Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 1,126
- Management 1,121
- Development 1,088
- Application software 917
- Computer Science 780
- Computer networks 617
- Database management 610
- Data processing 539
- Business & Economics 517
- Computer programs 516
- Education 487
- Python (Computer program language) 477
- Cloud computing 472
- Economic conditions 461
- Leadership 451
- Machine learning 414
- Economic policy 402
- Operating systems (Computers) 395
- Economics 373
- Examinations 367
- Artificial intelligence 364
- Web site development 345
- Security measures 341
- Electrical & Computer Engineering 317
- History 313
- Computer software 311
- Java (Computer program language) 309
- Information technology 308
- Computer programming 307
- Programming 303
-
20021Publicado 2022Tabla de Contenidos: “…-- Model Ops Capabilities -- Model Visibility -- Model Repository -- Model Performance Metrics -- Contextualized Collaboration Framework -- Governance -- Summary -- References -- Additional Resources -- Keywords -- 12 To Build, Buy, or Outsource Analytics Platform -- Introduction -- Analytics Infrastructure Components -- What Really Matters (In Your Business)? …”
Libro electrónico -
20022Publicado 2022Tabla de Contenidos: “…3.3.2 Weighing words with inverse document frequency -- 3.4 Practical use of the search algorithm -- 3.4.1 Retrieval of the most similar documents -- 3.4.2 Evaluation of the results -- 3.4.3 Deploying search algorithm in practice -- Summary -- Solutions to miscellaneous exercises -- 4 Information extraction -- 4.1 Use cases -- 4.1.1 Case 1 -- 4.1.2 Case 2 -- 4.1.3 Case 3 -- 4.2 Understanding the task -- 4.3 Detecting word types with part-of-speech tagging -- 4.3.1 Understanding word types -- 4.3.2 Part-of-speech tagging with spaCy -- 4.4 Understanding sentence structure with syntactic parsing -- 4.4.1 Why sentence structure is important -- 4.4.2 Dependency parsing with spaCy -- 4.5 Building your own information extraction algorithm -- Summary -- Solutions to miscellaneous exercises -- 5 Author profiling as a machine-learning task -- 5.1 Understanding the task -- 5.1.1 Case 1: Authorship attribution -- 5.1.2 Case 2: User profiling -- 5.2 Machine-learning pipeline at first glance -- 5.2.1 Original data -- 5.2.2 Testing generalization behavior -- 5.2.3 Setting up the benchmark -- 5.3 A closer look at the machine-learning pipeline -- 5.3.1 Decision Trees classifier basics -- 5.3.2 Evaluating which tree is better using node impurity -- 5.3.3 Selection of the best split in Decision Trees -- 5.3.4 Decision Trees on language data -- Summary -- Solutions to miscellaneous exercises -- 6 Linguistic feature engineering for author profiling -- 6.1 Another close look at the machine-learning pipeline -- 6.1.1 Evaluating the performance of your classifier -- 6.1.2 Further evaluation measures -- 6.2 Feature engineering for authorship attribution -- 6.2.1 Word and sentence length statistics as features -- 6.2.2 Counts of stopwords and proportion of stopwords as features -- 6.2.3 Distributions of parts of speech as features…”
Libro electrónico -
20023Publicado 2022Tabla de Contenidos: “…Incidents -- Understand the Risk Management Process -- Risk Visibility and Reporting -- Risk Management Concepts -- Risk Management Frameworks -- Risk Treatment -- Perform Security Assessment Activities -- Security Assessment Workflow Management -- Participate in Security Testing -- Interpretation and Reporting of Scanning and Testing Results -- Remediation Validation -- Audit Finding Remediation -- Manage the Architectures: Asset Management and Configuration Control -- Operate and Maintain Monitoring Systems -- Events of Interest -- Logging -- Source Systems -- Legal and Regulatory Concerns -- Analyze Monitoring Results -- Security Baselines and Anomalies -- Visualizations, Metrics, and Trends…”
Libro electrónico -
20024Publicado 2022Tabla de Contenidos: “…Initializing final Fields -- Initializing Instances -- Inheriting Members -- Overriding a Method -- Redeclaring private Methods -- Hiding Static Methods -- Hiding Variables -- Writing final Methods -- Creating Abstract Classes -- Introducing Abstract Classes -- Declaring Abstract Methods -- Creating a Concrete Class -- Creating Constructors in Abstract Classes -- Spotting Invalid Declarations -- Creating Immutable Objects -- Declaring an Immutable Class -- Performing a Defensive Copy -- Summary -- Exam Essentials -- Review Questions -- Chapter 7 Beyond Classes -- Implementing Interfaces -- Declaring and Using an Interface -- Extending an Interface -- Inheriting an Interface -- Inserting Implicit Modifiers -- Declaring Concrete Interface Methods -- Working with Enums -- Creating Simple Enums -- Using Enums in switch Statements -- Adding Constructors, Fields, and Methods -- Sealing Classes -- Declaring a Sealed Class -- Compiling Sealed Classes -- Specifying the Subclass Modifier -- Omitting the permits Clause -- Sealing Interfaces -- Reviewing Sealed Class Rules -- Encapsulating Data with Records -- Understanding Encapsulation -- Applying Records -- Understanding Record Immutability -- Declaring Constructors -- Customizing Records -- Creating Nested Classes -- Declaring an Inner Class -- Creating a static Nested Class -- Writing a Local Class -- Defining an Anonymous Class -- Reviewing Nested Classes -- Understanding Polymorphism -- Object vs. …”
Libro electrónico -
20025Publicado 2022Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- Preface: The Global Impact of The Conversion Code and What's New in the Second Edition -- Introduction: How I Created The Conversion Code -- Disclaimer: How to Read The Conversion Code -- How You Should Crack The Conversion Code -- The Conversion Code Creeds -- Section I How to Do Marketing That Attracts High-Quality Leads -- Chapter 1 The Biggest Challenges Facing Marketing and Sales (Plus What Happens When You Crack The Conversion Code) -- Chapter 2 How to Use Your Website to Attract High-Quality Leads -- How to Know If Your Website Is Working -- How to Build a Website That Builds Trust and Captures Leads -- How to Quickly Turn Your Website into a Lead-Generating Machine -- Proven Ways to Capture Leads on Your Website without Being (Too) Annoying -- The Impact of Personalization on Lead Conversion -- The Impact of Live Chat on Lead Conversion -- Chapter 3 How to Build Landing Pages That Capture High-Quality Leads -- The Microwave Mindset -- Nine Key Elements Every Landing Page Should Include -- Landing Page-Less Leads -- Chapter 4 Blogging for Business (How to Write Blog Posts That Generate High-Quality Leads) -- The Impact of Taking Blogging Seriously -- The Robots Can Write -- What Top-Performing Blog Posts Include -- How I Turn Every Blog Post into a Dozen Additional Pieces of Content -- What Should You Blog About? …”
Libro electrónico -
20026Publicado 2023Tabla de Contenidos: “…Further reading -- Part 3: Design Patterns for Model Optimization and Life Cycle Management -- Chapter 7: Fairness Notions and Fair Data Generation -- Technical requirements -- Understanding the impact of data on fairness -- Real-world bias examples -- Causes of bias -- Defining fairness -- Types of fairness based on statistical metrics -- Types of fairness based on the metrics of predicted outcomes -- Types of fairness based on similarity-based measures -- Types of fairness based on causal reasoning -- The role of data audits and quality checks in fairness -- Assessing fairness -- Linear regression -- The variance inflation factor -- Mutual information -- Significance tests -- Evaluating group fairness -- Evaluating counterfactual fairness -- Best practices -- Fair synthetic datasets -- MOSTLY AI's self-supervised fair synthetic data generator -- A GAN-based fair synthetic data generator -- Summary -- Further reading -- Chapter 8: Fairness in Model Optimization -- Technical requirements -- The notion of fairness in ML -- Unfairness mitigation methods -- In-processing methods -- Explicit unfairness mitigation -- Fairness constraints for a classification task -- Fairness constraints for a regression task -- Fairness constraints for a clustering task -- Fairness constraints for a reinforcement learning task -- Fairness constraints for recommendation systems -- Challenges of fairness -- Missing sensitive attributes -- Multiple sensitive attributes -- Choice of fairness measurements -- Individual versus group fairness trade-off -- Interpretation and fairness -- Fairness versus model performance -- Limited datasets -- Summary -- Further reading -- Chapter 9: Model Explainability -- Technical requirements -- Introduction to Explainable AI -- Scope of XAI -- Challenges in XAI -- Explain Like I'm Five (ELI5) -- LIME -- SHAP…”
Libro electrónico -
20027Publicado 2023Tabla de Contenidos: “…Secret key ciphers -- Advanced Encryption Standard -- Data Encryption Standard -- How AES works -- Encrypting and decrypting using AES -- Summary -- Chapter 4 : Asymmetric Cryptography -- Foundational mathematics -- Asymmetric cryptography -- Public and private keys -- Asymmetric cryptography algorithms -- Integer factorization -- Discrete logarithm -- Elliptic curves -- Integrated encryption scheme -- Introducing RSA -- Encrypting and decrypting with RSA -- Introducing ECC -- Mathematics behind ECC -- Point addition -- Point doubling -- Point multiplication -- The discrete logarithm problem -- Generating keys with ECC -- Digital signatures -- RSA digital signature algorithms -- Generating RSA digital signatures -- The elliptic curve digital signature algorithm -- Generating ECDSA digital signatures -- Different types of digital signatures -- Blind signatures -- Multisignatures -- Threshold signatures -- Aggregate signatures -- Ring signatures -- Cryptographic constructs and blockchain technology -- Homomorphic encryption -- Secret sharing -- Commitment schemes -- Zero-knowledge proofs -- zk-SNARKs -- zk-STARKs -- Zero-knowledge range proofs -- Encoding schemes -- Base64 -- base58 -- Verifiable random functions -- Summary -- Chapter 5 : Consensus Algorithms -- Introducing consensus -- Fault tolerance -- FLP impossibility -- Analysis and design -- Model -- Processes -- Timing assumptions -- Classification -- Algorithms -- CFT algorithms -- Paxos -- Raft -- BFT algorithms -- Practical Byzantine Fault Tolerance -- Istanbul Byzantine Fault Tolerance -- Tendermint -- Nakamoto consensus -- Variants of PoW -- HotStuff -- Choosing an algorithm -- Finality -- Speed, performance, and scalability -- Summary -- Chapter 6 : Bitcoin Architecture -- Introducing Bitcoin -- Cryptographic keys -- Private keys in Bitcoin -- Public keys in Bitcoin -- Addresses…”
Libro electrónico -
20028Publicado 2016Tabla de Contenidos: “…Annor, Lorenzo Iannini and Nick van de Giesen Remotely Sensed Monitoring of Small Reservoir Dynamics: A Bayesian Approach Reprinted from: Remote Sens. 2014, 6(2), 1191-1210 http://www.mdpi.com/2072-4292/6/2/1191 -- Donato Amitrano, Gerardo Di Martino, Antonio Iodice, Francesco Mitidieri, Maria Nicolina Papa, Daniele Riccio and Giuseppe Ruello Sentinel-1 for Monitoring Reservoirs: A Performance Analysis Reprinted from: Remote Sens. 2014, 6(11), 10676-10693 http://www.mdpi.com/2072-4292/6/11/10676 -- Elijah K. …”
Libro electrónico -
20029por Joe ValacichTabla de Contenidos: “…Initiating and Planning Systems Development Projects for Pine Valley Furniture's WebStore -- Summary -- Key Terms -- Review Questions -- Problems and Exercises -- Field Exercises -- References -- BEC CASE: INITIATING AND PLANNING SYSTEMS DEVELOPMENT PROJECTS -- Case Questions -- PART THREE Analysis -- AN OVERVIEW OF PART THREE -- 6 Determining System Requirements -- Learning Objectives -- Introduction -- Performing Requirements Determination -- The Process of Determining Requirements -- Deliverables and Outcomes -- Traditional Methods for Determining Requirements -- Interviewing and Listening -- Interviewing Groups -- Directly Observing Users -- Analyzing Procedures and Other Documents -- Contemporary Methods for Determining System Requirements -- Joint Application Design -- Using Prototyping During Requirements Determination -- Radical Methods for Determining System Requirements -- Identifying Processes to Reengineer -- Disruptive Technologies -- Requirements Determination Using Agile Methodologies -- Continual User Involvement -- Agile Usage-Centered Design -- The Planning Game from eXtreme Programming -- Electronic Commerce Applications: Determining System Requirements -- Determining System Requirements for Pine Valley Furniture's WebStore -- Summary -- Key Terms -- Review Questions -- Problems and Exercises -- Field Exercises -- References -- BEC CASE: DETERMINING SYSTEM REQUIREMENTS -- Case Questions -- 7 Structuring System Process Requirements -- Learning Objectives -- Introduction -- Process Modeling -- Modeling a System's Process for Structured Analysis -- Deliverables and Outcomes -- Data Flow Diagramming Mechanics -- Definitions and Symbols -- Developing DFDs: An Example -- Data Flow Diagramming Rules -- Decomposition of DFDs -- Balancing DFDs -- An Example DFD -- Using Data Flow Diagramming in the Analysis Process…”
Publicado 2021
Libro electrónico -
20030por R., ElakkiyaTabla de Contenidos: “…-- 16.4 Cognitive Computing -- 16.5 Data Expressed by the Healthcare and Smart Cities -- 16.6 Use of Computers to Analyze the Data and Predict the Outcome -- 16.7 Machine Learning Algorithm -- 16.8 How to Perform Machine Learning? -- 16.9 Machine Learning Algorithm -- 16.10 Common Libraries for Machine Learning Projects -- 16.11 Supervised Learning Algorithm -- 16.12 Future of the Healthcare -- 16.13 Development of Model and Its Workflow -- 16.13.1 Types of Evaluation -- 16.14 Future of Smart Cities -- 16.15 Case Study I -- 16.16 Case Study II -- 16.17 Case Study III -- 16.18 Case Study IV -- 16.19 Conclusion -- References -- Index -- EULA…”
Publicado 2024
Libro electrónico -
20031Publicado 2024Tabla de Contenidos: “…Chapter 7 Risk Management -- Risk Management in the Business -- Understanding the Risk Management Life Cycle -- FFIEC Handbooks and Risk Management Guidance -- Governance and Risk Management Framework -- Risk Approvals and the Role of Committees -- Risk Identification and Analysis -- Third-Party Risk Management -- Regulatory Expectations For third-party Risk Management -- Compliance and Legal Risk Management -- Monitoring and Reporting -- Chapter Conclusion -- Case Study: Navigating Risk Management at Phoenix Innovations -- Chapter 8 The NIST Risk Management Framework -- The NIST Risk Management Framework -- Understanding RMF's Authorization Process -- NIST RMF in Practice: Step-by-Step Analysis -- Applicability to Regulatory Expectations -- Integrating NIST RMF into an Organization -- Using NIST RMF for Risk Assessment and Management -- NIST RMF and Technology Implementation -- Challenges and Solutions in Implementing NIST RMF -- NIST RMF and Third-Party Risk Management -- Chapter Conclusion -- Case Study: OmniTech Corporation and NIST RMF Implementation -- Sample RMF Authorization Document Package -- Chapter 9 Cybersecurity Metrics -- Understanding Cybersecurity Metrics -- The Importance of Metrics in cybersecurity -- The Role of Metrics in Decision-making and Resource Allocation -- Differentiating Between KPIs and KRIs -- The Role of Metrics in Compliance -- Challenges and Considerations -- Key Performance Indicators (KPIs) -- Key Risk Indicators (KRIs) -- Integrating KPIs and KRIs into Cybersecurity Strategy -- Chapter Conclusion -- Case Study: Transforming TechNova's Defense Landscape -- Chapter 10 Risk Assessments -- The Importance of Risk Assessments -- The FFIEC's Perspective on Risk Assessments -- NIST's Approach to Risk Assessments -- Risk Assessment Frameworks -- Conducting a Cybersecurity Risk Assessment -- Managing Third-Party Risks…”
Libro electrónico -
20032por Simmat, KobiTabla de Contenidos: “…-- Chapter 16 How to manage an under-performing executive -- Chapter 17 How to fire a customer or supplier (nicely) -- Firing a client -- Firing a supplier -- When in doubt, do nothing -- Chapter 18 The immature entrepreneur -- The dopamine trap -- Avoiding the immature entrepreneur trap -- Staying focused -- Chapter 19 Why partnerships don't work -- Part III takeaways -- Part 4 Marketing -- Chapter 20 Get some skin in the game -- Meet Gary Vee! …”
Publicado 2023
Libro electrónico -
20033Publicado 2023Tabla de Contenidos: “…Which software? -- 8.2.2. What performances? -- 8.3. Questioning the hypotheses -- 8.4. …”
Libro electrónico -
20034Publicado 2023Tabla de Contenidos: “…-- Summary -- Chapter 11: Debugging a Multiplayer Game -- Technical requirements -- Introducing network debugging -- Explaining game debugging -- Introducing multiplayer options -- Logging in a networked environment -- Filtering the LogNet category -- Creating a custom log category -- Emulating a networked environment -- Enabling network emulation -- Testing the game with network emulation -- Using the Network Profiler -- Recording a profiling session -- Analyzing a profiling session -- Improving performance and bandwidth utilization -- Turning on replication only when necessary -- Avoiding invoking RPCs that are not required or essential -- Distinguishing between reliable and unreliable RPCs -- Validating data -- Remembering that the GameMode exists only on the server -- Using a naming convention for RPCs -- Summary -- Part 4: Deploying Your Game Online -- Chapter 12: Managing Multiplayer Sessions -- Technical requirements -- Understanding game sessions -- Introducing the Online Subsystem -- Understanding session commands -- Understanding connection errors -- Preparing a project game session -- Creating a session -- Adding the visual elements -- Implementing the Visual Scripting logic -- Joining a session -- Creating the SessionItemRenderer widget -- Creating the FindSessions widget -- Creating the Main Menu widget…”
Libro electrónico -
20035por Knapp, Eric D.Tabla de Contenidos: “…Common Industrial Security Recommendations -- Identification of critical systems -- Network segmentation/isolation of systems -- Defense in depth -- Access control -- Advanced Industrial Security Recommendations -- Security Monitoring -- Policy whitelisting -- Application whitelisting -- Common Misperceptions About Industrial Network Security -- Assumptions made in this book -- Summary -- 3 - Industrial Cybersecurity History and Trends -- The convergence of OT and IT -- Importance of securing industrial networks -- The evolution of the cyber threat -- APTs and weaponized malware -- Industroyer -- Night dragon -- Stuxnet -- TRISIS -- Advanced persistent threats and cyber warfare -- Still to come -- Defending against modern cyber threats -- The insider -- Hacktivism, cybercrime, cyberterrorism, and cyberwar -- Summary -- 4 - Introduction to Industrial Control Systems and Operations -- System assets -- Programmable logic controller -- Ladder diagrams -- Sequential function charts -- Remote terminal unit -- Intelligent electronic device -- Human-machine interface -- Supervisory workstations -- Data historian -- Business information consoles and dashboards -- Other assets -- System operations -- Control loops -- Control processes -- Feedback loops -- Production information management -- Business information management -- Process management -- Safety instrumented systems -- The smart grid -- Network architectures -- Summary -- 5 - Industrial Network Design and Architecture -- Introduction to industrial networking -- Common topologies -- Network segmentation -- Higher layer segmentation -- Physical versus logical segmentation -- Microsegmentation -- Cryptographic microsegmentation -- Network services -- Wireless networks -- Remote access -- Performance considerations -- Latency and jitter -- Bandwidth and throughput…”
Publicado 2024
Libro electrónico -
20036Publicado 2024Tabla de Contenidos: “…Administrative Concerns -- Virtualization Risks -- Regulatory Non-Compliance -- Distributed Denial of Service (DDoS) Attacks -- Man-in-the-Middle Attacks -- Vendor Issues -- Shadow IT -- Natural Disasters -- Insider Threats -- Insecure APIs -- Misconfigurations -- Forensic Challenges in Cloud Environments and Solutions -- Implementing Cloud Security Best Practices, Controls and Countermeasures -- Best Practices -- Controls -- Data Encryption and Protection Techniques in the Cloud -- IAM in Cloud Environments -- Information Rights Management (IRM) / Digital Rights Management (DRM) -- Virtualization -- Network Segmentation -- Firewalls and Other Devices -- DLP Tools / Egress Monitoring -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 10: Security Control Implementation -- Physical and Environmental Protection Controls -- Site Selection and Facility Design -- System, Storage, and Communication Protection Controls -- Protecting Data -- Cryptographic Key Establishment and Management -- Managing a Network to Protect Systems and Services -- Landing Zones -- Virtualization Systems -- IAM Solutions for Identification, Authentication, and Authorization -- OpenID -- OAuth -- Identification -- Authentication -- Authentication Methods -- Conditional Authentication Policies -- Authorization -- Federation -- Key Cloud Control Audit Mechanisms -- Log Collection -- Correlation -- Packet Capturing -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 11: Planning for the Worst-Case Scenario - Business Continuity and Disaster Recovery -- BCDR Definitions -- The Importance of BCDR -- Key Concepts and Terminology -- BCDR Strategies -- Defining the Scope of the BCDR Plan -- Gathering Requirements and Generating Objectives -- Integrating Requirements -- Assessing Risk -- Performance Issues Due to Location Change…”
Libro electrónico -
20037por Sarkar, AnaitaTabla de Contenidos: “…-- Useful industry knowledge -- Storytelling -- Product tips, hacks, secret features -- Current news story or pop-culture event -- Stage 2: Warming up the audience in the MOFU -- Chapter 13 MOFU strategy #1: Meta ads -- Meta ads MOFU strategy -- Chapter 14 MOFU strategy #2: Email marketing -- 'But I don't want them to unsubscribe' -- Email strategy part 1: How to get subscribers -- The dreaded popup -- Instagram story promotions -- Run a giveaway -- Brand collaboration -- Use a lead magnet -- Email strategy part 2: Email flows and email campaigns -- Email flows -- Create an email newsletter -- Chapter 15 MOFU strategy #3: Google Ads -- Types of Google Ads -- Branded search ads -- Keyword-focused search ads -- Performance max (PMAX) ads -- Chapter 16 MOFU strategy #4: SEO -- But, how does SEO actually work? …”
Publicado 2024
Libro electrónico -
20038por Lat, Joshua ArvinTabla de Contenidos: “…-- How ML engineers can get the most out of AWS -- Essential prerequisites -- Creating the Cloud9 environment -- Increasing Cloud9's storage -- Installing the Python prerequisites -- Preparing the dataset -- Generating a synthetic dataset using a deep learning model -- Exploratory data analysis -- Train-test split -- Uploading the dataset to Amazon S3 -- AutoML with AutoGluon -- Setting up and installing AutoGluon -- Performing your first AutoGluon AutoML experiment -- Getting started with SageMaker and SageMaker Studio -- Onboarding with SageMaker Studio -- Adding a user to an existing SageMaker Domain -- No-code machine learning with SageMaker Canvas -- AutoML with SageMaker Autopilot -- Summary -- Further reading -- Chapter 2: Deep Learning AMIs -- Technical requirements -- Getting started with Deep Learning AMIs -- Launching an EC2 instance using a Deep Learning AMI -- Locating the framework-specific DLAMI -- Choosing the instance type -- Ensuring a default secure configuration -- Launching the instance and connecting to it using EC2 Instance Connect -- Downloading the sample dataset -- Training an ML model -- Loading and evaluating the model -- Cleaning up -- Understanding how AWS pricing works for EC2 instances -- Using multiple smaller instances to reduce the overall cost of running ML workloads -- Using spot instances to reduce the cost of running training jobs -- Summary -- Further reading -- Chapter 3: Deep Learning Containers -- Technical requirements -- Getting started with AWS Deep Learning Containers -- Essential prerequisites…”
Publicado 2022
Libro electrónico -
20039Publicado 2022Tabla de Contenidos: “…Capability Maturity Model -- Putting It All Together -- Chapter Review -- Quick Review -- Questions -- Answers -- Part II Asset Security -- Chapter 5 Assets -- Information and Assets -- Identification -- Classification -- Physical Security Considerations -- Protecting Mobile Devices -- Paper Records -- Safes -- Managing the Life Cycle of Assets -- Ownership -- Inventories -- Secure Provisioning -- Asset Retention -- Data Life Cycle -- Data Acquisition -- Data Storage -- Data Use -- Data Sharing -- Data Archival -- Data Destruction -- Data Roles -- Chapter Review -- Quick Review -- Questions -- Answers -- Chapter 6 Data Security -- Data Security Controls -- Data States -- Standards -- Scoping and Tailoring -- Data Protection Methods -- Digital Asset Management -- Digital Rights Management -- Data Loss Prevention -- Cloud Access Security Broker -- Chapter Review -- Quick Review -- Questions -- Answers -- Part III Security Architecture and Engineering -- Chapter 7 System Architectures -- General System Architectures -- Client-Based Systems -- Server-Based Systems -- Database Systems -- High-Performance Computing Systems -- Industrial Control Systems -- Devices -- Distributed Control System -- Supervisory Control and Data Acquisition -- ICS Security -- Virtualized Systems -- Virtual Machines -- Containerization -- Microservices -- Serverless -- Cloud-Based Systems -- Software as a Service -- Platform as a Service -- Infrastructure as a Service -- Everything as a Service -- Cloud Deployment Models -- Pervasive Systems -- Embedded Systems -- Internet of Things -- Distributed Systems -- Edge Computing Systems -- Chapter Review -- Quick Review -- Questions -- Answers -- Chapter 8 Cryptology -- The History of Cryptography -- Cryptography Definitions and Concepts -- Cryptosystems -- Kerckhoffs' Principle -- The Strength of the Cryptosystem -- One-Time Pad…”
Libro electrónico -
20040por Institute of Medicine (U.S.).Tabla de Contenidos: “…Recommendation 5.1 Availability of Primary Care for All Americans -- Financing of Primary Care Services -- Recommendation 5.2 Health Care Coverage for All Americans -- Recommendation 5.3 Payment Methods Favorable to Primary Care -- Recommendation 5.4 Payment for Primary Care Services -- Organizing Primary Care Services -- Understanding Professional Roles in Primary Care -- Background -- The Primary Care Team -- Recommendation 5.5 Practice by Interdisciplinary Teams -- Role of Specialists in Primary Care -- Roles of Other First-Contact Health Professionals -- Ensuring Primary Care for Underserved Populations -- Background -- Managed Care and Underserved Populations -- Recommendation 5.6 The Underserved and Those with Special Needs -- Other Approaches for Underserved Populations -- Coordinating Primary Care with Other Services -- Public Health and Primary Care -- Recommendation 5.7 Primary Care and Public Health -- Mental Health and Primary Care -- Recommendation 5.8 Primary Care and Mental Health Services -- Long-Term Care and Primary Care -- Recommendation 5.9 Primary Care and Long-Term Care -- Performance Monitoring for Primary Care -- Recommendation 5.10 Quality of Primary Care -- Infrastructure Development for Primary Care -- Role of Academic Health Centers in Delivery Of Care -- Recommendation 5.11 Primary Care in Academic Health Centers -- SUMMARY -- REFERENCES -- 6 The Primary Care Workforce -- WORKFORCE TRENDS AND SUPPLY PROJECTIONS: PHYSICIANS -- Overall Levels of Supply -- Primary Care Physicians -- Who Is Included -- Trends in Supply -- Education, Training, and Licensure -- Geographic Distribution of Primary Care Physicians -- WORKFORCE TRENDS AND SUPPLY PROJECTIONS: NURSE PRACTITIONERS -- Primary Care Nurse Practitioners -- Trends in Supply -- Current Work Environments and Responsibilities…”
Publicado 1996
Libro electrónico