Mostrando 3,301 - 3,320 Resultados de 13,276 Para Buscar '"Risk"', tiempo de consulta: 0.10s Limitar resultados
  1. 3301
    Publicado 2020
    Materias:
    Libro electrónico
  2. 3302
    Publicado 2020
    Materias:
    Libro electrónico
  3. 3303
    por Nofsinger, John R., 1965-
    Publicado 2002
    Materias:
    Libro electrónico
  4. 3304
    Publicado 2020
    Materias: “…Artificial intelligence Accidents Risk assessment…”
    Libro electrónico
  5. 3305
    Materias:
    Libro electrónico
  6. 3306
    por Institute of Medicine (U.S.)
    Publicado 2006
    Materias:
    Libro electrónico
  7. 3307
    Publicado 2009
    Materias:
    Libro electrónico
  8. 3308
    Publicado 2022
    Tabla de Contenidos: “…Intelligence data structuring and storing -- CTI data structuring -- CTI data storing requirements -- Intelligence data storing strategies -- Summary -- Chapter 8: Effective Defense Tactics and Data Protection -- Technical requirements -- Enforcing the CIA triad - overview -- Enforcing and maintaining confidentiality -- Enforcing and maintaining integrity -- Enforcing and maintaining availability -- Challenges and pitfalls of threat defense mechanisms -- Data security top challenges -- Threat defense mechanisms' pitfalls -- Data monitoring and active analytics -- Benefits of system monitoring -- High-level architecture -- Characteristics of a reliable monitoring system -- Vulnerability assessment and data risk analysis -- Vulnerability assessment methodology -- Vulnerability assessment process -- Vulnerability assessment tools -- Vulnerability and data risk assessment -- Encryption, tokenization, masking and quarantining -- Encryption as a defense mechanism -- Tokenization as a defense mechanism -- Masking and quarantining -- Endpoint management -- Reliable endpoint management requirements -- Mobile endpoint management -- Endpoint data breach use case - point of sale -- Summary -- Chapter 9: AI Applications in Cyber Threat Analytics -- Technical requirements -- AI and CTI -- Cyber threat hunting -- How adversaries can leverage AI -- AI's position in the CTI program and security stack -- AI integration - the IBM QRadar Advisor approach -- QRadar simplified architecture -- Deploying QRadar -- What's in it for you or your organization? …”
    Libro electrónico
  9. 3309
    por Davis, Bill, 1953-
    Publicado 2002
    Materias:
    Libro electrónico
  10. 3310
    Publicado 2024
    Materias:
    Vídeo online
  11. 3311
    Publicado 2022
    Materias:
    Grabación no musical
  12. 3312
    por Trujillo Mejia, Raul Felipe
    Publicado 2011
    Materias:
    Libro electrónico
  13. 3313
    Tabla de Contenidos: “…""Front Matter""; ""Reviewers""; ""Preface""; ""Acknowledgments""; ""Contents""; ""Summary""; ""1 Introduction""; ""2 NASA Risk Management and Health Standards""; ""3 Health Risks""; ""4 Risk Acceptance and Responsibilities in Human Spaceflight and Terrestrial Activities""; ""5 Recommendations for Ethics Principles""; ""6 Recommendations for Ethics Responsibilities and Decision Framework""; ""Appendix A: Meeting Agendas""; ""Appendix B: Committee Biographical Sketches""…”
    Libro electrónico
  14. 3314
    Publicado 2014
    Materias:
    Revista digital
  15. 3315
    Publicado 2013
    Tabla de Contenidos: “…section 1. Due diligence and risk management -- section 2. UCITS performance -- section 3. …”
    Libro electrónico
  16. 3316
    Publicado 2004
    “…EMCDDA Risk Assessments…”
    Libro
  17. 3317
    por Bisbe i Viñas, Josep
    Publicado 2005
    Libro
  18. 3318
    por Bisbe i Viñas, Josep
    Publicado 2005
    Accés lliure
    Libro electrónico
  19. 3319
    Publicado 1976
    Libro
  20. 3320
    por Roussel, Jimmy
    Publicado 2018
    Electrónico