Mostrando 2,881 - 2,900 Resultados de 3,141 Para Buscar '"forense"', tiempo de consulta: 0.09s Limitar resultados
  1. 2881
    Publicado 1991
    Libro
  2. 2882
    Publicado 2021
    “…AI and Cloud Computing, Volume 120 in the Advances in Computers series, highlights new advances in the field, with this updated volume presenting interesting chapters on topics including A Deep-forest based Approach for Detecting Fraudulent Online Transaction, Design of Cyber-Physical-Social Systems with Forensic-awareness Based on Deep Learning, Review on Privacy-preserving Data Comparison Protocols in Cloud Computing, Fingerprint Liveness Detection Using an Improved CNN with the Spatial Pyramid Pooling Structure, Protecting Personal Sensitive Data Security in the Cloud with Blockchain, and more. …”
    Libro electrónico
  3. 2883
    Publicado 2020
    “…Security analysts, forensic investigators, and SOC teams looking for new approaches on digital investigations from the perspective of collecting and parsing publicly available information. …”
    Libro electrónico
  4. 2884
    por Pope, Kenneth S.
    Publicado 1999
    Libro
  5. 2885
    Publicado 2019
    “…The environmental control, forensics and virtually any industry rely on the newest advances in nanoscience and sustainable technologies. …”
    Libro electrónico
  6. 2886
    Publicado 2003
    “…Understanding Biotechnology presents careful and complete introductions to cloning, gene therapy, pharmacogenomics, molecular markers, forensic DNA, bioremediation, and biodiversity, as well as a full chapter on the risks of bioterrorism. …”
    Libro electrónico
  7. 2887
    Publicado 2013
    “…The employment of advanced neuroimaging techniques have been expanded in the scientific fields of neuropsychology, consumer’s psychology, and forensic medicine. Our current textbook presents exactly a collection of such innovative work, and explores new frontiers, and future applications of neuroimaging…”
    Libro electrónico
  8. 2888
    Publicado 2019
    “…Bayesian networks (BN) have recently experienced increased interest and diverse applications in numerous areas, including economics, risk analysis and assets and liabilities management, AI and robotics, transportation systems planning and optimization, political science analytics, law and forensic science assessment of agency and culpability, pharmacology and pharmacogenomics, systems biology and metabolomics, psychology, and policy-making and social programs evaluation. …”
    Libro electrónico
  9. 2889
    Publicado 2015
    “…The journal accepts papers in basic Veterinary sciences, preclinical and clinical veterinary medical sciences including Anatomy and Embryology, Histology, Animal Nutrition, Poultry Diseases, Aquatic animals diseases, Microbiology, Immunology, Biochemistry, Clinical Pathology, pathology, Internal Medicine, Infectious diseases, Parasitology, Pathology, Pharmacology, Physiology, Meat and Milk hygiene, Surgery, Theriogenology, Forensic medicine and toxicology, Animal Production, genetics, Farm economics, Zoonoses, Animal behavior, Animal hygiene, and biostatistics"--About page, viewed October 7, 2024.…”
    Seriada digital
  10. 2890
    Publicado 2018
    “…Offering perspectives from fields as varied as history, political science, literary and cultural studies, forensic and cultural anthropology, international human rights law, sociology, and art, this volume explores the multifaceted nature of a society's reckoning with past violence. …”
    Libro
  11. 2891
    Publicado 2023
    “…Lessons Covered Include: Domain 1: Threat Detection and Incident Response 1.0 Introduction 1.1 Designing and Implementing Incident Response Plans 1.2 Detecting Security Threats and Anomalies with AWS Services 1.3 Responding to Compromised Resources and Workloads 1.4 Automating Incident Response with AWS Lambda 1.5 Conducting Root Cause Analysis with Amazon Detective 1.6 Capturing Forensics Data from Compromised Resources 1.7 Querying Logs to Validate Security Events 1.8 Preserving Forensic Artifacts with S3 Object Lock 1.9 Preparing and Recovering Services After Incidents 1.10 Incident Response Case Study 1.11 Practice Exam - Threat Detection and Response 1.12 Threat Detection and Incident Response Summary Learning Objectives Understand best practices for incident response in the cloud Explore AWS services to detect security threats Learn how to respond to compromised resources Domain 2: Security Logging and Monitoring 2.0 Introduction 2.1 Designing and Implementing Monitoring and Alerting 2.2 Troubleshooting Security Monitoring and Alerting 2.3 Designing and Implementing Logging Solutions 2.4 Troubleshooting Logging Solutions 2.5 Designing Log Analysis Solutions 2.6 Configuring AWS CloudTrail for Logging 2.7 Analyzing Logs with Amazon Athena 2.8 Monitoring Case Study 2.9 Practice Exam - Logging and Monitoring 2.10 Optimizing Log Storage Lifecycles 2.11 Third Party Log Analysis Tools 2.12 Security Logging and Monitoring Summary Learning Objectives Understand how to set up monitoring and alerts for security Learn best practices for logging and log analysis Gain skills in troubleshooting logging and monitoring Domain 3: Infrastructure Security 3.0 Introduction 3.1 Designing and Implementing Edge Service Security 3.2 Designing and Implementing Network Security 3.3 Designing and Securing Compute Workloads 3.4 Troubleshooting Network Security 3.5 Securing EC2 Instances with SSM 3.6 Scanning Images for Vulnerabilities 3.7 Infrastructure Security Case Study 3.8 Practice Exam - Infrastructure Security 3.9 Integrating AWS Firewall Manager 3.10 Applying Security Best Practices to Lambdas 3.11 Hardening AMIs with EC2 Image Builder 3.12 Infrastructure Security Summary Learning Objectives Learn how to secure AWS network infrastructure Understand options for compute and workload security Gain skills in troubleshooting infrastructure issues Domain 4: Identity and Access Management 4.0 Introduction 4.1 Designing Authentication for AWS Resources 4.2 Designing Authorization for AWS Resources 4.3 Troubleshooting with IAM Access Analyzer 4.4 Enforcing Least Privilege Access 4.5 Separating Duties with IAM Roles 4.6 Identity and Access Management Case Study 4.7 Practice Exam - Identity and Access Management 4.8 Securing Root User Credentials 4.9 IAM Policy Simulator for Troubleshooting 4.10 Enabling Federated Access with SSO 4.11 Managing Credentials and Secrets 4.12 Identity and Access Management Summary Learning Objectives Master IAM best practices for authentication and authorization Understand how to apply least privilege and separation of duties Learn to troubleshoot IAM issues Domain 5: Data Protection 5.0 Introduction 5.1 Data in Transit Confidentiality and Integrity 5.2 Data at Rest Confidentiality and Integrity 5.3 Managing Data at Rest Lifecycles 5.4 Protecting Credentials, Secrets, and Keys 5.5 Encrypting Data with AWS KMS 5.6 Data Protection Case Study 5.7 Practice Exam - Data Protection 5.8 Enforcing Data Retention with Glacier 5.9 Preventing Data Deletion with S3 Object Lock 5.10 Rotating RDS Credentials 5.11 Encrypting Data in Transit with SSL/TLS 5.12 Data Protection Summary Learning Objectives Learn techniques to protect data in transit and at rest Understand how to manage data lifecycles Gain skills in managing credentials and secrets Domain 6: Management and Security Governance 6.0 Introduction 6.1 Strategies for Central Account Deployment 6.2 Secure and Consistent Cloud Deployment 6.3 Evaluating Compliance of AWS Resources 6.4 Identifying Security Gaps through Reviews and Cost 6.5 AWS Organizations SCP Best Practices 6.6 Governance Case Study 6.7 Practice Exam - Governance 6.8 Automating Security Deployments 6.9 Tagging Resources for Governance 6.10 AWS Config for Security Assessments 6.11 AWS Well Architected Tool 6.12 Governance and Security Management Summary Learning Objectives Understand best practices for governing accounts and resources Learn how to align security with organizational requirements Gain skills in compliance, auditing, and deployment Additional Popular Resources Assimilate OpenAI 52 Weeks of AWS-The Complete Series Microsoft Azure Fundamentals (AZ-900) Certification AWS Solutions Architect Professional (SAP-C02) 2023 Assimilate Python From Zero…”
    Video
  12. 2892
    Publicado 2023
    Tabla de Contenidos: “…Una denuncia falsa es un delito que consiste en imputar falsamente y a conciencia una serie de hechos a una persona que, de ser ciertos, constituirían una infracción penal. -- La doctrina forense se refiere el termino denuncia en la siguiente forma: «La. . . -- CAPÍTULO XXVI Fraude procesal(pp. 507-520) -- CAPÍTULO XXVI Fraude procesal(pp. 507-520) -- https://doi.org/10.2307/jj.11786250.30 -- https://www.jstor.org/stable/jj.11786250.30 -- Se define de acuerdo al DRAE, el vocablo fraude como: «Acción contraria a la verdad y a la rectitud, que perjudica a la persona contra quien se comete». …”
    Libro electrónico
  13. 2893
    Publicado 1889
    Revista digital
  14. 2894
    “…que combinan la experiencia forense (un juez, un abogado) con el riguroso análisis académico (un catedrático especialista en la materia)? …”
    Acceso al texto completo en Aranzadi
    Libro
  15. 2895
    por Perelman, Chaïm 1912-1984
    Publicado 2000
    “…Aristotle's division of rhetoric into three genres-forensic, deliberative, and epideictic-is largely motivated by the judgments required for each: forensic or legal arguments require verdicts on past action, deliberative or political rhetoric seeks judgment on future action, and epideictic or ceremonial rhetoric concerns values associated with praise or blame and seeks no specific decisions. …”
    Libro
  16. 2896
    Publicado 2022
    “…Otro de los propósitos de este trabajo es explicar la criminalidad por parte de estos sujetos y qué repercusiones forenses existen. También se aborda el tema de la psicopatía femenina diferenciándola de los rasgos de la psicopatía masculina. …”
    Acceso restringido UPSA
    Tesis
  17. 2897
    Publicado 2019
    “…It discusses the latest developments influencing the performance and utility of different NAA techniques across wide areas of applications: nuclear technology, industry, medicine, clinical investigations, biology, geochemistry, soil contamination, waste management, diet, lifestyle and health, cosmology, archeology, forensic science, etc. The overall goal of the book is to promote innovation and development of NAA techniques, technologies, and nuclear culture by presenting high-quality chapters with numerous results at both national and international levels. …”
    Libro electrónico
  18. 2898
    Publicado 2011
    “…With this document as your guide, you will review topics on security protocols, encryption, application protocols, security technologies, Cisco IOS security features, Cisco ASA, security management, wireless security, IPv6 security, security policies, network attack mitigation, and computer forensics . This fact-filled Quick Reference allows you to get all-important information at a glance, helping you to focus your study on areas of weakness and to enhance memory retention of essential exam concepts…”
    Libro electrónico
  19. 2899
    Publicado 2021
    “…It may be needed for safety, security, permission, banking, crime prevention, forensics, medical applications, communication, face finding, and others. …”
    Libro electrónico
  20. 2900
    Publicado 2023
    “…IBM Storage Sentinel automates the creation of immutable backup copies of your data, then uses machine learning to detect signs of possible corruption and generate forensic reports that help you quickly diagnose and identify the source of the attack. …”
    Libro electrónico