Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Technology: general issues 78
- History of engineering & technology 57
- Research & information: general 57
- Computer security 54
- Security measures 49
- Medicine 42
- Computer networks 35
- Environment 34
- Daños y perjuicios (Derecho civil) 31
- damage 31
- mechanical properties 31
- Digital techniques 29
- microstructure 29
- Brain damage 28
- History 28
- inflammation 28
- machine learning 28
- Damages 27
- Law and legislation 27
- climate change 27
- numerical simulation 27
- oxidative stress 27
- Photography 26
- Biology, life sciences 25
- Management 25
- DNA damage 24
- Prevention 24
- Economic aspects 23
- Social aspects 23
- Economics 22
-
2041Publicado 2017“…Apply core security techniques including 2FA and strong passwords Protect admin workstations via lock screens, disk encryption, BIOS passwords, and other methods Use the security-focused Tails distribution as a quick path to a hardened workstation Compartmentalize workstation tasks into VMs with varying levels of trust Harden servers with SSH, use apparmor and sudo to limit the damage attackers can do, and set up remote syslog servers to track their actions Establish secure VPNs with OpenVPN, and leverage SSH to tunnel traffic when VPNs can't be used Configure a software load balancer to terminate SSL/TLS connections and initiate new ones downstream Set up standalone Tor services and hidden Tor services and relays Secure Apache and Nginx web servers, and take full advantage of HTTPS Perform advanced web server hardening with HTTPS forward secrecy and ModSecurity web application firewalls Strengthen email security with SMTP relay authentication, SMTPS, SPF records, DKIM, and DMARC Harden DNS servers, deter their use in DDoS attacks, and fully implement DNSSEC Systematically protect databases via network access control,..…”
Libro electrónico -
2042Publicado 2015“…Equally valuable, you’ll learn how to systematically improve your situational awareness, so you can uncover problems before they damage relationships, brand reputation, or business performance. …”
Libro electrónico -
2043Publicado 2004“…How to repair and restore damaged photos The sharpening techniques the pros really use (there's an entire chapter just on this!) …”
Libro electrónico -
2044por Bejtlich, Richard“…By focusing on case studies and the application of open source tools, he helps you gain hands-on knowledge of how to better defend networks and how to mitigate damage from security incidents. Inside, you will find in-depth information on the following areas. …”
Publicado 2005
Libro electrónico -
2045Publicado 2003“…In early 2003, sites that had diligently applied Microsoft SQL Server updates were spared the impact of the Slammer worm that did serious damage to thousands of systems. Beyond the technical, Secure Coding sheds new light on the economic, psychological, and sheer practical reasons why..…”
Libro electrónico -
2046por Miller, Michael, 1958-“…Today’s real threat are thieves who steal your identity, rack up thousands on your credit card, open businesses under your name, commit crimes, and forever damage your reputation! Is Big Brother watching? Get the scoop on online tracking and surveillance. …”
Publicado 2008
Libro electrónico -
2047Publicado 2008“…After you’ve learned to motivate yourself, Steve and Scott will help you learn: • How to slow down and enjoy a new level of focus • Why multitasking is a myth, not a strength, and keeping life simple and straightforward is the goal • The power of building on your peoples’ strengths • How to avoid the damaging inclination to obsess about people’s weaknesses • A simple and creative way to hold people accountable • How to enjoy cultivating the art of supportive confrontation. …”
Libro electrónico -
2048por Fishman, Neal“…Incorrect data can easily trigger inappropriate actions, prevent urgent actions from being taken, disrupt customer transactions and relationships, generate compliance problems, and damage business performance. Companies need a comprehensive blueprint for ensuring data reliability in their SOA environments. …”
Publicado 2010
Libro electrónico -
2049Publicado 2014“…Regarding the content, we addressed the multifunctional role of cultural heritage, and due to specific circumstances in the past two decades we have also highlighted the damage caused to cultural heritage by military conflicts. …”
Libro electrónico -
2050What got you here won't get you there in sales! how successful salespeople take it to the next levelPublicado 2012“…Now, Goldsmith teams up with leading sales thought leaders Don Brown and Bill Hawkins to help you break the habits that specifically damage sales relationships. This dream team’s combined clients have increased their sales from 5 to 30 percent—and their gross profit up to 50 percent! …”
Libro electrónico -
2051Publicado 2012“…Digital Leader explains how to take full advantage of everything the digital age has to offer, while avoiding common pitfalls that can damage your "digital legacy." Bestselling author Erik Qualman explains what modern leadership means and describes how to be an effective leader in the digital world. …”
Libro electrónico -
2052Publicado 2004“…Inside, you'll find extensive information on Actual hacker investigations, including the harm caused and how the criminals were tracked and caught The ins and outs of identity theft, a rapidly growing crime with potential for serious damage Using the criminology and psychology of hackers to detect and deter attacks The risks associated with various technologies Do's and don'ts for high-tech criminal investigations This easily understandable book will take you beyond hearing about high-tech crimes to actually understanding how and why they happen—and what can be done to protect yourself. …”
Libro electrónico -
2053Publicado 2011“…Now, Goldsmith teams up with leading sales thought leaders Don Brown and Bill Hawkins to help you break the habits that specifically damage sales relationships. This dream team’s combined clients have increased their sales from 5 to 30 percent—and their gross profit up to 50 percent! …”
Grabación de sonido -
2054Publicado 2016“…Traditionally, the fields of music neuroscience and music therapy have progressed rather independently, but they are now beginning to integrate and merge in clinical neurology, providing novel and important information about how music is processed in the damaged or abnormal brain, how structural and functional recovery of the brain can be enhanced by music-based rehabilitation methods, and what neural mechanisms underlie the therapeutic effects of music. …”
Libro electrónico -
2055Publicado 2017“…The distinction may be further highlighted by disorders in which the brain parenchymal tissue is damaged. Therefore, studies investigating the dynamics of immune cells in traumatic brain injury and neurotropic viral infections including human immunodeficiency virus, etc. as well as neurodegenerative diseases such as amyotrophic lateral sclerosis are promising to clarify the interplay between the central nervous and immune systems. …”
Libro electrónico -
2056Publicado 2007“…If you're having trouble, Joe offers solutions to numerous problems, including what to do if you can't send or receive mail, step-by-step instructions for fixing damaged mailboxes , and how to make Spotlight see messages it isn't finding properly. …”
Libro electrónico -
2057por Prowse, David L.“…Deploy and administer desktops and notebooks running Windows 7, Vista, or XP Understand, install, and troubleshoot motherboards, processors, and memory Test and troubleshoot power-related problems Use all forms of storage, including new Blu-ray and Solid State (SSD) devices Work effectively with mobile devices, including tablets and smartphones Install, configure, and troubleshoot both visible and internal laptop components Configure Windows components and applications, use Windows administrative tools, and optimize Windows systems Repair damaged Windows environments and boot errors Work with audio and video subsystems, I/O devices, and the newest peripherals Install and manage both local and network printers Configure IPv4 and understand TCP/IP protocols and IPv6 changes Install and configure SOHO wired/wireless networks and troubleshoot connectivity Implement secure authentication, prevent malware attacks, and protect data Companion CD The companion CD contains a digital edition of the Cram Sheet and the powerful Pearson IT Certification Practice Test engine, complete with hundreds of exam-rea..…”
Publicado 2013
Libro electrónico -
2058Publicado 2022“…You'll see how the simple act of removing personally identifiable information (PII) from a dataset lowers the risk of social engineering attacks.By the end of this machine learning book, you'll have an increased awareness of the various attacks and the techniques to secure your ML systems effectively.What You Will Learn:Explore methods to detect and prevent illegal access to your systemImplement detection techniques when access does occurEmploy machine learning techniques to determine motivationsMitigate hacker access once security is breachedPerform statistical measurement and behavior analysisRepair damage to your data and applicationsUse ethical data collection methods to reduce security risksWho this book is for:Whether you're a data scientist, researcher, or manager working with machine learning techniques in any aspect, this security book is a must-have . …”
Libro electrónico -
2059Publicado 2016“…Compelling preclinical results indicate that whereas transient TWEAK/Fn14 activation promotes productive tissue responses after acute injury, excessive or persistent TWEAK/Fn14 activation drives pathological tissue responses, leading to progressive damage and degeneration in target organs of injury, autoimmune and inflammatory diseases and cancer. …”
Libro electrónico -
2060Publicado 2016“…Furthermore, various immuno-therapeutic agents also being developed to treat and minimize immuno-pathological damage in patients suffering from life threatening complications. …”
Libro electrónico