Refine
H-BRS Bibliography
- no (68) (remove)
Departments, institutes and facilities
Document Type
- Article (27)
- Conference Object (19)
- Part of a Book (8)
- Lecture (6)
- Book (monograph, edited volume) (5)
- Conference Proceedings (1)
- Master's Thesis (1)
- Patent (1)
Year of publication
- 2013 (68) (remove)
Has Fulltext
- no (68)
Keywords
- Amiloride (2)
- Mal d 1 (2)
- Molecular dynamics (2)
- apple allergy (2)
- cystic fibrosis (2)
- end user development (2)
- 1-Methycyclopropene (1)
- Adaptive resolution schemes (1)
- Airway surface liquid (1)
- Analysis (1)
More than 25 years ago, it was a big surprise for physiologists that nitric oxide (NO) was identified as the endothelium derived relaxing factor which is responsible for endothelium-induced smooth muscle relaxation (Ignarro et al., 1987). Until then, small gaseous molecules were simply regarded as byproducts of cellular metabolism which were unlikely to be of any physiological relevance. The discovery that NO was synthesized by specific enzymes (NO-synthases), upon stimulation by specific, physiologically relevant stimuli (e.g., acetylcholine stimulation of endothelial cells), as well as the fact that it acted on specific cellular targets (e.g., soluble guanylate cyclase), set the course for numerous studies which investigated the physiological roles of gaseous signaling molecules—in other words, gasotransmitters (Wang, 2002).
Botnets
(2013)
Malware poses one of the major threats to all currently operated computer systems. The scale of the problem becomes obvious by looking at the global economic loss caused by different kinds of malware, which is estimated to be more than US$ 10 billion every year. Botnets, a special kind of malware, are used to reap economic gains by criminals as well as for politically motivated activities. In contrast to other kinds of malware, botnets utilize a hidden communication channel to receive commands from their operator and communicate their current status. The ability to execute almost arbitrary commands on the infected machines makes botnets a general-purpose tool to perform malicious cyber-activities. (Verlagsangaben)
Fast täglich werden neue Angriffe auf IT-Systeme bekannt, bei denen sensible Daten entwendet werden. Das vorliegende Buch vermittelt die wesentlichen Grundlagen und Technologien, die zur Absicherung von Computernetzwerken benötigt werden. Stets legen die Autoren dabei Wert auf eine verständliche Darstellung, die – soweit möglich – auf abstrakte Modelle und formalen Notationen verzichtet. Zu jedem Kapitel werden Aufgaben zur Kontrolle von Wissensstand und Verständnis angeboten.