Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Forensic psychology 210
- Psicología 186
- Psychology 181
- Psicología legal 180
- Computer security 165
- Security measures 154
- Medicina legal 136
- Computer networks 121
- Computer crimes 107
- Derecho 96
- Investigation 88
- Psiquiatría forense 81
- Psicología forense 80
- Forensic sciences 79
- Derecho procesal 72
- Anuarios 70
- Oratoria forense 58
- Derecho Civil 41
- Examinations 38
- Medical jurisprudence 38
- Law 34
- Criminología 33
- Derecho civil 33
- Práctica forense 33
- Psicología criminal 32
- Historia 30
- Forensic Medicine 29
- Psychological aspects 29
- Criminal investigation 28
- Abogados 27
-
2881Publicado 1991Biblioteca Universidad de Deusto (Otras Fuentes: Biblioteca de la Universidad de Navarra)Libro
-
2882Publicado 2021“…AI and Cloud Computing, Volume 120 in the Advances in Computers series, highlights new advances in the field, with this updated volume presenting interesting chapters on topics including A Deep-forest based Approach for Detecting Fraudulent Online Transaction, Design of Cyber-Physical-Social Systems with Forensic-awareness Based on Deep Learning, Review on Privacy-preserving Data Comparison Protocols in Cloud Computing, Fingerprint Liveness Detection Using an Improved CNN with the Spatial Pyramid Pooling Structure, Protecting Personal Sensitive Data Security in the Cloud with Blockchain, and more. …”
Libro electrónico -
2883Publicado 2020“…Security analysts, forensic investigators, and SOC teams looking for new approaches on digital investigations from the perspective of collecting and parsing publicly available information. …”
Libro electrónico -
2884
-
2885Publicado 2019“…The environmental control, forensics and virtually any industry rely on the newest advances in nanoscience and sustainable technologies. …”
Libro electrónico -
2886Publicado 2003“…Understanding Biotechnology presents careful and complete introductions to cloning, gene therapy, pharmacogenomics, molecular markers, forensic DNA, bioremediation, and biodiversity, as well as a full chapter on the risks of bioterrorism. …”
Libro electrónico -
2887Publicado 2013“…The employment of advanced neuroimaging techniques have been expanded in the scientific fields of neuropsychology, consumer’s psychology, and forensic medicine. Our current textbook presents exactly a collection of such innovative work, and explores new frontiers, and future applications of neuroimaging…”
Libro electrónico -
2888Publicado 2019“…Bayesian networks (BN) have recently experienced increased interest and diverse applications in numerous areas, including economics, risk analysis and assets and liabilities management, AI and robotics, transportation systems planning and optimization, political science analytics, law and forensic science assessment of agency and culpability, pharmacology and pharmacogenomics, systems biology and metabolomics, psychology, and policy-making and social programs evaluation. …”
Libro electrónico -
2889Publicado 2015“…The journal accepts papers in basic Veterinary sciences, preclinical and clinical veterinary medical sciences including Anatomy and Embryology, Histology, Animal Nutrition, Poultry Diseases, Aquatic animals diseases, Microbiology, Immunology, Biochemistry, Clinical Pathology, pathology, Internal Medicine, Infectious diseases, Parasitology, Pathology, Pharmacology, Physiology, Meat and Milk hygiene, Surgery, Theriogenology, Forensic medicine and toxicology, Animal Production, genetics, Farm economics, Zoonoses, Animal behavior, Animal hygiene, and biostatistics"--About page, viewed October 7, 2024.…”
Seriada digital -
2890Publicado 2018“…Offering perspectives from fields as varied as history, political science, literary and cultural studies, forensic and cultural anthropology, international human rights law, sociology, and art, this volume explores the multifaceted nature of a society's reckoning with past violence. …”
Libro -
2891Publicado 2023“…Lessons Covered Include: Domain 1: Threat Detection and Incident Response 1.0 Introduction 1.1 Designing and Implementing Incident Response Plans 1.2 Detecting Security Threats and Anomalies with AWS Services 1.3 Responding to Compromised Resources and Workloads 1.4 Automating Incident Response with AWS Lambda 1.5 Conducting Root Cause Analysis with Amazon Detective 1.6 Capturing Forensics Data from Compromised Resources 1.7 Querying Logs to Validate Security Events 1.8 Preserving Forensic Artifacts with S3 Object Lock 1.9 Preparing and Recovering Services After Incidents 1.10 Incident Response Case Study 1.11 Practice Exam - Threat Detection and Response 1.12 Threat Detection and Incident Response Summary Learning Objectives Understand best practices for incident response in the cloud Explore AWS services to detect security threats Learn how to respond to compromised resources Domain 2: Security Logging and Monitoring 2.0 Introduction 2.1 Designing and Implementing Monitoring and Alerting 2.2 Troubleshooting Security Monitoring and Alerting 2.3 Designing and Implementing Logging Solutions 2.4 Troubleshooting Logging Solutions 2.5 Designing Log Analysis Solutions 2.6 Configuring AWS CloudTrail for Logging 2.7 Analyzing Logs with Amazon Athena 2.8 Monitoring Case Study 2.9 Practice Exam - Logging and Monitoring 2.10 Optimizing Log Storage Lifecycles 2.11 Third Party Log Analysis Tools 2.12 Security Logging and Monitoring Summary Learning Objectives Understand how to set up monitoring and alerts for security Learn best practices for logging and log analysis Gain skills in troubleshooting logging and monitoring Domain 3: Infrastructure Security 3.0 Introduction 3.1 Designing and Implementing Edge Service Security 3.2 Designing and Implementing Network Security 3.3 Designing and Securing Compute Workloads 3.4 Troubleshooting Network Security 3.5 Securing EC2 Instances with SSM 3.6 Scanning Images for Vulnerabilities 3.7 Infrastructure Security Case Study 3.8 Practice Exam - Infrastructure Security 3.9 Integrating AWS Firewall Manager 3.10 Applying Security Best Practices to Lambdas 3.11 Hardening AMIs with EC2 Image Builder 3.12 Infrastructure Security Summary Learning Objectives Learn how to secure AWS network infrastructure Understand options for compute and workload security Gain skills in troubleshooting infrastructure issues Domain 4: Identity and Access Management 4.0 Introduction 4.1 Designing Authentication for AWS Resources 4.2 Designing Authorization for AWS Resources 4.3 Troubleshooting with IAM Access Analyzer 4.4 Enforcing Least Privilege Access 4.5 Separating Duties with IAM Roles 4.6 Identity and Access Management Case Study 4.7 Practice Exam - Identity and Access Management 4.8 Securing Root User Credentials 4.9 IAM Policy Simulator for Troubleshooting 4.10 Enabling Federated Access with SSO 4.11 Managing Credentials and Secrets 4.12 Identity and Access Management Summary Learning Objectives Master IAM best practices for authentication and authorization Understand how to apply least privilege and separation of duties Learn to troubleshoot IAM issues Domain 5: Data Protection 5.0 Introduction 5.1 Data in Transit Confidentiality and Integrity 5.2 Data at Rest Confidentiality and Integrity 5.3 Managing Data at Rest Lifecycles 5.4 Protecting Credentials, Secrets, and Keys 5.5 Encrypting Data with AWS KMS 5.6 Data Protection Case Study 5.7 Practice Exam - Data Protection 5.8 Enforcing Data Retention with Glacier 5.9 Preventing Data Deletion with S3 Object Lock 5.10 Rotating RDS Credentials 5.11 Encrypting Data in Transit with SSL/TLS 5.12 Data Protection Summary Learning Objectives Learn techniques to protect data in transit and at rest Understand how to manage data lifecycles Gain skills in managing credentials and secrets Domain 6: Management and Security Governance 6.0 Introduction 6.1 Strategies for Central Account Deployment 6.2 Secure and Consistent Cloud Deployment 6.3 Evaluating Compliance of AWS Resources 6.4 Identifying Security Gaps through Reviews and Cost 6.5 AWS Organizations SCP Best Practices 6.6 Governance Case Study 6.7 Practice Exam - Governance 6.8 Automating Security Deployments 6.9 Tagging Resources for Governance 6.10 AWS Config for Security Assessments 6.11 AWS Well Architected Tool 6.12 Governance and Security Management Summary Learning Objectives Understand best practices for governing accounts and resources Learn how to align security with organizational requirements Gain skills in compliance, auditing, and deployment Additional Popular Resources Assimilate OpenAI 52 Weeks of AWS-The Complete Series Microsoft Azure Fundamentals (AZ-900) Certification AWS Solutions Architect Professional (SAP-C02) 2023 Assimilate Python From Zero…”
Video -
2892Publicado 2023Tabla de Contenidos: “…Una denuncia falsa es un delito que consiste en imputar falsamente y a conciencia una serie de hechos a una persona que, de ser ciertos, constituirían una infracción penal. -- La doctrina forense se refiere el termino denuncia en la siguiente forma: «La. . . -- CAPÍTULO XXVI Fraude procesal(pp. 507-520) -- CAPÍTULO XXVI Fraude procesal(pp. 507-520) -- https://doi.org/10.2307/jj.11786250.30 -- https://www.jstor.org/stable/jj.11786250.30 -- Se define de acuerdo al DRAE, el vocablo fraude como: «Acción contraria a la verdad y a la rectitud, que perjudica a la persona contra quien se comete». …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
2893
-
2894por Benito-Butrón Ochoa, Juan Carlos“…que combinan la experiencia forense (un juez, un abogado) con el riguroso análisis académico (un catedrático especialista en la materia)? …”
Publicado 2013
Acceso al texto completo en Aranzadi
Libro -
2895por Perelman, Chaïm 1912-1984“…Aristotle's division of rhetoric into three genres-forensic, deliberative, and epideictic-is largely motivated by the judgments required for each: forensic or legal arguments require verdicts on past action, deliberative or political rhetoric seeks judgment on future action, and epideictic or ceremonial rhetoric concerns values associated with praise or blame and seeks no specific decisions. …”
Publicado 2000
Libro -
2896Publicado 2022“…Otro de los propósitos de este trabajo es explicar la criminalidad por parte de estos sujetos y qué repercusiones forenses existen. También se aborda el tema de la psicopatía femenina diferenciándola de los rasgos de la psicopatía masculina. …”
Acceso restringido UPSA
Tesis -
2897Publicado 2019“…It discusses the latest developments influencing the performance and utility of different NAA techniques across wide areas of applications: nuclear technology, industry, medicine, clinical investigations, biology, geochemistry, soil contamination, waste management, diet, lifestyle and health, cosmology, archeology, forensic science, etc. The overall goal of the book is to promote innovation and development of NAA techniques, technologies, and nuclear culture by presenting high-quality chapters with numerous results at both national and international levels. …”
Libro electrónico -
2898Publicado 2011“…With this document as your guide, you will review topics on security protocols, encryption, application protocols, security technologies, Cisco IOS security features, Cisco ASA, security management, wireless security, IPv6 security, security policies, network attack mitigation, and computer forensics . This fact-filled Quick Reference allows you to get all-important information at a glance, helping you to focus your study on areas of weakness and to enhance memory retention of essential exam concepts…”
Libro electrónico -
2899Publicado 2021“…It may be needed for safety, security, permission, banking, crime prevention, forensics, medical applications, communication, face finding, and others. …”
Libro electrónico -
2900Publicado 2023“…IBM Storage Sentinel automates the creation of immutable backup copies of your data, then uses machine learning to detect signs of possible corruption and generate forensic reports that help you quickly diagnose and identify the source of the attack. …”
Libro electrónico