Mostrando 25,401 - 25,420 Resultados de 26,559 Para Buscar '"performances"', tiempo de consulta: 0.11s Limitar resultados
  1. 25401
    Publicado 2022
    Libro electrónico
  2. 25402
  3. 25403
    Publicado 2015
    Recurso relacionado
    DVD
  4. 25404
    Publicado 2023
    “…You will have the knowledge and skills required to do the following: Architect, engineer, integrate, and implement secure solutions across complex environments to support a resilient enterprise Use monitoring, detection, incident response, and automation to proactively support ongoing security operations in an enterprise environment Apply security practices to cloud, on-premises, endpoint, and mobile infrastructure, while considering cryptographic technologies and techniques Consider the impact of governance, risk, and compliance requirements throughout the enterprise The 4 courses in the CASP series covers the following topics: Architecture Analyze security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network Services Deperimeterization/zero trust Merging of networks from various organizations Software-defined networking Analyze organizational requirements to determine proper infrastructure security design Scalability Resiliency Automation Performance Containerization Virtualization Content delivery network Caching Integrate software applications securely into an enterprise architecture Baseline and templates Software assurance Considerations of integrating enterprise applications Integrating security into development life cycle Implement data security techniques for securing enterprise architecture Data loss prevention Data loss detection Data classification, labeling, and tagging Obfuscation Anonymization Encrypted versus unencrypted Data life cycle Data inventory and mapping Data integrity management Data storage, backup, and recovery Analyze security requirements and objectives to provide appropriate authentication and authorization controls Credential management Password policies Federation Access control Protocols Multifactor authentication One-time password Hardware root of trust Single sign-on JavaScript Object Notation web token Attestation and identity proofing Implement secure cloud and virtualization solutions Virtualization strategies Provisioning and deprovisioning Middleware Metadata and tags Deployment models and considerations Hosting models Service models Cloud provider limitations Extending appropriate on-premises controls Storage models Explain how cryptography and public key infrastructure support security objectives and requirements Privacy and confidentiality requirements Integrity requirements Non-repudiation Compliance and policy requirements Common cryptography use cases Common Public key infrastructure use cases Explain impact of emerging technologies on enterprise security and privacy Artificial intelligence Machine learning Quantum computing Blockchain Homomorphic encryption Secure multiparty computation Distributed consensus Big Data Virtual reality Three Dimetional printing Passwordless authentication Nano technology Deep learning Biometric impersonation Operations Perform threat management activities Intelligence types Actor types Threat actor properties Intelligence collection methods Frameworks Analyze indicators of compromise and formulate an appropriate response Indicators of compromise Response Rules Perform vulnerability management activities Vulnerability scans Security Content Automation Protocol Self-assessment or third party vendor assessment Patch management Information sources Use appropriate vulnerability assessment and penetration testing methods and tools Methods Tools Dependency management Requirements Analyze vulnerabilities and recommend risk mitigations Vulnerabilities Inherently vulnerable system or application Attacks Use processes to reduce risk Proactive and detection Security data analytics Preventive Application control Security automation Physical security Given an incident, implement appropriate response Event classifications Triage event Preescalation tasks Incident response process Specific response playbooks Communication plan Stakeholder management Explain importance of forensic concepts Legal versus internal corporate purposes Forensic process Integrity preservation Cryptanalysis Steganalysis Use forensic analysis tools File carving tools Binary analysis tools Analysis tools Imaging tools Hashing utilities Live collection versus post-mortem tools Engineering and Cryptography Apply secure configurations to enterprise mobility Managed configurations Deployment scenarios Security considerations Configure and implement endpoint security controls Hardening techniques Processes Mandatory access control Trustworthy computing Compensating controls Explain security considerations impacting specific sectors and operational technologies Embedded ICS/supervisory control and data acquisition Protocols Sectors Explain how cloud technology adoption impacts organizational security Automation and orchestration Encryption configuration Logs Monitoring configurations Key ownership and location Key life-cycle management Backup and recovery methods Infrastructure versus serverless computing Application virtualization Software-defined networking Misconfigurations Collaboration tools Storage configurations Cloud access security broker Given a business requirement, implement appropriate Public key infrastructure solution Public key infrastructure hierarchy Certificate types Certificate usages/profiles/templates Extensions Trusted providers Trust model Cross-certification Configure profiles Life-cycle management Public and private keys Digital signature Certificate pinning Certificate stapling Certificate signing requests Online Certificate Status Protocol versus certificate revocation list HTTP Strict Transport Security Given a business requirement, implement appropriate cryptographic protocols and algorithms Hashing Symmetric algorithms Symetric Complexity Contruction Asymmetric algorithms Protocols Elliptic curve cryptography Forward secrecy Authenticated encryption with associated data Key stretching Troubleshoot issues with cryptographic implementations Implementation and configuration issues Keys Governance, Risk, and Compliance Given a set of requirements, apply appropriate risk strategies Risk assessment Risk handling techniques Risk types Risk management life cycle Risk tracking Risk appetite Risk tolerance Policies and security practices Explain importance of managing and mitigating vendor risk Shared responsibility model Vendor lock-in and vendor lockout Vendor viability Meeting client requirements Support availability Geographical considerations Supply chain visibility Incident reporting requirements Source code escrows Ongoing vendor assessment tools Third-party dependencies Technical considerations Explain compliance frameworks and legal considerations, and IR organizational impact Security concerns of integrating diverse industries Data considerations Geographic considerations Third-party attestation of compliance Regulations, accreditations, and standards Legal considerations Contract and agreement types Explain importance of business continuity and disaster recovery concepts Business impact analysis Privacy impact assessment Disaster recovery plan Business continuity plan Incident response plan Testing plans…”
    Video
  5. 25405
    por Vega Gutiérrez, Ana M?
    Publicado 2017
    “…Regarding the assessment tool, indicators are devised as an input to provide knowledge and evidence in matters such as performance and good practices for decision makers in the field of Higher Education, both at the corresponding national and individual university level. …”
    Acceso al texto completo en Aranzadi
    Libro
  6. 25406
    por Rokach, Lior
    Publicado 2015
    “…A walk-through guide to existing open-source data mining software is also included in this edition.This book invites readers to explore the many benefits in data mining that decision trees offer:Self-explanatory and easy to follow when compactedAble to handle a variety of input data: nominal, numeric and textualScales well to big dataAble to process datasets that may have errors or missing valuesHigh predictive performance for a relatively small computational effortAvailable in many open source data mining packages over a variety of platformsUseful for various tasks, such as classification, regression, clustering and feature selectionContents:Introduction to Decision TreesTraining Decision TreesA Generic Algorithm for Top-Down Induction of Decision TreesEvaluation of Classification TreesSplitting CriteriaPruning TreesPopular Decision Trees Induction AlgorithmsBeyond Classification TasksDecision ForestsA Walk-through Guide for Using Decision Trees SoftwareAdvanced Decision TreesCost-sensitive Active and Proactive Learning of Decision TreesFeature SelectionFuzzy Decision TreesHybridization of Decision Trees with Other TechniquesDecision Trees and Recommender SystemsReadership: Researchers, graduate and undergraduate students in information systems, engineering, computer science, statistics and management…”
    Enlace al texto completo en streaming en Ebscohost
    Libro electrónico
  7. 25407
    por Bakeman, Roger
    Publicado 2005
    “…This integrated approach helps to simplify topics that often cause confusion.Understanding Statistics in the Behavioral Sciences features:•Computer-based exercises, many of which rely on spreadsheets, help the reader perform statistical analyses and compare and verify the results using either SPSS or SAS. …”
    Libro electrónico
  8. 25408
    Publicado 2017
    “…After synthesis, plastid proteins must rapidly fold into stable three dimensional structures and often undergo co- and posttranslational modifications to perform their biological mission, avoiding aberrant folding, aggregation and targeting with the help of molecular chaperones and proteases. …”
    Libro electrónico
  9. 25409
    Publicado 2018
    “…Improvements in task performance, usability, and embodiment have all been reported in systems utilizing some form of feedback. …”
    Libro electrónico
  10. 25410
    Publicado 2020
    “…The most severe isthat the sequence of steps performed by Friedmann does not consistently obey Zadeh’spivot rule. …”
    Libro electrónico
  11. 25411
    Publicado 2011
    “…While the International Court of Justice appears to have been reluctant to perform such a function, the Inter-American Court of Human Rights has developed a creative and dynamic method of interpretation intended to afford a full and complete protection to human beings; such an approach resulted inevitably in the identification of the content of peremptory norms. …”
    Libro electrónico
  12. 25412
    “…This short book applies the DevOps perspective to the competitive challenge, faced by every high-performance IT organization today, of integrating and automating open source, cloud, and enterprise tools, processes, and techniques across the software development life cycle from requirements to release. …”
    Libro electrónico
  13. 25413
    por Schmidt, Manfred G.
    Publicado 2013
    “…He concludes that the GDR was unable to cope with the trade-off between ambitious social policy goals and a deteriorating economic performance. Ritter embeds his analysis of the Social Union in a general study of German unification, its international circumstances and its domestic repercussions (1989-1994). …”
    Libro electrónico
  14. 25414
    por Funk, Tom. author
    Publicado 2013
    “…In it, we simplify tasks that might otherwise be complicated—like adopting and tracking key performance metrics, developing online ad campaigns, or creating Facebook apps like games, giveaways and sweepstakes with the capacity to go viral. …”
    Libro electrónico
  15. 25415
    Publicado 2016
    “…Furthermore, the important issue of transnational joint performance of exercising state authority as well as aspects of cross-border economic activities of local authorities are discussed Grenzüberschreitende Zusammenarbeit auf kommunaler Ebene ist bereits seit Langem gelebte Praxis. …”
    Libro electrónico
  16. 25416
    Publicado 2022
    “…What you will learn Understand the new language features and the problems they can solve Implement generic features of the STL with practical examples Understand standard support classes for concurrency and synchronization Perform efficient memory management using the STL Implement seamless formatting using std::format Work with strings the STL way instead of handcrafting C-style code Who this book is for This book is for intermediate to advanced C++ programmers who want to get the most out of the Standard Template Library of C++20, the newest version of C++. …”
    Libro electrónico
  17. 25417
    Publicado 2022
    “…The book focuses on model compression and feature engineering methods that are essential in automated deep learning. It also includes performance techniques that allow the creation of large-scale distributive training platforms using NNI. …”
    Libro electrónico
  18. 25418
    Publicado 2022
    “…We will be wrapping up the course by understanding how to perform threat hunting with Microsoft Sentinel, which will be our 8th module. …”
    Video
  19. 25419
    Publicado 2018
    “…Along the way, you’ll perform data manipulation and solve common problems using basic file input/output functions. …”
    Video
  20. 25420
    Publicado 2018
    “…It takes you through the process of performing “genetic testing” on your company, examining the market through the six Cs of positioning, and developing your positioning statement—a rational, factual statement about your company’s role and relevance. …”
    Libro electrónico