Search Results - "worm"
Suggested Topics within your search.
Suggested Topics within your search.
- Machine design 7
- Computer security 6
- History 2
- Malware (Computer software) 2
- Arthropod Vectors 1
- Arthropod vectors 1
- Arthropods 1
- Bites and Stings 1
- Civilization 1
- Civilization, medieval 1
- Communicable Diseases 1
- Computer crimes 1
- Computer hackers 1
- Computer network 1
- Computer networks 1
- Computer viruses 1
- Cyberterrorism 1
- Dermatology 1
- Doctrines 1
- Equipment and supplies 1
- Examinations 1
- Family Practice 1
- Family medicine 1
- Helminthiasis 1
- Helminths 1
- Immune System 1
- Immunity 1
- Infection 1
- Islam 1
- Islam and science 1
-
1
-
2
-
3
-
4
-
5
-
6
-
7
The Cheerful Cricket and Others
Published 2005“…The cheerful cricket -- The slothful toad -- The sullen caterpillar -- The green inch worm -- The mean spider -- The Marsh Grass Vesper Quartette -- The noisy fly -- The dizzy moth -- The honest ant -- The walking stick -- Lady Bug and Mrs. …”
Get full text
Rights
Electronic eBook -
8
The Lilac Fairy Book
Published 2002“…The Shifty Lad -- The False Prince and the True -- The Jogi's Punishment -- The Heart of a Monkey -- The Fairy Nurse -- A Lost Paradise -- How Brave Walter Hunted Wolves -- The Ring of the Waterfalls -- A French Puck -- The Three Crowns -- The Story of a Very Bad Boy -- The Brown Bear of Norway -- Little Lasse -- 'Moti' -- The Enchanted Deer -- A Fish Story -- The Wonderful Tune -- The Rich Brother and the Poor Brother -- The One-Handed Girl -- The Bones of Djulung -- The Sea Ring's Gift -- The Raspberry Worm -- The Stones of Plouhinec -- The Castle of Kerglas -- The Battle of the Birds -- The Lady of the Fountain -- The Four Gifts -- The Groac'h of the Isle of Lok -- The Escape of the Mouse -- The Believing Husbands -- The Hoodie-Crow -- The Brownie of the Lake -- The Winning of Olwen.…”
Get full text
Rights
Electronic eBook -
9
Working on yourself doesn't work the 3 simple ideas that will instantaneously transform your life /
Published 2009Table of Contents: “…-- The principles of instantaneous transformation -- Prejudices -- Instantaneous transformation -- The birth of the present -- W.O.R.M.S. -- Decisions versus choices.…”
NetLibrary
MyiLibrary
Electronic eBook -
10
A history of cyber security attacks 1980 to present
Published 2017Table of Contents: “…The 1980s -- Kevin Mitnick -- The 414s -- Legion of doom -- Chaos computer club -- Fry guy -- Fred Cohen -- Morris worm (internet worm) -- The 1990s -- Nahshon even-chaim -- Masters of deception -- Operation sun devil -- Griffiss AFB and the Korean Atomic Research Institute -- Ehud Tenenbaum -- The Brotherhood of Warez -- The 2000s -- Mafiaboy -- Operation Shady Rat - 2006 -- Night dragon - 2006 -- Zeus - 2007 -- Operation aurora - 2009 -- Stuxnet - 2010 -- Operation potao express - 2011 -- Saudi Aramco - 2012 -- Target data breach - 2013 -- Neiman Marcus - 2013 -- Michaels attack - 2013 -- P.F. …”
Book -
11
Graphic guide to infectious disease
Published 2019Table of Contents: “…Viral hepatitis -- Infectious diarrhea -- Childhood illnesses -- Tick-borne illness -- Worms -- Fungal infections -- Sexually transmitted diseases -- Pulmonary infections -- Mosquito borne diseases -- Rat, flea, and louse borne diseases -- Oropharyngeal infections -- Viral -- Parasites and prions -- Bacterial…”
Book -
12
Mechanical engineering design
Published 1989Table of Contents: “…Part one: Basics -- Introduction -- Stress -- Deflection and stiffness -- Statistical considerations -- Part two: Failure prevention -- Materials -- Steady loading -- Variable loading -- Part three: Design of mechanical elements -- The design of screws, fasteners, and connections -- Welded, brazed, and bonded joints -- Mechanical springs -- Rolling contect bearings -- Lubrication and journal bearings -- Gearing -- general -- Spur and helical gears -- Bevel and worm gears -- Clutches, brakes, couplings, and flywheels -- Flexible mechanical elements -- Shafts, axles, and spindles.…”
Book -
13
-
14
Network and internetwork security principles and practice
Published 1995Table of Contents: “…Intruders, Viruses, and Worms -- Ch. 7. Cryptographic Algorithms -- Ch. 8. …”
Book -
15
Machine design design of transmission systems
Published 2012Table of Contents: “…Bevel - gear drives -- 10. Worm - gear drives -- 11. Gear - box -- 12. Power screws -- 13. …”
Book -
16
Machine design design of transmission systems
Published 2012Table of Contents: “…Bevel - gear drives -- 10. Worm - gear drives -- 11. Gear - box -- 12. Power screws -- 13. …”
Book -
17
Mechanical engineering design
Published 2001Table of Contents: “…Screws, fasteners, and the design of nonpermanent joints -- Welding, brazing, bonding, and the design of permanent joints -- Mechanical springs -- Rolling-contact bearings -- Lubrication and journal bearings -- Gearings--general -- Spur and helical gears -- Bevel and worm gears -- Clutches, breakes, couplings, and flywheels -- Flexible mechanical elements -- Shafts and axles.…”
Book -
18
Guide to operating systems security
Published 2004Table of Contents: “…Operating Systems Security: Keeping Computers and Networks Secure -- 2. Viruses, Worms, and Malicious Software -- 3. Security Through Authentication and Encryption -- 4. …”
Book -
19
Essentials in dermatology, venereology & leprology
Published 2015Table of Contents: “…Structure of human skin -- Approach to diagnosis in dermatology -- Skin diseases caused by protozoa, arthropods and parasitic worms -- Cutaneous infections -- Eczemas -- Genetics and genodermatoses -- Vesiculobullous diseases -- Papulosquamous disorders -- Disorders of connective tissue -- Disorders of skin appendages -- Disorders of pigmentation -- Leg ulcers and other disorders of vascular insufficiency -- Urticaria, mastocytosis, pruritus and other vascular responses -- Disorders due to cold, light, heat and radiation -- Drug reactions -- Nevi and skin tumors -- Cutaneous manifestations of internal diseases -- Miscellaneous cutaneous diseases -- Glucocorticoids -- Dermatotherapeutics -- Sexually transmitted infections -- Leprosy -- Cosmetology and dermatosurgery -- Lasers in dermatology -- HIV infection and AIDS…”
Book -
20
The CEH prep guide the comprehensive guide to certified ethical hacking
Published 2008Table of Contents: “…The business and legal issues of ethical hacking -- Introduction to hacking -- Ethics and legality -- Penetration testing for business -- The pre-attack phases -- Footprinting -- Scanning -- Enumerating -- Attack techniques and tools -- System hacking techniques -- Trojans, backdoors, and sniffers -- Denial of service attacks and session hijacking -- Penetration testing steps -- Linus hacking tools -- Social engineering and physical security -- Web server and database attacks -- Web server hacking and Web application vulnerabilities -- SQL injection vulnerabilities -- Cryptography -- Cracking Web passwords -- Advanced topics -- Wireless network attacks and countermeasures -- Firewalls, intrusion detection systems and honeypots -- Viruses, worms, and buffer overflows -- Answers to sample questions -- Glossary of terms and acronyms -- What's on the CD.…”
Book


