Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 108
- Police 94
- Policía 50
- Politics and government 30
- Law and legislation 27
- Prevention 26
- Social aspects 26
- Social conditions 23
- Crime 22
- Crime prevention 20
- Historia 20
- Political aspects 20
- Criminología 18
- Law 18
- Law enforcement 18
- Policia 17
- National security 16
- Police administration 16
- Psychological aspects 16
- Security measures 16
- Terrorism 16
- Criminal justice, Administration of 15
- Criminology, Penology & Juvenile Delinquency 15
- Government policy 15
- Investigación criminal 15
- police 15
- Computer networks 14
- Criminal investigation 14
- Criminal law 13
- Psychology 13
-
1321Publicado 2007“…IJCC will focus on all aspects of cyber/computer crime: Forms of Cyber Crime, Impact of Cyber crimes in the real world, Policing Cyber space, Cyber-terrorism, International Perspectives of Cyber Crime, developing cyber safety policy, intrusion investigations, information security, Cyber Victims, Cyber Psychopathology, Geographical aspects of Cybercrime, Cyber offender behavior, cyber crime law, Cyber Pornography, Physical Computer Security, Privacy & Anonymity on the Net, Internet Fraud & Identity Theft, Mobile Phone Safety, Online Gambling, Copyright and Intellectual property Law, and Detection of Distributed Denial of Service Attacks. …”
Revista digital -
1322Publicado 2021“…"Many of today's insurgent Black movements call for an end to racial capitalism. They take aim at policing and mass incarceration, the racial partitioning of workplaces and residential communities, and the expropriation and underdevelopment of Black populations at home and abroad. …”
Libro electrónico -
1323Publicado 2022“…With the use of FRT for policing, surveillance, and business steadily increasing, this book provides a timely examination of both the benefits of FRT, and the threats it poses to privacy rights, human rights, and civil liberties. …”
Libro electrónico -
1324Publicado 2015“…They included a lack of infrastructure (ie. fences), institutions (ie. police), and population (ie. consumers). However, the ranching people in these two societies had their differences too. …”
Libro electrónico -
1325Publicado 2022“…The book also offers: discussions of policing 4.0 and how data and analytics will transform public safety; explorations of the future of education and how AI can dramatically enhance educational standards while reducing costs; and treatments of the internationalization of public services and its impact on agencies and departments everywhere. …”
Grabación no musical -
1326Publicado 2021“…Many of today's insurgent Black movements call for an end to racial capitalism. They take aim at policing and mass incarceration, the racial partitioning of workplaces and residential communities, the expropriation and underdevelopment of Black populations at home and abroad. …”
Libro electrónico -
1327por Denton, Geoffrey R.
Publicado 1970Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca Universidad de Deusto)Libro -
1328Publicado 2022Tabla de Contenidos: “…Logging Levels/Severity Levels -- 00-FMindd 18 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Interface Statistics/Status -- Link State (Up/Down) -- Speed/Duplex -- Send/Receive Traffic -- Cyclic Redundancy Checks (CRCs) -- Protocol Packet and Byte Counts -- Interface Errors or Alerts -- CRC Errors -- Giants -- Runts -- Encapsulation Errors -- Environmental Factors and Sensors: Temperature, Humidity, Electrical, Flooding -- Baselines -- NetFlow Data -- Uptime/Downtime -- REVIEW -- 31 QUESTIONS -- 31 ANSWERS -- Objective 32 Explain the purpose of organizational documents -- and policies -- Plans and Procedures -- Change Management -- Incident Response Plan -- Disaster Recovery Plan -- Business Continuity Plan -- System Life Cycle -- Standard Operating Procedures -- Hardening and Security Policies -- Password Policy -- Acceptable Use Policy -- Bring Your Own Device (BYOD) Policy -- Remote Access Policy -- Onboarding and Offboarding Policy -- Security Policy -- Data Loss Prevention -- Common Documentation -- Physical Network Diagram -- Logical Network Diagram -- Wiring Diagram -- Site Survey Report -- 00-FMindd 19 22/04/22 11:12 AM -- xx Mike Meyers' CompTIA Network+ Certification Passport -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Audit and Assessment Report -- Baseline Configurations -- Common Agreements -- Non-Disclosure Agreement (NDA) -- Service-Level Agreement (SLA) -- Memorandum of Understanding (MOU) -- REVIEW -- 32 QUESTIONS -- 32 ANSWERS -- Objective 33 Explain high availability and disaster recovery -- concepts and summarize which is the best solution -- Load Balancing -- Multipathing -- Network Interface Card (NIC) Teaming -- Redundant Hardware/Clusters -- Switches -- Routers -- Firewalls -- Facilities and Infrastructure Support -- Uninterruptible Power Supply (UPS) -- Power Distribution Units (PDUs) -- Generator -- HVAC -- Fire Suppression -- Redundancy and High Availability (HA) Concepts -- Cold Site -- Warm Site -- Hot Site -- Cloud Site -- Active-Active vs Active-Passive -- Mean Time to Repair (MTTR) -- Mean Time Between Failure (MTBF) -- Recovery Time Objective (RTO) -- Recovery Point Objective (RPO) -- Network Device Backup/Restore -- Configuration -- State -- REVIEW -- 33 QUESTIONS -- 33 ANSWERS -- 00-FMindd 20 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- 40 Network Security -- Objective 41 Explain common security concepts -- Confidentiality, Integrity, Availability (CIA) -- Threats -- Internal -- External -- Vulnerabilities -- Common Vulnerabilities and Exposures (CVE) -- Zero-Day -- Exploits -- Least Privilege -- Role-Based Access -- Zero Trust -- Defense in Depth -- Network Segmentation Enforcement -- Screened Subnet [Previously Known as Demilitarized Zone (DMZ)] -- Separation of Duties -- Network Access Control -- Honeypot -- Authentication Methods -- Multifactor -- Terminal Access Controller Access-Control System Plus (TACACS+) -- Remote Authentication Dial-in User Service (RADIUS) -- Single Sign-On (SSO) -- LDAP -- Kerberos -- Local Authentication -- Extensible Authentication Protocol (EAP) -- 8021X -- Risk Management -- Security Risk Assessments -- Business Risk Assessments -- Security Information and Event Management (SIEM) -- REVIEW -- 41 QUESTIONS -- 41 ANSWERS -- Objective 42 Compare and contrast common types of attacks -- Technology-Based -- Denial-of-Service (DoS)/Distributed Denial-of-Service (DDoS) -- On-Path Attack (Previously Known as Man-in-the-Middle Attack) -- 00-FMindd 21 22/04/22 11:12 AM -- xxii Mike Meyers' CompTIA Network+ Certification Passport -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- ARP Spoofing -- DNS Poisoning -- VLAN Hopping -- Rogue DHCP -- Rogue Access Point (AP) -- Evil Twin -- Ransomware -- Password Attacks -- MAC Spoofing -- IP Spoofing -- Deauthentication -- Malware -- Human and Environmental -- Social Engineering -- REVIEW -- 42 QUESTIONS -- 42 ANSWERS -- Objective 43 Given a scenario, apply network -- hardening techniques -- Best Practices -- Secure SNMP -- Router Advertisement (RA) Guard -- Port Security -- Dynamic ARP Inspection -- Control Plane Policing -- Private VLANs -- Disable Unneeded Switchports -- Disable Unneeded Network Services -- Change Default Passwords -- Password Complexity/Length -- Enable DHCP Snooping -- Change Default VLAN -- Patch and Firmware Management -- Access Control List -- Firewall Rules -- Role-Based Access -- Wireless Security -- MAC Filtering -- Antenna Placement -- Power Levels -- Wireless Client Isolation -- Guest Network Isolation -- 00-FMindd 22 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Preshared Keys (PSKs) -- EAP -- Geofencing -- Captive Portal -- IoT Access Considerations -- REVIEW -- 43 QUESTIONS -- 43 ANSWERS -- Objective 44 Compare and contrast remote access methods -- and security implications -- Site-to-Site VPN -- Client-to-Site VPN -- Clientless VPN -- Split Tunnel vs Full Tunnel -- Remote Desktop Connection -- Remote Desktop Gateway -- SSH -- Virtual Network Computing (VNC)…”
Libro electrónico -
1329Publicado 2020“…This book covers domains of government policy and Indigenous agency including local government, education, land rights, the outstation movement, international law, foreign policy, capital programs, health, public administration, mission policies and the policing of identity. Each of the contributors is a specialist in his/her topic. …”
Libro electrónico -
1330Publicado 2016“…The target challenges are coupling the innovative smart metering services with the smart meters technologies, and the consumers' behaviour should interact with new technologies and polices. The book looks for the future of the electricity demand and the challenges posed by climate changes by using the smart meters technologies and smart meters services. …”
Libro electrónico -
1331por Gillen, David“…Any economic recovery is going to involve fundamental changes in institutions, rethinking polices regarding government participation in economies and changes in economic leadership in the world. …”
Publicado 2009
Capítulo de libro electrónico -
1332Publicado 2022“…The official culture used such stories to encourage heroic self-fashioningamong Soviet youth and as a means of self-policing and censure. Later Soviet narratives maintained this sacrificial imagery in order to assert the continued hold of Soviet ideology on society, while post-Soviet discourses of victimhood appeal to nationalist nostalgia. …”
Libro electrónico -
1333Publicado 2024“…Weaving together the stories of historical figures in a richly detailed narrative, the book shows how trans femininity emerged under colonial governments, the sex work industry, the policing of urban public spaces, and the area between the formal and informal economy. …”
Libro electrónico -
1334por Delnoy, Michel“…Différents spécialistes ont analysé à la fois la pertinence des instruments juridiques disponibles (polices administratives, responsabilités contractuelle et extra-contractuelle, droit des assurances) et les développements récents en Région flamande et en Région wallonne. …”
Publicado 2019
Electrónico -
1335Publicado 2020“…They investigate the digital signatures of the "new civil rights movement"-the online activism, storytelling, and strategy-building that set the stage for #BlackLivesMatter-and recount the spread of racial justice hashtags after the killing of Michael Brown in Ferguson, Missouri, and other high-profile incidents of killings by police. Finally, they consider hashtags created by allies, including #AllMenCan and #CrimingWhileWhite…”
Grabación no musical -
1336
-
1337por Hae, Laam“…This book offers a detailed analysis of the conflicts emerging between newly transplanted middle-class populations and different sectors of nightlife actors, and how these conflicts have led the NYC government to enforce "Quality of Life" policing over nightlife businesses. In particular, it provides a deep investigation of the zoning regulations that the municipal government has employed to control where certain types of nightlife can or cannot be located. …”
Publicado 2012
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
1338por Arvois, Emmanuel“…Dans les milieux professionnels aussi opposés que les forces de l’ordre (elles-mêmes diverses : polices urbaines, CRS, gendarmes mobiles, armée), les cheminots, les enseignants ou les hospitaliers ? …”
Publicado 2019
Electrónico -
1339Publicado 2009“…Special Topics: this section includes chapters on crime-related issues such as gangs, guns, peer pressure, drug use, child abuse/domestic violence, school crime, and hate crime, and criminal-justice related issues including capital punishment, restorative justice, community policing, and race and gender in criminal processing. …”
Libro electrónico -
1340Publicado 2009“…Written by renowned experts in the field, the chapters in this book address basic academic questions, and also provide real-life examples and applications of how they are resolved in cutting-edge research. Crime analysts in police and law enforcement agencies as well as academic researchers studying the spatial distributions of crime and victimization will learn from the discussions and tools presented…”
Libro electrónico