Mostrando 1 - 4 Resultados de 4 Para Buscar 'Axiom Mission 3', tiempo de consulta: 0.07s Limitar resultados
  1. 1
    Publicado 2019
    Tabla de Contenidos:
    Libro electrónico
  2. 2
    Publicado 2023
    Tabla de Contenidos: “…Divestitures -- Third Party Assessment and Monitoring -- Outsourcing and Offshoring -- Types of Attackers -- Hackers -- Script Kiddies -- Outsiders -- Insiders -- Hacktivist -- Bots and Botnets -- Phishers and Spear Phishers -- Summary of Exam Objectives -- Self-Test -- Self-Test Quick Answer Key -- References -- Chapter 3: Domain 2: Asset Security -- Unique Terms and Definitions -- Introduction -- Classifying Data -- Labels -- Security Compartments -- Clearance -- Formal Access Approval -- Need to Know -- Sensitive Information/Media Security -- Sensitive Information -- Handling -- Storage -- Retention -- Ownership and Inventory -- Asset Inventory -- Asset Retention -- Business or Mission Owners -- Data Owners -- System Owner -- Custodian -- Users -- Data Controllers and Data Processors -- Data Location -- Data Maintenance -- Data Loss Prevention -- Digital Rights Management -- Cloud Access Security Brokers -- Data Collection Limitation -- Memory and Remanence -- Data Remanence -- Memory -- Cache Memory -- RAM and ROM -- DRAM and SRAM -- Firmware -- Flash Memory -- Solid State Drives (SSDs) -- Data Destruction -- Overwriting -- Degaussing -- Destruction -- Shredding -- Determining Data Security Controls -- Certification and Accreditation -- Standards and Control Frameworks -- Standards Selection -- PCI-DSS -- OCTAVE -- ISO 17799 and the ISO 27000 Series -- COBIT -- ITIL -- Scoping and Tailoring -- Data States -- Protecting Data in Use -- Protecting Data in Transit -- Drive and Tape Encryption -- Media Storage and Transportation -- Summary of Exam Objectives -- Self-Test -- Self-Test Quick Answer Key -- References -- Chapter 4: Domain 3: Security Architecture and Engineering -- Unique Terms and Definitions -- Introduction -- Secure Design Principles -- Threat Modeling -- Least Privilege and Defense-in-Depth -- Secure Defaults -- Privacy by Design…”
    Libro electrónico
  3. 3
    Publicado 2021
    Tabla de Contenidos: “…-- A Successful Project -- The CEO Meeting -- Grokking the Business -- The Company's Gestalt -- Values, Vision, Mission -- Business Model and Health -- History -- Why, Who, and How? …”
    Libro electrónico
  4. 4
    por Whitlock, Chris
    Publicado 2023
    “…As the Honorable Robert Work wrote in the foreword: “This book is not the last word on leading AI in the national security enterprise, but I believe it is an essential starting point.” You will: • Review axioms or enduring truths at work in six dimensions of AI: program, budget, project, data science, people, and technology • Apply best practices—such as decision frameworks, processes, checklists—for leading work in each of the six dimensions. • See how the axioms and best practices are contextualized to national security missions…”
    Libro electrónico