Mostrando 1,321 - 1,340 Resultados de 1,433 Para Buscar '"The Police"', tiempo de consulta: 0.08s Limitar resultados
  1. 1321
    Publicado 2007
    “…IJCC will focus on all aspects of cyber/computer crime: Forms of Cyber Crime, Impact of Cyber crimes in the real world, Policing Cyber space, Cyber-terrorism, International Perspectives of Cyber Crime, developing cyber safety policy, intrusion investigations, information security, Cyber Victims, Cyber Psychopathology, Geographical aspects of Cybercrime, Cyber offender behavior, cyber crime law, Cyber Pornography, Physical Computer Security, Privacy & Anonymity on the Net, Internet Fraud & Identity Theft, Mobile Phone Safety, Online Gambling, Copyright and Intellectual property Law, and Detection of Distributed Denial of Service Attacks. …”
    Revista digital
  2. 1322
    Publicado 2021
    “…"Many of today's insurgent Black movements call for an end to racial capitalism. They take aim at policing and mass incarceration, the racial partitioning of workplaces and residential communities, and the expropriation and underdevelopment of Black populations at home and abroad. …”
    Libro electrónico
  3. 1323
    Publicado 2022
    “…With the use of FRT for policing, surveillance, and business steadily increasing, this book provides a timely examination of both the benefits of FRT, and the threats it poses to privacy rights, human rights, and civil liberties. …”
    Libro electrónico
  4. 1324
    Publicado 2015
    “…They included a lack of infrastructure (ie. fences), institutions (ie. police), and population (ie. consumers). However, the ranching people in these two societies had their differences too. …”
    Libro electrónico
  5. 1325
    Publicado 2022
    “…The book also offers: discussions of policing 4.0 and how data and analytics will transform public safety; explorations of the future of education and how AI can dramatically enhance educational standards while reducing costs; and treatments of the internationalization of public services and its impact on agencies and departments everywhere. …”
    Grabación no musical
  6. 1326
    Publicado 2021
    “…Many of today's insurgent Black movements call for an end to racial capitalism. They take aim at policing and mass incarceration, the racial partitioning of workplaces and residential communities, the expropriation and underdevelopment of Black populations at home and abroad. …”
    Libro electrónico
  7. 1327
    por Denton, Geoffrey R.
    Publicado 1970
    Libro
  8. 1328
    Publicado 2022
    Tabla de Contenidos: “…Logging Levels/Severity Levels -- 00-FMindd 18 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Interface Statistics/Status -- Link State (Up/Down) -- Speed/Duplex -- Send/Receive Traffic -- Cyclic Redundancy Checks (CRCs) -- Protocol Packet and Byte Counts -- Interface Errors or Alerts -- CRC Errors -- Giants -- Runts -- Encapsulation Errors -- Environmental Factors and Sensors: Temperature, Humidity, Electrical, Flooding -- Baselines -- NetFlow Data -- Uptime/Downtime -- REVIEW -- 31 QUESTIONS -- 31 ANSWERS -- Objective 32 Explain the purpose of organizational documents -- and policies -- Plans and Procedures -- Change Management -- Incident Response Plan -- Disaster Recovery Plan -- Business Continuity Plan -- System Life Cycle -- Standard Operating Procedures -- Hardening and Security Policies -- Password Policy -- Acceptable Use Policy -- Bring Your Own Device (BYOD) Policy -- Remote Access Policy -- Onboarding and Offboarding Policy -- Security Policy -- Data Loss Prevention -- Common Documentation -- Physical Network Diagram -- Logical Network Diagram -- Wiring Diagram -- Site Survey Report -- 00-FMindd 19 22/04/22 11:12 AM -- xx Mike Meyers' CompTIA Network+ Certification Passport -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Audit and Assessment Report -- Baseline Configurations -- Common Agreements -- Non-Disclosure Agreement (NDA) -- Service-Level Agreement (SLA) -- Memorandum of Understanding (MOU) -- REVIEW -- 32 QUESTIONS -- 32 ANSWERS -- Objective 33 Explain high availability and disaster recovery -- concepts and summarize which is the best solution -- Load Balancing -- Multipathing -- Network Interface Card (NIC) Teaming -- Redundant Hardware/Clusters -- Switches -- Routers -- Firewalls -- Facilities and Infrastructure Support -- Uninterruptible Power Supply (UPS) -- Power Distribution Units (PDUs) -- Generator -- HVAC -- Fire Suppression -- Redundancy and High Availability (HA) Concepts -- Cold Site -- Warm Site -- Hot Site -- Cloud Site -- Active-Active vs Active-Passive -- Mean Time to Repair (MTTR) -- Mean Time Between Failure (MTBF) -- Recovery Time Objective (RTO) -- Recovery Point Objective (RPO) -- Network Device Backup/Restore -- Configuration -- State -- REVIEW -- 33 QUESTIONS -- 33 ANSWERS -- 00-FMindd 20 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- 40 Network Security -- Objective 41 Explain common security concepts -- Confidentiality, Integrity, Availability (CIA) -- Threats -- Internal -- External -- Vulnerabilities -- Common Vulnerabilities and Exposures (CVE) -- Zero-Day -- Exploits -- Least Privilege -- Role-Based Access -- Zero Trust -- Defense in Depth -- Network Segmentation Enforcement -- Screened Subnet [Previously Known as Demilitarized Zone (DMZ)] -- Separation of Duties -- Network Access Control -- Honeypot -- Authentication Methods -- Multifactor -- Terminal Access Controller Access-Control System Plus (TACACS+) -- Remote Authentication Dial-in User Service (RADIUS) -- Single Sign-On (SSO) -- LDAP -- Kerberos -- Local Authentication -- Extensible Authentication Protocol (EAP) -- 8021X -- Risk Management -- Security Risk Assessments -- Business Risk Assessments -- Security Information and Event Management (SIEM) -- REVIEW -- 41 QUESTIONS -- 41 ANSWERS -- Objective 42 Compare and contrast common types of attacks -- Technology-Based -- Denial-of-Service (DoS)/Distributed Denial-of-Service (DDoS) -- On-Path Attack (Previously Known as Man-in-the-Middle Attack) -- 00-FMindd 21 22/04/22 11:12 AM -- xxii Mike Meyers' CompTIA Network+ Certification Passport -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- ARP Spoofing -- DNS Poisoning -- VLAN Hopping -- Rogue DHCP -- Rogue Access Point (AP) -- Evil Twin -- Ransomware -- Password Attacks -- MAC Spoofing -- IP Spoofing -- Deauthentication -- Malware -- Human and Environmental -- Social Engineering -- REVIEW -- 42 QUESTIONS -- 42 ANSWERS -- Objective 43 Given a scenario, apply network -- hardening techniques -- Best Practices -- Secure SNMP -- Router Advertisement (RA) Guard -- Port Security -- Dynamic ARP Inspection -- Control Plane Policing -- Private VLANs -- Disable Unneeded Switchports -- Disable Unneeded Network Services -- Change Default Passwords -- Password Complexity/Length -- Enable DHCP Snooping -- Change Default VLAN -- Patch and Firmware Management -- Access Control List -- Firewall Rules -- Role-Based Access -- Wireless Security -- MAC Filtering -- Antenna Placement -- Power Levels -- Wireless Client Isolation -- Guest Network Isolation -- 00-FMindd 22 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Preshared Keys (PSKs) -- EAP -- Geofencing -- Captive Portal -- IoT Access Considerations -- REVIEW -- 43 QUESTIONS -- 43 ANSWERS -- Objective 44 Compare and contrast remote access methods -- and security implications -- Site-to-Site VPN -- Client-to-Site VPN -- Clientless VPN -- Split Tunnel vs Full Tunnel -- Remote Desktop Connection -- Remote Desktop Gateway -- SSH -- Virtual Network Computing (VNC)…”
    Libro electrónico
  9. 1329
    Publicado 2020
    “…This book covers domains of government policy and Indigenous agency including local government, education, land rights, the outstation movement, international law, foreign policy, capital programs, health, public administration, mission policies and the policing of identity. Each of the contributors is a specialist in his/her topic. …”
    Libro electrónico
  10. 1330
    Publicado 2016
    “…The target challenges are coupling the innovative smart metering services with the smart meters technologies, and the consumers' behaviour should interact with new technologies and polices. The book looks for the future of the electricity demand and the challenges posed by climate changes by using the smart meters technologies and smart meters services. …”
    Libro electrónico
  11. 1331
    por Gillen, David
    Publicado 2009
    “…Any economic recovery is going to involve fundamental changes in institutions, rethinking polices regarding government participation in economies and changes in economic leadership in the world. …”
    Capítulo de libro electrónico
  12. 1332
    Publicado 2022
    “…The official culture used such stories to encourage heroic self-fashioningamong Soviet youth and as a means of self-policing and censure. Later Soviet narratives maintained this sacrificial imagery in order to assert the continued hold of Soviet ideology on society, while post-Soviet discourses of victimhood appeal to nationalist nostalgia. …”
    Libro electrónico
  13. 1333
    Publicado 2024
    “…Weaving together the stories of historical figures in a richly detailed narrative, the book shows how trans femininity emerged under colonial governments, the sex work industry, the policing of urban public spaces, and the area between the formal and informal economy. …”
    Libro electrónico
  14. 1334
    por Delnoy, Michel
    Publicado 2019
    “…Différents spécialistes ont analysé à la fois la pertinence des instruments juridiques disponibles (polices administratives, responsabilités contractuelle et extra-contractuelle, droit des assurances) et les développements récents en Région flamande et en Région wallonne. …”
    Electrónico
  15. 1335
    Publicado 2020
    “…They investigate the digital signatures of the "new civil rights movement"-the online activism, storytelling, and strategy-building that set the stage for #BlackLivesMatter-and recount the spread of racial justice hashtags after the killing of Michael Brown in Ferguson, Missouri, and other high-profile incidents of killings by police. Finally, they consider hashtags created by allies, including #AllMenCan and #CrimingWhileWhite…”
    Grabación no musical
  16. 1336
    Publicado 1997
    Acceso restringido usuarios UPSA
    Libro electrónico
  17. 1337
    por Hae, Laam
    Publicado 2012
    “…This book offers a detailed analysis of the conflicts emerging between newly transplanted middle-class populations and different sectors of nightlife actors, and how these conflicts have led the NYC government to enforce "Quality of Life" policing over nightlife businesses. In particular, it provides a deep investigation of the zoning regulations that the municipal government has employed to control where certain types of nightlife can or cannot be located. …”
    Enlace del recurso
    Libro electrónico
  18. 1338
    por Arvois, Emmanuel
    Publicado 2019
    “…Dans les milieux professionnels aussi opposés que les forces de l’ordre (elles-mêmes diverses : polices urbaines, CRS, gendarmes mobiles, armée), les cheminots, les enseignants ou les hospitaliers ? …”
    Electrónico
  19. 1339
    Publicado 2009
    “…Special Topics: this section includes chapters on crime-related issues such as gangs, guns, peer pressure, drug use, child abuse/domestic violence, school crime, and hate crime, and criminal-justice related issues including capital punishment, restorative justice, community policing, and race and gender in criminal processing. …”
    Libro electrónico
  20. 1340
    Publicado 2009
    “…Written by renowned experts in the field, the chapters in this book address basic academic questions, and also provide real-life examples and applications of how they are resolved in cutting-edge research. Crime analysts in police and law enforcement agencies as well as academic researchers studying the spatial distributions of crime and victimization will learn from the discussions and tools presented…”
    Libro electrónico