Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Machine learning 125
- Computer graphics 121
- Data processing 111
- Python (Computer program language) 109
- Artificial intelligence 106
- Engineering & Applied Sciences 80
- Security measures 77
- Computer networks 74
- Mathematics 74
- Science 70
- Computer security 69
- Development 64
- R (Computer program language) 64
- Design 62
- Ciencias 60
- Programming 60
- Computer programs 59
- Digital techniques 55
- Application software 54
- Data mining 53
- General 51
- machine learning 45
- History of engineering & technology 44
- Mathematical models 44
- Computer programming 41
- Web sites 40
- Technology: general issues 39
- Research & information: general 38
- support vector machine 38
- Image processing 37
-
41
-
42
-
43
-
44
-
45
-
46
-
47
-
48
-
49
-
50por Haber, Morey J. authorTabla de Contenidos: “…Chapter 1: Privileged Attack Vectors -- Chapter 2: Privileges -- Chapter 3: Credentials -- Chapter 4: Attack Vectors -- Chapter 5: Passwordless Authentication -- Chapter 6: Privilege Escalation -- Chapter 7: Insider and External Threats -- Chapter 8: Threat Hunting -- Chapter 9: Unstructured Data -- Chapter 10: Privileged Monitoring -- Chapter 11: Privileged Access Management -- Chapter 12: PAM Architecture -- Chapter 13: Break Glass -- Chapter 14: Industrial Control Systems (ICS) and Internet of Things (IoT) -- Chapter 15: The Cloud -- Chapter 16: Mobile Devices -- Chapter 17: Ransomware and Privileges -- Chapter 18: Remote Access -- Chapter 19: Secured DevOps (SecDevOps) -- Chapter 20: Regulatory Compliance -- Chapter 21: Just in Time -- Chapter 22: Zero Trust -- Chapter 23: Sample Privileged Access Management Use Cases -- Chapter 24: Deployment Considerations -- Chapter 25: Privileged Account Management Implementation -- Chapter 26: Machine Learning -- Chapter 27: Conclusion -- …”
Publicado 2020
Libro electrónico -
51Tabla de Contenidos: “…Chapter 1: The Three Pillars of Cybersecurity -- Chapter 2: A Nuance on Lateral Movement -- Chapter 3: The Five A’s of Enterprise IAM -- Chapter 4: Understanding Enterprise Identity -- Chapter 5: BOTS -- Chapter 6: Identity Governance Defined -- Chapter 7: The Identity Governance Process -- Chapter 8: Meeting Regulatory Compliance Mandates -- Chapter 9: Indicators of Compromise -- Chapter 10: Identity Attack Vectors -- Chapter 11: Identity Management Controls in the Cyber Kill Chain -- Chapter 12: Identity Management Program Planning -- Chapter 13: Privileged Access Management -- Chapter 14: Just-In-Time Access Management -- Chapter 15: Identity Obfuscation -- Chapter 16: System for Cross-domain Identity Management (SCIM) -- Chapter 17: Remote Access -- Chapter 18: Identity-Based Threat Response -- Chapter 19: Biometric Risks Related to Identities -- Chapter 20: Blockchain and Identity Management -- Chapter 21: Conclusion…”
Libro electrónico -
52“…See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. …”
Libro electrónico -
53Publicado 2016“…In Vector Basic Training, Second Edition acclaimed illustrative designer Von Glitschka takes you through his systematic process for creating the kind of precise vector graphics that separate the pros from the mere toolers. …”
Libro electrónico -
54
-
55Asset Attack Vectors Building Effective Vulnerability Management Strategies to Protect Organizations“…To stay ahead of these threats, IT and security leaders must be aware of exposures and understand their potential impact. Asset Attack Vectors will help you build a vulnerability management program designed to work in the modern threat environment. …”
Libro electrónico -
56Publicado 2022Tabla de Contenidos: “…Asset Manager -- Chapter 6. Attack Vectors -- Chapter 7. Mitigation Strategies -- Chapter 8. …”
Libro electrónico -
57por Deng, NaiyangTabla de Contenidos: “…Linear Regression; 4. Kernels and Support Vector Machines; 5. Basic Statistical Learning Theory of C-Support Vector Classification; 6. …”
Publicado 2013
Libro electrónico -
58
-
59Publicado 2015“…These videos accompany the book Vector Basic Training, Second Edition: A Systematic Creative Process for Building Precision Vector Artwork. …”
-
60por Clark, David P.“…Clark. The crucial role of vectors in disease virulence--and the best place to focus disease prevention efforts"--Resource description page…”
Publicado 2010
Libro electrónico