Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 168
- Application software 140
- Security measures 140
- Computer security 131
- Engineering & Applied Sciences 116
- Computer networks 106
- Computer Science 79
- Management 74
- Operating systems (Computers) 70
- Computer programs 62
- Computer software 59
- Web site development 59
- Computer programming 51
- Microsoft Windows (Computer file) 48
- Cloud computing 47
- Java (Computer program language) 47
- Artificial intelligence 46
- Business & Economics 46
- Web sites 46
- Safety measures 42
- Microsoft .NET Framework 40
- History 37
- Data processing 36
- Leadership 35
- Social aspects 35
- Database management 34
- Electrical & Computer Engineering 34
- Prevention 34
- Finance 33
- Software engineering 33
-
1281Publicado 2023“…And the best way to get started is as a team. Join Sam Newman and SafeStack founder and CEO Laura Bell for a special conversation on cybersecurity. …”
Video -
1282
-
1283por Kölligan, Daniel aut“…The paper discusses three words attested in Classical Armenian and traces their origin to Middle Iranian etyma or hybrid formations with Iranian elements: Arm. virh 'gulf, pit' is argued to go back to an Ir. form *u̯iθra- 'divide' derived from PIE *u̯i- 'asunder, apart' comparable to Germanic *u̯iþra-; following de Lamberterie, Arm. apahov 'safe(ty)' is explained as a compound consisting of the Ir. prefix apa- 'away' and *hov interpreted as a variant of hog 'care, concern', structurally comparable to Lat. sēcūrus 'safe' < 'away from concern (cūra)'; Arm. zawak 'offspring, child' is claimed to stem from an Ir. form *zāwaka-, probably also found in Balochi zāk 'child', deriving from PIE *ǵheu̯- 'to pour' also used in the sense of 'procreate'…”
Publicado 2021
Artículo -
1284por Crowl, Daniel A.“…A new edition of the best-selling guide to chemical process safety - with important new content on reactivity, safe design, and much more Extensive updates throughout, including an all-new chapter on chemical reactivity, responding to the U.S. …”
Publicado 2011
Libro electrónico -
1285Publicado 2010“…How to safely buy individual bonds-and why the process can uncomfortably resemble buying a used car! …”
Libro electrónico -
1286Publicado 2019“…No data is completely safe.Cyberattacks on companies and individuals are on the rise and growing not only in number but also in ferocity. …”
Grabación musical -
1287Publicado 2020“…We would all like to live in a safe house that will not collapse on us. We would all like to walk on a safe road and never see a chasm open in front of us. …”
Libro electrónico -
1288Publicado 2024“…Keep your Mac, iPhone, and iPad safe! Version 1.0, published September 30, 2024 Secure your Mac, iPhone, or iPad against attacks from the internet, physical intrusion, and more with the greatest of ease. …”
Libro electrónico -
1289Publicado 2022“…Keep your Mac safe from intruders, malware, and more! Secure your Mac against attacks from the internet and physical intrusion with the greatest of ease. …”
Libro electrónico -
1290
-
1291Publicado 2018“…The full extent of the effects on the composition of foods treated by new technologies is still unknown and it must be considered to guarantee that food is produced safely. Descriptive Food Science gives an in-depth insight into this field. …”
Libro electrónico -
1292Publicado 2020“…One of the most complex challenges for the future of aviation is to ensure a safe integration of the expected air traffic demand. …”
Libro electrónico -
1293Publicado 2022“…New technologies and scientific discoveries are the solutions to the increasing demand for sufficient, safe, healthy, and sustainable foods influenced by the increased public awareness of their importance…”
Libro electrónico -
1294Publicado 2022“…Its safe use, and disposal at the end of its life cycle must be taken into account too. …”
Libro electrónico -
1295Publicado 2022Tabla de Contenidos: “…183 Producing easy metrics 183 Benefiting from just-in-time training 184 Differentiating between risky and secure users. 184 Planning a Phishing Program 185 Identifying the players 185 Obtaining permission and buy-in. 186 Allocating enough time for phishing simulations. 187 Choosing responsive tools. 187 Choosing a Phishing Tool. 188 Creating custom phishing tools. 188 Choosing vendor options. 189 Implementing a Phishing Simulation Program. 192 Integrating Active Directory. 192 Working with subcultures and geographies. 193 Choosing languages 193 Registering phishing domains. 194 Defining program goals 194 Collecting Day 0 metrics. 194 Running a Phishing Simulation. 195 Determining the targets. 195 Preparing the lures. 196 Creating landing pages. 200 Addressing logistical concerns 201 Conducting a pilot test. 203 Tracking Metrics and Identifying Trends. 204 Dealing with Repeat Offenders. 205 Management Reporting. 206 Part 4: the Part of Tens. 207 Chapter 13: Ten Ways to Win Support for Your Awareness Program. 209 Finding Yourself a Champion. 209 Setting the Right Expectations. 210 Addressing Business Concerns. 211 Creating an Executive Program. 211 Starting Small and Simple 212 Finding a Problem to Solve 212 Establishing Credibility. 213 Highlighting Actual Incidents. 213 Security Awareness For Dummies Being Responsive 213 Looking for Similar Programs 214 Chapter 14: Ten Ways to Make Friends and Influence People. 215 Garnering Active Executive Support. 215 Courting the Organization's Influencers 216 Supporting Another Project That Has Support. 216 Choosing Topics Important to Individuals. 217 Having Some Fun Events 218 Don't Promise Perfection. 218 Don't Overdo the FUD Factor. 218 Scoring an Early Win. 219 Using Real Gamification. 219 Integrating the Organization's Mission Statement. 220 Chapter 15: Ten Fundamental Awareness Topics. 221 Phishing 221 Business Email Compromise. 222 Mobile Device Security. 222 Home Network and Computer Security. 223 Password Security. 223 Social Media Security 223 Physical Security 224 Malware and Ransomware 224 Social Engineering. 225 It Can Happen to You. 225 Chapter 16: Ten Helpful Security Awareness Resources. 227 Security Awareness Special Interest Group. 228 CybSafe Research Library. 228 Cybersecurity Culture Guidelines. 229 RSA Conference Library. 229 You Can Stop Stupid. 229 The Work of Sydney Dekker. 230 Human Factors Knowledge Area. 230 People-Centric Security 230 Human Security Engineering Consortium. 231 How to Run a Security Awareness Program Course 231 Appendix: Sample Questionnaire 233 Index…”
Libro electrónico -
1296Publicado 2017“…Final sections provide the latest information on safe computing in the workplace and at school, and give parents steps they can take to keep young kids and teens safe online. …”
Libro electrónico -
1297Publicado 2007“…Readers will not only learn about the new security features of Vista, but they will learn how to safely integrate Vista with their existing wired and wireless network infrastructure and safely deploy with their existing applications and databases. …”
Libro electrónico -
1298por Nice, National Institute for Health and Care Excellence“…The update will focus on safe and effective levels of oxygen saturation when discharging patients…”
Publicado 2019
Libro electrónico -
1299por Rohrer, Marcia“…A great resource for teaching assistants, NQTs, and school leaders and principlas wishing to establish a collaborative and consistent SEN setting where their students feel safe and successful…”
Publicado 2014
Libro -
1300Publicado 2021Tabla de Contenidos: “…11.3.1 Adding a configuration provider in Program.cs -- 11.3.2 Using multiple providers to override configuration values -- 11.3.3 Storing configuration secrets safely -- 11.3.4 Reloading configuration values when they change -- 11.4 Using strongly typed settings with the options pattern -- 11.4.1 Introducing the IOptions interface -- 11.4.2 Reloading strongly typed options with IOptionsSnapshot -- 11.4.3 Designing your options classes for automatic binding -- 11.4.4 Binding strongly typed settings without the IOptions interface -- 11.5 Configuring an application for multiple environments -- 11.5.1 Identifying the hosting environment -- 11.5.2 Loading environment-specific configuration files -- 11.5.3 Setting the hosting environment -- Summary -- 12 Saving data with Entity Framework Core -- 12.1 Introducing Entity Framework Core -- 12.1.1 What is EF Core? …”
Libro electrónico