Mostrando 2,041 - 2,060 Resultados de 2,075 Para Buscar '"Damage"', tiempo de consulta: 0.07s Limitar resultados
  1. 2041
    Publicado 2017
    “…Apply core security techniques including 2FA and strong passwords Protect admin workstations via lock screens, disk encryption, BIOS passwords, and other methods Use the security-focused Tails distribution as a quick path to a hardened workstation Compartmentalize workstation tasks into VMs with varying levels of trust Harden servers with SSH, use apparmor and sudo to limit the damage attackers can do, and set up remote syslog servers to track their actions Establish secure VPNs with OpenVPN, and leverage SSH to tunnel traffic when VPNs can't be used Configure a software load balancer to terminate SSL/TLS connections and initiate new ones downstream Set up standalone Tor services and hidden Tor services and relays Secure Apache and Nginx web servers, and take full advantage of HTTPS Perform advanced web server hardening with HTTPS forward secrecy and ModSecurity web application firewalls Strengthen email security with SMTP relay authentication, SMTPS, SPF records, DKIM, and DMARC Harden DNS servers, deter their use in DDoS attacks, and fully implement DNSSEC Systematically protect databases via network access control,..…”
    Libro electrónico
  2. 2042
    Publicado 2015
    “…Equally valuable, you’ll learn how to systematically improve your situational awareness, so you can uncover problems before they damage relationships, brand reputation, or business performance. …”
    Libro electrónico
  3. 2043
    Publicado 2004
    “…How to repair and restore damaged photos The sharpening techniques the pros really use (there's an entire chapter just on this!) …”
    Libro electrónico
  4. 2044
    por Bejtlich, Richard
    Publicado 2005
    “…By focusing on case studies and the application of open source tools, he helps you gain hands-on knowledge of how to better defend networks and how to mitigate damage from security incidents. Inside, you will find in-depth information on the following areas. …”
    Libro electrónico
  5. 2045
    Publicado 2003
    “…In early 2003, sites that had diligently applied Microsoft SQL Server updates were spared the impact of the Slammer worm that did serious damage to thousands of systems. Beyond the technical, Secure Coding sheds new light on the economic, psychological, and sheer practical reasons why..…”
    Libro electrónico
  6. 2046
    por Miller, Michael, 1958-
    Publicado 2008
    “…Today’s real threat are thieves who steal your identity, rack up thousands on your credit card, open businesses under your name, commit crimes, and forever damage your reputation! Is Big Brother watching? Get the scoop on online tracking and surveillance. …”
    Libro electrónico
  7. 2047
    Publicado 2008
    “…After you’ve learned to motivate yourself, Steve and Scott will help you learn: • How to slow down and enjoy a new level of focus • Why multitasking is a myth, not a strength, and keeping life simple and straightforward is the goal • The power of building on your peoples’ strengths • How to avoid the damaging inclination to obsess about people’s weaknesses • A simple and creative way to hold people accountable • How to enjoy cultivating the art of supportive confrontation. …”
    Libro electrónico
  8. 2048
    por Fishman, Neal
    Publicado 2010
    “…Incorrect data can easily trigger inappropriate actions, prevent urgent actions from being taken, disrupt customer transactions and relationships, generate compliance problems, and damage business performance. Companies need a comprehensive blueprint for ensuring data reliability in their SOA environments. …”
    Libro electrónico
  9. 2049
    Publicado 2014
    “…Regarding the content, we addressed the multifunctional role of cultural heritage, and due to specific circumstances in the past two decades we have also highlighted the damage caused to cultural heritage by military conflicts. …”
    Libro electrónico
  10. 2050
    Publicado 2012
    “…Now, Goldsmith teams up with leading sales thought leaders Don Brown and Bill Hawkins to help you break the habits that specifically damage sales relationships. This dream team’s combined clients have increased their sales from 5 to 30 percent—and their gross profit up to 50 percent! …”
    Libro electrónico
  11. 2051
    Publicado 2012
    “…Digital Leader explains how to take full advantage of everything the digital age has to offer, while avoiding common pitfalls that can damage your "digital legacy." Bestselling author Erik Qualman explains what modern leadership means and describes how to be an effective leader in the digital world. …”
    Libro electrónico
  12. 2052
    Publicado 2004
    “…Inside, you'll find extensive information on Actual hacker investigations, including the harm caused and how the criminals were tracked and caught The ins and outs of identity theft, a rapidly growing crime with potential for serious damage Using the criminology and psychology of hackers to detect and deter attacks The risks associated with various technologies Do's and don'ts for high-tech criminal investigations This easily understandable book will take you beyond hearing about high-tech crimes to actually understanding how and why they happen—and what can be done to protect yourself. …”
    Libro electrónico
  13. 2053
    Publicado 2011
    “…Now, Goldsmith teams up with leading sales thought leaders Don Brown and Bill Hawkins to help you break the habits that specifically damage sales relationships. This dream team’s combined clients have increased their sales from 5 to 30 percent—and their gross profit up to 50 percent! …”
    Grabación de sonido
  14. 2054
    Publicado 2016
    “…Traditionally, the fields of music neuroscience and music therapy have progressed rather independently, but they are now beginning to integrate and merge in clinical neurology, providing novel and important information about how music is processed in the damaged or abnormal brain, how structural and functional recovery of the brain can be enhanced by music-based rehabilitation methods, and what neural mechanisms underlie the therapeutic effects of music. …”
    Libro electrónico
  15. 2055
    Publicado 2017
    “…The distinction may be further highlighted by disorders in which the brain parenchymal tissue is damaged. Therefore, studies investigating the dynamics of immune cells in traumatic brain injury and neurotropic viral infections including human immunodeficiency virus, etc. as well as neurodegenerative diseases such as amyotrophic lateral sclerosis are promising to clarify the interplay between the central nervous and immune systems. …”
    Libro electrónico
  16. 2056
    Publicado 2007
    “…If you're having trouble, Joe offers solutions to numerous problems, including what to do if you can't send or receive mail, step-by-step instructions for fixing damaged mailboxes , and how to make Spotlight see messages it isn't finding properly. …”
    Libro electrónico
  17. 2057
    por Prowse, David L.
    Publicado 2013
    “…Deploy and administer desktops and notebooks running Windows 7, Vista, or XP Understand, install, and troubleshoot motherboards, processors, and memory Test and troubleshoot power-related problems Use all forms of storage, including new Blu-ray and Solid State (SSD) devices Work effectively with mobile devices, including tablets and smartphones Install, configure, and troubleshoot both visible and internal laptop components Configure Windows components and applications, use Windows administrative tools, and optimize Windows systems Repair damaged Windows environments and boot errors Work with audio and video subsystems, I/O devices, and the newest peripherals Install and manage both local and network printers Configure IPv4 and understand TCP/IP protocols and IPv6 changes Install and configure SOHO wired/wireless networks and troubleshoot connectivity Implement secure authentication, prevent malware attacks, and protect data Companion CD The companion CD contains a digital edition of the Cram Sheet and the powerful Pearson IT Certification Practice Test engine, complete with hundreds of exam-rea..…”
    Libro electrónico
  18. 2058
    Publicado 2022
    “…You'll see how the simple act of removing personally identifiable information (PII) from a dataset lowers the risk of social engineering attacks.By the end of this machine learning book, you'll have an increased awareness of the various attacks and the techniques to secure your ML systems effectively.What You Will Learn:Explore methods to detect and prevent illegal access to your systemImplement detection techniques when access does occurEmploy machine learning techniques to determine motivationsMitigate hacker access once security is breachedPerform statistical measurement and behavior analysisRepair damage to your data and applicationsUse ethical data collection methods to reduce security risksWho this book is for:Whether you're a data scientist, researcher, or manager working with machine learning techniques in any aspect, this security book is a must-have . …”
    Libro electrónico
  19. 2059
    Publicado 2016
    “…Compelling preclinical results indicate that whereas transient TWEAK/Fn14 activation promotes productive tissue responses after acute injury, excessive or persistent TWEAK/Fn14 activation drives pathological tissue responses, leading to progressive damage and degeneration in target organs of injury, autoimmune and inflammatory diseases and cancer. …”
    Libro electrónico
  20. 2060
    Publicado 2016
    “…Furthermore, various immuno-therapeutic agents also being developed to treat and minimize immuno-pathological damage in patients suffering from life threatening complications. …”
    Libro electrónico