Zobrazeno 1 - 10
of 47
pro vyhledávání: '"S. Vibert"'
Autor:
M. Lasfar, A.-L. Eveno, C. Huas, N. Godart, S. Berthoz, C. Lalanne, J. Duclos, L. Mattar, H. Roux, M.R. Thiébaud, S. Vibert, T. Hubert, A. Courty, D. Ringuenet, J.-P. Benoit, C. Blanchet, M.-R. Moro, L. Bignami, C. Nordon, F. Rouillon, S. Cook, C. Doyen, M.-C. Mouren Siméoni, P. Gerardin, S. Lebecq, M.-A. Podlipski, C. Gayet, M. Delorme, X. Pommereau, S. Bioulac, M. Bouvard, J. Carrere, K. Doncieux, S. Faucher, C. Fayollet, A. Prexl, S. Billard, F. Lang, V. Mourier-Soleillant, R. Greiner, A. Gay, G. Carrot, S. Lambert, M. Rousselet, L. Placé, J.-L. Venisse, M. Bronnec, B. Falissard, C. Genolini, C. Hassler, J.-M. Tréluyer, O. Chacornac, M. Delattre, N. Moulopo, C. Turuban, C. Auger
Publikováno v:
L'Encéphale. 48:517-529
Background Hospitalization is rare in anorexia nervosa (AN) and local application of indications is heterogeneous. However, no study has evaluated the effect of these different treatment modalities on the mean length of stay. Our objective was to des
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Michael Blanchard, David Harley, Andrew Lee, Bojan Zdrnja, Igor Muttik, Ken Bechtel, Robert S. Vibert, Henk Diemer
Experience suggests that many administrators and managers with excellent technical knowledge in mainstream security (network security, firewall, encryption, and so on) are less familiar with the issues of cyber stalking, and have been subjected to th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::13cb8c066e0065d5c6804b6fcddd594b
https://doi.org/10.1016/b978-159749164-8.50008-7
https://doi.org/10.1016/b978-159749164-8.50008-7
Autor:
Andrew Lee, Robert S. Vibert, David Harley, Henk Diemer, Bojan Zdrnja, Igor Muttik, Michael Blanchard, Ken Bechtel
Publisher Summary Nowadays, technical solutions are not enough, because so many of the current pains in assets are far less susceptible to proactive detection. No single group has all the answers, and some problems are better addressed by some of the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6a9ecbef04ca1a104e2f393823a9d4a7
https://doi.org/10.1016/b978-159749164-8.50007-5
https://doi.org/10.1016/b978-159749164-8.50007-5
Autor:
Ken Bechtel, Michael Blanchard, Robert S. Vibert, Henk Diemer, David Harley, Bojan Zdrnja, Igor Muttik, Andrew Lee
Publisher Summary This chapter is based on the works of Michael Blanchard and Bojan Zdrnja. It deals with malware analysis and forensics techniques and tools, starting from basics and progressing to advanced forensics. In the past couple of years, ma
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4880eefe57cd6d238d84fc4bf3b780d4
https://doi.org/10.1016/b978-159749164-8.50015-4
https://doi.org/10.1016/b978-159749164-8.50015-4
Autor:
David Harley, Robert S. Vibert, Ken Bechtel, Michael Blanchard, Henk Diemer, Andrew Lee, Igor Muttik, Bojan Zdrnja
Publisher Summary Outsourcing is a commonly considered option today for Information Technology (IT) security managers in public, private, and non-profit entities and in most areas of information management. This chapter considers outsourcing anti-mal
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5b4f6611e37ee828ef2ecdda8d050349
https://doi.org/10.1016/b978-159749164-8.50013-0
https://doi.org/10.1016/b978-159749164-8.50013-0
Publisher Summary This chapter maps the developments in the Anti-Virus Information Exchange Network (AVIEN) and Anti-Virus Information and Early Warning System (AVIEWS). Today's world is very different from the time AVIEN and AVIEWS were born. Howeve
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ff92385fecec490ada8d775eaa47ca5e
https://doi.org/10.1016/b978-159749164-8.50017-8
https://doi.org/10.1016/b978-159749164-8.50017-8
Autor:
Bojan Zdrnja, Henk Diemer, Ken Bechtel, David Harley, Igor Muttik, Robert S. Vibert, Andrew Lee, Michael Blanchard
Publisher Summary This chapter describes the works of Tony Bradley and David Harley who revisit the subject and offer a comprehensive overview of the robot (bot) threat and its implications for the enterprise. Botnets are arguably the biggest threat
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c977dfd7d9a712f671c0c5ea7ba11788
https://doi.org/10.1016/b978-159749164-8.50010-5
https://doi.org/10.1016/b978-159749164-8.50010-5
Autor:
Ken Bechtel, Robert S. Vibert, David Harley, Andrew Lee, Michael Blanchard, Henk Diemer, Bojan Zdrnja, Igor Muttik
Publisher Summary It has long been held in some security circles that education does not work. In fact, this assertion is really based on a fundamental disagreement about what one can expect education to accomplish. Education and training have certai
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::36b824bb29757635f39b1a74e3931f3b
https://doi.org/10.1016/b978-159749164-8.50014-2
https://doi.org/10.1016/b978-159749164-8.50014-2