication systems.Computer logic.Artificial intelligence.Software engineering.Computers and civilization.Systems and Data Security.Computer Communication Networks.Logics and Meanings of Programs.Artificial Intelligence.Software Engineering.Computers and Society.005.8Ortmeier Frankedthttp://id.loc.gov/vocabulary/relators/edtDaniel Peteredthttp://id.loc.gov/vocabulary/relators/edtSassur (Workshop)(2012 :Magdeburg, Germany)ASCoMS 2012(2012 :Magdeburg, Germany)DESEC4LCCI 2012(2012 :Magdeburg, Germany)ERCIM/EWICS 2012(2012 :Magdeburg, Germany)International Workshop on Digital Engineering(2012 :Magdeburg, Germany)BOOK996466211503316Computer Safety, Reliability, and Security2175020UNISA05291nam 22006494a 450 991078423170332120230617004749.01-280-19832-X97866101983200-470-79836-X0-470-75525-31-4051-4607-9(CKB)1000000000342064(EBL)233081(OCoLC)437147401(SSID)ssj0000160075(PQKBManifestationID)11183349(PQKBTitleCode)TC0000160075(PQKBWorkID)10182549(PQKB)10709460(MiAaPQ)EBC233081(Au-PeEL)EBL233081(CaPaEBR)ebr10243497(CaONFJC)MIL19832(EXLCZ)99100000000034206420030602d2003 uy 0engur|n|---|||||txtccrFungal infection[electronic resource] diagnosis and management /Malcolm D. Richardson, David W. Warnock3rd ed.Malden, Mass. Blackwell20031 online resource (394 p.)Description based upon print version of record.1-4051-1578-5 Includes bibliographical references and index.""Fungal Infection: Diagnosis and Management""; ""Contents""; ""Preface to the third edition""; ""Preface to the first edition""; ""Acknowledgements""; ""1 Introduction""; ""1.1 The nature of fungi""; ""1.2 Classification and nomenclature of fungi and fungal diseases""; ""1.3 Fungi as human pathogens""; ""1.3.1 The superficial mycoses""; ""1.3.2 The subcutaneous mycoses""; ""1.3.3 The systemic mycoses""; ""1.4 The changing pattern of fungal infection""; ""1.5 New directions in diagnosis""; ""1.6 New directions in treatment and prevention""; ""2 Laboratory diagnosis of fungal infection""""2.1 Introduction""""2.2 Collection of specimens""; ""2.2.1 Skin, nails and hair""; ""2.2.2 Mucous membranes""; ""2.2.3 Ear""; ""2.2.4 Eye""; ""2.2.5 Blood""; ""2.2.6 Cerebrospinal fluid""; ""2.2.7 Urine""; ""2.2.8 Other fluids""; ""2.2.9 Lower respiratory tract specimens""; ""2.2.10 Pus""; ""2.2.11 Bone marrow""; ""2.2.12 Tissue""; ""2.3 Specimens for serological tests""; ""2.4 Specimens for antifungal drug level determinations""; ""2.5 Transport of specimens""; ""2.6 Interpretation of laboratory test result""; ""2.6.1 Direct microscopic examination""""2.6.2 Histopathological examination""""2.6.3 Culture""; ""2.6.4 Serological tests""; ""2.7 Molecular diagnosis of fungal infection""; ""3 Antifungal drugs""; ""3.1 Introduction""; ""3.2 Amphotericin B""; ""3.2.1 Mechanism of action""; ""3.2.2 Spectrum of action""; ""3.2.3 Acquired resistance""; ""3.2.4 Pharmacokinetics""; ""3.2.5 Pharmaceutics""; ""3.2.6 Therapeutic use""; ""3.2.7 Mode of administration""; ""3.2.8 Adverse reactions,""; ""3.2.9 Drug interactions""; ""3.3 Other polyene compounds for topical administration""; ""3.3.1 Natamycin""; ""3.3.2 Nystatin""; ""3.4 Fluconazole""""3.4.1 Mechanism of action""""3.4.2 Spectrum of action""; ""3.4.3 Acquired resistance""; ""3.4.4 Pharmacokinetics""; ""3.4.5 Pharmaceutics""; ""3.4.6 Therapeutic use""; ""3.4.7 Mode of administration""; ""3.4.8 Adverse reactions""; ""3.4.9 Drug interactions""; ""3.5 Itraconazole""; ""3.5.1 Mechanism of action""; ""3.5.2 Spectrum of action""; ""3.5.3 Acquired resistance""; ""3.5.4 Pharmacokinetics""; ""3.5.5 Pharmaceutics""; ""3.5.6 Therapeutic use""; ""3.5.7 Mode of administration""; ""3.5.8 Adverse reactions""; ""3.5.9 Drug interactions""; ""3.6 Ketoconazole""; ""3.6.1 Mechanism of action""""3.6.2 Spectrum of action""""3.6.3 Acquired resistance""; ""3.6.4 Pharmacokinetics""; ""3.6.5 Pharmaceutics""; ""3.6.6 Therapeutic use""; ""3.6.7 Mode of administration""; ""3.6.8 Adverse reactions""; ""3.6.9 Drug interactions""; ""3.7 Voriconazole""; ""3.7.1 Mechanism of action""; ""3.7.2 Spectrum of action""; ""3.7.3 Acquired resistance""; ""3.7.4 Pharmacokinetics""; ""3.7.5 Pharmaceutics""; ""3.7.6 Therapeutic use""; ""3.7.7 Mode of administration""; ""3.7.8 Adverse reactions""; ""3.7.9 Drug interactions""; ""3.8 Other imidazole compounds for topical administration""; ""3.8.1 Bifonazole""""3.8.2 Butoconazole""Concise, up-to-date guide to the clinical manifestations, laboratory diagnosis and management of superficial, subcutaneous and systemic fungal infections ""I would recommend this book to all microbiologists and clinicians regularly dealing with patients suffering from fungal infections."" Journal of Medical Microbiology WHY BUY THIS BOOK? Thorough update of significant developments in the diagnosis and management of fungal infections Up-to-date drug and dosage recommendations updated in line with current guidelines New feature: epidemiology and prevention section in each chapter pluMycosesMycoses.616.9/69Richardson M. D860654Warnock D. W864389MiAaPQMiAaPQMiAaPQBOOK9910784231703321Fungal infection1929353UNINA05880nam 22007573u 450 991078147900332120230725050819.01-283-17725-097866131772541-118-11454-X(CKB)2550000000040634(EBL)693645(OCoLC)747412541(SSID)ssj0000539129(PQKBManifestationID)11357033(PQKBTitleCode)TC0000539129(PQKBWorkID)10568613(PQKB)10439950(MiAaPQ)EBC693645(EXLCZ)99255000000004063420131028d2011 uy| 0engur|nu---|||||txtrdacontentcrdamediacrrdacarrierMicrosoft Windows Security[electronic resource] Essentials /Darril GibsonHoboken Wiley2011Indiana Wiley20111 online resource (374 p.)Sybex serious skillsEssentials (Indianapolis, Ind.)Description based upon print version of record.1-118-72244-2 1-118-01684-X Microsoft Windows Security Essentials; Introduction; Who Should Read This Book; What You Will Learn; Prerequisites; What You Need; What Is Covered in This Book; Chapter 1: Understanding Core Security Principles; Understanding Risk; Exploring the Security Triad; Protecting Against Loss of Confidentiality; Protecting Against Loss of Availability; Protecting Against Loss of Integrity; Implementing a Defense-in-Depth Security Strategy; Enforcing the Principle of Least Privilege; Hardening a Server; Reducing the Attack Surface; Keeping a System Updated; Enabling the FirewallInstalling Antivirus Software Chapter 2: Understanding Malware and Social Engineering; Comparing Malware; Viruses; Worms; Trojan Horses; Buffer-Overflow Attacks; Spyware; Understanding the Threat; Protecting Against Malware; Using Antivirus Software; Using Microsoft Security Essentials on Desktops; Thwarting Social-Engineering Attacks; Social Engineering in Person; Social Engineering with a Phone Call; Recognizing Phishing Attempts; Recognizing Pharming; Protecting Email; Chapter 3: Understanding User Authentication; Comparing the Three Factors of AuthenticationUsing Passwords for Authentication Comparing Password Attack Methods; Creating Strong Passwords; Enforcing Strong Passwords; Exploring Account Lockout Policies; Unlocking an Account; Resetting a Password; Changing a Password; Creating a Password-Reset Disk; Using Smart Cards and Token Devices for Authentication; Using Biometrics for Authentication; Starting Applications with Run As Administrator; Preventing Time Skew with Kerberos; Identifying RADIUS Capabilities; Identifying Unsecure Authentication Protocols; LM; NTLM (NTLMv1); Chapter 4: Securing Access with PermissionsComparing NTFS Permissions Identifying Basic NTFS Permissions; Identifying Advanced NTFS Permissions; Combining Permissions; Enabling and Disabling Permission Inheritance; Moving and Copying Files; Comparing NTFS and FAT; Exploring Share Permissions; Identifying Share Permissions; Combining NTFS and Share Permissions; Identifying Active Directory Permissions; Viewing Active Directory Users and Computers; Comparing NTFS and Active Directory Permissions; Viewing Active Directory Permissions; Assigning Registry Permissions; Chapter 5: Using Audit Policies and Network AuditingExploring Audit Policies Exploring Object Access Auditing; Comparing Account Logon and Logon Events; Exploring Directory Service Access Auditing; Understanding Account Management Auditing; Understanding System Events Auditing; Understanding Privilege Use Auditing; Understanding Policy Change Auditing; Understanding Process Tracking; Enabling Auditing; Enabling Object Access Auditing; Enabling Directory Service Access Auditing; Viewing Audit Information; Managing Security Logs; Saving Audit Information; Securing Audit Information; Auditing a Network with MBSA; Installing MBSA; Running MBSAChapter 6: Protecting Clients and ServersWindows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to beSerious skillsElectronic data processing personnelCertificationStudy guidesComputer networksExaminationsStudy guidesComputer networks - ExaminationsComputer networks -- Examinations -- Study guidesComputer security - ExaminationsElectronic data processing personnel - CertificationElectronic data processing personnelCertificationComputer networksExaminationsComputer networks - Examinations.Computer networks -- Examinations -- Study guides.Computer security - Examinations.Electronic data processing personnel - Certification.005.8621.3916076Gibson Darril1122631AU-PeELAU-PeELAU-PeELAzTeSBOOK9910781479003321Microsoft Windows Security3868170UNINA