Mostrando 1,281 - 1,300 Resultados de 2,801 Para Buscar '"Safed"', tiempo de consulta: 0.07s Limitar resultados
  1. 1281
    Publicado 2023
    “…And the best way to get started is as a team. Join Sam Newman and SafeStack founder and CEO Laura Bell for a special conversation on cybersecurity. …”
    Video
  2. 1282
    por Sacco, Joe
    Publicado 2006
    Libro
  3. 1283
    por Kölligan, Daniel aut
    Publicado 2021
    “…The paper discusses three words attested in Classical Armenian and traces their origin to Middle Iranian etyma or hybrid formations with Iranian elements: Arm. virh 'gulf, pit' is argued to go back to an Ir. form *u̯iθra- 'divide' derived from PIE *u̯i- 'asunder, apart' comparable to Germanic *u̯iþra-; following de Lamberterie, Arm. apahov 'safe(ty)' is explained as a compound consisting of the Ir. prefix apa- 'away' and *hov interpreted as a variant of hog 'care, concern', structurally comparable to Lat. sēcūrus 'safe' < 'away from concern (cūra)'; Arm. zawak 'offspring, child' is claimed to stem from an Ir. form *zāwaka-, probably also found in Balochi zāk 'child', deriving from PIE *ǵheu̯- 'to pour' also used in the sense of 'procreate'…”
    Artículo
  4. 1284
    por Crowl, Daniel A.
    Publicado 2011
    “…A new edition of the best-selling guide to chemical process safety - with important new content on reactivity, safe design, and much more Extensive updates throughout, including an all-new chapter on chemical reactivity, responding to the U.S. …”
    Libro electrónico
  5. 1285
    Publicado 2010
    “…How to safely buy individual bonds-and why the process can uncomfortably resemble buying a used car! …”
    Libro electrónico
  6. 1286
    Publicado 2019
    “…No data is completely safe.Cyberattacks on companies and individuals are on the rise and growing not only in number but also in ferocity. …”
    Grabación musical
  7. 1287
    Publicado 2020
    “…We would all like to live in a safe house that will not collapse on us. We would all like to walk on a safe road and never see a chasm open in front of us. …”
    Libro electrónico
  8. 1288
    Publicado 2024
    “…Keep your Mac, iPhone, and iPad safe! Version 1.0, published September 30, 2024 Secure your Mac, iPhone, or iPad against attacks from the internet, physical intrusion, and more with the greatest of ease. …”
    Libro electrónico
  9. 1289
    Publicado 2022
    “…Keep your Mac safe from intruders, malware, and more! Secure your Mac against attacks from the internet and physical intrusion with the greatest of ease. …”
    Libro electrónico
  10. 1290
    Publicado 2010
    Libro electrónico
  11. 1291
    Publicado 2018
    “…The full extent of the effects on the composition of foods treated by new technologies is still unknown and it must be considered to guarantee that food is produced safely. Descriptive Food Science gives an in-depth insight into this field. …”
    Libro electrónico
  12. 1292
    Publicado 2020
    “…One of the most complex challenges for the future of aviation is to ensure a safe integration of the expected air traffic demand. …”
    Libro electrónico
  13. 1293
    Publicado 2022
    “…New technologies and scientific discoveries are the solutions to the increasing demand for sufficient, safe, healthy, and sustainable foods influenced by the increased public awareness of their importance…”
    Libro electrónico
  14. 1294
    Publicado 2022
    “…Its safe use, and disposal at the end of its life cycle must be taken into account too. …”
    Libro electrónico
  15. 1295
    Publicado 2022
    Tabla de Contenidos: “…183 Producing easy metrics 183 Benefiting from just-in-time training 184 Differentiating between risky and secure users. 184 Planning a Phishing Program 185 Identifying the players 185 Obtaining permission and buy-in. 186 Allocating enough time for phishing simulations. 187 Choosing responsive tools. 187 Choosing a Phishing Tool. 188 Creating custom phishing tools. 188 Choosing vendor options. 189 Implementing a Phishing Simulation Program. 192 Integrating Active Directory. 192 Working with subcultures and geographies. 193 Choosing languages 193 Registering phishing domains. 194 Defining program goals 194 Collecting Day 0 metrics. 194 Running a Phishing Simulation. 195 Determining the targets. 195 Preparing the lures. 196 Creating landing pages. 200 Addressing logistical concerns 201 Conducting a pilot test. 203 Tracking Metrics and Identifying Trends. 204 Dealing with Repeat Offenders. 205 Management Reporting. 206 Part 4: the Part of Tens. 207 Chapter 13: Ten Ways to Win Support for Your Awareness Program. 209 Finding Yourself a Champion. 209 Setting the Right Expectations. 210 Addressing Business Concerns. 211 Creating an Executive Program. 211 Starting Small and Simple 212 Finding a Problem to Solve 212 Establishing Credibility. 213 Highlighting Actual Incidents. 213 Security Awareness For Dummies Being Responsive 213 Looking for Similar Programs 214 Chapter 14: Ten Ways to Make Friends and Influence People. 215 Garnering Active Executive Support. 215 Courting the Organization's Influencers 216 Supporting Another Project That Has Support. 216 Choosing Topics Important to Individuals. 217 Having Some Fun Events 218 Don't Promise Perfection. 218 Don't Overdo the FUD Factor. 218 Scoring an Early Win. 219 Using Real Gamification. 219 Integrating the Organization's Mission Statement. 220 Chapter 15: Ten Fundamental Awareness Topics. 221 Phishing 221 Business Email Compromise. 222 Mobile Device Security. 222 Home Network and Computer Security. 223 Password Security. 223 Social Media Security 223 Physical Security 224 Malware and Ransomware 224 Social Engineering. 225 It Can Happen to You. 225 Chapter 16: Ten Helpful Security Awareness Resources. 227 Security Awareness Special Interest Group. 228 CybSafe Research Library. 228 Cybersecurity Culture Guidelines. 229 RSA Conference Library. 229 You Can Stop Stupid. 229 The Work of Sydney Dekker. 230 Human Factors Knowledge Area. 230 People-Centric Security 230 Human Security Engineering Consortium. 231 How to Run a Security Awareness Program Course 231 Appendix: Sample Questionnaire 233 Index…”
    Libro electrónico
  16. 1296
    Publicado 2017
    “…Final sections provide the latest information on safe computing in the workplace and at school, and give parents steps they can take to keep young kids and teens safe online. …”
    Libro electrónico
  17. 1297
    Publicado 2007
    “…Readers will not only learn about the new security features of Vista, but they will learn how to safely integrate Vista with their existing wired and wireless network infrastructure and safely deploy with their existing applications and databases. …”
    Libro electrónico
  18. 1298
    “…The update will focus on safe and effective levels of oxygen saturation when discharging patients…”
    Libro electrónico
  19. 1299
    por Rohrer, Marcia
    Publicado 2014
    “…A great resource for teaching assistants, NQTs, and school leaders and principlas wishing to establish a collaborative and consistent SEN setting where their students feel safe and successful…”
    Libro
  20. 1300
    Publicado 2021
    Tabla de Contenidos: “…11.3.1 Adding a configuration provider in Program.cs -- 11.3.2 Using multiple providers to override configuration values -- 11.3.3 Storing configuration secrets safely -- 11.3.4 Reloading configuration values when they change -- 11.4 Using strongly typed settings with the options pattern -- 11.4.1 Introducing the IOptions interface -- 11.4.2 Reloading strongly typed options with IOptionsSnapshot -- 11.4.3 Designing your options classes for automatic binding -- 11.4.4 Binding strongly typed settings without the IOptions interface -- 11.5 Configuring an application for multiple environments -- 11.5.1 Identifying the hosting environment -- 11.5.2 Loading environment-specific configuration files -- 11.5.3 Setting the hosting environment -- Summary -- 12 Saving data with Entity Framework Core -- 12.1 Introducing Entity Framework Core -- 12.1.1 What is EF Core? …”
    Libro electrónico