Enviar búsqueda
Cargar
1. rok ELAI, Pelléova vila, 29.9.2011
•
Descargar como PPTX, PDF
•
0 recomendaciones
•
237 vistas
Stepan Bärtl
Seguir
Viajes
Noticias y política
Denunciar
Compartir
Denunciar
Compartir
1 de 25
Descargar ahora
Recomendados
Elai prezentace compressed
Elai prezentace compressed
Stepan Bärtl
Elai prezentace compressed
Elai prezentace compressed
Stepan Bärtl
Dan Kohen-Vacs, Miky Ronen and Ronen Hammer: Designing, Enacting & Sharing Collaborative Online Activities with CeLS
Asld2011 kohen vacs-ronen_hammer
Asld2011 kohen vacs-ronen_hammer
Yishay Mor
Liferay
Liferay
Dmitry Buzdin
Gcse 2011 8 hour examination art
Gcse 2011 8 hour examination art
Chagall178
путешествие на диване
путешествие на диване
Ella53
Analiza SEO ptr site-uri din 2parale
Analiza SEO ptr site-uri din 2parale
Gabriel Curcudel
Akses internet
Akses internet
Qudsi Falkhi
Recomendados
Elai prezentace compressed
Elai prezentace compressed
Stepan Bärtl
Elai prezentace compressed
Elai prezentace compressed
Stepan Bärtl
Dan Kohen-Vacs, Miky Ronen and Ronen Hammer: Designing, Enacting & Sharing Collaborative Online Activities with CeLS
Asld2011 kohen vacs-ronen_hammer
Asld2011 kohen vacs-ronen_hammer
Yishay Mor
Liferay
Liferay
Dmitry Buzdin
Gcse 2011 8 hour examination art
Gcse 2011 8 hour examination art
Chagall178
путешествие на диване
путешествие на диване
Ella53
Analiza SEO ptr site-uri din 2parale
Analiza SEO ptr site-uri din 2parale
Gabriel Curcudel
Akses internet
Akses internet
Qudsi Falkhi
Presentation at iCamp2011
За клієнта замовте слово, або 10 причин незадоволеності отриманим веб-сайтом
За клієнта замовте слово, або 10 причин незадоволеності отриманим веб-сайтом
Helen Zanichkovska
Perangkat komputer
Perangkat komputer
Qudsi Falkhi
Proceso de elaboracion y recomendaciones de la Guia Argentina de Practica Clinica de Diagnostico y Tratamiento de la Enfermedad Pulmonar Obstructiva
Guia argentina de tratamiento de la EPOC
Guia argentina de tratamiento de la EPOC
Alejandro Videla
Diana Laurillard and Liz Masterman: Re-envisioning Pedagogic Planning: the Learning Designer http://www.ld-grid.org/workshops/ASLD11
Asld2011 laurillard masterman
Asld2011 laurillard masterman
Yishay Mor
Oklahoma received the Innovation in Tech Prep/Career Pathways award from NATPL. This is the expanded handout covering the Tech Prep Review and Improvement Process. A short video and handouts were provided at the conference.
2011 NATPL National Award Winner for Innovation in Tech Prep/Career Pathways
2011 NATPL National Award Winner for Innovation in Tech Prep/Career Pathways
Jeremy Zweiacker
Ch4 value the_basics
Ch4 value the_basics
Shashi Shekhar
Ch9
Ch9
Shashi Shekhar
Chap9
Chap9
Shashi Shekhar
Ch1 understanding marketing_in_new_perspective
Ch1 understanding marketing_in_new_perspective
Shashi Shekhar
Ch3 understanding marketing (1)
Ch3 understanding marketing (1)
Shashi Shekhar
Abstract: Botnets, which are networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security threats on the Internet. A particularly sophisticated and insidious type of bot is Torpig, which is a malware program that is designed to harvest sensitive information (such as bank account and credit card data) from its victims. In this talk, I will report on our efforts to take control of the Torpig botnet for ten days. Over this period, we observed more than 180 thousand infections and recorded more than 70 GB of data that the bots collected. While botnets have been hijacked before, the Torpig botnet exhibits certain properties that make the analysis of the data particularly interesting. First, it is possible (with reasonable accuracy) to identify unique bot infections and relate that number to the more than 1.2 million IP addresses that contacted our command and control server during the ten day period. This shows that botnet estimates that are based on IP addresses are likely to report inflated numbers. Second, the Torpig botnet is large, targets a variety of applications, and gathers a rich and diverse set of information from the infected victims. This allowed us to perform interesting data analysis that goes well beyond simply counting the number of stolen credit cards. In this talk I will discuss the analysis that we performed on the data collected and the lessons learned from the analysis, as well as from the process of obtaining (and losing) the botnet. Bio: Richard A. Kemmerer is the Computer Science Leadership Professor and a past Department Chair of the Department of Computer Science at the University of California, Santa Barbara. Dr. Kemmerer received the B.S. degree in Mathematics from the Pennsylvania State University in 1966, and the M.S. and Ph.D. degrees in Computer Science from the University of California, Los Angeles, in 1976 and 1979, respectively. His research interests include formal specification and verification of systems, computer system security and reliability, programming and specification language design, and software engineering. Dr. Kemmerer is a Fellow of the IEEE Computer Society, a Fellow of the Association for Computing Machinery, and he is the 2007 recipient of The Applied Security Associates Distinguished Practitioner Award. He is a member of the IFIP Working Group 11.3 on Database Security, and a member of the International Association for Cryptologic Research. He is a past Editor-in-Chief of IEEE Transactions on Software Engineering, and he has served on the editorial boards of the ACM Computing Surveys and IEEE Security and Privacy and on the Board of Governors of the IEEE Computer Society. He served on Microsoft’s Trustworthy Computing Academic Advisory Board (2002-2010) and on the National Science Foundations/CISE Advisory Board (2002-2004).
Richard Kemmerer Keynote icsm11
Richard Kemmerer Keynote icsm11
ICSM 2011
Ch11 formulating marketing_strategy
Ch11 formulating marketing_strategy
Shashi Shekhar
Ch2 fundamentals of_marketing
Ch2 fundamentals of_marketing
Shashi Shekhar
Ch3 understanding marketing
Ch3 understanding marketing
Shashi Shekhar
David Griffiths, Timothy Goddard and Mi Wang: Why has IMS LD not led to the advances which were hoped for? http://www.ld-grid.org/workshops/ASLD11
Asld2011 griffiths goddard_wang
Asld2011 griffiths goddard_wang
Yishay Mor
Liz Masterman: From proof of concept to evidence of impact: towards a principled approach to evaluating learning design tools http://www.ld-grid.org/workshops/ASLD11
Asld2011 masterman
Asld2011 masterman
Yishay Mor
Helen Walmsley: The e-Design Template: a pedagogic guide for elearning designers http://www.ld-grid.org/workshops/ASLD11
Asld2011 walmsley
Asld2011 walmsley
Yishay Mor
Dejan Ljubojevic and Diana Laurillard: Pedagogical Pattern Collector software tool http://www.ld-grid.org/workshops/ASLD11
Asld2011 ljubojevic laurillard
Asld2011 ljubojevic laurillard
Yishay Mor
Davinia Hernández-Leo, Pablo Abenia, Pau Moreno, Jonathan Chacón and Josep Blat: Let’s shake on it: co-editing and sharing diverse learning design http://www.ld-grid.org/workshops/ASLD11
Asld2011 hernández leo-abenia_moreno_chacón_blat
Asld2011 hernández leo-abenia_moreno_chacón_blat
Yishay Mor
Persico Donatella and Pozzi Francesc: SUSTAINING LEARNING DESIGN AND PEDAGOGICAL PLANNING IN CSCL http://www.ld-grid.org/workshops/ASLD11
Asld2011 persico pozzi
Asld2011 persico pozzi
Yishay Mor
Más contenido relacionado
Destacado
Presentation at iCamp2011
За клієнта замовте слово, або 10 причин незадоволеності отриманим веб-сайтом
За клієнта замовте слово, або 10 причин незадоволеності отриманим веб-сайтом
Helen Zanichkovska
Perangkat komputer
Perangkat komputer
Qudsi Falkhi
Proceso de elaboracion y recomendaciones de la Guia Argentina de Practica Clinica de Diagnostico y Tratamiento de la Enfermedad Pulmonar Obstructiva
Guia argentina de tratamiento de la EPOC
Guia argentina de tratamiento de la EPOC
Alejandro Videla
Diana Laurillard and Liz Masterman: Re-envisioning Pedagogic Planning: the Learning Designer http://www.ld-grid.org/workshops/ASLD11
Asld2011 laurillard masterman
Asld2011 laurillard masterman
Yishay Mor
Oklahoma received the Innovation in Tech Prep/Career Pathways award from NATPL. This is the expanded handout covering the Tech Prep Review and Improvement Process. A short video and handouts were provided at the conference.
2011 NATPL National Award Winner for Innovation in Tech Prep/Career Pathways
2011 NATPL National Award Winner for Innovation in Tech Prep/Career Pathways
Jeremy Zweiacker
Ch4 value the_basics
Ch4 value the_basics
Shashi Shekhar
Ch9
Ch9
Shashi Shekhar
Chap9
Chap9
Shashi Shekhar
Ch1 understanding marketing_in_new_perspective
Ch1 understanding marketing_in_new_perspective
Shashi Shekhar
Ch3 understanding marketing (1)
Ch3 understanding marketing (1)
Shashi Shekhar
Abstract: Botnets, which are networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security threats on the Internet. A particularly sophisticated and insidious type of bot is Torpig, which is a malware program that is designed to harvest sensitive information (such as bank account and credit card data) from its victims. In this talk, I will report on our efforts to take control of the Torpig botnet for ten days. Over this period, we observed more than 180 thousand infections and recorded more than 70 GB of data that the bots collected. While botnets have been hijacked before, the Torpig botnet exhibits certain properties that make the analysis of the data particularly interesting. First, it is possible (with reasonable accuracy) to identify unique bot infections and relate that number to the more than 1.2 million IP addresses that contacted our command and control server during the ten day period. This shows that botnet estimates that are based on IP addresses are likely to report inflated numbers. Second, the Torpig botnet is large, targets a variety of applications, and gathers a rich and diverse set of information from the infected victims. This allowed us to perform interesting data analysis that goes well beyond simply counting the number of stolen credit cards. In this talk I will discuss the analysis that we performed on the data collected and the lessons learned from the analysis, as well as from the process of obtaining (and losing) the botnet. Bio: Richard A. Kemmerer is the Computer Science Leadership Professor and a past Department Chair of the Department of Computer Science at the University of California, Santa Barbara. Dr. Kemmerer received the B.S. degree in Mathematics from the Pennsylvania State University in 1966, and the M.S. and Ph.D. degrees in Computer Science from the University of California, Los Angeles, in 1976 and 1979, respectively. His research interests include formal specification and verification of systems, computer system security and reliability, programming and specification language design, and software engineering. Dr. Kemmerer is a Fellow of the IEEE Computer Society, a Fellow of the Association for Computing Machinery, and he is the 2007 recipient of The Applied Security Associates Distinguished Practitioner Award. He is a member of the IFIP Working Group 11.3 on Database Security, and a member of the International Association for Cryptologic Research. He is a past Editor-in-Chief of IEEE Transactions on Software Engineering, and he has served on the editorial boards of the ACM Computing Surveys and IEEE Security and Privacy and on the Board of Governors of the IEEE Computer Society. He served on Microsoft’s Trustworthy Computing Academic Advisory Board (2002-2010) and on the National Science Foundations/CISE Advisory Board (2002-2004).
Richard Kemmerer Keynote icsm11
Richard Kemmerer Keynote icsm11
ICSM 2011
Ch11 formulating marketing_strategy
Ch11 formulating marketing_strategy
Shashi Shekhar
Ch2 fundamentals of_marketing
Ch2 fundamentals of_marketing
Shashi Shekhar
Ch3 understanding marketing
Ch3 understanding marketing
Shashi Shekhar
David Griffiths, Timothy Goddard and Mi Wang: Why has IMS LD not led to the advances which were hoped for? http://www.ld-grid.org/workshops/ASLD11
Asld2011 griffiths goddard_wang
Asld2011 griffiths goddard_wang
Yishay Mor
Liz Masterman: From proof of concept to evidence of impact: towards a principled approach to evaluating learning design tools http://www.ld-grid.org/workshops/ASLD11
Asld2011 masterman
Asld2011 masterman
Yishay Mor
Helen Walmsley: The e-Design Template: a pedagogic guide for elearning designers http://www.ld-grid.org/workshops/ASLD11
Asld2011 walmsley
Asld2011 walmsley
Yishay Mor
Dejan Ljubojevic and Diana Laurillard: Pedagogical Pattern Collector software tool http://www.ld-grid.org/workshops/ASLD11
Asld2011 ljubojevic laurillard
Asld2011 ljubojevic laurillard
Yishay Mor
Davinia Hernández-Leo, Pablo Abenia, Pau Moreno, Jonathan Chacón and Josep Blat: Let’s shake on it: co-editing and sharing diverse learning design http://www.ld-grid.org/workshops/ASLD11
Asld2011 hernández leo-abenia_moreno_chacón_blat
Asld2011 hernández leo-abenia_moreno_chacón_blat
Yishay Mor
Persico Donatella and Pozzi Francesc: SUSTAINING LEARNING DESIGN AND PEDAGOGICAL PLANNING IN CSCL http://www.ld-grid.org/workshops/ASLD11
Asld2011 persico pozzi
Asld2011 persico pozzi
Yishay Mor
Destacado
(20)
За клієнта замовте слово, або 10 причин незадоволеності отриманим веб-сайтом
За клієнта замовте слово, або 10 причин незадоволеності отриманим веб-сайтом
Perangkat komputer
Perangkat komputer
Guia argentina de tratamiento de la EPOC
Guia argentina de tratamiento de la EPOC
Asld2011 laurillard masterman
Asld2011 laurillard masterman
2011 NATPL National Award Winner for Innovation in Tech Prep/Career Pathways
2011 NATPL National Award Winner for Innovation in Tech Prep/Career Pathways
Ch4 value the_basics
Ch4 value the_basics
Ch9
Ch9
Chap9
Chap9
Ch1 understanding marketing_in_new_perspective
Ch1 understanding marketing_in_new_perspective
Ch3 understanding marketing (1)
Ch3 understanding marketing (1)
Richard Kemmerer Keynote icsm11
Richard Kemmerer Keynote icsm11
Ch11 formulating marketing_strategy
Ch11 formulating marketing_strategy
Ch2 fundamentals of_marketing
Ch2 fundamentals of_marketing
Ch3 understanding marketing
Ch3 understanding marketing
Asld2011 griffiths goddard_wang
Asld2011 griffiths goddard_wang
Asld2011 masterman
Asld2011 masterman
Asld2011 walmsley
Asld2011 walmsley
Asld2011 ljubojevic laurillard
Asld2011 ljubojevic laurillard
Asld2011 hernández leo-abenia_moreno_chacón_blat
Asld2011 hernández leo-abenia_moreno_chacón_blat
Asld2011 persico pozzi
Asld2011 persico pozzi
1. rok ELAI, Pelléova vila, 29.9.2011
1.
OSLAVA PRVNÍHO ROKU
Pelléovavila, 29.9.2011
2.
3.
4.
5.
6.
DĚKUJEME VÁM ZA
ÚČAST PRO VÍCE INFORMACÍ O AKTIVITÁCH ELAI NAVŠTIVTE: WWW.ELAIPRAGUE.CZ NEBO KONTAKTUJTE KATEŘINU COOPS HR and Client Manager +420 737 329 457 coops@elaiprague.cz
7.
Výběr z předešlýchakcí
ELAI: Kurzpokročilýchprezentačníchdovedností: RadekŠpicar
8.
Leading Positive Change
in the Czech Republic 23.11.2010
9.
Taťána le Moigne
10.
TomášSedláček David Ondráčka
Steve Oxley
11.
12.
Diskuze a brunch
s panemZdeňkemTůmou 6.5.2011
13.
14.
15.
16.
Diskuze s americkýmvelvyslancemNormanemEisenem,
16.5.2011 With an Iron Fist against Corruption in Politics: How to Apply Ethical Standards in Unethical Environment?
17.
18.
19.
20.
21.
22.
23.
24.
ELAI POWER LUNCH:
"KAM SMĚRUJE TEAMBUILDING?” 21.6.2011
25.
www.elaiprague.cz
Descargar ahora