Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 49
- Computer security 48
- Computer networks 42
- Engineering & Applied Sciences 25
- Filosofía 22
- Historia 22
- Computer Science 14
- Electrical & Computer Engineering 12
- Telecommunications 12
- Ciencias sociales 11
- Certification 9
- Bergson, Henri 8
- Examinations 8
- Operating systems (Computers) 8
- Arquitectura 7
- Electronic data processing personnel 7
- Firewalls (Computer security) 7
- Internet 7
- Luther, Martin 7
- Computer crimes 6
- Computers 6
- Environment 6
- History 6
- Programming 6
- Access control 5
- Computer programs 5
- Derecho canónico 5
- Educación 5
- Història 5
- Protestantismo 5
-
241
-
242
-
243Publicado 2012Tabla de Contenidos: “…Summary -- Approach -- Key findings and recommendations from the analysis xiii -- Acknowledgments -- Abbreviations -- Introduction -- Mitigating the cyber threat through rapid acquisition -- Study approach -- Organization of this report -- Testing (certification and accreditation) challenges, best practices -- And recommendations -- Testing in the new IT acquisition strategy -- Navy modernization process challenges, best practices, and -- Recommendations -- Challenges -- Recommendations -- Budgeting, funding, and contracts challenges, best practices, and -- Recommendations -- Challenges -- Recommendations -- Governance, integration and training, and emergent needs challenges -- Best practices, and recommendations -- Challenges -- Recommendations -- Summary and conclusions -- Future work -- Appendix A: Survey of RAPID acquisition processes -- Appendix B: Navy RAPID acquisition options -- Appendix C: Case studies of successful RAPID/IT acquisition -- Navy case study: A-RCI -- Army case study: DRRS-A -- Marine Corps case study: Commercial hunter -- Appendix D: JCIDS and incremental acquisition background information -- Exceptions to JCIDS -- Description of "IT box" -- Appendix E: review of cyber and IT acquisition literature -- Legislation -- National research council report -- Defense Science Board report -- Other reports -- Appendix f: Air Force cyber acquisition -- Appendix G: Worms -- Worm attacks are an increasing problem -- Worm attacks require fast and frequent responses…”
Libro electrónico -
244
-
245Publicado 1992Microfilme
-
246
-
247
-
248
-
249por Organisation for Economic Co-operation and Development.“…Ten worms are randomly allocated to each test vessel. …”
Publicado 2016
Libro electrónico -
250Publicado 2019Tabla de Contenidos: “…An overview of machine design -- Strength of machine elements -- Detachable joints and fastening methods -- Detachable fastenings for shaft and hub -- Permanent connections -- Belt drives -- Chain drives -- Gear drives -- Worm gear drives -- Shafts -- Rolling contact bearings -- Sliding bearings -- Coupling and clutches -- Springs…”
Libro electrónico -
251Publicado 2024Tabla de Contenidos: “…T -- Friends -- Rejoice -- Blackpool -- Salcey Forest -- Tightrope -- Room 629 -- Clockwork -- A White Light -- Wetting Worms -- Hypothenar Evidence -- Dublin -- London -- Glasgow -- Reckonings…”
Libro -
252Publicado 2017Tabla de Contenidos: “…Introduction to security threats -- The 2014--2015 Anthem Blue Cross and Blue Shield break-in case study -- Anonymous persistent threats -- Creating secure code -- Providing a secure architecture -- The hacker strategy : expanded -- Malware, viruses, worms, bugs, and botnets -- Cryptography and the RSA algorithm -- Browser security and cross-site scripting-- Banking security, Zeus, and SpyEye -- Web application security -- Session management, user authentication, and web application security -- Web security, DNS security, and the internet -- Network security and defenses -- Network security protocols and defensive mechanisms -- Denial-of-service attacks -- Mobile platform security -- Cellular access security : 4G LTE, Mobile WiMAX, 5G, and MIMOs -- Wireless LAN security -- The Stuxnet Worm and the vulnerability of the U.S. electric power grid -- Cyber-warfare -- Conclusion…”
Libro electrónico -
253Publicado 2016Tabla de Contenidos: “…Collecting zero-day polymorphic worms using double-honeynet…”
Libro electrónico -
254
-
255
-
256por Romilly, Jacqueline de
Publicado 1997Biblioteca Universitat Ramon Llull (Otras Fuentes: Red de Bibliotecas de la Archidiócesis de Granada, Biblioteca Universidad de Deusto, Biblioteca de la Universidad de Navarra, Universidad Loyola - Universidad Loyola Granada, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago)Libro -
257por Davis, Miles, 1926-1991Tabla de Contenidos: “…Klaunstance (Tk 1) ; 15. Bird Gets The Worm (Tk 1) ; 16. Bird Gets The Worm (Tk 3) ; 17. …”
Publicado 2011
CDROM -
258
-
259
-
260por Organisation for Economic Co-operation and Development.“…Ten worms are randomly allocated to each test vessel. …”
Publicado 2004
Libro electrónico