Mostrando 41 - 60 Resultados de 2,927 Para Buscar '"Vector"', tiempo de consulta: 0.06s Limitar resultados
  1. 41
    por Schwartz, Jacob T.
    Publicado 1961
    Libro
  2. 42
    por Schaefer, Helmut H.
    Publicado 1966
    Libro
  3. 43
    por Llerena, Irene
    Publicado 2010
    Libro
  4. 44
    por Eisenman, Richard L.
    Publicado 1963
    Libro
  5. 45
    por Capildeo, R.
    Publicado 1968
    Libro
  6. 46
    por Collinson, C. D.
    Publicado 1974
    Libro
  7. 47
    Capítulo
  8. 48
    por Ballabriga, Fernando C.
    Publicado 1997
    Libro
  9. 49
    Publicado 2010
    “…Revista vectores de investigación…”
    Seriada digital
  10. 50
    por Haber, Morey J. author
    Publicado 2020
    Tabla de Contenidos: “…Chapter 1: Privileged Attack Vectors -- Chapter 2: Privileges -- Chapter 3: Credentials -- Chapter 4: Attack Vectors -- Chapter 5: Passwordless Authentication -- Chapter 6: Privilege Escalation -- Chapter 7: Insider and External Threats -- Chapter 8: Threat Hunting -- Chapter 9: Unstructured Data -- Chapter 10: Privileged Monitoring -- Chapter 11: Privileged Access Management -- Chapter 12: PAM Architecture -- Chapter 13: Break Glass -- Chapter 14: Industrial Control Systems (ICS) and Internet of Things (IoT) -- Chapter 15: The Cloud -- Chapter 16: Mobile Devices -- Chapter 17: Ransomware and Privileges -- Chapter 18: Remote Access -- Chapter 19: Secured DevOps (SecDevOps) -- Chapter 20: Regulatory Compliance -- Chapter 21: Just in Time -- Chapter 22: Zero Trust -- Chapter 23: Sample Privileged Access Management Use Cases -- Chapter 24: Deployment Considerations -- Chapter 25: Privileged Account Management Implementation -- Chapter 26: Machine Learning -- Chapter 27: Conclusion -- …”
    Libro electrónico
  11. 51
    Tabla de Contenidos: “…Chapter 1: The Three Pillars of Cybersecurity -- Chapter 2: A Nuance on Lateral Movement -- Chapter 3: The Five A’s of Enterprise IAM -- Chapter 4: Understanding Enterprise Identity -- Chapter 5: BOTS -- Chapter 6: Identity Governance Defined -- Chapter 7: The Identity Governance Process -- Chapter 8: Meeting Regulatory Compliance Mandates -- Chapter 9: Indicators of Compromise -- Chapter 10: Identity Attack Vectors -- Chapter 11: Identity Management Controls in the Cyber Kill Chain -- Chapter 12: Identity Management Program Planning -- Chapter 13: Privileged Access Management -- Chapter 14: Just-In-Time Access Management -- Chapter 15: Identity Obfuscation -- Chapter 16: System for Cross-domain Identity Management (SCIM) -- Chapter 17: Remote Access -- Chapter 18: Identity-Based Threat Response -- Chapter 19: Biometric Risks Related to Identities -- Chapter 20: Blockchain and Identity Management -- Chapter 21: Conclusion…”
    Libro electrónico
  12. 52
    “…See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. …”
    Libro electrónico
  13. 53
    Publicado 2016
    “…In Vector Basic Training, Second Edition acclaimed illustrative designer Von Glitschka takes you through his systematic process for creating the kind of precise vector graphics that separate the pros from the mere toolers. …”
    Libro electrónico
  14. 54
    Revista digital
  15. 55
    “…To stay ahead of these threats, IT and security leaders must be aware of exposures and understand their potential impact. Asset Attack Vectors will help you build a vulnerability management program designed to work in the modern threat environment. …”
    Libro electrónico
  16. 56
    Publicado 2022
    Tabla de Contenidos: “…Asset Manager -- Chapter 6. Attack Vectors -- Chapter 7. Mitigation Strategies -- Chapter 8. …”
    Libro electrónico
  17. 57
    por Deng, Naiyang
    Publicado 2013
    Tabla de Contenidos: “…Linear Regression; 4. Kernels and Support Vector Machines; 5. Basic Statistical Learning Theory of C-Support Vector Classification; 6. …”
    Libro electrónico
  18. 58
    por Dragomir, Sorin, 1955-
    Publicado 2012
    Tabla de Contenidos:
    Libro electrónico
  19. 59
    Publicado 2015
    “…These videos accompany the book Vector Basic Training, Second Edition: A Systematic Creative Process for Building Precision Vector Artwork. …”
    Video
  20. 60
    por Clark, David P.
    Publicado 2010
    “…Clark. The crucial role of vectors in disease virulence--and the best place to focus disease prevention efforts"--Resource description page…”
    Libro electrónico