Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 92
- Computer security 80
- Computer networks 63
- Cloud computing 20
- Penetration testing (Computer security) 18
- Examinations 16
- History 16
- Management 16
- Certification 14
- Politics and government 14
- Data protection 13
- United States 13
- Artificial intelligence 12
- Engineering & Applied Sciences 12
- Application software 11
- Development 11
- Information technology 11
- National security 11
- Electronic data processing personnel 10
- Foreign relations 10
- Prevention 10
- Business enterprises 9
- Computer crimes 9
- Python (Computer program language) 9
- Access control 8
- Armed Forces 8
- Computers 8
- Electrical & Computer Engineering 7
- Military policy 7
- Operating systems (Computers) 7
-
181
-
182por Rothman, Maarten“…Finally, the fifth section deals with the way armed forces can transform their organizations and learn from this war, and concludes with questions on how and when the Russia-Ukriane war might end…”
Publicado 2024
Libro electrónico -
183
-
184Publicado 2014“…Build your portal into the Nether, defend your Fortress, and bring back the rewards you've earned... Prepare for the End, defeat the Ender Dragon, and capture its egg... create and defeat the Wither... transform Redstone ore into incredible devices, transport systems, defenses, and more! …”
-
185Publicado 2017Libro electrónico
-
186Publicado 2015“…What happens if we bet too heavily on unmanned systems, cyber warfare, and special operations in our defense?In today's U.S. defense policy debates, big land wars are out. …”
Libro electrónico -
187Publicado 2019Tabla de Contenidos: “…Summary -- 6. Testing Front-End Applications -- 6.1. Functional Testing of Front-End Applications -- 6.2. …”
Libro electrónico -
188por Ameriks, Karl, 1947-“…Karl Ameriks provides a detailed and concise account of the main ways in which the later critical works provide a plausible defense of the conception of humanity's fundamental end that Kant turned to after reading Rousseau in the 1760s. …”
Publicado 2012
Libro -
189
-
190por Camporeale, Salvatore I.Tabla de Contenidos: “…Thomas Aquinas in the Dominican Tradition; 1.2 The History of Thomism and the Centrality of the Summa Theologiae in the Fifteenth and Sixteenth Centuries; 1.3 Valla's Encomium: Its Place in History and Cultural Significance; 1.4 The Cappellone degli Spagnoli in Florence (Second Half of the Fourteenth Century) and the Cappella Carafa in Rome (End of the Fifteenth Century); 2.1 Exordium and Divine Invocation…”
Publicado 2013
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
191por Landy, Gene K.Tabla de Contenidos: “…; Organization of this Book; Approach of this Book; Understanding and Using Intellectual Property; Doing Deals; Understanding and Dealing with Legal Risk Factors; Global Perspective; Focusing on Your End Game from the Beginning; How to Use this Book…”
Publicado 2008
Libro electrónico -
192Publicado 2014Tabla de Contenidos: “…Protecting Mission-Critical Systems; Information Assurance; Information Risk Management; Administrative, Technical, and Physical Controls; Risk Analysis; Defense in Depth…”
Libro electrónico -
193por Gaughan, Patrick A.Tabla de Contenidos: “…Empirical Evidence on the Acquisition Programs of the 1960's How Likely Is It That Diversifying Acquisitions Will End Up Being Sold Off?; Is There a Diversification Discount?…”
Publicado 2013
Libro electrónico -
194Publicado 2012Tabla de Contenidos: “…Declarative Languages; SQL Basics; Statements; Databases; Transaction Logs; Schemas; Tables; Views; Indexes; Stored Procedures; User-Defined Functions; SQL CLR Assemblies; Elements of Style; Whitespace; Naming Conventions; One Entry, One Exit; Defensive Coding…”
Libro electrónico -
195por Ebenstein, DonnyTabla de Contenidos: “…What Comes Next: Making Change Happen and Identifying Dead EndsPossibility 1: The Situation Gets Better and the Relationship Improves; Possibility 2: Making Peace with the Status Quo; Possibility 3: Walking Away; Have you Really Tried?…”
Publicado 2013
Libro electrónico -
196Publicado 2013Tabla de Contenidos: “…Federal Supply Schedules/GSA SchedulesFederal Register; Federal Agency Acquisition Forecasts; Tech-Net; Federal Procurement Data System; Year-End Procurements; Chapter 9: Support Programs and Services for Contractors; Small Business Administration; Procurement Technical Assistance Centers; DoD Office of Small Business Programs; General Services Administration; National Contract Management Association; PART IV: HOW THE GOVERNMENT ISSUES PROCUREMENT OPPORTUNITIES; Chapter 10: Simplified Acquisition or Small Purchase Procedures; Micropurchases; Simplified Acquisition Methods…”
Libro electrónico -
197por McDonough, Bart R.Tabla de Contenidos: “…Best Practices for Managing Third-Party Cyber Risk -- Legal and Regulatory Considerations in Third-Party Risk Management -- Sample Questions to ask Third-Party Vendors -- Chapter 7 Summary -- Chapter 8: Cybersecurity Training and Awareness -- Importance of Cybersecurity Awareness for All Employees -- Strategies for Providing Effective Training and Awareness Programs -- More Detail on Effective Training Strategies -- Chapter 8 Summary -- Chapter 9: Cyber Insurance -- Understanding Cyber Insurance -- Key Components of Cyber Insurance -- Evaluating and Purchasing Cyber Insurance -- Managing and Reviewing the Cyber Insurance Policy -- Chapter 9 Summary -- Chapter 10: Conclusion: Moving Forward with Cybersecurity Governance -- The Board's Role in Cybersecurity Governance -- Key Takeaways and Action Items for Board Members -- Chapter 10 Summary -- Appendix A: Checklist of Key Considerations for Board Members -- Appendix B: Sample Questions -- Appendix C: Sample Board Meeting Agenda -- Appendix D: List of Key Vendors -- Appendix E: Cybersecurity Resources -- Appendix F: Cybersecurity Books -- Appendix G: Cybersecurity Podcasts -- Appendix H: Cybersecurity Websites and Blogs -- Appendix I: Tabletop Exercise: Cybersecurity Incident Response -- Appendix J: Articles -- About the Author -- Acknowledgments -- Index -- Copyright -- Dedication -- End User License Agreement…”
Publicado 2023
Libro electrónico -
198por Barnett, Thomas P. M.“…Where's the world going, and how do we become a leader again in the most profound reordering since the end of World War II? The "great powers" are no longer just the world's major nation-states, but powerful forces moving with us and past us. …”
Publicado 2009
Libro -
199Publicado 2024“…Aamir has designed offensive counter-defense measures for the Department of Defense and national intelligence agencies. …”
Video -
200Publicado 2014Libro electrónico