Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Philosophy 424
- Engineering & Applied Sciences 307
- History 299
- Development 292
- Management 275
- Application software 234
- Religion 233
- Web sites 230
- Design 227
- Computer networks 219
- Data processing 206
- Social sciences 194
- Economics 187
- Research 184
- Computer programs 178
- Web site development 174
- Computer Science 167
- Education 158
- Electrical & Computer Engineering 152
- Mathematics 147
- Social aspects 138
- Telecommunications 138
- Ethics 135
- Historia 135
- Business & Economics 124
- Security measures 123
- Economic aspects 118
- Social Sciences 115
- Operating systems (Computers) 110
- Religion and sociology 110
-
5601
-
5602Publicado 2015Tabla de Contenidos: “…-- Cobb-Douglas Production Function Characteristics -- Changes in the Production Function: Supply Shocks -- DETERMINATION OF FACTOR PRICES -- Demand for Capital and Labor -- Supply of Capital and Labor -- Factor Market Equilibrium -- DISTRIBUTION OF NATIONAL INCOME -- APPLICATION: Explaining Real Wage Growth -- APPLICATION: Oil Shocks, Real Wages, and the Stock Market -- Concluding Remarks -- SUMMARY -- KEY TERMS -- REVIEW QUESTIONS -- PROBLEMS -- DATA ANALYSIS PROBLEMS -- Chapter 4 SAVING AND INVESTMENT IN CLOSED AND OPEN ECONOMIES -- PREVIEW -- RELATIONSHIP BETWEEN SAVING AND WEALTH -- Private Saving -- Government Saving -- National Saving -- POLICY AND PRACTICE: Government Policies to Stimulate Saving -- Uses of Saving -- The Link Between Saving and Wealth -- MACROECONOMICS IN THE NEWS: Balance of Payments Accounts -- APPLICATION: How the United States Became the Largest Net Debtor in the World -- SAVING, INVESTMENT, AND GOODS MARKET EQUILIBRIUM IN A CLOSED ECONOMY -- Saving and Investment Equation -- Saving -- Investment -- Goods Market Equilibrium -- RESPONSE TO CHANGES IN SAVING AND INVESTMENT IN A CLOSED ECONOMY -- Changes in Saving: Autonomous Consumption -- Changes in Saving: Effects of Fiscal Policy…”
Libro electrónico -
5603Publicado 2018Tabla de Contenidos: “…Mitko Bogdansoki -- Securing the weakest link in the cyber security chain against social engineering attacks -- Introduction -- Social engineering definition -- Social engineering attacks life cycle -- Taxonomy of the social engineering attacks -- Phishing -- Dumpster diving -- Shoulder surfing -- Advanced Persistent Treat (APT) -- Reverse social engineering -- Baiting -- Waterholing -- Tailgating -- Trojan horses -- Surfing online content -- Role-playing -- Pretexting -- Spear phishing -- Quid pro quo -- Vishing -- Real-world examples of social engineering attacks -- Staying safe from social engineering attacks -- References -- Ozan Ucar and Orhan Sari -- Ask the expert-tips to prevent social engineering (SE) and personal real-life experiences of SE -- Keepnet Phishing Simulator is an excellent tool for fighting against phishing attacks -- Template management -- Edit button -- Adding a new template -- Report manager -- Phishing incident responder -- Sami Lahio -- Chapter 14: Ask the Experts - Part 4 -- Oguzhan Filizlibay -- The aftermath - what follows a social engineering attack? …”
Libro electrónico -
5604Publicado 2018Tabla de Contenidos: “…Why you should never invoke compaction manually -- Adjusting compaction throughput due to available resources -- Summary -- Chapter 7: Monitoring -- JMX interface -- MBean packages exposed by Cassandra -- JConsole (GUI) -- Connection and overview -- Viewing metrics -- Performing an operation -- JMXTerm (CLI) -- Connection and domains -- Getting a metric -- Performing an operation -- The nodetool utility -- Monitoring using nodetool -- describecluster -- gcstats -- getcompactionthreshold -- getcompactionthroughput -- getconcurrentcompactors -- getendpoints -- getlogginglevels -- getstreamthroughput -- gettimeout -- gossipinfo -- info -- netstats -- proxyhistograms -- status -- tablestats -- tpstats -- verify -- Administering using nodetool -- cleanup -- drain -- flush -- resetlocalschema -- stopdaemon -- truncatehints -- upgradeSSTable -- Metric stack -- Telegraf -- Installation -- Configuration -- JMXTrans -- Installation -- Configuration -- InfluxDB -- Installation -- Configuration -- InfluxDB CLI -- Grafana -- Installation -- Configuration -- Visualization -- Alerting -- Custom setup -- Log stack -- The system/debug/gc logs -- Filebeat -- Installation -- Configuration -- Elasticsearch -- Installation -- Configuration -- Kibana -- Installation -- Configuration -- Troubleshooting -- High CPU usage -- Different garbage-collection patterns -- Hotspots -- Disk performance -- Node flakiness -- All-in-one Docker -- Creating a database and other monitoring components locally -- Web links -- Summary -- Chapter 8: Application Development -- Getting started -- The path to failure -- Is Cassandra the right database? …”
Libro electrónico -
5605Publicado 2018Tabla de Contenidos: “…Boundary defense with firewalls and filtering -- Comprehensive access control -- Core and edge gateways -- Unidirectional gateway protection -- Asset discovery, visibility, and monitoring -- Physical security - the first line of defense -- Security assessment of IIoT connectivity standards and protocols -- Fieldbus protocols -- Connectivity framework standards -- Data Distribution Service -- DDS security -- oneM2M -- oneM2M security -- Open Platform Communications Unified Architecture (OPC UA) -- OPC UA security -- Web services and HTTP -- Web services and HTTP security -- Connectivity transport standards -- Transmission Control Protocol (TCP) -- TCP security -- User Datagram Protocol (UDP) -- UDP security -- MQTT and MQTT-SN -- MQTT security -- Constrained Application Protocol (CoAP) -- CoAP security -- Advanced Message Queuing Protocol (AMQP) -- Connectivity network standards -- Data link and physical access standards -- IEEE 802.15.4 WPAN -- IEEE 802.11 wireless LAN -- Cellular communications -- Wireless wide area network standards -- IEEE 802.16 (WiMAX) -- LoRaWAN -- Summary -- Chapter 6: Securing IIoT Edge, Cloud, and Apps -- Defining edge, fog, and cloud computing -- IIoT cloud security architecture -- Secured industrial site -- Secured edge intelligence -- Secure edge cloud transport -- Secure cloud services -- Cloud security - shared responsibility model -- Defense-in-depth cloud security strategy -- Infrastructure security -- Identity and access management -- Application security -- Microservice architecture -- Container security -- Credential store and vault -- Data protection -- Data governance -- Data encryption -- Key and digital certificate management -- Securing the data life cycle -- Cloud security operations life cycle -- Business continuity plan and disaster recovery -- Secure patch management -- Security monitoring…”
Libro electrónico -
5606Publicado 2016Tabla de Contenidos: “…20.2 Control of the Processor -- 20.3 Hardwired Implementation -- 20.4 Key Terms, Review Questions, and Problems -- Chapter 21 Microprogrammed Control -- 21.1 Basic Concepts -- 21.2 Microinstruction Sequencing -- 21.3 Microinstruction Execution -- 21.4 TI 8800 -- 21.5 Key Terms, Review Questions, and Problems -- Appendix A Projects for Teaching Computer Organization and Architecture -- A.1 Interactive Simulations -- A.2 Research Projects -- A.3 Simulation Projects -- A.4 Assembly Language Projects -- A.5 Reading/Report Assignments -- A.6 Writing Assignments -- A.7 Test Bank -- Appendix B Assembly Language and Related Topics -- B.1 Assembly Language -- B.2 Assemblers -- B.3 Loading and Linking -- B.4 Key Terms, Review Questions, and Problems -- References -- Index -- Credits…”
Libro electrónico -
5607Publicado 2004Tabla de Contenidos: “…Introduction -- 1.1 Security goals -- 1.1.1 Security policy -- 1.2 Elements of security -- 1.2.1 Physical security -- 1.2.2 System security -- 1.2.3 Network security -- 1.3 System installation and backup -- 1.3.1 Verifying the RPM package -- Chapter 2. z/VM integrity and security -- 2.1 zSeries and z/VM system integrity -- 2.1.1 LPAR integrity -- 2.1.2 Integrity provided by the z/VM Control Program -- 2.2 zSeries network security -- 2.3 Securing your z/VM system -- 2.3.1 System integrity statement for z/VM -- 2.4 CP privilege classes -- 2.5 The z/VM SYSTEM CONFIG file -- 2.5.1 Enabling journaling -- 2.5.2 System features -- 2.5.3 Defining privilege classes -- 2.5.4 z/VM virtual networking -- 2.5.5 Configuring virtual networks -- 2.5.6 Redefining a command privilege class -- 2.6 The z/VM user directory -- 2.6.1 The USER directory entry statement -- 2.6.2 The INCLUDE statement -- 2.6.3 The IPL statement -- 2.6.4 The LOGONBY statement -- 2.6.5 The MDISK statement -- 2.6.6 The LINK statement -- 2.6.7 The DEDICATE statement -- 2.6.8 The OPTION statement -- 2.6.9 The SPECIAL statement -- 2.7 Directory Maintenance Facility -- 2.7.1 DirMaint security features -- 2.8 RACF for z/VM -- Chapter 3. …”
Libro electrónico -
5608Publicado 2021Tabla de Contenidos: “…Managing your Content Library -- Searching for content -- Using content folders -- Creating new versions of your content -- Adding language versions -- Retiring and deleting content -- Working with tags -- Creating Job Aids -- Summary -- Chapter 4: Creating Skills and Courses -- Technical requirements -- Managing skills -- Creating a custom skill -- Modifying an existing skill -- Retiring and Deleting Skills -- Assembling modules into Courses -- Creating a new course -- Linking Courses to Skills -- Customizing a course and making it discoverable -- Adding an instructor-led activity to a course -- Adding Activity Modules -- Adding alternative delivery types to modules -- Other types of learning material -- Defining Course Prerequisites -- Setting the course completion criteria -- Defining multiple language versions of a course -- Publishing a course -- Editing a published course -- Retiring and deleting courses -- Summary -- Section 2: Managing and Tracking Students' Learning -- Chapter 5: Managing Users -- Technical requirements -- Creating internal and external users -- Creating external users -- Customizing the user form -- Activating and customizing CSV fields -- Creating Custom Fields -- Entering data in the additional custom fields -- Additional Active Fields options -- Automating User Creation and Updates -- Looking at the available connectors -- Connecting to a generic third-party system -- Configuring Login Methods -- Using user groups -- Inspecting autogenerated groups -- Creating custom groups -- Managing user roles -- Assigning roles to users -- Creating custom roles -- Summary -- Chapter 6: Enrolling Learners to Courses -- Technical requirements -- Reviewing the course options that affect enrollment -- Creating course instances -- Creating course instances -- Providing the necessary session details -- Retiring course instances…”
Libro electrónico -
5609por OECDTabla de Contenidos: “…Rethinking the form and content of its country strategies would enable Germany to move towards a coherent, German approach and increase transparency and accountability -- A strong supporter of development effectiveness, Germany could facilitate greater partner ownership -- Germany's predictability and forward planning are strong -- Germany has a broad range of instruments at its disposal to respond flexibly to partner countries' demands, with the COVID-19 response a good example to build on -- Germany links the disbursement of ODA funds to the reform priorities of its six Africa reform partners -- References -- Notes -- 6 Germany's results, evaluation and learning -- Management for development results -- Germany contributes to the 2030 Agenda and aligns with partner countries' priorities -- Results management is being extended from projects to portfolios -- Further work is required to improve results-based management and embed a results culture within German development co-operation -- Evaluation system -- Germany's evaluation capability is strong and respected -- The evaluation function is independent, but management responses to evaluations often lack specificity -- Evaluation capacity is being strengthened in partner countries -- Institutional learning -- Networks exist for knowledge sharing and learning in sectoral and thematic areas -- Knowledge management is challenging in the complex German system -- References -- Notes -- 7 Germany's fragility, crises and humanitarian assistance -- 7.A Crises and fragility -- Strategic framework -- Germany is an active and efficient broker for global peace efforts -- Germany has aligned its strategic framework to its vision for peace -- Germany's ODA is not primarily mobilised towards fragile contexts -- Germany is engaged in many fragile contexts beyond just its nexus and peace partners…”
Publicado 2021
Libro electrónico -
5610por OECDTabla de Contenidos: “…Intro -- Foreword -- Acknowledgements -- Table of contents -- Abbreviations and acronyms -- Executive summary -- Key findings -- Key recommendations -- Assessment and recommendations -- Strong and fast urbanisation in Colombia -- Strengths and challenges in Colombia's urban system -- Cities are the engine of economic growth but productivity is low by international standards -- Air pollution in Colombian cities remains high -- Colombian cities are prone to natural phenomena, man-made disasters and climate change impact -- Critical sectoral policy challenges remain and undermine urban outcomes -- A quantitative and qualitative housing deficit is addressed mainly by social housing production and the promotion of homeownership -- Land use plans are the main instrument to implement urban policy but most of them are outdated and underused -- Despite investments, urban residents face critical mobility challenges -- Urban inequality has decreased and safety has improved but more could be done -- The System of Cities has modernised Colombia's approach to urbanisation -- However, some challenges remain in the System of Cities -- Colombia is developing a new version of its NUP Cities 4.0 -- Key recommendations to unlock the potential of a new NUP for Colombia -- Reinforce the place-based approach to embrace the diversity of urban needs -- Use the new NUP as a tool to deal with the impact of the COVID-19 pandemic -- Continue promoting compact cities to make better use of the existing city -- Mainstream climate change and disaster risk management into urban planning -- Link urban and rural policies and continue promoting urban-rural partnerships -- Introduce an evaluation system -- Key recommendations on leveraging urban-related sectoral policies for better-quality urbanisation…”
Publicado 2022
Libro electrónico -
5611Publicado 2016Tabla de Contenidos: “…Transparency Reporting Submission Dates -- First Transparency Reports -- Example -- Reporting transparency information to the FCA -- GABRIEL reporting -- Access to GABRIEL -- Full-Scope UK AIFMs with Quarterly Sep. 30, 2014 Reporting Obligations -- Full-Scope UK AIFMs and Small Authorized UK AIFMs -- Small Registered UK AIFMs -- All AIFM Types-Initial Action Required in GABRIEL -- Ongoing Responsibility -- Submitting Transparency Reports Using GABRIEL -- Missed or late transparency reporting -- Transparency reporting requirement-quarterly reporting period ending Sep. 30, 2014 -- More information on transparency reporting -- Appendix 6 - Questions and Answers Application of the AIFMD -- Question 1: First application of the remuneration rules -- Date Last Updated: 17 February 2014 -- Question 2: Remuneration rules in case of delegation of portfolio management or risk management activities -- Date Last Updated: 17 February 2014 -- Question 3: Annex IV of the AIFMD -- Date Last Updated: 17 February 2014 -- Question 4: Notifications of AIFs -- Date Last Updated: 17 February 2014 -- Question 5: Reporting under Article 42 of the AIFMD -- Date Last Updated: 17 February 2014 -- Appendix 7 - China Securities Regulatory Commission (CSRC) -- Suggested Further Reading -- Appendix 8 - October 2015-Top 10 Performing Funds -- Appendix 9 - Global OTC Derivatives Market-Source BIS -- Appendix 10 - Global OTC Derivatives Market-Source BIS -- Appendix 11 -- Glossary of Terms -- Useful Websites and Links -- Index -- Back cover…”
Libro electrónico -
5612Publicado 2016Tabla de Contenidos: “…Overview of Violations and Noncompliance -- Key Points -- 7.1 Human error -- Models of Human Error -- The Skills, Rules, Knowledge Framework -- Slips, Lapses, and Mistakes -- Human Information Processing Model -- Model of Situational Awareness -- Human Errors in the Context of a Flawed System -- Prevalence of Human Error -- Performance Shaping Factors -- Human Limits and Susceptibility to Bias -- Potential Solutions for Managing Human Error -- Summary: Human Error -- Key Points -- References -- 7.2 Intentional noncompliance -- Recognizing Intentional Noncompliance -- Tools and Methods for Analyzing Noncompliant Behaviors -- Work Compatibility Model -- ABC Model -- Theory of Planned Behavior -- The Links Between Noncompliance and Safety Culture -- Risk Homeostasis and Safety Noncompliance -- Actions to Reduce Intentional Noncompliances -- Summary: Intentional Noncompliance -- Key Points -- References -- References -- 8 Human factors in incident investigation -- List of Abbreviations -- The Investigation Process -- Key Stages of an Investigation -- Investigation Methods -- Advantages of Mainstream Methods -- Disadvantages of Mainstream Methods -- Choice of Method -- Including Human Factors Within Existing Investigation Methods -- Human Factors Considerations for Investigators -- Key Qualities of Investigators -- Interviewing Skills -- Cognitive Bias in the Investigation Process -- Managing Investigation Capability -- Proactive Application of Human Factors Analysis -- Summary: Human Factors in Incident Investigation -- Key Points -- References -- III. …”
Libro electrónico -
5613Publicado 2016Tabla de Contenidos: “…-- Sharing is caring -- Facebook -- Twitter -- LinkedIn -- Instagram -- Snapchat and Vine -- YouTube -- Blogs and websites -- Documenting the process -- Describing updates -- MailChimp -- Paying attention to statistics -- Engaging with your audience -- Rewarding engagement -- It's a hoot! …”
Libro electrónico -
5614Publicado 2017Tabla de Contenidos: “…. -- See also -- Setting the link constraint -- Getting ready -- How to do it... -- How it works... -- See also -- Using force to assist visualization -- Getting ready -- How to do it... -- How it works... -- See also -- Manipulating force -- Getting ready -- How to do it... -- How it works... -- See also -- Building a force-directed graph -- Getting ready -- How to do it... -- How it works... -- See also -- Chapter 12: Knowing Your Map -- Introduction -- Projecting the US map -- GeoJSON -- TopoJSON -- Getting ready -- How to do it... -- How it works... -- See also -- Projecting the world map -- Getting ready -- How to do it... -- How it works... -- See also -- Building a choropleth map -- Getting ready -- How to do it... -- How it works... -- See also…”
Libro electrónico -
5615Publicado 2016Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Table of Contents -- Preface -- Chapter 1: Moodle Installation -- Moodle installation - an overview -- Choosing the best setup -- Moodle prerequisites -- Hardware requirements -- Software requirements -- Installation in a LAMP environment -- Downloading Moodle -- Creating the Moodle database and the data directory -- Using a hosted server -- Using the command line -- Creating the Moodle data directory -- Running the installer script -- Finalizing the installation -- Setting up the cron process -- Installation in a Windows environment -- Installation in a Mac OS X environment -- Installation via the Command Line Interface -- Updating Moodle -- Manual update -- Creating a backup -- Creating your new Moodle system -- Running the update script -- Updating Moodle via CLI -- Update notifications -- Summary -- Chapter 2: The Moodle System -- Moodle architecture -- The LAMP architecture -- The Moodle layer -- Code and data locations -- Finding your way around in Moodle -- The Navigation bar -- The administrator search facility -- Moodle bookmarks -- Moodle Docs and Help -- File management -- The Moodle file management interface -- Uploading files -- Private files -- To link or to copy? -- File types -- The upload limit -- Web host file management -- File management via the file system repository -- Summary -- Chapter 3: Courses, Users, and Roles -- A high-level overview -- Moodle courses -- Moodle users -- Moodle roles -- Summary -- Chapter 4: Course Management -- Course categories -- Course categories - an overview -- Managing course categories -- Adding course categories -- Course sub-categories -- Deleting course categories -- Organizing courses and categories -- Creating courses -- Course requests - enabling teachers to ask for new courses…”
Libro electrónico -
5616Publicado 2017Tabla de Contenidos: “…. -- Route based on the originating virtual port (default policy) -- Route based on source MAC hash -- Route based on IP hash -- Using the explicit failover order -- Link status only (default) -- Beacon probing -- Designing a vSphere Distributed Switch for load balancing and failover -- Getting ready -- How to do it... -- How it works... -- What to know when offloading checksum -- Getting ready -- How to do it... -- How it works... -- Selecting the correct virtual network adapter -- Getting ready -- How to do it... -- How it works... -- Improving performance through VMDirectPath I/O -- Getting ready -- How to do it... -- Improving performance through NetQueue -- Getting ready -- How to do it... -- How it works... -- Improving network performance using the SplitRx mode for multicast traffic -- Getting ready -- How to do it... -- How it works... -- Designing a multi-NIC vMotion -- Getting ready -- How to do it... -- Improving network performance using network I/O control -- Getting ready -- How to do it... -- Monitoring network capacity and performance matrix -- Getting ready -- How to do it... -- Chapter 4: DRS, SDRS, and Resource Control Design -- Introduction -- Using DRS algorithm guidelines -- Getting ready -- How to do it... -- How it works... -- Using resource pool guidelines -- Getting ready -- How to do it... -- How it works... -- Avoiding the use of a resource pool as a folder structure -- How to do it... -- How it works... -- Choosing the best SIOC latency threshold -- Getting ready -- How to do it... -- How it works... -- Using storage capability and policy-driven storage -- Getting ready -- How to do it... -- How it works... -- Anti-affinity rules in the SDRS cluster -- Getting ready -- How to do it…”
Libro electrónico -
5617Publicado 2014Tabla de Contenidos: “…Intro -- The Art of RF (Riba-Free) Islamic Banking and Finance -- Contents -- Preface to the Second Edition -- Preface: My Story with RF (Islamic) Banking and Finance in America -- Acknowledgments -- About the Book Cover -- CHAPTER 1 Introduction -- NOTES -- CHAPTER 2 The Faith-Based Judeo-Christian-Islamic Foundation of the Prohibition of Interest and the RF (Riba-Free) Banking System -- ISLAM: THE ADDITIONAL AND CLOSING LINK IN THE CHAIN OF JUDAISM AND CHRISTIANITY -- AN INTRODUCTION TO THE JUDEO-CHRISTIAN-ISLAMIC FOUNDATIONS OF FAITH -- The Book -- The People of the Faith -- Loans -- Usury/Interest -- THE JUDAIC POSITION ON THE CHARGING OF RIBIT (INTEREST): MONEY, LENDING, AND INTEREST IN THE TORAH AND THE JEWISH TRADITION -- Loans to the Poor -- Lending to Non-Jews with Interest -- Business Financing -- THE CHARGING OF RIBIT (INTEREST) IN THEROMAN CATHOLIC TRADITION: THEN AND NOW -- Lending to the Poor -- Position of the Contemporary Roman Catholic Churchon Allowing the Charging of Interest -- THE CHARGING OF RIBIT (INTEREST) IN THE TRADITION AND TEACHINGS OF THE EVANGELICAL CHRISTIAN CHURCH -- Lending to the Poor -- Lending to the Enemy -- Business Financing and Relaxation of the Rules of Prohibiting the Charge of Interest -- THE PROHIBITION OF CHARGING OF RIBIT/RIBA (INTEREST/USURY) IN ISLAM -- The Development of the Universal RF System in Islam -- The Concept of God Owning Everything -- Developing the Institution of Giving (Zakah) as a Required Islamic Ritual (Like Prayers) -- Behavioral Guidelines and the Discipline of Giving -- Business Finance -- Types of Riba -- Riba al-Jahiliyah -- Riba al-Fadl -- The Law (Shari'aa) Prohibits Deceptive and Speculative Activities in Business Transactions (Gharar) -- REVIEW QUESTIONS -- NOTES -- CHAPTER 3 The RF Valuation Disciplines of Commodity Indexation and Marking to the Market…”
Libro electrónico -
5618Publicado 2022Tabla de Contenidos: “…Select Controls Based Upon Systems Security Requirements -- Evaluation criteria -- System certification and accreditation -- Understand Security Capabilities of Information Systems -- Trusted Computing Base -- Trusted Platform Module -- Secure modes of operation -- Open and closed systems -- Memory protection -- Encryption and decryption -- Protection rings -- Security modes -- Recovery procedures -- Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements -- Client-based systems -- Server-based systems -- Database systems -- Cryptographic systems -- Industrial control systems -- Cloud-based systems -- Distributed systems -- Internet of Things -- Microservices -- Containerization -- Serverless -- Embedded systems -- High-performance computing systems -- Edge computing systems -- Virtualized systems -- Web-based systems -- Mobile systems -- Select and Determine Cryptographic Solutions -- Plaintext and ciphertext -- Encryption and decryption -- End-to-end encryption -- Link encryption -- Putting it all together: The cryptosystem -- Classes of ciphers -- Types of ciphers -- Cryptographic life cycle -- Cryptographic methods -- Public key infrastructure -- Key management practices -- Digital signatures and digital certificates -- Nonrepudiation -- Integrity (hashing) -- Understand Methods of Cryptanalytic Attacks -- Brute force -- Ciphertext only -- Known plaintext -- Frequency analysis -- Chosen ciphertext -- Implementation attacks -- Side channel -- Fault injection -- Timing -- Man in the middle -- Pass the hash -- Kerberos exploitation -- Ransomware -- Apply Security Principles to Site and Facility Design -- Design Site and Facility Security Controls -- Wiring closets, server rooms, and more -- Restricted and work area security -- Utilities and heating, ventilation, and air conditioning -- Environmental issues…”
Libro electrónico -
5619por OCDE, OECD /.Tabla de Contenidos: “…-- The new goals need relevant and measurable commitments and standards -- Existing accountability mechanisms should be consolidated -- Actions need to be better linked to impact -- Global and regional forums contribute to learning…”
Publicado 2015
Libro electrónico -
5620Publicado 2024Tabla de Contenidos: “…Hybrid dedicated/outsourced teams -- Patterns to avoid during implementation -- Selecting an implementation pattern -- Summary -- Chapter 12: Measuring Progress and Outcomes -- Measures of progress and outcomes -- Why measures of progress and outcomes are important -- Linking measures to capability maturity -- Examples of outcome metrics -- Examples of progress metrics -- Selecting measures -- Leadership and teams for selecting outcome and progress metrics -- Practices for designing metrics and dashboards -- Designing an outcome and progress metrics -- Architectures for dashboards displaying metrics -- Sustaining measures of progress and outcomes -- Evaluating and deprecating metrics -- Introducing new metrics -- Validating metric implementations -- Summary -- Part 4: Exploring Future Trends and Continuous Learning -- Chapter 13: Emerging Trends -- Macro trends in DevOps, DevSecOps, and SRE -- Testability and observability trends -- Platform engineering trends -- VSM trends -- AI/ML trends -- Summary -- Chapter 14: Exploring Continuous Learning and Improvement -- The Third Way of DevOps -- Continuous improvement in DevOps -- Learning in DevOps -- Continuous testing, quality, and security -- Learning from sharing -- Building a culture of open communication -- Sharing best practices and tools -- Cross-team collaboration and external engagement -- Leveraging feedback for continuous improvement -- Learning from outreach -- The role of external engagement in continuous improvement -- The benefits of industry collaboration -- Implementing outreach learnings in DevOps practices -- Learning from experimentation -- The importance of experimentation in DevOps -- Conducting safe experiments in DevOps -- Learning from experimentation outcomes -- Learning from failure -- Embracing a no-blame culture -- Practical steps to analyze failures…”
Libro electrónico