Mostrando 11,381 - 11,400 Resultados de 13,276 Para Buscar '"Risk"', tiempo de consulta: 0.09s Limitar resultados
  1. 11381
    Publicado 2024
    Tabla de Contenidos: “…9.6.3 Multiview Fusion -- 9.6.4 Multimodal Fusion -- 9.6.5 Multi-Focus Fusion -- 9.6.6 Multi-Temporal Fusion -- 9.7 Image Fusion Applications -- 9.7.1 Medical Image Fusion -- 9.7.2 Remote-Sensing Image Fusion -- 9.7.3 Visible-Infrared Fusion -- 9.7.4 Multi-Focus Image Fusion -- 9.8 Conclusion -- References -- Chapter 10Detecting Phishing URLs through Deep Learning Models -- 10.1 Introduction -- 10.2 DL Models Used in Cybersecurity -- 10.2.1 Convolutional Neural Network -- 10.2.2 Recurrent Neural Networks -- 10.2.3 Long Short-Term Memory -- 10.2.4 Deep Belief Networks -- 10.2.5 Multi-Layer Perceptron -- 10.2.6 Generative Adversarial Network -- 10.3 Metrics -- 10.3.1 Accuracy -- 10.3.2 Precision -- 10.3.3 Recall (Sensitivity) -- 10.3.4 F1 Score -- 10.3.5 Confusion Matrix -- 10.4 Application of Deep Learning in Cybersecurity Use Cases -- 10.4.1 Intrusion Detection System -- 10.4.2 Malware Detection -- 10.4.3 Botnet Detection -- 10.4.4 Network Traffic Identification -- 10.4.5 Credit Card Fraud Detection -- 10.5 Existing Work Related to Phishing URL Detection Using DL Models -- 10.6 Conclusion -- References -- Chapter 11 Augmenting Multimedia Analysis: A Fusion of Deep Learning with Differential Privacy -- 11.1 Introduction -- 11.2 Multimedia Data and Crowdsensing Privacy Concerns -- 11.3 Deep Learning and Privacy Risks -- 11.3.1 Privacy Attacks in Deep Learning Pipeline -- 11.4 Algorithms for Preserving Privacy -- 11.5 The Differential Privacy Distributions -- 11.6 How Differential Privacy Fuses With Deep Learning -- 11.7 Methodology: Exploring the Intersection of Multimedia Data With Deep Learning and Privacy in Literature -- 11.7.1 Preserving-Privacy Image Analysis -- 11.7.2 Preserving-Privacy Video Analysis -- 11.7.3 Preserving-Privacy With Other Methods -- 11.8 Discussion -- 11.9 Conclusion -- References…”
    Libro electrónico
  2. 11382
    “…The report notes, however, that certain business models and key features of the digital economy may exacerbate BEPS risks, and shows the expected impact of measures developed across the BEPS Project on these risks. …”
    Libro electrónico
  3. 11383
    Publicado 2023
    “…The workshop aimed to explore the potential of wearables in capturing, monitoring, and predicting environmental exposures and risks to inform precision environmental health…”
    Libro electrónico
  4. 11384
    Publicado 2024
    “…From these foundations, the author examines topics related to the emerging risks of advanced AI technologies, including - The use of Large Language Models (LLMs) for social manipulation, disinformation, psychological operations, deception and fraud - The implementation of LLMs to construct fully autonomous social engineering systems for targeted attacks or for mass manipulation at scale - The technical use of LLMs and the underlying transformer architecture for use in technical weapons systems to include advanced next-generation malware, physical robotics, and even autonomous munition systems - Speculative future risks such as the alignment problem, disembodiment attacks, and flash wars…”
    Grabación no musical
  5. 11385
    Publicado 2023
    “…It highlights the benefits of fintech, such as improved efficiency, accuracy, and customer experience, but also notes the challenges and risks involved, such as data privacy and security concerns. …”
    Libro electrónico
  6. 11386
    Publicado 2021
    “…Agile methodologies allow companies to maximise value and deal effectively with risks, which is why most IT companies adopt Agile in their workflows. …”
    Libro electrónico
  7. 11387
    por International Transport Forum.
    Publicado 2021
    “…How can countries reap the benefits of drone transport while limiting risks? The report examines concerns about the acceptability, efficiency and sustainability of drone transport. …”
    Libro electrónico
  8. 11388
    Publicado 2021
    “…This book homes in on the absolute essential elements of the field.With practical insights throughout, the book provides listeners with a concise understanding of key concepts, techniques, and outcomes such as ownership, execution, success, quality, budgets, and risks. Authored by an experienced project and change management practitioner, consultant, and educator, this unique resource will be essential for students of project management looking to excel in employment…”
    Grabación musical
  9. 11389
    por Dhamani, Numa
    Publicado 2024
    “…Introduction to Generative AI guides you through benefits, risks, and limitations of Generative AI technology. …”
    Libro electrónico
  10. 11390
    Publicado 2020
    “…This book presents a small sample of the physiological changes and human health risks that have been observed in low Earth orbit, and that will undoubtedly be magnified with extended exploration operations to deep space. …”
    Libro electrónico
  11. 11391
    Publicado 2023
    “…While the cybersecurity landscape remains full of increasingly sophisticated threats, new regulations are encouraging boards to do better at managing such risks. This article aims to help boards identify and evaluate appropriate director candidates by detailing five sets of critical skills required of an effective board cyber strategist…”
    Libro electrónico
  12. 11392
    Publicado 2022
    Libro
  13. 11393
    por OECD
    Publicado 2022
    “…In Colombia, the Office of the Comptroller General of the Republic (CGR) has implemented a new preventive and concomitant control function that identifies risks while projects and budgets are being executed…”
    Libro electrónico
  14. 11394
    Publicado 2012
    “…Obesity and diabetes are not just problems for the individual. They pose risks to the environmental, psychological and economic stability of the entire world. …”
    Libro electrónico
  15. 11395
    Publicado 2022
    “…The complete Certified Cloud Security Professional video course with CCSK extras by Dean Bushmiller Domain 1 Cloud Concepts, Architecture and Design 1.1 Understand cloud computing concepts Cloud computing definitions Cloud computing roles and responsibilities Key cloud computing characteristics Building block technologies 1.2 Describe cloud reference architecture Cloud computing activities Cloud service capabilities Cloud service categories IaaS, PaaS, SaaS Cloud deployment models Cloud shared considerations , auditability, regulatory, outsourcing 1.3 Understand security concepts relevant to cloud computing Cryptography and key management Identity and access control Data and media sanitization Network security Virtualization security Common threats Security hygiene 1.4 Understand design principles of secure cloud computing Cloud secure data lifecycle Cloud-based business continuity and disaster recovery plan Business impact analysis Functional security requirements Security considerations and responsibilities for different cloud categories Cloud design patterns Enterprise Architecture DevOps security 1.5 Evaluate cloud service providers Verification against criteria System/subsystem product certifications Domain 2 Cloud Data Security 2.1 Describe cloud data concepts Cloud data life cycle phases Data dispersion Data flows 2.2 Design and implement cloud data storage architectures Storage types Threats to storage types 2.3 Design and apply data security technologies and strategies Encryption and key management Hashing Data obfuscation Tokenization Data loss prevention Keys, secrets and certificates management 2.4 Implement data discovery Structured data Unstructured data Semi-structured data Data location 2.5 Plan and implement data classification Data classification policies Data mapping Data labeling 2.6 Design and implement Information Rights Management Legal hold 2.7 Design and implement auditability, traceability and accountability of data events Definition of event sources and requirement of event attributes address, geolocation Logging, storage and analysis of data events Chain of custody and non repudiation Domain 3 Cloud Platform and Infrastructure Security 3.1 Comprehend cloud infrastructure and platform components Physical environment Network and communications Compute Virtualization Storage Management plane 3.2 Design a secure data center Logical design Physical design Environmental design Design resilient 3.3 Analyze risks associated with cloud infrastructure and platforms Risk assessment Cloud vulnerabilities, threats and attacks Risk mitigation strategies 3.4 Plan and implementation of security controls Physical and environmental protection System, storage and communication protection Identification, authentication and authorization in cloud environments Audit mechanisms correlation, packet capture 3.5 Plan business continuity and disaster recovery Business continuity and disaster recovery strategies Business requirements , Recovery Point Objective Creation, implementation and testing of plan Domain 4 Cloud Application Security 4.1 Advocate training and awareness for application security Cloud development basics Common pitfalls Common cloud vulnerabilities OWASP Top 10 4.2 Describe the Secure Software Development Life Cycle process Business requirements Phases and methodologies 4.3 Apply the Secure Software Development Life Cycle Cloud specific risks Threat modeling STRIDE and DREAD Avoid common vulnerabilities during development Secure coding Application Security Verification Standard Software configuration management and versioning 4.4 Apply cloud software assurance and validation Functional and non functional testing Security testing methodologies SAST DAST Quality assurance Abuse case testing 4.5 Use verified secure software Securing application programming interfaces Supply chain management Third party software management Validated open source software 4.6 Comprehend the specifics of cloud application architecture Supplemental security components , Database Activity Monitoring, Extensible Markup Language firewalls, application programming interface gateway Cryptography Sandboxing Application virtualization and orchestration 4.7 Design appropriate identity and access management solutions Federated identity Identity providers Single sign on Multi factor authentication Cloud access security broker Secrets management Domain 5 Cloud Security Operations 5.1 Build and implement physical and logical infrastructure for cloud environment Hardware specific security configuration requirements and Trusted Platform Module Installation and configuration of management tools Virtual hardware specific security configuration requirements , Hypervisor types Installation of guest operating system virtualization toolsets 5.2 Operate and maintain physical and logical infrastructure for cloud environment Access controls for local and remote access , secure terminal access, Secure Shell, console based access mechanisms, jumpboxes, virtual client Secure network configuration , Transport Layer Security, Dynamic Host Configuration Protocol, Domain Name System Security Extensions, virtual private network Network security controls , intrusion prevention systems, honeypots, vulnerability assessments, network security groups, bastion host Operating system hardening through the application of baselines, monitoring and remediation Patch management Infrastructure as Code strategy Availability of clustered hosts Availability of guest operating system Performance and capacity monitoring Hardware monitoring Configuration of host and guest operating system backup and restore functions Management plane 5.3 Implement operational controls and standards Change management Continuity management Information security management Continual service improvement management Incident management Problem management Release management Deployment management Configuration management Service level management Availability management Capacity management 5.4 Support digital forensics Forensic data collection methodologies Evidence management Collect, acquire, and preserve digital evidence 5.5 Manage communication with relevant parties Vendors Customers Partners Regulators Other stakeholders 5.6 Manage security operations Security operations center Intelligent monitoring of security controls , intrusion prevention systems, honeypots, network security groups, artificial intelligence Log capture and analysis , log management Incident management Vulnerability assessments Domain 6 Legal, Risk and Compliance 6.1 Articulate legal requirements and unique risks within the cloud environment Conflicting international legislation Evaluation of legal risks specific to cloud computing Legal framework and guidelines eDiscovery Forensics requirements 6.2 Understand privacy issues Difference between contractual and regulated private data , personally identifiable information Country specific legislation related to private data , personally identifiable information Jurisdictional differences in data privacy Standard privacy requirements Privacy Impact Assessments 6.3 Understand audit process, methodologies, and required adaptations for a cloud environment Internal and external audit controls Impact of audit requirements Identify assurance challenges of virtualization and cloud Types of audit reports Restrictions of audit scope statements Gap analysis Audit planning Internal information security management system Internal information security controls system Policies Identification and involvement of relevant stakeholders Specialized compliance requirements for highly regulated industries Impact of distributed information technology model 6.4 Understand implications of cloud to enterprise risk management Assess providers risk management programs Difference between data owner/controller vs. data custodian/processor Regulatory transparency requirements , General Data Protection Regulation Risk treatment Different risk frameworks Metrics for risk management Assessment of risk environment 6.5 Understand outsourcing and cloud contract design Business requirements , master service agreement, statement of work Vendor management Contract management Supply chain management…”
    Video
  16. 11396
    por Robson, Sean
    Publicado 2013
    “…Agile techniques can greatly improve your SAP implementations, reduce risks, and help you bring your projects in on schedule and within budget…”
    Libro electrónico
  17. 11397
    Publicado 2007
    “…There are other ways to describe the effect so that women might get a clearer picture of what these risk estimates may mean. Thankfully the background risk is low so approximately 97,40 % of women in these age groups will anyway be alive after 13 years followup. …”
    Libro electrónico
  18. 11398
    por Jiménez García (Dir), Juan
    Publicado 2014
    “…The last one is about the edition of the conditions in the work place, as well as professional’s personal factors, and the topographers’ risks while doing their job…”
    Texto completo en Odilo
    Otros
  19. 11399
    por Stewart, Fiona
    Publicado 2007
    “…Lessons can be learnt from all these schemes - for example the UK’s PPF is working to apply fully risk adjusted premiums, whilst the Swedish fund can take a lien on plan sponsor’s assets to protect its own financial position. …”
    Capítulo de libro electrónico
  20. 11400
    por Peck, Lisa
    Publicado 2024
    “…Critical Acting Pedagogy invites readers to think about pedagogy in actor training as a research field in its own right: to sit with the complex challenges, risks, and rewards of the acting studio; to recognise the shared vulnerability, courage and love that defines our field and underpins our practices…”
    Libro electrónico