Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 590
- Security measures 537
- Computer security 507
- Risk management 402
- Computer networks 400
- Finance 372
- Prevention 270
- Economics 253
- Business & Economics 243
- Information technology 236
- Project management 228
- Development 219
- Artificial intelligence 214
- Investments 208
- Risk assessment 204
- Examinations 184
- Medicine 178
- Data processing 176
- Technological innovations 162
- Engineering & Applied Sciences 159
- Social aspects 155
- Economic aspects 150
- Law and legislation 148
- Data protection 146
- Economic conditions 139
- Cloud computing 130
- Certification 127
- Computer software 127
- Gestió del risc 124
- Government policy 123
-
3301
-
3302
-
3303
-
3304Publicado 2020Materias: “…Artificial intelligence Accidents Risk assessment…”
Libro electrónico -
3305por IARC Working Group on the Evaluation of Carcinogenic Risks to HumansMaterias:
Publicado 2016Libro electrónico -
3306
-
3307
-
3308Publicado 2022Tabla de Contenidos: “…Intelligence data structuring and storing -- CTI data structuring -- CTI data storing requirements -- Intelligence data storing strategies -- Summary -- Chapter 8: Effective Defense Tactics and Data Protection -- Technical requirements -- Enforcing the CIA triad - overview -- Enforcing and maintaining confidentiality -- Enforcing and maintaining integrity -- Enforcing and maintaining availability -- Challenges and pitfalls of threat defense mechanisms -- Data security top challenges -- Threat defense mechanisms' pitfalls -- Data monitoring and active analytics -- Benefits of system monitoring -- High-level architecture -- Characteristics of a reliable monitoring system -- Vulnerability assessment and data risk analysis -- Vulnerability assessment methodology -- Vulnerability assessment process -- Vulnerability assessment tools -- Vulnerability and data risk assessment -- Encryption, tokenization, masking and quarantining -- Encryption as a defense mechanism -- Tokenization as a defense mechanism -- Masking and quarantining -- Endpoint management -- Reliable endpoint management requirements -- Mobile endpoint management -- Endpoint data breach use case - point of sale -- Summary -- Chapter 9: AI Applications in Cyber Threat Analytics -- Technical requirements -- AI and CTI -- Cyber threat hunting -- How adversaries can leverage AI -- AI's position in the CTI program and security stack -- AI integration - the IBM QRadar Advisor approach -- QRadar simplified architecture -- Deploying QRadar -- What's in it for you or your organization? …”
Libro electrónico -
3309
-
3310Publicado 2024Materias:Vídeo online
-
3311
-
3312por Trujillo Mejia, Raul FelipeMaterias:
Publicado 2011Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
3313por National Research Council (U.S.).Tabla de Contenidos: “…""Front Matter""; ""Reviewers""; ""Preface""; ""Acknowledgments""; ""Contents""; ""Summary""; ""1 Introduction""; ""2 NASA Risk Management and Health Standards""; ""3 Health Risks""; ""4 Risk Acceptance and Responsibilities in Human Spaceflight and Terrestrial Activities""; ""5 Recommendations for Ethics Principles""; ""6 Recommendations for Ethics Responsibilities and Decision Framework""; ""Appendix A: Meeting Agendas""; ""Appendix B: Committee Biographical Sketches""…”
Publicado 2014
Libro electrónico -
3314
-
3315Publicado 2013Tabla de Contenidos: “…section 1. Due diligence and risk management -- section 2. UCITS performance -- section 3. …”
Libro electrónico -
3316Publicado 2004“…EMCDDA Risk Assessments…”
Libro -
3317
-
3318
-
3319
-
3320