Narrow your search

Library

AP (2)

KDG (2)


Resource type

digital (2)


Language

English (2)


Year
From To Submit

2017 (2)

Listing 1 - 2 of 2
Sort by

Digital
Windows Virus and Malware Troubleshooting
Authors: ---
ISBN: 9781484226070 Year: 2017 Publisher: Berkeley, CA Apress

Loading...
Export citation

Choose an application

Bookmark

Abstract

Make your PCs as secure as possible. Limit the routes of attack and safely and completely remove all traces of malware and viruses should an infection take place. Whatever version of Windows you’re using, the threat of virus and malware infection is always a danger. From key loggers and Trojans, intent on stealing passwords and data, to malware that can disable individual PCs or even a company network, the cost to business in downtime and loss of productivity can be enormous. What You Will Learn: Recognize malware and the problems it can cause Defend a PC against malware and viruses Configure advanced Windows features to prevent attack Identify types of malware and virus attack Discover third-party tools and resources available to help remove malware Manually remove malware and viruses from a PC.


Digital
Using Imperfect Semiconductor Systems for Unique Identification
Author:
ISBN: 9783319678917 Year: 2017 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This thesis describes novel devices for the secure identification of objects or electronic systems. The identification relies on the the atomic-scale uniqueness of semiconductor devices by measuring a macroscopic quantum property of the system in question. Traditionally, objects and electronic systems have been securely identified by measuring specific characteristics: common examples include passwords, fingerprints used to identify a person or an electronic device, and holograms that can tag a given object to prove its authenticity. Unfortunately, modern technologies also make it possible to circumvent these everyday techniques. Variations in quantum properties are amplified by the existence of atomic-scale imperfections. As such, these devices are the hardest possible systems to clone. They also use the least resources and provide robust security. Hence they have tremendous potential significance as a means of reliably telling the good guys from the bad.

Listing 1 - 2 of 2
Sort by