Mostrando 13,081 - 13,100 Resultados de 13,270 Para Buscar '"Risk"', tiempo de consulta: 0.10s Limitar resultados
  1. 13081
    Publicado 2016
    “…What You Will Learn Install MIM components Find out about the MIM synchronization, its configuration settings, and advantages Get to grips with the MIM service capabilities and develop custom activities Use the MIM Portal to provision and manage an account Mitigate access escalation and lateral movement risks using privileged access management Configure client certificate management and its detailed permission model Troubleshoot MIM components by enabling logging and reviewing logs Back up and restore the MIM 2015 configuration Discover more about periodic purging and the coding best practices In Detail Microsoft Identity Manager 2016 is Microsoft's solution to identity management. …”
    Libro electrónico
  2. 13082
    Publicado 2018
    “…As you make your way through the chapters, you'll focus on specific hosts and services via scanning and run vulnerability scans to discover various risks and threats within the target, which can then be exploited. …”
    Libro electrónico
  3. 13083
    Publicado 2020
    “…What you will learn Understand the characteristics of a machine learning algorithm Implement algorithms from supervised, semi-supervised, unsupervised, and RL domains Learn how regression works in time-series analysis and risk prediction Create, model, and train complex probabilistic models Cluster high-dimensional data and evaluate model accuracy Discover how artificial neural networks work – train, optimize, and validate them Work with autoencoders, Hebbian networks, and GANs Who this book is for This book is for data science professionals who want to delve into complex ML algorithms to understand how various machine learning models can be built. …”
    Libro electrónico
  4. 13084
    Publicado 2016
    “…This book shows you how to implement cyber-security solutions, IoT design best practices and risk mitigation methodologies to address device and infrastructure threats to IoT solutions. …”
    Libro electrónico
  5. 13085
    Publicado 2015
    “…Provides a full introduction to ISO 27001 and information security management systems, including implementation guidance. Describes risk assessment, management, and treatment approaches. …”
    Libro electrónico
  6. 13086
    Publicado 2022
    “…Basically, the major difference between large- and small-impact innovation projects is that the small projects can accept more risks, require less formal documentation, use simpler communication systems, and require fewer resources. …”
    Libro electrónico
  7. 13087
    Publicado 2007
    “…This book does a good job of describing the organizational challenges and risks and providing suggestions to manage them. It also dives deeply into the architectural techniques that can be employed in order to align the service architecture with the business, thus providing maximum benefit and continued funding for your SOA transformation." …”
    Libro electrónico
  8. 13088
    Publicado 2007
    “…Security Threat Mitigation and Response helps you understand this powerful new security paradigm that reduces your security risks and helps you comply with new data privacy standards. …”
    Libro electrónico
  9. 13089
    Publicado 2017
    “…Understand the operational architecture of the Cisco Firepower NGFW, NGIPS, and AMP technologies Deploy FTD on ASA platform and Firepower appliance running FXOS Configure and troubleshoot Firepower Management Center (FMC) Plan and deploy FMC and FTD on VMware virtual appliance Design and implement the Firepower management network on FMC and FTD Understand and apply Firepower licenses, and register FTD with FMC Deploy FTD in Routed, Transparent, Inline, Inline Tap, and Passive Modes Manage traffic flow with detect-only, block, trust, and bypass operations Implement rate limiting and analyze quality of service (QoS) Blacklist suspicious IP addresses via Security Intelligence Block DNS queries to the malicious domains Filter URLs based on category, risk, and reputation Discover a network and implement application visibility and control (AVC) Control file transfers and block malicious files using advanced malware protection (AMP) Halt cyber attacks using Snort-based intrusion rule Masquerade an internal host..…”
    Libro electrónico
  10. 13090
    Publicado 2017
    “…You will also be shown how to identify remote services, how to assess security risks, and how various attacks are performed. By finishing the recipes, you will feel confident conducting wireless penetration tests and will be able to protect yourself or your organization from wireless security threats. …”
    Libro electrónico
  11. 13091
    por Allen, Franklin, 1956-
    Publicado 2010
    “…The authors prove in plain English the vital role creative finance played in building America and why stifling innovation poses a risk to our financial future.” Brian Sullivan, Fox Business Financial innovation can drive social, economic, and environmental change, transforming ideas into new technologies, industries, and jobs. …”
    Libro electrónico
  12. 13092
    Publicado 2015
    “…Scott uses his combined legal, business, and technical background to help organizations identify and address technology-related risk and market exposure and regularly teaches non-technical executives and professionals about information security and related issues in language they can understand. …”
    Video
  13. 13093
    por Hucaby, Dave
    Publicado 2004
    “…Productivity gains and returns on company investments are at risk if the network is not properly defended. Firewalls have emerged as the essential foundation component in any network security architecture. …”
    Libro electrónico
  14. 13094
    Publicado 2007
    “…His 20 years’ IT security experience encompasses systems level design, policy generation, endpoint security, risk management, and other key issues. Foreword Preface About the Author Chapter 1 Defini..…”
    Libro electrónico
  15. 13095
    por Beck, Kent
    Publicado 2001
    “…Specific topics include: Planning and the four key variables: cost, quality, time, and scope Deciding how many features to incorporate into a release Estimating scope, time, and effort for user stories Prioritizing user stories Balancing the business value and technical risk of user stories Rebuilding the release plan based on customer and programmer input Choosing the iteration length Tracking an iteration What to do when you're not going to make the date Dealing with bugs Making changes to the team Outsourcing Working with business contracts In addition, this book alerts you to the red flags that signal serious problems: customers who won't make decisions, growing defect reports, failing daily builds, and more. …”
    Libro electrónico
  16. 13096
    por Golden, Bernard, 1953-
    Publicado 2005
    “…It provides you with a new framework for assessing the maturity of open source solutions, walks you through every step of the evaluation process, and provides vital insights into the risks and benefits of making the open source decision.” — David A. …”
    Libro electrónico
  17. 13097
    Publicado 2005
    “…Use statistics in your everyday work or study Perform common statistical tasks using a Texas Instruments statistical calculator or Microsoft Excel Build and interpret statistical charts and tables "Test Yourself" at the end of each chapter to review the concepts and methods that you learned in the chapter Work with mean, median, mode, standard deviation, Z scores, skewness, and other descriptive statistics Use probability and probability distributions Work with sampling distributions and confidence intervals Test hypotheses and decision-making risks with Z, t, Chi-Square, ANOVA, and other techniques Perform regression analysis and modeling The easy, practical introduction to statistics–for everyone! …”
    Libro electrónico
  18. 13098
    por Day, Kevin, 1975-
    Publicado 2003
    “…Additional material covers: Designing an enterprise security plan, including perimeter/firewall and Internal defenses, application, system, and hardware security Ongoing security measures—recurring audits, vulnerability maintenance, logging and monitoring, and incident response, plus risk assessment Choosing between open source and proprietary solutions; and wired, wireless, and virtual private networks This book is essential reading for anyone working to keep information secure. …”
    Libro electrónico
  19. 13099
    Publicado 2014
    “…." -- DAVE ULRICH, PROFESSOR, ROSS SCHOOL OF BUSINESS, UNIVERSITY OF MICHIGAN; PARTNER, THE RBL GROUP "It takes passion, risk, and foresight to think beyond the status quo and see problems as opportunities. …”
    Libro electrónico
  20. 13100
    Publicado 2012
    “…You’ll learn how to manage greed and fear, avoid getting enticed by “magic bullet” solutions like gold or real estate, implement safeguards that reduce your risks, gain courage to face the truth, and use that knowledge to build your potential for long-term financial security! …”
    Libro electrónico