Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 590
- Security measures 537
- Computer security 507
- Risk management 402
- Computer networks 400
- Finance 372
- Prevention 270
- Economics 253
- Business & Economics 243
- Information technology 236
- Project management 228
- Development 219
- Artificial intelligence 214
- Investments 208
- Risk assessment 204
- Examinations 184
- Medicine 178
- Data processing 176
- Technological innovations 162
- Engineering & Applied Sciences 159
- Social aspects 155
- Economic aspects 150
- Law and legislation 148
- Data protection 146
- Economic conditions 139
- Cloud computing 130
- Certification 127
- Computer software 127
- Gestió del risc 124
- Government policy 123
-
13081Publicado 2016“…What You Will Learn Install MIM components Find out about the MIM synchronization, its configuration settings, and advantages Get to grips with the MIM service capabilities and develop custom activities Use the MIM Portal to provision and manage an account Mitigate access escalation and lateral movement risks using privileged access management Configure client certificate management and its detailed permission model Troubleshoot MIM components by enabling logging and reviewing logs Back up and restore the MIM 2015 configuration Discover more about periodic purging and the coding best practices In Detail Microsoft Identity Manager 2016 is Microsoft's solution to identity management. …”
Libro electrónico -
13082Publicado 2018“…As you make your way through the chapters, you'll focus on specific hosts and services via scanning and run vulnerability scans to discover various risks and threats within the target, which can then be exploited. …”
Libro electrónico -
13083Publicado 2020“…What you will learn Understand the characteristics of a machine learning algorithm Implement algorithms from supervised, semi-supervised, unsupervised, and RL domains Learn how regression works in time-series analysis and risk prediction Create, model, and train complex probabilistic models Cluster high-dimensional data and evaluate model accuracy Discover how artificial neural networks work – train, optimize, and validate them Work with autoencoders, Hebbian networks, and GANs Who this book is for This book is for data science professionals who want to delve into complex ML algorithms to understand how various machine learning models can be built. …”
Libro electrónico -
13084Publicado 2016“…This book shows you how to implement cyber-security solutions, IoT design best practices and risk mitigation methodologies to address device and infrastructure threats to IoT solutions. …”
Libro electrónico -
13085Publicado 2015“…Provides a full introduction to ISO 27001 and information security management systems, including implementation guidance. Describes risk assessment, management, and treatment approaches. …”
Libro electrónico -
13086Publicado 2022“…Basically, the major difference between large- and small-impact innovation projects is that the small projects can accept more risks, require less formal documentation, use simpler communication systems, and require fewer resources. …”
Libro electrónico -
13087Publicado 2007“…This book does a good job of describing the organizational challenges and risks and providing suggestions to manage them. It also dives deeply into the architectural techniques that can be employed in order to align the service architecture with the business, thus providing maximum benefit and continued funding for your SOA transformation." …”
Libro electrónico -
13088Publicado 2007“…Security Threat Mitigation and Response helps you understand this powerful new security paradigm that reduces your security risks and helps you comply with new data privacy standards. …”
Libro electrónico -
13089Publicado 2017“…Understand the operational architecture of the Cisco Firepower NGFW, NGIPS, and AMP technologies Deploy FTD on ASA platform and Firepower appliance running FXOS Configure and troubleshoot Firepower Management Center (FMC) Plan and deploy FMC and FTD on VMware virtual appliance Design and implement the Firepower management network on FMC and FTD Understand and apply Firepower licenses, and register FTD with FMC Deploy FTD in Routed, Transparent, Inline, Inline Tap, and Passive Modes Manage traffic flow with detect-only, block, trust, and bypass operations Implement rate limiting and analyze quality of service (QoS) Blacklist suspicious IP addresses via Security Intelligence Block DNS queries to the malicious domains Filter URLs based on category, risk, and reputation Discover a network and implement application visibility and control (AVC) Control file transfers and block malicious files using advanced malware protection (AMP) Halt cyber attacks using Snort-based intrusion rule Masquerade an internal host..…”
Libro electrónico -
13090Publicado 2017“…You will also be shown how to identify remote services, how to assess security risks, and how various attacks are performed. By finishing the recipes, you will feel confident conducting wireless penetration tests and will be able to protect yourself or your organization from wireless security threats. …”
Libro electrónico -
13091por Allen, Franklin, 1956-“…The authors prove in plain English the vital role creative finance played in building America and why stifling innovation poses a risk to our financial future.” Brian Sullivan, Fox Business Financial innovation can drive social, economic, and environmental change, transforming ideas into new technologies, industries, and jobs. …”
Publicado 2010
Libro electrónico -
13092Publicado 2015“…Scott uses his combined legal, business, and technical background to help organizations identify and address technology-related risk and market exposure and regularly teaches non-technical executives and professionals about information security and related issues in language they can understand. …”
-
13093por Hucaby, Dave“…Productivity gains and returns on company investments are at risk if the network is not properly defended. Firewalls have emerged as the essential foundation component in any network security architecture. …”
Publicado 2004
Libro electrónico -
13094Publicado 2007“…His 20 years’ IT security experience encompasses systems level design, policy generation, endpoint security, risk management, and other key issues. Foreword Preface About the Author Chapter 1 Defini..…”
Libro electrónico -
13095por Beck, Kent“…Specific topics include: Planning and the four key variables: cost, quality, time, and scope Deciding how many features to incorporate into a release Estimating scope, time, and effort for user stories Prioritizing user stories Balancing the business value and technical risk of user stories Rebuilding the release plan based on customer and programmer input Choosing the iteration length Tracking an iteration What to do when you're not going to make the date Dealing with bugs Making changes to the team Outsourcing Working with business contracts In addition, this book alerts you to the red flags that signal serious problems: customers who won't make decisions, growing defect reports, failing daily builds, and more. …”
Publicado 2001
Libro electrónico -
13096por Golden, Bernard, 1953-“…It provides you with a new framework for assessing the maturity of open source solutions, walks you through every step of the evaluation process, and provides vital insights into the risks and benefits of making the open source decision.” — David A. …”
Publicado 2005
Libro electrónico -
13097Publicado 2005“…Use statistics in your everyday work or study Perform common statistical tasks using a Texas Instruments statistical calculator or Microsoft Excel Build and interpret statistical charts and tables "Test Yourself" at the end of each chapter to review the concepts and methods that you learned in the chapter Work with mean, median, mode, standard deviation, Z scores, skewness, and other descriptive statistics Use probability and probability distributions Work with sampling distributions and confidence intervals Test hypotheses and decision-making risks with Z, t, Chi-Square, ANOVA, and other techniques Perform regression analysis and modeling The easy, practical introduction to statistics–for everyone! …”
Libro electrónico -
13098por Day, Kevin, 1975-“…Additional material covers: Designing an enterprise security plan, including perimeter/firewall and Internal defenses, application, system, and hardware security Ongoing security measures—recurring audits, vulnerability maintenance, logging and monitoring, and incident response, plus risk assessment Choosing between open source and proprietary solutions; and wired, wireless, and virtual private networks This book is essential reading for anyone working to keep information secure. …”
Publicado 2003
Libro electrónico -
13099Publicado 2014“…." -- DAVE ULRICH, PROFESSOR, ROSS SCHOOL OF BUSINESS, UNIVERSITY OF MICHIGAN; PARTNER, THE RBL GROUP "It takes passion, risk, and foresight to think beyond the status quo and see problems as opportunities. …”
Libro electrónico -
13100Publicado 2012“…You’ll learn how to manage greed and fear, avoid getting enticed by “magic bullet” solutions like gold or real estate, implement safeguards that reduce your risks, gain courage to face the truth, and use that knowledge to build your potential for long-term financial security! …”
Libro electrónico