Angebote zu "Test" (14 Treffer)

Kategorien

Shops

Worms W.M.D. All Stars - Weapons of Mass Destru...
Topseller
20,00 € *
zzgl. 5,95 € Versand

Allgemein Produkt-Name , Worms W.M.D. All Stars - Weapons of Mass Destruction, Downloadplattform , PlayStation Network, Plattform , PlayStation 4, Kompatibilität , PlayStation 4, Spielbeschreibung Entwicklerstudio , Team 17, Spielbeschreibung , Die Würmer kehren zurück, mit ihrem bislang zerstörerischsten Spiel! Aberwitzige Einzelspieler-Action, dazu Online- und Lokale Mehrspieler-Schlachten., Spielgenre , Strategie, Spielmodus , lokaler Mehrspielermodus offline online, Anzahl Spieler (offline) , 1, Anzahl Spieler (online) , Multiplayer, USK-Freigabe , ab 12, Sprachausgabe (Sprache) , Deutsch, Textausgabe (Sprache) , Deutsch, Systemanforderungen Zubehör (erforderlich) , Dualshock Controller, Internetverbindung , erforderlich, Hinweise Artikelhinweis , Dieser Artikel wird in einer versiegelten Verpackung an Sie geliefert. Bitte beachten Sie, dass Ihr Widerrufsrecht erlischt, wenn Sie die Versiegelung nach Erhalt des Artikels entfernen.,

Anbieter: OTTO
Stand: 21.02.2020
Zum Angebot
Stick Fight: The Game Steam Key PC GLOBAL
5,29 € *
ggf. zzgl. Versand

Genius lays in simplicityReleased in 2016 by a Swedish studio Landfall, Stick Fight was designed to be a funny, uncomplicated, arcade fighting game, perfect for a party with friends or a short break from work. A fully multiplayer title, where the accent is put on realistic physics and dynamics. Choose one of the lovely, colorful stickmen and go head to head with a random player or players or collect your friends and challenge them, either playing locally or online. Regardless which option you would choose, be ready for some massive fighting and a cool test for your reflex and wit.Invite your friendsPlaying solo against random players can be a good idea for a stress-relieving break from work or a nice training arena, however a fierce rivalry against your friends shall be much more exciting. See how fun it can be to battle your best friend or ally with him and try to pummel other opponents. Relive the whole spectrum of emotions, from laugh to anger, have fun while commenting it with your friends. The game can be played from one, up to 4 people, providing countless gameplay strategies and scenarios. A tremendous blast for the whole party guaranteed!Use your witStick Fight features almost a hundred of variously designed maps, from a forest, through factory terrains, ending on boiling hot lava. Each background is dynamically constructed, offering dozens of possibilities how you can (or should) use its features to combat your opponents. Scale the heights of your skillfulness and craft, and explore how various scenography elements can help you distance your competitor. Don’t miss any of the randomly occurring special weapons, falling down from the sky from time to time. Bazooka, Uzi, swords, knives and lasers can cause real havoc. Beware, however, as sometimes the map itself can be your adversary, setting unpredictable traps or getting destructed. The rule is simple – if you survive, you win!A nostalgic return to the golden era of 2D gamesStick Fight gameplay refers to the best 2D fighters. If you remember i.e. the legendary Worms series, you will catch up quickly the convention. Be ready for some better dynamics though, as all the players here act simultaneously, which creates a constant massive rumble. The steering is extremely simple, basing on keyboard arrows and mouse. The graphics may not be meant to delight with its breathtaking details, but instead provide well-designed, funny animations. Those who played Totally Accurate Battle Simulator will be familiar with the engine.

Anbieter: G2A
Stand: 21.02.2020
Zum Angebot
Lucky Breaks , Hörbuch, Digital, 1, 275min
9,95 € *
ggf. zzgl. Versand

On the eve of her eleventh birthday, Lucky wants to let loose and become intrepid; she's ready for life to change. But Hard Pan (population 43) drones on like it always has: Lincoln all tied up in knotty matters, Miles newly diagnosed as a genius but as needy as ever, Brigitte running her Café and trying to figure out what it means to be American.Enter Paloma, tagging along on a visit to Hard Pan with a pack of hungry geologists. She's smart and pretty and fun -- definitely best-friend material. But will Lucky be able to cope with tomato worms, Short Sammy's mysterious box, the potential for disaster when Paloma's parents visit Hard Pan, and Lincoln's fame among knot tyers of the world?Lucky's intrepidness is put to the test in this satisfying sequel to the Newbery Award-winning The Higher Power of Lucky. 1. Language: English. Narrator: Cassandra Campbell. Audio sample: http://samples.audible.de/bk/lili/000979/bk_lili_000979_sample.mp3. Digital audiobook in aax.

Anbieter: Audible
Stand: 21.02.2020
Zum Angebot
Raptor Cop: The Battle with Willie the Worm , H...
9,95 € *
ggf. zzgl. Versand

A jewelry store clerk is devoured by a mass of flesh-eating worms. It’s just another heist for Willie “The Worm” Pitts and his gang. There is a strong suspicion that the police cannot control crime in the city. The entire department is on the edge. Against this backdrop of crime gone wild, Stan Pocaroba, a K9 police officer, keeps his unit of dogs ready to go and emotionally attached like a close-knit family. One night, Stan and his K-9 Unit corner Willie in a university lab. During the gun fight, test tubes explode in Stan's face. His blood absorbs the fossilized cells of a prehistoric raptor. Stan soon learns that he is able to transform into a raptor with all the powers of the fabled hunter, but not without a few drawbacks. His transformation is a work-in-progress, including the pitfalls and dangers of a disjointed life in an unforgiving world. In order to escape the lab, Willie takes a lab research chemist, Juanita, as hostage. She is also the only person capable of unlocking the mystery of Stan's condition. Stan needs to hurry if he wants to save Juanita. But, the police mistake a transformed Stan for one of the criminals, and a dragnet is set up for his capture.Time is running out. Willie buries Juanita in a coffin with a 48-hour air supply, adding a snake and a mouse to keep her company. He demands $10 million from the city, or he will let Juanita die. Can Stan control his transformations enough to find Juanita? Will he be captured by his own police department? And how will the dogs cope with a prehistoric raptor as their commander?Raptor Cop is a nonstop action and adventure roller coaster ride - with exciting twists and turns! 1. Language: English. Narrator: Mike Carbuccia, Chris Lynch, Angela Juarez, Ivani Bing. Audio sample: http://samples.audible.de/bk/acx0/166959/bk_acx0_166959_sample.mp3. Digital audiobook in aax.

Anbieter: Audible
Stand: 21.02.2020
Zum Angebot
A Model To Detetct DOS Using Data Mining Classi...
61,90 € *
ggf. zzgl. Versand

This work proposes an Intrusion Detection Model (IDM) for detection of intrusion attempts caused by worms. The proposal is a hybrid IDM since it considers features of both network packets and host that are sensitive to worms. The proposed HybD (Hybrid Dataset) dataset, which is composed of the 10% KDD'99 (Knowledge Discovery in Databases) dataset features and the suggested host-based features, is used to build and test the proposed model. Both of misuse and anomaly detection approaches are used. The hybrid IDM has been designed using Data Mining (DM) methods that for their ability to detect new intrusions accurately and automatically, also it can process large amount of data, and it is more likely to discover the ignored and hidden information. Interactive Dichotomizer 3 classifier (ID3) and Naïve Bayesian Classifier (NB) are used to build and verify the validity of the proposed model in term of classifier accuracy. The results of implementing the proposed model show that accuracy of NB classifier is generally higher than that of ID3 classifier with the four sets of features.

Anbieter: Dodax
Stand: 21.02.2020
Zum Angebot
An investigation of Antiviruses and Combination...
49,00 € *
ggf. zzgl. Versand

Today, the more network connections that a company has, the more likely that an outsider finds out a way to intrude the network. Use of remote access and wireless networks might deploy against the network. Organizations that use any one of these are twice as likely to have detected attempts to penetrate their network as those do not. One of the countermeasures that is taken to lessen security penetration, is the antivirus, which should be named a malware scanner as it can detect different malware including worms and Trojans, not only viruses. This study is evaluating of the efficiency of scanners and designs an empirical comparison between them. Installing a scanner on a PC means consuming computer resources, so measuring the impact on the machine performance was the 1st step, then exploring the scanner features including the free additional services was the 2nd step. The 3rd one was to move on and test how fast it scans the machine, including, a quick scan, and then the last one was investigating how good it detects malicious samples. The interesting results have shown that there is a remarkable disparity between what scanners vendors claim and the real ability of the scanners.

Anbieter: Dodax
Stand: 21.02.2020
Zum Angebot
A Model To Detetct DOS Using Data Mining Classi...
99,90 CHF *
ggf. zzgl. Versand

This work proposes an Intrusion Detection Model (IDM) for detection of intrusion attempts caused by worms. The proposal is a hybrid IDM since it considers features of both network packets and host that are sensitive to worms. The proposed HybD (Hybrid Dataset) dataset, which is composed of the 10% KDD'99 (Knowledge Discovery in Databases) dataset features and the suggested host-based features, is used to build and test the proposed model. Both of misuse and anomaly detection approaches are used. The hybrid IDM has been designed using Data Mining (DM) methods that for their ability to detect new intrusions accurately and automatically, also it can process large amount of data, and it is more likely to discover the ignored and hidden information. Interactive Dichotomizer 3 classifier (ID3) and Naïve Bayesian Classifier (NB) are used to build and verify the validity of the proposed model in term of classifier accuracy. The results of implementing the proposed model show that accuracy of NB classifier is generally higher than that of ID3 classifier with the four sets of features.

Anbieter: Orell Fuessli CH
Stand: 21.02.2020
Zum Angebot
Conklin, W: Principles of Computer Security, Fo...
169,00 CHF *
ggf. zzgl. Versand

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Written by leading information security educators, this fully revised, full-color computer security textbook covers CompTIA's fastest-growing credential, CompTIA Security+.Principles of Computer Security, Fourth Edition is a student-tested, introductory computer security textbook that provides comprehensive coverage of computer and network security fundamentals in an engaging and dynamic full-color design. In addition to teaching key computer security concepts, the textbook also fully prepares you for CompTIA Security+ exam SY0-401 with 100% coverage of all exam objectives. Each chapter begins with a list of topics to be covered and features sidebar exam and tech tips, a chapter summary, and an end-of-chapter assessment section that includes key term, multiple choice, and essay quizzes as well as lab projects. Electronic content includes CompTIA Security+ practice exam questions and a PDF copy of the book. Key features: CompTIA Approved Quality Content (CAQC) Electronic content features two simulated practice exams in the Total Tester exam engine and a PDF eBook Supplemented by Principles of Computer Security Lab Manual, Fourth Edition, available separately White and Conklin are two of the most well-respected computer security educators in higher education Instructor resource materials for adopting instructors include: Instructor Manual, PowerPoint slides featuring artwork from the book, and a test bank of questions for use as quizzes or exams Answers to the end of chapter sections are not included in the book and are only available to adopting instructors Learn how to: Ensure operational, organizational, and physical security Use cryptography and public key infrastructures (PKIs) Secure remote access, wireless networks, and virtual private networks (VPNs) Authenticate users and lock down mobile devices Harden network devices, operating systems, and applications Prevent network attacks, such as denial of service, spoofing, hijacking, and password guessing Combat viruses, worms, Trojan horses, and rootkits Manage e-mail, instant messaging, and web security Explore secure software development requirements Implement disaster recovery and business continuity measures Handle computer forensics and incident response Understand legal, ethical, and privacy issues

Anbieter: Orell Fuessli CH
Stand: 21.02.2020
Zum Angebot
Lucky Breaks
8,10 CHF *
ggf. zzgl. Versand

On the eve of her eleventh birthday, Lucky wants to let loose and become intrepid; she's ready for life to change. But Hard Pan (population 43) drones on like it always has: Lincoln all tied up in knotty matters, Miles newly diagnosed as a genius but as needy as ever, Brigitte running her Café and trying to figure out what it means to be American. Enter Paloma, tagging along on a visit to Hard Pan with a pack of hungry geologists. She's smart and pretty and fun -- definitely best-friend material. But will Lucky be able to cope with tomato worms, Short Sammy's mysterious box, the potential for disaster when Paloma's parents visit Hard Pan, and Lincoln's fame among knot tyers of the world? Lucky's intrepidness is put to the test in this satisfying sequel to the Newbery Award-winning The Higher Power of Lucky.

Anbieter: Orell Fuessli CH
Stand: 21.02.2020
Zum Angebot
A Model To Detetct DOS Using Data Mining Classi...
54,99 € *
ggf. zzgl. Versand

This work proposes an Intrusion Detection Model (IDM) for detection of intrusion attempts caused by worms. The proposal is a hybrid IDM since it considers features of both network packets and host that are sensitive to worms. The proposed HybD (Hybrid Dataset) dataset, which is composed of the 10% KDD'99 (Knowledge Discovery in Databases) dataset features and the suggested host-based features, is used to build and test the proposed model. Both of misuse and anomaly detection approaches are used. The hybrid IDM has been designed using Data Mining (DM) methods that for their ability to detect new intrusions accurately and automatically, also it can process large amount of data, and it is more likely to discover the ignored and hidden information. Interactive Dichotomizer 3 classifier (ID3) and Naïve Bayesian Classifier (NB) are used to build and verify the validity of the proposed model in term of classifier accuracy. The results of implementing the proposed model show that accuracy of NB classifier is generally higher than that of ID3 classifier with the four sets of features.

Anbieter: Thalia AT
Stand: 21.02.2020
Zum Angebot