Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 185
- Historia 161
- Management 84
- Development 82
- Operating systems (Computers) 75
- Filosofía 73
- Social aspects 64
- Computer networks 63
- Application software 62
- Engineering & Applied Sciences 61
- Philosophy 60
- Linux 58
- RELIGION 54
- Security measures 54
- Data processing 50
- Leadership 49
- Computer security 47
- Computer Science 43
- Computer software 40
- Politics and government 40
- Política y gobierno 39
- Mathematics 37
- Computer programming 36
- Crítica e interpretación 35
- Cloud computing 34
- History and criticism 34
- Psychological aspects 34
- Research & information: general 34
- Business & Economics 31
- Computer programs 31
-
3901Publicado 2021“…This unique book teaches you concrete techniques rooted in cognitive science that will improve the way you learn and think about code. …”
Libro electrónico -
3902por Whitaker, Andrew“…The practical guide to simulating, detecting, and responding to network attacks Create step-by-step testing plans Learn to perform social engineering and host reconnaissance Evaluate session hijacking methods Exploit web server vulnerabilities Detect attempts to breach database security Use password crackers to obtain access information Circumvent Intrusion Prevention Systems (IPS) and firewall protections and disrupt the service of routers and switches Scan and penetrate wireless networks Understand the inner workings of Trojan Horses, viruses, and other backdoor applications Test UNIX, Microsoft, and Novell servers for vulnerabilities Learn the root cause of buffer overflows and how to prevent them Perform and prevent Denial of Service attacks Penetration testing is a growing field but there has yet to be a definitive resource that instructs ethical hackers on how to perform a penetration test with the ethics and responsibilities of testing in mind. …”
Publicado 2005
Libro electrónico -
3903por Vloeberghs, Ward 1979-“…Detailed country chapters provide a solid basis for the comparative approach which reveals major variations in meanings of accountability, mobilization strategies, and official responses, rooted in the specific sociopolitical contexts of each country. …”
Publicado 2024
Libro electrónico -
3904Publicado 2023“…Lessons Covered Include: Domain 1: Threat Detection and Incident Response 1.0 Introduction 1.1 Designing and Implementing Incident Response Plans 1.2 Detecting Security Threats and Anomalies with AWS Services 1.3 Responding to Compromised Resources and Workloads 1.4 Automating Incident Response with AWS Lambda 1.5 Conducting Root Cause Analysis with Amazon Detective 1.6 Capturing Forensics Data from Compromised Resources 1.7 Querying Logs to Validate Security Events 1.8 Preserving Forensic Artifacts with S3 Object Lock 1.9 Preparing and Recovering Services After Incidents 1.10 Incident Response Case Study 1.11 Practice Exam - Threat Detection and Response 1.12 Threat Detection and Incident Response Summary Learning Objectives Understand best practices for incident response in the cloud Explore AWS services to detect security threats Learn how to respond to compromised resources Domain 2: Security Logging and Monitoring 2.0 Introduction 2.1 Designing and Implementing Monitoring and Alerting 2.2 Troubleshooting Security Monitoring and Alerting 2.3 Designing and Implementing Logging Solutions 2.4 Troubleshooting Logging Solutions 2.5 Designing Log Analysis Solutions 2.6 Configuring AWS CloudTrail for Logging 2.7 Analyzing Logs with Amazon Athena 2.8 Monitoring Case Study 2.9 Practice Exam - Logging and Monitoring 2.10 Optimizing Log Storage Lifecycles 2.11 Third Party Log Analysis Tools 2.12 Security Logging and Monitoring Summary Learning Objectives Understand how to set up monitoring and alerts for security Learn best practices for logging and log analysis Gain skills in troubleshooting logging and monitoring Domain 3: Infrastructure Security 3.0 Introduction 3.1 Designing and Implementing Edge Service Security 3.2 Designing and Implementing Network Security 3.3 Designing and Securing Compute Workloads 3.4 Troubleshooting Network Security 3.5 Securing EC2 Instances with SSM 3.6 Scanning Images for Vulnerabilities 3.7 Infrastructure Security Case Study 3.8 Practice Exam - Infrastructure Security 3.9 Integrating AWS Firewall Manager 3.10 Applying Security Best Practices to Lambdas 3.11 Hardening AMIs with EC2 Image Builder 3.12 Infrastructure Security Summary Learning Objectives Learn how to secure AWS network infrastructure Understand options for compute and workload security Gain skills in troubleshooting infrastructure issues Domain 4: Identity and Access Management 4.0 Introduction 4.1 Designing Authentication for AWS Resources 4.2 Designing Authorization for AWS Resources 4.3 Troubleshooting with IAM Access Analyzer 4.4 Enforcing Least Privilege Access 4.5 Separating Duties with IAM Roles 4.6 Identity and Access Management Case Study 4.7 Practice Exam - Identity and Access Management 4.8 Securing Root User Credentials 4.9 IAM Policy Simulator for Troubleshooting 4.10 Enabling Federated Access with SSO 4.11 Managing Credentials and Secrets 4.12 Identity and Access Management Summary Learning Objectives Master IAM best practices for authentication and authorization Understand how to apply least privilege and separation of duties Learn to troubleshoot IAM issues Domain 5: Data Protection 5.0 Introduction 5.1 Data in Transit Confidentiality and Integrity 5.2 Data at Rest Confidentiality and Integrity 5.3 Managing Data at Rest Lifecycles 5.4 Protecting Credentials, Secrets, and Keys 5.5 Encrypting Data with AWS KMS 5.6 Data Protection Case Study 5.7 Practice Exam - Data Protection 5.8 Enforcing Data Retention with Glacier 5.9 Preventing Data Deletion with S3 Object Lock 5.10 Rotating RDS Credentials 5.11 Encrypting Data in Transit with SSL/TLS 5.12 Data Protection Summary Learning Objectives Learn techniques to protect data in transit and at rest Understand how to manage data lifecycles Gain skills in managing credentials and secrets Domain 6: Management and Security Governance 6.0 Introduction 6.1 Strategies for Central Account Deployment 6.2 Secure and Consistent Cloud Deployment 6.3 Evaluating Compliance of AWS Resources 6.4 Identifying Security Gaps through Reviews and Cost 6.5 AWS Organizations SCP Best Practices 6.6 Governance Case Study 6.7 Practice Exam - Governance 6.8 Automating Security Deployments 6.9 Tagging Resources for Governance 6.10 AWS Config for Security Assessments 6.11 AWS Well Architected Tool 6.12 Governance and Security Management Summary Learning Objectives Understand best practices for governing accounts and resources Learn how to align security with organizational requirements Gain skills in compliance, auditing, and deployment Additional Popular Resources Assimilate OpenAI 52 Weeks of AWS-The Complete Series Microsoft Azure Fundamentals (AZ-900) Certification AWS Solutions Architect Professional (SAP-C02) 2023 Assimilate Python From Zero…”
Video -
3905Publicado 2018“…It considers concrete and liberating faith constructs in areas ranging from gender, race, economic inequality, a solidarity economics and housing to urban violence, indigeneity and urbanisation, the interface between economic and environmental sustainability, and grass-roots theological education…”
Accés lliure
Libro electrónico -
3906Publicado 2013“…Carolyn Steel follows food on its journey - from the land (and sea) to market and supermarket, kitchen to table, waste-dump and back again - exploring the historical roots and the contemporary issues at each stage of food's cycle. …”
Libro -
3907Publicado 2018“…The fourth section includes a chapter presenting a two-level fault diagnosis and root-cause analysis scheme for a class of interconnected invertible dynamic systems, which aims at detecting and identifying actuator fault and causes…”
Libro electrónico -
3908por Feldman, Stephen M., 1955-“…Rather, it has slowly evolved as a political and religious development through western history, beginning with the initial appearance of Christianity as it contentiously separated from Judaism.In tracing the historical roots of the separation of church and state within the Western world, Feldman begins with the Roman Empire and names Augustine as the first political theorist to suggest the idea. …”
Publicado 1996
Libro electrónico -
3909Publicado 2017“…In the last twenty years many critics have discussed the possibility of various coexisting canons rooted in official and non-official literature and suggested replacing the term “Soviet literature” with a new definition - “Russian literature of the Soviet period”. …”
Libro electrónico -
3910por Tully, Alan, 1943-“…In a conclusion that pursues his insights into the revolutionary and early republican years, Tully underlines a paradox in American political development: not only were the path breaking liberal politicians of New York and Pennsylvania the least inclined towards revolutionary fervor, but their political language and concepts - integral to an emerging liberal democratic order - were rooted in oligarchical political practice. "A momentous contribution to the burgeoning literature on the middle Atlantic region, and to the vexed question of whether it constitutes a coherent cultural configuration. …”
Publicado 2019
Libro electrónico -
3911por Johnson, Christopher H.“…Christopher Johnson chronicles the life of Maurice Sugar, from his roots in Michigan's Upper Peninsula, through his resistance with Eugene V. …”
Publicado 2018
Libro electrónico -
3912Publicado 2010“…The European perspective in philosophy of science is the inclusion of the historical roots of current debates and the focus on methodological problems that cross the various sub-disciplines. …”
Libro electrónico -
3913Publicado 1994“…Several new topics have been added, and the most significant ideas have been traced to their historical roots. The book includes more than 500 exercises, divided into six categories. …”
Libro electrónico -
3914por Siriwardena, Prabath. author“…Benefit from lessons learned from analyzing multiple attacks that have taken place by exploiting security vulnerabilities in various OAuth 2.0 implementations. Explore root causes, and improve your security practices to mitigate against similar future exploits. …”
Publicado 2020
Libro electrónico -
3915Publicado 2016“…Learn why work-life balance is not a zero-sum game Discover what pragmatism and commitment truly mean in business Realise the importance of good partnerships and unsung heroes Manage change effectively and employ it wisely for sustainable success By eavesdropping on a leader’s communications with the people he serves, you get a real sense of the man behind the success. Great leadership is rooted in a philosophy of “building up” instead of tearing down, and motivated by the sincere belief that we bring our own purpose into everything we do. …”
Libro electrónico -
3916Publicado 2015“…Practical appendixes include reusable templates and audit meeting agendas, plus essential information on documentation Coverage includes: ISO 9001:2015’s business relevance and role in operational excellence Why revisions were necessary, and how they impact and benefit you Deepening your understanding of customer/stakeholder needs and expectations Scoping your QMS in the context of ISO 9001:2015 Identifying risks, opportunities, objectives, resources, and competencies Performing operational activities related to planning, control, requirements, design, and development Measuring QMS performance Addressing nonconformities and analyzing their root causes Promoting ongoing improvement…”
Libro electrónico -
3917Publicado 2019“…Pulling together the best thinking from neuroscience, psychology and business, and her rich personal experience in twenty years of leading change projects in professional services organisations and other people-centred businesses, author Jennifer Emery presents a framework for change rooted in seven key themes that help organisations establish their BECAUSE: belonging, evolution, confidence, agility, understanding, simplicity and energy. …”
Libro electrónico -
3918Publicado 2014“…Mikitani argues that Japan's tendency to shun international frameworks and hide from global realities is the root of the problem, while Mikitani Sr.'s background as an international economist puts the issue in perspective for a well-rounded look at today's Japan. …”
Libro electrónico -
3919Publicado 2015“…This global-cultural convergence has highlighted both similarities and deep-rooted differences, and it's up to the leaders involved in these exchanges to bridge the divide and pursue the goals that benefit both sides. …”
Libro electrónico -
3920Publicado 2017“…Reframing Organizations provides time-tested guidance for more effective organizational leadership. Rooted in decades of social science research across multiple disciplines, Bolman and Deal's four-frame model has continued to evolve since its conception over 25 years ago; this new sixth edition has been updated to include coverage of cross-sector collaboration, generational differences, virtual environments, globalization, sustainability, and communication across cultures. …”
Libro electrónico