Mostrando 101 - 114 Resultados de 114 Para Buscar 'An Other Cup', tiempo de consulta: 0.09s Limitar resultados
  1. 101
    Publicado 2022
    Tabla de Contenidos: “…253 Table of Contents ntroduction 1 About This Book 1 Foolish Assumptions 2 Icons Used in This Book 3 Beyond the Book 3 Where to Go from Here 4 Part 1: Getting to Know Security Awareness 5 Chapter 1: Knowing How Security Awareness Programs Work 7 Understanding the Benefits of Security Awareness 8 Reducing losses from phishing attacks 8 Reducing losses by reducing risk 9 Grasping how users initiate loss 10 Knowing How Security Awareness Programs Work 11 Establishing and measuring goals 12 Showing users how to "do things right" 14 Recognizing the Role of Awareness within a Security Program 15 Disputing the Myth of the Human Firewall 16 Chapter 2: Starting On the Right Foot: Avoiding What Doesn't Work 19 Making a Case Beyond Compliance Standards 20 Treating Compliance as a Must 21 Motivating users to take action 22 Working within the compliance budget 22 Limiting the Popular Awareness Theories 23 Applying psychology to a diverse user base 23 Differentiating between marketing and awareness 24 Distinguishing Social Engineering from Security Awareness 26 Addressing Mental Models That Don't Work 27 Making Perfection the Stated Goal 28 Measuring from the Start 29 Prioritizing Program Over Product 29 Choosing Substance Over Style 30 Understanding the Role of Security Awareness 31 Chapter 3: Applying the Science Behind Human Behavior and Risk Management 33 Achieving Common Sense through Common Knowledge 34 Borrowing Ideas from Safety Science 35 Recognizing incidents as system failures 36 Responding to incidents 37 Applying Accounting Practices to Security Awareness 37 Applying the ABCs of Awareness 39 Benefiting from Group Psychology 40 The ABCs of behavioral science 41 The Fogg Behavior Model 42 Relating B:MAP to the ABCs of awareness and behavior 43 The Forgetting Curve 44 Remembering That It's All About Risk 45 Optimizing risk 46 The risk formula 46 Part 2: Building a Security Awareness Program 51 Chapter 4: Creating a Security Awareness Strategy 53 Identifying the Components of an Awareness Program 54 Choosing effective communications tools 55 Picking topics based on business drivers 56 Knowing when you're a success 57 Figuring Out How to Pay for It All 58 Chapter 5: Determining Culture and Business Drivers 61 Understanding Your Organization's Culture 62 Determining security culture 64 Recognizing how culture relates to business drivers 65 Identifying Subcultures 65 Interviewing Stakeholders 67 Requesting stakeholder interviews 67 Scheduling the interviews 70 Creating interview content 70 Taking names 72 Partnering with Other Departments 72 Chapter 6: Choosing What to Tell The Users 75 Basing Topics on Business Drivers 76 Incorporating Personal Awareness Topics 76 Motivating Users to Do Things "Right" 77 Common Topics Covered in Security Awareness Programs 79 Phishing 79 Social engineering 80 Texting and instant messaging security 80 Physical security 81 Malware 81 Ransomware 81 Password security 82 Cloud security 82 USB device security 82 Internet of Things 83 Travel security 83 Wi-Fi security 84 Mobile devices 84 Work from home 84 Basic computer security 85 Insider threat 85 Protecting children on the internet 85 Social media security 86 Moving security 86 Compliance topics 87 Chapter 7: Choosing the Best Tools for the Job 89 Identifying Security Ambassadors 90 Finding ambassadors 90 Maintaining an ambassador program 91 Knowing the Two Types of Communications Tools 92 Reminding users to take action 93 Requiring interaction from users 93 Exploring Your Communications Arsenal 95 Knowledgebase 95 Posters 96 Hardcopy newsletters 97 Monitor displays 97 Screen savers 98 Pamphlets 98 Desk drops 99 Table tents 99 Coffee cups or sleeves 99 Stickers 100 Mouse pads 100 Pens and other useful giveaways 100 Camera covers 101 Squishy toys and other fun giveaways 101 Active communications tools 101 Chapter 8: Measuring Performance 107 Knowing the Hidden Cost of Awareness Efforts 108 Meeting Compliance Requirements 109 Collecting Engagement Metrics 111 Attendance metrics 111 Likability metrics 112 Knowledge metrics 112 Measuring Improved Behavior 113 Tracking the number of incidents 113 Examining behavior with simulations 114 Tracking behavior with gamification 116 Demonstrating a Tangible Return on Investment 116 Recognizing Intangible Benefits of Security Awareness 117 Knowing Where You Started: Day 0 Metrics 118 Part 3: Putting Your Security Awareness Program Into Action 119 Chapter 9: Assembling Your Security Awareness Program 121 Knowing Your Budget 122 Finding additional sources for funding 123 Allocating for your musts 125 Limiting your discretionary budget 126 Appreciating your team as your most valuable resource 126 Choosing to Implement One Program or Multiple Programs 127 Managing multiple programs 128 Beginning with one program 128 Gaining Support from Management 129 Devising a Quarterly Delivery Strategy 131 Ensuring that your message sticks 133 Distributing topics over three months 133 Deciding Whether to Include Phishing Simulations 136 Planning Which Metrics to Collect and When 137 Considering metrics versus topics 137 Choosing three behavioral metrics 138 Incorporating Day 0 metrics 138 Scheduling periodic updates 138 Biasing your metrics 139 Branding Your Security Awareness Program 139 Creating a theme 139 Maintaining brand consistency 140 Coming up with a catchphrase and logo 140 Promoting your program with a mascot 140 Chapter 10: Running Your Security Awareness Program 143 Nailing the Logistics 144 Determining sources or vendors 144 Scheduling resources and distribution 145 Contracting vendors 145 Recognizing the role of general project management 146 Getting All Required Approvals 146 Getting the Most from Day 0 Metrics 147 Creating Meaningful Reports 149 Presenting reports as a graphical dashboard 149 Adding index scores 152 Creating an awareness index 152 Reevaluating Your Program 153.…”
    Libro electrónico
  2. 102
    por Engelmann, Sven
    Publicado 2023
    Tabla de Contenidos: “…17.1 THERMOFORMING -- 17.2 INJECTION MOLDING -- 17.2.1 Door Handles -- 17.2.2 The Tripartite Dashboard -- 17.2.3 Instrument Board -- 17.2.4 Radio Bezel and Gear Shift Cover -- 17.3 TACTILE EFFECTS -- 17.4 OTHER SECTOR PARTS -- 17.5 MULTI-DECO MOLDING -- 17.6 THE AUTOMATED SEQUENCE PROCESS -- Chapter 18 Smart Manufacturing -- 18.1 TRANSATLANTIC COOPERATION -- 18.2 DESIGN OF EXPERIMENT -- 18.3 CONCLUSION -- 18.4 REMOTE THERMOFORMING LINE COMMISSIONING AND REMOTE SERVICE SUPPORT -- Chapter 19 Automotive Body Parts Made of PA + ABS -- Chapter 20 Softfeel Made from ABS/TPU Material -- Chapter 21 Introduction to Packaging -- Chapter 22 Optimizing a Thermoforming Process for Packaging -- 22.1 METHOD FOR OPTIMIZING A PROCESS TO PRODUCE A THERMOFORMED ARTICLE FROM POLYMERIC MATERIAL -- 22.2 CHARACTERIZATION OF RESINS BY PERFORMANCE PARAMETERS -- 22.3 VARIABLES THAT CAN BE ALTERED TO INFLUENCE THE PLUG FORCE AND CAVITY PRESSURE -- 22.4 APPLICATION EXAMPLES -- Chapter 23 Analysis of Thermoforming Films -- 23.1 GENERAL ANALYSIS OF THERMOFORMING FILMS1 -- 23.2 TESTS MEASURING FREE SHRINKAGE -- 23.3 TESTS MEASURING THICKNESS -- 23.4 TENSILE STRENGTH TEST -- 23.5 SURFACE TEXTURE TEST FOR THE GLOSS FACTOR -- 23.6 FLAME COLORATION -- Chapter 24 Advanced Analysis of Thermoforming Films -- 24.1 PRODUCT QUALITY DEMANDS -- 24.2 DIFFERENTIAL SCANNING CALORIMETRY -- 24.3 DMA (DYNAMIC MECHANICAL ANALYSIS) -- 24.3.1 The Functional Principle -- 24.3.2 The Complex E-modulus E* in Conjunction with Temperature -- 24.4 TORSION PENDULUM TEST -- 24.5 SUMMARY -- Chapter 25 Analysis of Thermoformed Products -- 25.1 WALL THICKNESS DISTRIBUTION -- 25.1.1 Examples of Measuring Wall Thickness of Cups -- 25.2 TOP LOAD -- 25.3 VISUAL APPEARANCE -- 25.4 WATER VAPOR PERMEABILITY -- 25.5 OXYGEN PERMEABILITY -- 25.6 TRANSPARENCY…”
    Libro electrónico
  3. 103
    Publicado 2011
    Libro electrónico
  4. 104
    Publicado 2024
    Tabla de Contenidos: “…Polylactic acid (PLA) -- Acrylonitrile butadiene styrene (ABS) -- Polycarbonate (PC) -- Polyamides (nylon) -- Polyvinyl alcohol (PVA) -- High-impact polystyrene (HIPS) -- High-density polyethylene (HDPE) -- Polyethylene terephthalate glycol (PETG) -- Experimental materials -- Extruded alternatives -- Identifying Granular Materials -- Plastic powders -- Sugar and salt -- Metal powders -- Sand and natural granular materials -- Exploring Photo-Cured Resins -- Understanding Bioprinting -- Bioprinting food and animal products -- Replacement tissues and organs -- Identifying Other Uses for Materials -- Recycling materials -- Sustainable large-scale 3D printing with local materials -- Producing food -- Caring for people -- Chapter 5 Identifying Sources and Communities for 3D-Printable Objects -- Exploring Object Repositories -- Vendor repositories -- Community repositories -- Designing in the Computer -- Scanning Objects -- Capturing Structure from Photographs -- Preparing Models for Printing -- 3D model viewers -- Mesh modelers -- Mesh repairers -- Part 3 Exploring the Business Side of 3D Printing -- Chapter 6 3D Printing for Everyone -- Democratizing Manufacturing -- Derived designs -- Curated artifacts -- Expanded opportunities -- Establishing personal storefronts -- Creating a unique design -- Fabricating a unique product on demand -- Creating "impossible" objects -- Building New Tools -- Moving beyond solid blocks -- Creating the tool that will create the tool -- Chapter 7 Understanding 3D Printing's Effect on Traditional Lines of Business -- Transforming Production -- Displacing the production line -- Abbreviating the manufacturing chain -- Providing local fabrication -- Eliminating traditional release cycles -- Handling Challenges to Intellectual Property Laws -- Threatening IP protections -- Assigning legal liability -- Leveraging Expired Patents…”
    Libro electrónico
  5. 105
    Publicado 2018
    Tabla de Contenidos: “…-- Ron's words -- Set etiquette -- Being a professional crew member -- Being professional when you're boss -- Location etiquette: getting along with locals -- Some thoughts on equipment -- Last thoughts and parting advice -- Ron Dexter's suggested book and source list -- Finally - your new career -- 2 Essential equipment -- Apple boxes -- Baby plates -- Bar clamp adapter pin -- Basso block -- Bazooka -- Bead board holder -- Big Ben clamp -- Branch holder -- C-clamp branch holder -- Tree branch holder -- Cable crossovers -- C-clamps -- Camera wedge -- Cardellini clamp -- Chain vise grips -- Clipboard -- Condor bracket -- Cribbing -- Crowder hanger/no nail hanger -- Cucoloris -- Cup blocks -- Dots and fingers -- Drop ceiling scissor clamp/cable holder -- Drop-down, 45-degree angle -- Empty frames -- Flag box/scrim box -- Flags and cutters -- Cutters…”
    Libro electrónico
  6. 106
    por Srinivasan, A.
    Publicado 2014
    Tabla de Contenidos: “…-- Summary -- Key Terms -- Review Questions -- Chapter 2: Move to Cloud Computing -- 2.1 Pros and Cons of Cloud Computing -- 2.1.1 Advantages of Cloud Computing in IT Field -- 2.1.2 The Fixed Cost Advantage -- 2.1.3 Keeping Data Safe -- 2.1.4 The Possible Disadvantages of Cloud Computing -- 2.1.5 Advantages of Cloud Computing -- 2.1.6 Disadvantages of Cloud Computing -- 2.2 Nature of the Cloud -- 2.2.1 Leveraging the Internet to Change the World -- 2.3 Technologies in Cloud Computing -- 2.3.1 Other Cloud-related Technologies -- 2.3.2 Working of Cloud -- 2.3.3 Key Characteristic of Cloud and its Role -- 2.4 Migrating into the Cloud -- 2.4.1 Cloud Computing Migration Issues: What You Need to Know? …”
    Libro electrónico
  7. 107
    Publicado 2004
    Libro electrónico
  8. 108
    Publicado 2022
    Libro electrónico
  9. 109
    Publicado 2018
    Libro electrónico
  10. 110
    Publicado 1979
    “…These views were not peculiar to the writers of Greece and Rome but were adopted by many others who have written in the 'classical tradition' right up to modern times. …”
    Acceso a las primeras páginas
    Sumario
    Libro
  11. 111
    por Suggs, Welch
    Publicado 2005
    “…Those decisions set the stage for some of the most celebrated moments in sports, such as the Women's World Cup in soccer and the Women's Final Four in NCAA basketball. …”
    Libro
  12. 112
    por Hudson, Andrew, 1978-
    Publicado 2008
    “…Install and configure the Fedora 8 Linux distribution Manage Linux services and users Run a printer server with CUPS Connect to a local network and the Internet Set up and administer a web server with Apache Secure your machine and your network from intruders Rebuild and install a new Linux kernel Learn shell scripting Run other operating systems on Fedora with Xen Share files with Windows users using Samba Get productive with OpenOffice.org Play games on Linux Use Linux multimedia programs Use a database with Fedora Set up a firewall Set up a DNS server Work with the X Window system Learn Linux programming (including Mono) Fedora 8 on DVD: DVD includes the Fedora 8 binary distribution with all the base Fedora packages plus hundreds of additional programs and utilities. …”
    Libro electrónico
  13. 113
    Publicado 2012
    “…Recognize vulnerabilities caused by IP network integration, as well as VoIP’s unique security requirements Discover how hackers target IP telephony networks and proactively protect against each facet of their attacks Implement a flexible, proven methodology for end-to-end Cisco IP Telephony security Use a layered (defense-in-depth) approach that builds on underlying network security design Secure CUCM, Cisco Unity/Unity Connection, CUPS, CUCM Express, and Cisco Unity Express platforms against internal and external threats Establish physical security, Layer 2 and Layer 3 security, and Cisco ASA-based perimeter security Complete coverage of Cisco IP Telephony encryption and authentication fundamentals Configure Cisco IOS Voice Gateways to help prevent toll fraud and deter attacks Secure Cisco Voice Gatekeepers and Cisco Unified Border Element (CUBE) against rogue endpoints and other attack vectors Se..…”
    Libro electrónico
  14. 114
    por Sobell, Mark G.
    Publicado 2005
    “…Don't settle for yesterday's Linux book...get the ONLY book that meets today's challenges and tomorrow's! Compared with the other Linux books out there, A Practical Guide to Red Hat® Linux®, Second Edition, delivers... …”
    Libro electrónico