Mostrando 2,681 - 2,700 Resultados de 3,146 Para Buscar '"forense"', tiempo de consulta: 0.12s Limitar resultados
  1. 2681
    por Chuvakin, Anton A.
    Publicado 2013
    Tabla de Contenidos: “…Resource ManagementIntrusion Detection; Troubleshooting; Forensics; Boring Audit, Fun Discovery; People, Process, Technology; Security Information and Event Management (SIEM); Summary; References; 2 What is a Log?…”
    Libro electrónico
  2. 2682
    por Liu, Dale
    Publicado 2009
    Tabla de Contenidos: “…Network Layer (3)Data Link Layer (2); Physical Layer (1); Using the OSI Model to Troubleshoot; Applying the OSI Model to Forensics; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3: An Introduction To Cryptography; What is Cryptography?…”
    Libro electrónico
  3. 2683
    por Cole, Eric
    Publicado 2013
    Tabla de Contenidos: “…; Summary; 7 Incident Response: Respond and Recover; Introduction; The New Rule; Suicidal Mindset; Incident Response; Events/Audit Trails; Sample Incidents; 6-Step Process; Preparation; Identification; Containment; Eradication; Recovery; Lesson Learned; Forensic Overview; Summary; 8 Technologies for Success; Introduction; Integrated Approach to APT; How Bad is the Problem?…”
    Libro electrónico
  4. 2684
    por Donnolo, Mark
    Publicado 2013
    Tabla de Contenidos: “…Motivating Creative Sales RolesDiscern Between Creativity as an End and Creativity as a Means to a Sales Result; Consider Fewer Directive Incentives and More Incentives with Latitude; Understand Motivators for Highly Cognitive Sales Roles; Involve Creative Sellers in Creating Their Own Goals; The Sales Crediting Balance; Measuring Mega Deals; 5 Questions You Should Ask Your Team About Strategic Accounts; CHAPTER 6 A Quota Quandary: Setting Equitable and Profitable Sales Goals; Some Challenges with Quotas; The Forensics: Do You Have a Quota Issue or a Sales Effectiveness Issue?…”
    Libro electrónico
  5. 2685
    Publicado 2014
    Tabla de Contenidos:
    Libro electrónico
  6. 2686
    por Carmichael, D. R.
    Publicado 2012
    Tabla de Contenidos: “…Albrecht Brigham Young University 41 Forensic Accounting in Litigation Consulting Services, Investigations, and Compliance Matters Yogesh Bahl, CPA, MBA Deloitte Financial Advisory Services LLP Frank Hydoski, PhD Deloitte Financial Advisory Services LLP 42 Introduction to E-Discovery Jack Moorman PricewaterhouseCoopers LLP Greg Schaffer PricewaterhouseCoopers LLP 43 Financial Expert Witness Challenges and Exclusions: Results and Trends in Federal and State Cases Since Kumho Tire Lawrence F. …”
    Libro electrónico
  7. 2687
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Tilte Page -- Copyright Page -- Contents -- Foreword -- Preface -- Acknowledgements -- Editors -- Contributors -- How to use this book -- Part 1: The Primary Care Interaction -- Chapter 1: Autonomy and consent in family medicine -- Chapter 2: Benefits, harms and evidence- Reflections from UK primary healthcare -- Chapter 3: Why it can be ethical to use placebos in clinical practice -- Chapter 4: Compassion in primary and community healthcare -- Chapter 5: The ethics of the family in primary care -- Chapter 6: Culture and ethics in healthcare -- Chapter 7: The ethics of complementary and alternative medicine (CAM) -- Chapter 8: The oughts of omnipractice -- Chapter 9: Micro-ethics of the general practice consultation -- Chapter 10: Analysing an ordinary consultation -- Chapter 11: The voice of the patient -- Part 2: On Vulnerable Patients -- Chapter 12: Children and the ethics of primary care -- Chapter 13: On frailty and ethics: Negotiating narratives -- Chapter 14: Achieving a good death in primary care: Ethical challenges at the end of life -- Chapter 15: The ethics and challenges in caring for vulnerable migrants inprimary care -- Chapter 16: Proximity, power and perspicacity: Ethical issues inprimary care research -- Chapter 17: Integrating ethical theory with musculoskeletal primary care practice -- Chapter 18: Power, prejudice and professionalism: Fat politics andmedical education -- Chapter 19: Genethics and genomics in thecommunity -- Chapter 20: Confidentiality and forensic disclosure in the primary healthcare setting -- Chapter 21: Mental health and ethics in primary care -- Chapter 22: Veterans and the ethics of reciprocity in UK primary healthcare -- Chapter 23: On residential care ethics -- Part 3: Teaching and Learning…”
    Libro electrónico
  8. 2688
    Publicado 2010
    Tabla de Contenidos: “…Morin -- Sleep in borderline personality disorder / José Manuel de la Fuente -- Dream differences in pschiatric patients / Milton Kramer -- Forensic issues of sleep in psychiatric patients / Irshaad Ebrahim and Peter B. …”
    Libro electrónico
  9. 2689
    Publicado 2006
    Tabla de Contenidos: “…Porsteinsson -- Cultural issues in late life / Kenneth Sakauye -- Forensic evaluation of the older patient / Stuart A. …”
    Libro
  10. 2690
    por Calaza López, Sonia
    Publicado 2024
    Tabla de Contenidos: “…. -- 2. intervención médico forense -- 3. aplicaciones del informe psiquiátrico -- 3.1. …”
    Libro electrónico
  11. 2691
    Publicado 2017
    Tabla de Contenidos: “…Potential Personal and Data Privacy Issues in the Cloud Environment -- eDiscovery -- Forensic Requirements -- International Conflict Resolution -- Cloud Forensic Challenges -- Contractual and Regulated PII -- Direct and Indirect Identifiers -- Audit Processes, Methodologies, and Cloud Adaptations -- Virtualization -- Scope -- Gap Analysis -- Information Security Management Systems (ISMSs) -- The Right to Audit in Managed Services -- Audit Scope Statements -- Policies -- Different Types of Audit Reports -- Auditor Independence -- AICPA Reports and Standards -- Summary -- Exam Essentials -- Written Labs -- Review Questions -- Chapter 11 Legal and Compliance Part 2 -- The Impact of Diverse Geographical Locations and Legal Jurisdictions -- Policies -- Implications of the Cloud for Enterprise Risk Management -- Choices Involved in Managing Risk -- Risk Management Frameworks -- Risk Management Metrics -- Contracts and Service-Level Agreements (SLAs) -- Business Requirements -- Cloud Contract Design and Management for Outsourcing -- Identifying Appropriate Supply Chain and Vendor Management Processes -- Common Criteria Assurance Framework (ISO/IEC 15408-1:2009) -- Cloud Computing Certification -- CSA Security, Trust, and Assurance Registry (STAR) -- Supply Chain Risk -- Summary -- Exam Essentials -- Written Labs -- Review Questions -- Appendix A Answers to the Review Questions -- Chapter 1: Architectural Concepts -- Chapter 2: Design Requirements -- Chapter 3: Data Classification -- Chapter 4: Cloud Data Security -- Chapter 5: Security in the Cloud -- Chapter 6: Responsibilities in the Cloud -- Chapter 7: Cloud Application Security -- Chapter 8: Operations Elements -- Chapter 9: Operations Management -- Chapter 10: Legal and Compliance Part 1 -- Chapter 11: Legal and Compliance Part 2 -- Appendix B Answers to the Written Labs -- Chapter 1 -- Chapter 2.…”
    Libro electrónico
  12. 2692
    Publicado 2012
    Tabla de Contenidos: “…Valoración y atención al daño cerebral adquirido 27 Síndrome de desorganización de la acción Café servido en plato llano 28 Neuropsicología forense La evaluación neuropsicológica va a juicio 29 El trabajo en un centro de día de atención al paciente con daño cerebral adquiridoF. …”
    Lectura en línea. Acceso restringido con credenciales UPSA
    Tutorial de uso de Eureka
    Libro
  13. 2693
    Publicado 2023
    Tabla de Contenidos: “…Resumen -- Ejercicios de repaso y autoevaluación -- Capítulo 5 Principios de medicina legal y forense aplicados a la actividad de tanatopraxia -- 1. …”
    Libro electrónico
  14. 2694
    Publicado 2021
    Tabla de Contenidos: “…Telling Stories With the Social Web -- 33. Digital Forensics: Repurposing Google Analytics IDs -- 34. …”
    Libro electrónico
  15. 2695
    Publicado 2013
    Tabla de Contenidos: “…Cover -- Contents -- Foreword -- Preface -- Acknowledgments -- About the Editors -- Contributors -- PART I: HISTORY AND CULTURE -- 1 Early History of Military Mental Health Care -- 2 History of Military Psychology -- 3 History of Psychology in the Department of Veterans Affairs -- 4 Demographics of the US Military -- 5 Military Culture -- 6 Personality and Military Service -- 7 Impact of Military Culture on the Clinician and Clinical Practice -- PART II: MILITARY PSYCHOLOGY SPECIALTIES AND PROGRAMS -- 8 Aeromedical Psychology -- 9 Assessment of Aviators -- 10 Military Neuropsychology -- 11 Combat Operational Stress and Behavioral Health -- 12 Forensic Psychology in the Military Setting -- 13 Operational Psychology -- 14 Working with Special Operations Forces -- 15 Command and Organizational Consultation -- 16 Human Factors Engineering and Human Performance -- 17 Clinical Health Psychology in Military Settings -- 18 Hostage Negotiation in the Military -- 19 Mental Health Advisory Teams -- 20 Comprehensive Soldier Fitness -- PART III: ETHICAL AND PROFESSIONAL ISSUES -- 21 Multiple Relationships in the Military Setting -- 22 Managing Conflicts between Ethics and Law -- 23 Mixed-Agency Dilemmas in Military Psychology -- 24 Professional Education and Training for Psychologists in the Military -- 25 The Department of Defense Psychopharmacology Demonstration Project -- 26 Psychologists on the Frontlines -- 27 Provision of Mental Health Services by Enlisted Service Members -- 28 Professional Burnout -- 29 Suicide in the Military -- 30 Women in Combat -- 31 Psychotherapy with Lesbian, Gay, and Bisexual Military Service Members -- 32 Military Psychologists' Roles in Interrogation -- 33 Interacting with the Media -- 34 Preparation and Training as a Military Psychologist -- 35 The Impact of Leadership on Mental Health…”
    Libro electrónico
  16. 2696
  17. 2697
    por Gutiérrez Salazar, Pablo
    Publicado 2019
    Tabla de Contenidos: “…-- PROCESOS -- DIRECCIÓN IP -- ATAQUES AL OBJETIVO -- DESCARGA DE ARCHIVOS -- SNIFFER -- ROBO DE CREDENCIALES DE NAVEGADORES Y OTROS PROGRAMAS REMOTAMENTE -- DESACTIVAR ANTIVIRUS -- ELEVACIÓN DE PRIVILEGIOS -- GETSYSTEM -- ELEVACIÓN PRIVILEGIOS ANDROID -- PERSISTENCIA -- WINDOWS -- PIVOTEO - ATACANDO DESDE SISTEMA COMPROMETIDO -- RECONOCIMIENTO -- INTERCEPTANDO PAQUETES EN REDES EXTERNAS -- ATACANDO A OTRO SISTEMA -- HACKEANDO WHATSAPP -- 6. FORENSE -- METODOLOGÍA -- PRÁCTICA - WINDOWS -- 7. …”
    Libro electrónico
  18. 2698
    Tabla de Contenidos: “….) -- 7.1.13 DETECCIÓN DE HAAR-CASCADE EN OPENCV -- CAPÍTULO 8. FORENSE -- 8.1 FORENSE MÓVIL -- 8.1.1 QUÉ ES SANTOKU -- 8.1.2 HERRAMIENTAS PARA ANALIZAR DATOS -- 8.1.3 HERRAMIENTAS PARA EL ANÁLISIS DE (...) -- 8.1.4 EVALUACIÓN DE APLICACIONES MÓVILES -- 8.1.5 HERRAMIENTAS -- 8.1.6 HERRAMIENTAS DE DESARROLLO -- 8.1.7 ANALIZADORES DE REDES INALÁMBRICAS -- 8.1.8 INGENIERÍA INVERSA -- 8.1.9 REQUERIMIENTOS -- 8.1.10 INSTALACIÓN -- 8.1.11 AFLOGICAL OSE -- 8.1.12 EXTRAYENDO INFORMACIÓN DEL DISPOSITIVO -- 8.1.13 APLICACIÓN -- 8.1.14 HERRAMIENTAS- AFLOGICAL OSE -- 8.1.15 PROCESO -- 8.1.16 EXIFTOOL -- 8.1.17 RESULTADOS -- 8.1.18 OTRAS HERRAMIENTAS: NMAP…”
    Libro electrónico
  19. 2699
    por Foltz, Kevin
    Publicado 2020
    Tabla de Contenidos: “…5.15 Data at Rest -- 5.16 Data in Motion -- 6 The Cloud -- 6.1 The Promise of Cloud Computing -- 6.2 Benefits of the Cloud -- 6.3 Drawbacks of Cloud Usage -- 6.3.1 Differences from Traditional Data Centers -- 6.3.2 Some Changes in the Threat Scenario -- 6.4 Challenges for the Cloud and High Assurance -- 6.5 Cloud Accountability, Monitoring, and Forensics -- 6.5.1 Accountability -- 6.5.2 Monitoring -- 6.5.3 Knowledge Repository -- 6.5.4 Forensic Tools -- 6.6 Standard Requirements for Cloud Forensics -- 7 The Network -- 7.1 The Network Entities -- 7.1.1 Most Passive Elements -- 7.1.2 Issues of the Most Passive Devices -- 7.1.3 The Convenience Functions -- 7.1.4 Issues for the Convenience Functions -- 7.1.5 Content Analyzers -- 7.1.6 Issues for Content Analyzers -- Section II Technical Details -- 8 Claims-Based Authentication -- 8.1 Authentication and Identity -- 8.2 Credentials in the Enterprise -- 8.3 Authentication in the Enterprise -- 8.3.1 Certificate Credentials -- 8.3.2 Registration -- 8.3.3 Authentication -- 8.4 Infrastructure Security Component Interactions -- 8.4.1 Interactions Triggered by a User Request for Service -- 8.4.2 Interaction Triggered by a Service Request -- 8.5 Compliance Testing -- 8.6 Federated Authentication -- 8.6.1 Naming and Identity -- 8.6.2 Translation of Claims or Identities -- 8.6.3 Data Requirements -- 8.6.4 Other Issues -- 9 Credentials for Access Claims -- 9.1 Security Assertion Markup Language -- 9.2 Access Control Implemented in the Web Service -- 9.3 Establishing Least Privilege -- 9.4 Default Values -- 9.5 Creating an SAML Token -- 9.6 Scaling of the STS for High Assurance Architectures -- 9.7 Rules for Maintaining High Assurance during Scale-Up -- 10 Claims Creation -- 10.1 Access Control Requirements at the Services -- 10.1.1 Discretionary Access Control List -- 10.1.2 Mandatory Access Control…”
    Libro electrónico
  20. 2700
    Publicado 2023
    Tabla de Contenidos: “…(pp. 35-44)--OSINT Y ANÁLISIS FORENSE PARA COMBATIR BULOS(pp. 45-60)--POSVERDAD Y VULNERABILIDAD COGNITIVA(pp. 61-7--BLOQUE II. …”
    Libro electrónico