Mostrando 2,761 - 2,780 Resultados de 3,146 Para Buscar '"forense"', tiempo de consulta: 0.08s Limitar resultados
  1. 2761
    Publicado 2021
    “…Yet many of the scientific, legal, and ethical concepts that underpin forensic DNA evidence remain unclear to the general public, judges, prosecutors, defense attorneys and students of law, forensic sciences, ethics, and genetics. …”
    Libro
  2. 2762
    Publicado 2015
    “…Digital Archaeology: The Art and Science of Digital Forensics LiveLessons is a comprehensive video guide to the techniques and processes used to perform forensic investigations on information systems. …”
    Video
  3. 2763
    Publicado 2021
    “…This book is not a handbook of criminology and forensic medicine but rather a tool that reviews socio-historical and scientific data and notes of methodology based on the different sciences aimed at the study of crime in all its many facets (sociology, jurisprudence, criminalistics, psychology, forensic neuroscience, and forensic medicine). …”
    Libro electrónico
  4. 2764
    Publicado 1698
    Libro
  5. 2765
    Publicado 2014
    Tabla de Contenidos: “….) -- PÁGINA LEGAL -- ÍNDICE -- INTRODUCCIÓN -- 1 ASPECTOS BÁSICOS -- 1.1 TAREAS DEL ADMINISTRADOR -- 1.2 HARDWARE DEL SERVIDOR -- 1.2.1 CPD -- 1.2.2 Sistema de rack -- 1.2.3 Servidores -- 1.2.4 Sistemas RAID -- 1.3 SOFTWARE DEL SERVIDOR -- 2 REDES DE ORDENADORES -- 2.1 CABLEADO -- 2.2 DISPOSITIVOS DE INTERCONEXIÓN -- 2.3 DIRECCIONAMIENTO IP -- 2.3.1 Clases de direcciones -- 2.3.2 Direcciones específicas -- 2.3.3 Direcciones privadas -- 2.3.4 Subredes -- 2.4 CONFIGURACIÓN DE ROUTERS -- 2.4.1 Tablas de enrutado -- 2.4.2 Ejemplo de creación de una tabla de enrutado -- 3 SERVICIOS -- 3.1 INTRODUCCIÓN -- 3.2 SERVICIO DHCP -- 3.3 SERVICIO DNS -- 3.3.1 Espacio de nombres de dominio -- 3.3.2 Registrar un dominio -- 3.3.3 Tipos de registro -- 3.4 SERVICIO FTP -- 3.5 SERVICIO WEB -- 3.5 SERVICIO WEB -- 3.6 SERVICIO DE CORREO ELECTRÓNICO -- 3.7 SERVICIO DE ACCESO REMOTO -- 4 SEGURIDAD -- 4.1 LAS DIEZ LEYES INMUTABLES DE LA SEGURIDAD -- 4.2 CONCEPTOS BÁSICOS SOBRE SEGURIDAD -- 4.2.1 Amenazas de seguridad -- 4.2.2 Ataques pasivos -- 4.2.3 Ataques activos -- 4.2.4 Tipos de ataques -- 4.3 OBTENCIÓN DE INFORMACIÓN DE UN ATACANTE -- 4.3.1 Identificar los servicios TCP y UDP -- 4.3.2 Identificar el sistema operativo -- 4.3.3 Identificar las versiones de los servicios -- 4.3.4 Escaneo de vulnerabilidades -- 4.4 MEDIDAS DE SEGURIDAD EN LOS SISTEMAS -- 4.4.1 Prevención -- 4.4.2 Detección: sistemas de detección de intrusos -- 4.4.3 Colocación de un NIDS -- 4.4.4 Tipos de sistemas de detección de intrusos -- 4.4.5 Recuperación: copias de seguridad -- 4.4.6 Técnicas de análisis forense -- WINDOWS 2008 R2 -- 5 INSTALACIÓN Y CONFIGURACIÓN -- 5.1 PREPARACIÓN DEL SISTEMA -- 5.1.1 Primeros pasos -- 5.1.2 Instalación -- 5.1.3 Finalización de la instalación y configuración -- 5.2 AGREGAR O QUITAR FUNCIONES (...)…”
    Enlace del recurso
    Libro electrónico
  6. 2766
    Publicado 2018
    Tabla de Contenidos: “…9.4.3 Writing rules -- 9.4.4 Using predefined rule-sets -- 9.5 Finding intrusions in system-call audit logs -- 9.5.1 The execution vulnerability -- 9.5.2 Catching fraudulent executions -- 9.5.3 Monitoring the filesystem -- 9.5.4 Monitoring the impossible -- 9.6 Trusting humans to detect anomalies -- Summary -- Chapter 10: The Caribbean breach: a case study in incident response -- 10.1 The Caribbean breach -- 10.2 Identification -- 10.3 Containment -- 10.4 Eradication -- 10.4.1 Capturing digital forensics artifacts in AWS -- 10.4.2 Outbound IDS filtering -- 10.4.3 Hunting IOCs with MIG -- 10.5 Recovery -- 10.6 Lessons learned and the benefits of preparation -- Summary -- Part 3: Maturing DevOps security -- Chapter 11: Assessing risks -- 11.1 What is risk management? …”
    Libro electrónico
  7. 2767
    por Stapleton, Jeff
    Publicado 2024
    Tabla de Contenidos: “…8.1.1 Offline Root CA -- 8.1.2 Online Intermediate CA With Issuing CAs -- 8.1.3 Online Issuing CA -- 8.1.4 Online RA -- 8.1.5 Online CRL Service -- 8.1.6 Online OCSP Service -- 8.1.7 End User's Machine -- 8.2 PKI Incident Attack Actions -- 8.2.1 Private Key Compromise -- 8.2.2 Private Key Access -- 8.2.3 Limited Access to the Private Key -- 8.2.4 Other Attacks -- 8.3 PKI Incident Response Plan -- 8.4 Monitoring the PKI Environment Prior to an Incident -- 8.5 Initial Response to an Incident -- 8.6 Detailed Discovery of an Incident -- 8.7 Collection of Forensic Evidence -- 8.8 Reporting of an Incident -- Notes -- Chapter 9 PKI Governance, Risk, and Compliance -- 9.1 PKI Governance -- 9.1.1 Management Organization -- 9.1.2 Security Organization -- 9.1.3 Audit Organization -- 9.2 PKI Risks -- 9.3 Cryptography Risks -- 9.3.1 Algorithm Issues -- 9.3.2 Protocol Issues -- 9.3.3 Product Issues -- 9.4 Cybersecurity Risks -- 9.5 Operational Risks -- 9.5.1 Monitoring -- 9.5.2 Capacity -- 9.5.3 Continuity -- 9.5.4 Resources -- 9.5.5 Knowledge -- 9.6 PKI Compliance -- 9.6.1 Evaluation Criteria -- 9.6.2 Gap Assessment -- 9.6.3 Audit Process -- 9.7 PKI Risk Assessment -- 9.8 PKI Cloud Assessment -- Notes -- Chapter 10 PKI Industry -- 10.1 ITU-T X.509 -- 10.2 EMV Integrated Circuit Card (ICC) -- 10.3 ASC X9 PKI Standards -- 10.4 Secure Electronic Transactions (SET) -- 10.5 Secure Socket Layer (SSL) -- 10.6 PKI Forum -- 10.7 American Bar Association (ABA) -- 10.8 WebTrust CA -- 10.9 CA Browser Forum -- 10.10 Cloud Security Alliance (CSA) -- 10.11 NIST PQC Program -- 10.12 ASC X9 Financial PKI -- 10.12.1 X9 Financial PKI Origins -- 10.12.2 PKI Architecture Models -- 10.12.3 X9 Financial PKI Program -- Notes -- Bibliography -- B.1 ASC X9 Financial Services -- B.2 European Telecommunication Standards Institute (ETSI) -- B.3 Internet Engineering Task Force (IETF)…”
    Libro electrónico
  8. 2768
    Publicado 2018
    “…The text will be indispensable for SIDS researchers, SIDS organisations, paediatric pathologists, forensic pathologists, paediatricians and families, in addition to residents in training programs that involve paediatrics. …”
    Libro electrónico
  9. 2769
    por Dorpat, Theodore L.
    Publicado 2007
    “…This groundbreaking book by an award-winning psychoanalyst and forensic psychiatrist presents a comprehensive exploration of a timely but often taboo topic: the failure of punishment to deter crime and violence, an issue that affects us both individually and as a culture. …”
    Libro electrónico
  10. 2770
  11. 2771
    Publicado 2017
    “…The second group of papers deals with forensic or analytical toxicology topics such as simplified methods for the analysis of gaseous toxic agents, rapid methods for the analysis and monitoring of pathogens in drinking water and water-based solutions, as well as the linkages between clinical and forensic toxicology. …”
    Libro electrónico
  12. 2772
    Publicado 2024
    “…The new edition of this practical book covers updates to the tools, including enhanced coverage of forensics and reverse engineering. Author Ric Messier also goes beyond strict security testing by adding coverage on performing forensic analysis, including disk and memory forensics, as well as some basic malware analysis. …”
    Libro electrónico
  13. 2773
    Publicado 1960
    Revista digital
  14. 2774
    Publicado 2023
    “…Over the last decades, interest in forensic toxicology has continually increased. Consequently, the discipline assumed a leading role, becoming one of the reference sciences for elucidating events of judicial importance. …”
    Libro electrónico
  15. 2775
    Publicado 2020
    “…The field of psychology is closely linked to legal processes, from forensic evaluation to treatment of offenders, through treatment with victims or risk assessment. …”
    Libro electrónico
  16. 2776
    Publicado 2017
    “…He has decades of information security experience and is the author of dozens of O'Reilly titles on info sec and digital forensics, including "Introduction to Penetration Testing" and "Learning Linux Security". …”
    Video
  17. 2777
    Publicado 2022
    Tabla de Contenidos: “…EL SESGO DE CONFIRMACIÓN FORENSE -- 4.4. REMEDIOS -- 5. BIBLIOGRAFÍA -- UNA NUEVA ERA: HACIA EL ROBOT SANITARIO "AUTÓNOMO" Y SU ENCAJE EN EL DERECHO1 -- 1. …”
    Libro electrónico
  18. 2778
    por Tyagi, Amit Kumar
    Publicado 2024
    Tabla de Contenidos: “…4.11 An Open Discussion -- 4.12 Conclusion -- References -- Chapter 5 Artificial Intelligence for Cyber Security: Current Trends and Future Challenges -- 5.1 Introduction: Security and Its Types -- 5.1.1 Human Aspects of Information Security -- 5.2 Network and Information Security for Industry 4.0 and Society 5.0 -- 5.2.1 Industry 4.0 vs Society 5.0 -- 5.2.2 Industry 4.0 to Society 5.0 -- 5.3 Internet Monitoring, Espionage, and Surveillance -- 5.4 Cyber Forensics with Artificial Intelligence and without Artificial Intelligence -- 5.5 Intrusion Detection and Prevention Systems Using Artificial Intelligence -- 5.6 Homomorphic Encryption and Cryptographic Obfuscation -- 5.7 Artificial Intelligence Security as Adversarial Machine Learning -- 5.8 Post-Quantum Cryptography -- 5.9 Security and Privacy in Online Social Networks and Other Sectors -- 5.10 Security and Privacy Using Artificial Intelligence in Future Applications/Smart Applications -- 5.11 Security Management and Security Operations Using Artificial Intelligence for Society 5.0 and Industry 4.0 -- 5.11.1 Implementation on the Internet of Things and Protecting Data in IoT Connected Devices -- 5.12 Digital Trust and Reputation Using Artificial Intelligence -- 5.13 Human-Centric Cyber Security Solutions -- 5.14 Artificial Intelligence-Based Cyber Security Technologies and Solutions -- 5.15 Open Issues, Challenges, and New Horizons Towards Artificial Intelligence and Cyber Security -- 5.15.1 An Overview of Cyber-Security -- 5.15.2 The Role of Artificial Intelligence in Cyber Security -- 5.15.3 AI Is Continually Made Smarter -- 5.15.4 AI Never Misses a Day of Work -- 5.15.5 AI Swiftly Spots the Threats -- 5.15.6 Impact of AI on Cyber Security -- 5.15.7 AI in Cyber Security Case Study -- 5.16 Future Research with Artificial Intelligence and Cyber Security -- 5.17 Conclusion -- References…”
    Libro electrónico
  19. 2779
    Publicado 2011
    “…It covers all major aspects of the pathologic anatomy of childhood disorders ranging from chromosomal syndromes and neoplasms to forensic pathology. Sections are organized by disease classification and by organ system. …”
    Enlace del recurso
    Libro electrónico
  20. 2780
    Publicado 1873
    Libro