Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 317
- Application software 284
- Web site development 198
- Engineering & Applied Sciences 185
- Management 153
- Computer programs 152
- Web sites 137
- Computer Science 134
- Computer networks 134
- Design 125
- Examinations 124
- Data processing 121
- Security measures 115
- Machine learning 114
- Python (Computer program language) 114
- Microsoft .NET Framework 106
- Cloud computing 102
- Computer software 102
- Java (Computer program language) 100
- Computer programming 98
- Software engineering 95
- Artificial intelligence 89
- Database management 89
- JavaScript (Computer program language) 89
- Computer security 82
- Certification 81
- Data mining 75
- Web applications 75
- Internet programming 73
- Electronic data processing personnel 70
-
3021Publicado 2010Tabla de Contenidos: “…MANAGING YOUR ONLINE REPUTATION -- WE ARE ALL BRAND MANAGERS -- NOTE -- Chapter 16: Learning and Experimentation Lead to Experience -- BECOMING THE EXPERT -- YOU'RE THE REAL THING -- WHEN POV BECOMES A POINT OF VALIDATION -- LET'S TALK ABOUT MEANINGFUL EXCHANGES -- WHO OWNS SOCIAL MEDIA? …”
Libro electrónico -
3022Publicado 2012Tabla de Contenidos: “…Common Team Problems -- Productive Group Roles -- Counterproductive Group Roles -- Management's Role -- Chapter 14: Measure Stage -- Process Definition -- Metric Definition -- Establishing Process Baselines -- Measurement Systems Analysis -- Levels of Measurement -- Reliability and Validity -- Definitions -- Chapter 15: Analyze Stage -- Value Stream Analysis -- Analyze Sources of Process Variation -- Quality Function Deployment -- Data Collection and Review of Customer Expectations, Needs, Requirements, and Specifications -- Cause-and-Effect Diagrams -- Scatter Diagrams -- How to Construct a Scatter Diagram -- Example of a Scatter Diagram. -- Pointers for Using Scatter Diagrams -- Determine Process Drivers -- Correlation and Regression Analysis -- Least-Squares Fit -- Interpretation of Computer Output for Regression Analysis -- Analysis of Residuals -- Designed Experiments -- Chapter 16: Improve/Design Stage -- Define New Operating/Design Conditions -- Define and Mitigate Failure Modes -- Process Decision Program Chart -- Preventing Failures -- Inadvertent Errors -- Technique Errors -- Willful Errors (Sabotage) -- Failure Mode and Effects Analysis -- Chapter 17: Control/Verify Stage -- Performance Evaluation -- Recognition and Reward -- Principles of Effective Reward Systems -- Training -- Job Training -- Developing a Structured OJT Program -- Instructional Games, Simulations, and Role-Plays -- Part V: Management of Human Resources -- Chapter 18: Motivation Theories and Principles -- Maslow's Hierarchy of Needs -- Herzberg's Hygiene Theory -- Theories X, Y, and Z -- Chapter 19: Management Styles -- Judgmental Management Style -- Data-Based Management Style -- Combination Data-Based/Judgment Management Style -- Participatory Management Style -- Autocratic Management Style -- Management by Wandering Around -- Fourth Generation Management…”
Libro electrónico -
3023Publicado 2010Tabla de Contenidos: “…Chapter 14 Essential CSS Techniques -- Creating Multicolumn Layouts with Float -- Styling Links Versus Navigation -- Using CSS Sprites -- Creating a CSS Drop-down Menu -- Chapter 15 Managing Style Sheets -- Creating Readable Style Sheets -- Include an introduction and TOC -- Define colors, fonts, and other constants -- Use section headers -- The @ rules go at the top -- Choose an organization scheme -- Use specificity for hierarchy -- CSS Libraries and Frameworks -- Style Sheet Strategies -- The One For All method -- The Divide and Conquer method -- The Aggregate method -- The Dynamic method -- Troubleshooting CSS Code -- Ask these questions -- If all else fails, try these ideas -- Debugging CSS in Firebug and Web Inspector -- Firebug for Firefox -- Web Inspector in Safari and Chrome -- Validating Your CSS Code -- Minifying Your CSS -- 32 CSS Best Practices -- Appendix A: CSS Quick Reference -- Basic Selectors -- Pseudo-Classes -- Pseudo-Elements -- Text Properties -- Font Properties -- Color and Background Properties -- List Properties -- Table Properties -- User Interface and Generated Content Properties -- Box Properties -- Visual Formatting Properties -- Transform Properties (-webkit-, -moz-, -o-) -- Transition Properties (-webkit-, -moz-, -o-) -- Appendix B: HTML and UTF Character Encoding -- HTML and UTF Character Encoding -- Index…”
Libro electrónico -
3024Publicado 2015Tabla de Contenidos: “…How magnetic hard drives store data -- Summary -- References -- Chapter 3 - Labs and tools -- Information in This Chapter: -- Introduction -- Forensic laboratories -- Virtual labs -- Lab security -- Evidence storage -- Policies and procedures -- Quality assurance -- Tool validation -- Documentation -- Forms -- Examiner notes -- Examiner's final report -- Digital forensic tools -- Tool selection -- Hardware -- Other equipment -- Software -- Additional resources -- Open source tools -- Alert! …”
Libro electrónico -
3025Publicado 1988Tabla de Contenidos: “…MEASUREMENTS -- Air Monitoring -- Research Recommendation -- Biological Monitoring -- Research Recommendation -- MODELING HUMAN EXPOSURE TO AIR POLLUTION -- Statistical Modeling -- Physical Modeling -- Physical-Stochastic Modeling -- Source Apportionment -- Validation and Generalization -- Research Recommendation -- SUMMARY AND CONCLUSIONS -- SUMMARY OF RESEARCH RECOMMENDATIONS -- ACKNOWLEDGMENTS -- References -- Biological Disposition of Airborne Particles: Basic Principles and Application to Vehicular Emissions -- STRUCTURE OF THE RESPIRATORY TRACT -- Upper Respiratory Tract -- Tracheobronchial Tree -- Pulmonary Region -- Research Recommendations -- VENTILATION -- Ventilatory Parameters -- Comparative Aspects of Ventilation -- Airflow Patterns -- Research Recommendations -- DEPOSITION OF INHALED PARTICLES IN THE RESPIRATORY TRACT -- Deposition Mechanisms and Controlling Factors -- Measurement of Deposition -- Factors Modifying Deposition -- Localized Patterns of Deposition -- Mathematical Modeling -- Research Recommendations -- RETENTION OF DEPOSITED PARTICLES -- Clearance Mechanisms: Basic Structure and Function -- Clearance Kinetics -- Factors Modifying Clearance -- Research Recommendations -- DISPOSITION OF VEHICULAR PARTICULATE EMISSIONS -- Diesel Exhaust Particles -- Metals -- Sulfates -- Research Recommendations -- SUMMARY -- SUMMARY OF RESEARCH RECOMMENDATIONS: DISCUSSION -- SUMMARY OF RESEARCH RECOMMENDATIONS: PRIORITIES -- References -- Biological Disposition of Vehicular Airborne Emissions: Particle-Associated Organic Constituents -- SIGNIFICANCE OF CARRIER PARTICLES -- CHARACTERISTICS OF PARTICLE-ASSOCIATED AIR POLLUTANTS -- INHALATION OF AIRBORNE PARTICLES -- Disposition of Inhaled Particle-Associated Organic Compounds -- Bio availability of Particle-Associated Organic Compounds -- TOXICITY OF INHALED ORGANIC COMPOUNDS…”
Libro electrónico -
3026Data Cleaning with Power BI The Definitive Guide to Transforming Dirty Data into Actionable InsightsPublicado 2024Tabla de Contenidos: “…-- Building a process for cleaning data -- Data assessment -- Data profiling -- Data validation -- Data cleaning strategies -- Data transformations -- Data quality assurance -- Documentation -- Understanding quality over quantity in data cleaning -- Summary -- Questions -- Chapter 4: The Most Common Data Cleaning Operations -- Technical requirements -- Removing duplicates -- Removing missing data -- Splitting columns -- Merging columns -- Replacing values -- Creating calculated columns versus measures -- Calculated columns -- Measures -- Calculation group -- Considerations -- Summary -- Questions -- Part 2 - Data Import and Query Editor -- Chapter 5: Importing Data into Power BI -- Technical requirements -- Understanding data completeness -- Understanding data accuracy -- Understanding data consistency…”
Libro electrónico -
3027por Institute of Medicine (U.S.).Tabla de Contenidos: “…Specificity of Association -- Biologic Plausibility -- Other Considerations -- The Role of Studies of Occupational and Environmental Exposures -- NATURE OF THE CONCLUSIONS -- Quantification -- Resolution -- Uncertainty and Confidence -- Qualitative Aspects of the Review Process -- Comprehensiveness -- Neutrality -- Judgment -- SUMMARY OF THE EVIDENCE -- Categories of Association -- Increased Risk in Vietnam Veterans -- REFERENCES -- 6 Exposure Assessment -- AN OVERVIEW OF EXPOSURE ASSESSMENT FOR EPIDEMIOLOGY -- Hierarchy of Exposure Assessment Strategies -- Exposure Assessment for Cohort Studies -- Exposure Assessment for Case-Control Studies -- Exposure Misclassification -- Biomarkers -- Biomarkers for TCDD -- Chloracne as a Biomarker -- EXPOSURE ASSESSMENT IN OCCUPATIONAL AND ENVIRONMENTAL STUDIES -- Occupational Studies -- Production Workers -- Agricultural/Forestry Workers -- Herbicide/Pesticide Applicators -- Paper and Pulp Mill Workers -- Environmental Studies -- Vietnamese Studies -- Conclusions on Exposure Assessment in Occupational and Environmental Studies -- EXPOSURE ASSESSMENT IN STUDIES OF VIETNAM VETERANS -- Self-Reports -- Records-Based Measures -- Vietnam Service -- Branch of Service -- Combat Experience -- Military Occupation -- Reconstructing Estimated Exposure from Troop Location and Herbicide Spray Data -- The CDC Exposure Opportunity Index -- The CDC Agent Orange Study -- The Stellmans' Study -- Ranch Hand Exposure Index -- Biomarkers of Exposure in Vietnam -- CDC Agent Orange Validation Study (AOVS) -- ESTIMATES OF EXPOSURE TO HERBICIDES AND TCDD DURING VIETNAM SERVICE -- EXPOSURE RECONSTRUCTION -- Development of the Exposure Reconstruction Model -- Evaluation of the Exposure Reconstruction Model -- SUMMARY -- REFERENCES -- 7 Epidemiologic Studies -- OCCUPATIONAL STUDIES -- Production Workers…”
Publicado 1994
Libro electrónico -
3028Publicado 1992Tabla de Contenidos: “…Sensitivity Analysis -- Cost Analysis -- SUMMARY -- APPENDIX 4.1: WINNOWING PROCESSES -- Intensity Rankings by Nominating Persons and Organizations -- Preliminary Ranking Processes -- Panel-Based Preliminary Weighting -- Comment -- APPENDIX 4.2: METHODOLOGIC ISSUES -- Properties of Logarithms -- Application to the Iom Model -- 5 Implementation Issues -- THE PRIORITY-SETTING CYCLE -- SETTING CRITERION WEIGHTS -- RESOURCES NEEDED TO IMPLEMENT THE PROCESS -- Technology Assessment Program Staff Requirements -- Priority-Setting Panel -- IMPLEMENTATION CONSIDERATIONS FOR OHTA AND OTHER ORGANIZATIONS -- Validity and Reliability -- Criteria -- Choosing-and Changing-Criteria -- Criterion Weights -- Availability of Data to Generate Criterion Scores -- Publicly Available Products -- WHEN THE SCIENTIFIC EVIDENCE IS INSUFFICIENT FOR ASSESSMENT -- Interim Statements -- Modeling -- SUMMARY -- 6 Recommendations and Conclusions -- REVIEW OF THE COMMITTEE'S RATIONALE AND RECOMMENDATIONS -- Recommendations -- Recommendation 1 -- Recommendation 2 -- Recommendation 3 -- Recommendation 4 -- Recommendation 5 -- Recommendation 6 -- Recommendation 7 -- Recommendation 8 -- Recommendation 9 -- Recommendation 10 -- Recommendation 11 -- REVIEW OF STEPS AND ISSUES IN IMPLEMENTATION -- Steps in a Priority-Setting Process -- Step 1. …”
Libro electrónico -
3029por Institute of Medicine (U.S.).Tabla de Contenidos: “…ADVANCES IN ASSESSMENT TECHNOLOGY -- Diagnosis -- Differential Assessment -- Research on the Reliability and Validity of Assessments -- Research on Verbal Report Methods -- Use of Biological Markers -- Automation of Data Collection -- ASSESSMENT OF TREATMENT PROCESS, QUALITY, AND OUTCOME -- Treatment Variables -- Outcome Variables -- GROWING SOPHISTICATION IN METHODOLOGICAL APPROACHES -- Experimental Approaches -- Quasi-Experimental Approaches -- Aggregate-Level Descriptive Studies -- References -- 9 Treatment Modalities: Process and Outcome -- OUTCOME RESEARCH ON SPECIFIC TREATMENT APPROACHES -- Pharmacotherapies -- Antidipsotropics -- Effect-Altering Medications -- Psychotropics -- Aversion Therapies -- Psychotherapy and Counseling -- Didactic Approaches -- Mutual Help Groups -- Behavioral Self-Control Training -- Conjoint Therapies -- Broad-Spectrum Treatment Strategies -- Relapse Prevention -- RESEARCH ON TRADITIONAL TREATMENT PROGRAMS -- RESEARCH ON THE INTENSITY AND DURATION OF TREATMENT -- RESEARCH ON AFTERCARE -- TREATMENT PROCESS RESEARCH -- Mechanisms of Treatment Efficacy -- Therapist Variables -- Motivation -- Compliance -- Mandated Treatment -- CONCLUSIONS -- Does Treatment Work? …”
Publicado 1990
Libro electrónico -
3030Publicado 1994Tabla de Contenidos: “…BASIC HUMAN GENETICS AND GENETIC ANALYSIS -- Technologies for Detecting Genetic Disorders -- NEWBORN SCREENING -- CARRIER TESTING AND SCREENING -- PRENATAL DIAGNOSIS -- Critical Issues in Prenatal Diagnosis -- TESTING FOR LATE-ONSET DISORDERS -- Monogenic Disorders of Late Onset -- Huntington Disease -- Alzheimer Disease -- Hemochromatosis -- Familial Hypercholesterolemia -- Polycystic Kidney Disease -- Inherited Susceptibility to Cancers -- Testing for Multifactorial Genetic Disorders -- Coronary Heart Disease -- Hypertension -- Cancers of Complex Origin -- Diabetes -- Rheumatoid Arthritis -- Infectious Diseases -- Psychiatric Diseases -- CONCLUSIONS AND RECOMMENDATIONS -- Newborn Screening -- Carrier Testing and Screening -- Prenatal Diagnosis -- Testing for Late-Onset Disorders -- REFERENCES -- 3 Laboratory Issues in Human Genetics -- PROGRAMS AND REGULATIONS FOR ASSESSING THE QUALITY OF LABORATORIES PROVIDING GENETIC TESTS -- State Assessments of Laboratories Providing Genetic Tests -- Voluntary Quality Assurance and Proficiency Testing in Genetics -- Costs, Benefits, and Limitations of State and Voluntary Quality Assurance Programs -- Federal Regulation of Clinical Laboratories -- History -- Laboratories Covered by CLIA88 -- CLIA88 Regulations -- Genetic Tests Under CLIA88 -- Research Laboratories and Tests for Rare Disorders -- Interpretation of Laboratory Test Results -- ENSURING THE SAFETY AND EFFECTIVENESS OF NEW GENETIC TESTS -- Premarket Approval of Medical Devices -- Collection of Data for Test Validation -- Humanitarian Exemptions -- Investigational Use of New Devices -- Institutional Review Boards and Genetic Tests -- Inappropriate Use of Investigational Devices -- NEWBORN AND OTHER GENETIC SCREENING PROGRAMS -- FINDINGS AND RECOMMENDATIONS -- Ensuring the Quality of Laboratories -- Ensuring the Safety of New Tests -- REFERENCES…”
Libro electrónico -
3031Publicado 2024Tabla de Contenidos: “…-- Issue 1 -- Issue 2 -- Issue 3 -- Issue 4 -- Issue 5 -- Beyond the CLV formula -- The BTYD model -- The Pareto/NBD model -- The BG/NBD model -- Implementing the BTYD model using PyMC Marketing -- Predicting the expected number of purchases for a new customer -- Estimating the CLV -- Summary -- Further reading -- Chapter 9: Customer Survey Analysis -- Technical requirements -- Steps in customer survey analysis -- Questionnaire construction -- Principles of questionnaire design -- Types of questions -- Asking questions -- Questionnaire design-layout -- Response formats -- Reliability and validity -- Reliability and classical measurement theory -- Standard error of measurement -- Using scales with high reliability -- How to do sampling -- Types of sampling -- Probability versus quota sampling…”
Libro electrónico -
3032Publicado 2023Tabla de Contenidos: “…</P></B><P>14.1 A Disaster Recovery analogy. 14.2 Introduction to Disaster Recovery. 14.3 Constructing Your DR Plan/Program. 14.4 Creating a Disaster Recovery Plan (DRP). 14.5 Validating the Effectiveness of Your DR Plan/Program. 14.6 When Disaster Recovery Bites Back. 14.6 Decoding Disaster Recovery (DR).…”
Libro electrónico -
3033Publicado 2018Tabla de Contenidos: “…10.3.1 Interplanetary Particle Transport: From the Sun to the Magnetosphere -- 10.3.2 From the Interplanetary Particle Distribution to Neutron Monitor Measurements - Magneto- and Atmospheric Transport of Charged Energetic Particles -- 10.3.3 Combined Greens-Function -- 10.4 Inversion Methodology -- 10.4.1 Inversion of Spacecraft Data to the Sun -- 10.4.2 Inversion of NM Data to the Border of the Earth's Magnetosphere -- 10.4.3 The HESPERIA Approach -- 10.5 Results and Validation -- 10.6 Concluding Remarks -- References -- Index…”
Libro electrónico -
3034
-
3035por Muhlmeyer, MichaelTabla de Contenidos: “…Basic Steps to Develop a Mathematical Model -- 6.8. Model Validation -- 6.9. Modeling and the State-Space Representation -- 6.10. …”
Publicado 2021
Libro electrónico -
3036Publicado 2018Tabla de Contenidos: “…Stage 4 - self-build security services -- Stage 5 - big data security analysis and automation -- Role of a security team in an organization -- Security office under a CTO -- Dedicated security team -- Case study - a matrix, functional, or taskforce structure -- Security resource pool -- Security technical committee (taskforce) -- Summary -- Questions -- Further reading -- Chapter 4: Security Requirements and Compliance -- Security requirements for the release gate -- Release gate examples -- Common Vulnerability Scoring System (CVSS) -- Security requirements for web applications -- OWASP Application Security Verification Standard (ASVS) -- Security knowledge portal -- Security requirements for big data -- Big data security requirements -- Big data technical security frameworks -- Privacy requirements for GDPR -- Privacy Impact Assessment (PIA) -- Privacy data attributes -- Example of a data flow assessment -- GDPR security requirements for data processor and controller -- Summary -- Questions -- Further reading -- Chapter 5: Case Study - Security Assurance Program -- Security assurance program case study -- Microsoft SDL and SAMM -- Security training and awareness -- Security culture -- Web security frameworks -- Baking security into DevOps -- Summary -- Questions -- Further reading -- Chapter 6: Security Architecture and Design Principles -- Security architecture design principles -- Cloud service security architecture reference -- Security framework -- Java web security framework -- Non-Java web security frameworks -- Web readiness for privacy protection -- Login protection -- Cryptographic modules -- Input validation and sanitization -- Data masking -- Data governance - Apache Ranger and Atlas -- Third-party open source management -- Summary -- Questions -- Further reading -- Chapter 7: Threat Modeling Practices and Secure Design…”
Libro electrónico -
3037Publicado 2018Tabla de Contenidos: “…Specification - storing current move -- Implementation -- Specification - error handling -- Implementation -- Specification - alternate players -- Implementation -- Exercises -- Integration tests -- Tests separation -- The integration test -- Summary -- Chapter 7: TDD and Functional Programming - A Perfect Match -- Setting up the environment -- Optional - dealing with uncertainty -- Example of Optional -- Functions revisited -- Kata - Reverse Polish Notation -- Requirements -- Requirement - handling invalid input -- Requirement - single operations -- Requirement - complex operations -- Streams -- filter -- map -- flatMap -- reduce -- Summary -- Chapter 8: BDD - Working Together with the Whole Team -- Different specifications -- Documentation -- Documentation for coders -- Documentation for non-coders -- Behavior-driven development -- Narrative -- Scenarios -- The book store BDD story -- JBehave -- JBehave runner -- Pending steps -- Selenium and Selenide -- JBehave steps -- Final validation -- Summary -- Chapter 9: Refactoring Legacy Code - Making It Young Again -- Legacy code -- Legacy code example -- Other ways to recognize legacy code -- A lack of dependency injection -- The legacy code change algorithm -- Applying the legacy code change algorithm -- Identifying change points -- Finding test points -- Breaking dependencies -- Writing tests -- The kata exercise -- Legacy kata -- Description -- Technical comments -- Adding a new feature -- Black-box or spike testing -- Preliminary investigation -- How to find candidates for refactoring -- Introducing the new feature -- Applying the legacy code algorithm -- Writing end-to-end test cases -- Automating the test cases -- Injecting the BookRepository dependency -- Extract and override call -- Parameterizing a constructor -- Adding a new feature -- Removing the primitive obsession with status as int…”
Libro electrónico -
3038Publicado 2021Tabla de Contenidos: “…-- Engagement and curiosity -- Usability -- Familiarity - conceptual and content -- Awareness and salience -- Satisfaction and fun -- Other evaluation criteria are relevant -- Chapter 6: How You Can Use the Kids' Experience (KX) Score -- KX score setup - an example -- Step one: Determine what success is -- Step two: Determine what sort of user behavior is indicative of success or failure -- Aligning the KX score with business goals in practice -- Build your own experience score -- Build behavioral indicators -- Define audience (sub)segments -- Collate and test -- Score and report -- Chapter 7: Challenges and Opportunities in Research with Children as Seen by Practitioners -- Learning and research through play -- How can we increase cultural diversity and ecological validity? -- How do we group children by age? -- Can children accurately tell us about their thinking and experiences? …”
Libro electrónico -
3039Publicado 2021Tabla de Contenidos: “…The Inspiration of David Attenborough -- A Learning Culture -- Exploring the Informal Mass of Opportunities in a Learning Culture -- Individual - Self-Reflection and Awareness -- Individual to Individual - Inspiration -- Team -- Leadership - Intent -- Organization - Customer Focus -- Community - Connection and Passion -- In Conclusion -- Where in the World -- A Changing World -- Beans Before Beanbags -- Chapter 19: Unite and Move Forward -- Strength in Diversity -- Using Design Thinking to Map, Bridge, and Integrate Cultural Diversity -- Map -- Empathize -- Defining the Problem -- Bridge -- Ideate -- Integrate -- Prototyping and Validating -- Agile As a Culture Shift -- The Emergence of Agile Contracts9 -- The Lean-Agile Procurement Process16 -- Initialization -- Preparation -- Big Room Day(s) -- Peer Feedback -- Index…”
Libro electrónico -
3040Publicado 2021Tabla de Contenidos: “…On Premises -- Cloud -- Hybrid -- Implement and Manage Authorization Mechanisms -- Role-Based Access Control -- Rule-Based Access Control -- Mandatory Access Control -- Discretionary Access Control -- Attribute-Based Access Control -- Risk-Based Access Control -- Manage the Identity and Access Provisioning Lifecycle -- Account Access Review -- Account Usage Review -- Provisioning and Deprovisioning -- Role Definition -- Privilege Escalation -- Implement Authentication Systems -- OpenID Connect/Open Authorization -- Security Assertion Markup Language -- Kerberos -- Remote Authentication Dial-In User Service/Terminal Access Controller Access Control System Plus -- Summary -- Domain 6 Security Assessment and Testing -- Design and Validate Assessment, Test, and Audit Strategies -- Internal -- External -- Third-Party -- Conduct Security Control Testing -- Vulnerability Assessment -- Penetration Testing -- Log Reviews -- Synthetic Transactions -- Code Review and Testing -- Misuse Case Testing -- Test Coverage Analysis -- Interface Testing -- Breach Attack Simulations -- Compliance Checks -- Collect Security Process Data -- Technical Controls and Processes -- Administrative Controls -- Account Management -- Management Review and Approval -- Management Reviews for Compliance -- Key Performance and Risk Indicators -- Backup Verification Data -- Training and Awareness -- Disaster Recovery and Business Continuity -- Analyze Test Output and Generate Report -- Typical Audit Report Contents -- Remediation -- Exception Handling -- Ethical Disclosure -- Conduct or Facilitate Security Audits -- Designing an Audit Program -- Internal Audits -- External Audits -- Third-Party Audits -- Summary -- Domain 7 Security Operations -- Understand and Comply with Investigations -- Evidence Collection and Handling -- Reporting and Documentation -- Investigative Techniques…”
Libro electrónico