Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 172
- Application software 138
- Engineering & Applied Sciences 100
- Management 88
- Cloud computing 78
- Computer Science 72
- Machine learning 69
- Computer software 59
- Computer networks 57
- Computer programs 56
- Python (Computer program language) 56
- Security measures 55
- Data processing 53
- Artificial intelligence 52
- Computer programming 51
- Microsoft .NET Framework 50
- Database management 43
- Computer security 42
- Web site development 42
- Java (Computer program language) 39
- Design 38
- Information technology 38
- Operating systems (Computers) 37
- Web sites 35
- Application program interfaces (Computer software) 32
- Programming 32
- Research & information: general 32
- Software engineering 32
- Business 29
- Business & Economics 29
-
2261Publicado 2020“…Representing every style from minimalism and Art Nouveau to Gesamtkunstwerk creations that defy definition, these interiors are elegant compositions that will endure --…”
Libro -
2262
-
2263Publicado 2018“…Efficient use of nitrogen for crop production is therefore very important for increasing grain yield, maximizing economic return and minimizing nitrous oxide (N2O) emission from the fields and nitrate (NO3) leaching to ground water. …”
Libro electrónico -
2264Publicado 2017“…This book also discusses the methods of diagnosis of HCC, the minimally invasive therapies for liver cancers, living donor liver transplantation for HCC, surgical management of liver metastases from colorectal cancers, and assessment and optimization for the future liver remnant…”
Libro electrónico -
2265Publicado 2018“…Researchers have developed several mathematical models for noise dissipation, minimization and complete vibration isolation laminated mechanisms. …”
Libro electrónico -
2266Publicado 2019“…Recently, there have been increasing unmet needs for developing high-performance implants that are small, minimally-invasive, biocompatible, long-term stable, and cost-effective. …”
Libro electrónico -
2267Publicado 2015“…The flagship of Google's Cloud Platform, App Engine hosts your app on infrastructure that grows automatically with your traffic, minimizing up-front costs and accommodating unexpected visitors. …”
Libro electrónico -
2268Publicado 2010“…As an investor, however, you can minimize it. As with all things in life, you can’t control the exterior. …”
Libro electrónico -
2269Publicado 2014“…Bariatric surgery has been proved to be clinically effective and economically viable for obese people when compared to non-surgical interventions. Advancement of minimally invasive surgery in the last 20 years has made the safety and reliability widely accepted by the public and government systems. …”
Libro electrónico -
2270Publicado 2013“…Each application requires a certain approach which determines the filter structure, the cost function to minimize the estimation error, the adaptive algorithm, and other parameters; and each selection involves certain cost in computational terms, that in any case should consume less time than the time required by the application working in real-time. …”
Libro electrónico -
2271Publicado 2006“…Get a head-start to understanding the new concepts and features of SQL Server 2005 from the database administrator's perspective, including: SQL Server 2005 Architecture Tool Sets Scalability, Reliability and High Availability Chapter Performance Tuning Replication .NET CLR Integration DTS and Business Intelligence Minimize the surprises in SQL Server 2005 with the help of Microsoft SQL Server 2005: Changing the Paradigm (SQL Server 2005 Public Beta Edition) …”
Libro electrónico -
2272Publicado 2023“…Electrochemistry could be a great tool to solve these problems, with an impact that could minimize or at least control damage in our environment, since the main driver of the reaction is the electron that can be produced in a sustainable manner. …”
Libro electrónico -
2273Publicado 2020“…Endoscopy technology brings a minimally invasive diagnosis and treatment experience to patients. …”
Libro electrónico -
2274Publicado 2023“…Electrochemistry could be a great tool to solve these problems, with an impact that could minimize or at least control damage in our environment, since the main driver of the reaction is the electron that can be produced in a sustainable manner. …”
Libro electrónico -
2275Publicado 2019“…Every service should employ at least one or two generic mitigations to minimize outage impacts. In this Spotlight on Cloud, Jennifer Mace, site reliability engineer at Google, shows you how to distinguish between specific and generic mitigations and how to identify what generic mitigations your service might need."…”
Vídeo online -
2276por Leyton-Brown, Kevin, 1975-“…What has been missing is a relatively short introduction to the field covering the common basis that anyone with a professional interest in game theory is likely to require. Such a text would minimize notation, ruthlessly focus on essentials, and yet not sacrifice rigor. …”
Publicado 2008
Biblioteca de la Universidad de Navarra (Otras Fuentes: Biblioteca Universidad de Deusto)Libro -
2277Publicado 2017Tabla de Contenidos: “…9 1.1.4 FTC June 2015 Guidance on Data Security 11 1.1.5 FTC Protecting Personal Information Guide 14 1.1.6 Lessons from FTC Cybersecurity Complaints 15 1.1.6.1 Failure to Secure Highly Sensitive Information 16 1.1.6.1.1 Use Industry-Standard Encryption for Sensitive Data 16 1.1.6.1.2 Routine Audits and Penetration Testing are Expected 17 1.1.6.1.3 Health-Related Data Requires Especially Strong Safeguards 18 1.1.6.1.4 Data Security Protection Extends to Paper Documents 19 1.1.6.1.5 Business-to-Business Providers also are Accountable to the FTC For Security of Sensitive Data 20 1.1.6.1.6 Companies are Responsible for the Data Security Practices of Their Contractors 22 1.1.6.1.7 Make Sure that Every Employee Receives Regular Data Security Training for Processing Sensitive Data 23 1.1.6.1.8 Privacy Matters, Even in Data Security 23 1.1.6.1.9 Limit the Sensitive Information Provided to Third Parties 24 1.1.6.2 Failure to Secure Payment Card Information 24 1.1.6.2.1 Adhere to Security Claims about Payment Card Data 24 1.1.6.2.2 Always Encrypt Payment Card Data 25 1.1.6.2.3 Payment Card Data Should be Encrypted Both in Storage and at Rest 26 1.1.6.2.4 In-Store Purchases Pose Significant Cybersecurity Risks 26 1.1.6.2.5 Minimize Duration of Storage of Payment Card Data 28 1.1.6.2.6 Monitor Systems and Networks for Unauthorized Software 29 1.1.6.2.7 Apps Should Never Override Default App Store Security Settings 29 1.1.6.3 Failure to Adhere to Security Claims 30 1.1.6.3.1 Companies Must Address Commonly Known Security Vulnerabilities 30 1.1.6.3.2 Ensure that Security Controls are Sufficient to Abide by Promises about Security and Privacy 31 1.1.6.3.3 Omissions about Key Security Flaws can also be Misleading 33 1.1.6.3.4 Companies Must Abide by Promises for Security-Related Consent Choices 33 1.1.6.3.5 Companies that Promise Security Must Ensure Adequate Authentication Procedures 34 1.1.6.3.6 Adhere to Promises about Encryption 35 1.2 State Data Breach Notification Laws 36 1.2.1 When Consumer Notifications are Required 37 1.2.1.1 Definition of Personal Information 37 1.2.1.2 Encrypted Data 38 1.2.1.3 Risk of Harm 39 1.2.1.4 Safe Harbors and Exceptions to Notice Requirement 39 1.2.2 Notice to Individuals 40 1.2.2.1 Timing of Notice 40 1.2.2.2 Form of Notice 40 1.2.2.3 Content of Notice 41 1.2.3 Notice to Regulators and Consumer Reporting Agencies 41 1.2.4 Penalties for Violating State Breach Notification Laws 42 1.3 State Data Security Laws 42 1.3.1 Oregon 43 1.3.2 Rhode Island 45 1.3.3 Nevada 45 1.3.4 Massachusetts 46 1.4 State Data Disposal Laws 49 2 Cybersecurity Litigation 51 2.1 Article III Standing 52 2.1.1 Applicable Supreme Court Rulings on Standing 53 2.1.2 Lower Court Rulings on Standing in Data Breach Cases 57 2.1.2.1 Injury-in-Fact 57 2.1.2.1.1 Broad View of Injury-in-Fact 57 2.1.2.1.2 Narrow View of Injury-in-Fact 60 2.1.2.2 Fairly Traceable 62 2.1.2.3 Redressability 63 2.2 Common Causes of Action Arising from Data Breaches 64 2.2.1 Negligence 64 2.2.1.1 Legal Duty and Breach of Duty 65 2.2.1.2 Cognizable Injury 67 2.2.1.3 Causation 69 2.2.2 Negligent Misrepresentation or Omission 70 2.2.3 Breach of Contract 72 2.2.4 Breach of Implied Warranty 76 2.2.5 Invasion of Privacy by Publication of Private Facts 80 2.2.6 Unjust Enrichment 81 2.2.7 State Consumer Protection Laws 82 2.3 Class Action Certification in Data Breach Litigation 84 2.4 Insurance Coverage for Cybersecurity Incidents 90 2.5 Protecting Cybersecurity Work Product and Communications from Discovery 94 2.5.1 Attorney-Client Privilege 96 2.5.2 Work Product Doctrine 98 2.5.3 Non-Testifying Expert Privilege 101 2.5.4 Applying the Three Privileges to Cybersecurity: Genesco v. …”
Libro electrónico -
2278por Costea, Liviu“…Build CD pipelines following GitOps principles like declarative and immutable changes stored in version control, all continuously reconciled by Argo CD, and minimize the failure of deployments. Purchase of the print or Kindle book includes a free eBook in the PDF format. …”
Publicado 2022
Libro electrónico -
2279Publicado 2015“…Strengthen internal compliance and governance programs Manage whistleblower programs and conduct effective investigations Understand how to minimize exposure and liability from Enforcement actions Learn how to prepare for the different types of regulatory examinations Minimize exposure from FCPA violations Understand the pros and cons of commenting on regulations The volume and pace of regulatory change is causing new and diverse pressures on compliance professionals. …”
Libro electrónico -
2280por Wagner, Bill“…You'll learn how to Use both types of C# constants for efficiency and maintainability (see Item 2) Employ immutable data types to promote multicore processing (see Item 20) Minimize garbage collection, boxing, and unboxing (see Items 16 and 45) Take full advantage of interfaces and delegates (see Items 22 though 25) Make the most of the parallel framework (see Items 35 through 37) Use duck typing in C# (see Item 38) Spot the advantages of the dynamic and Expression types over reflection (see Items 42 and 43) Assess why query expressions are better than loops (see Item 8) Understand how generic covariance and contravariance affect your designs (see Item 29) See how optional parameters can minimize the number of method overloads (see Item 10) You're already a successful C# programmerthis book will help you become an outstanding one…”
Publicado 2010
Libro electrónico