Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 92
- Computer security 80
- Computer networks 63
- Cloud computing 20
- Penetration testing (Computer security) 18
- Examinations 16
- History 16
- Management 16
- Certification 14
- Politics and government 14
- Data protection 13
- United States 13
- Artificial intelligence 12
- Engineering & Applied Sciences 12
- Application software 11
- Development 11
- Information technology 11
- National security 11
- Electronic data processing personnel 10
- Foreign relations 10
- Prevention 10
- Business enterprises 9
- Computer crimes 9
- Python (Computer program language) 9
- Access control 8
- Armed Forces 8
- Computers 8
- Electrical & Computer Engineering 7
- Military policy 7
- Operating systems (Computers) 7
-
241Publicado 2023Libro electrónico
-
242por Sjostrom, Kristine L.“…After the successful defense of the upper Illinois settlements of St. Louis and Cahokia against the Anglo-inspired attack of May 26, 1780, however, measures were taken to ensure the continued defense of the region. …”
Publicado 2020
Libro -
243Publicado 2023Tabla de Contenidos: “…-- Cloud Environment Security Objectives -- Confidentiality -- Integrity -- Availability -- Nonrepudiation -- Common Security Issues -- Principle of Least Privilege -- Zero-Trust Model -- Defense in Depth -- Avoid Security through Obscurity -- The AAAs of Access Management -- Encryption -- End-to-End Encryption -- Symmetric Key Encryption -- Asymmetric Key Encryption -- Network Segmentation -- Basic Network Configuration -- Unsegmented Network Example -- Internal and External Compliance -- Cybersecurity Considerations for the Cloud Environment -- Configuration Management -- Unauthorized Access -- Insecure Interfaces/APIs -- Hijacking of Accounts -- Compliance -- Lack of Visibility -- Accurate Logging -- Cloud Storage -- Vendor Contracts -- Link Sharing -- Major Cybersecurity Threats -- DDoS -- Social Engineering -- Password Attacks -- Malware -- Summary -- Exam Essentials -- Review Questions -- Chapter 2 Managing Identity and Access in Microsoft Azure -- Identity and Access Management -- Identifying Individuals in a System -- Identifying and Assigning Roles in a System and to an Individual -- Assigning Access Levels to Individuals or Groups -- Adding, Removing, and Updating Individuals and Their Roles in a System -- Protecting a System's Sensitive Data and Securing the System -- Enforcing Accountability -- IAM in the Microsoft Azure Platform…”
Libro electrónico -
244Publicado 2013“…The course is designed for both technical managers seeking high-level understanding of the platform as well as developers warming up for a deep dive into programming for Android. By the end of this course, you will have a complete, high-level understanding of the entire operating system. …”
-
245Publicado 2023“…You'll explore maintainable code through SOLID principles and defensive coding techniques made possible in newer versions of C#. …”
Libro electrónico -
246
-
247
-
248
-
249Publicado 2012Tabla de Contenidos: “…Federated Identity Management -- eXtensible Access Control Markup Language (XACML) -- Simple Object Access Protocol (SOAP) -- Single Sign On (SSO) -- Service Provisioning Markup Language (SPML) -- Certificate-based Authentication -- Attestation -- Two-Minute Drill -- Q& -- A Self Test -- Lab Question -- Self Test Answers -- Lab Answer -- 18 Security Activities Across the Technology Life Cycle -- End-to-End Solution Ownership -- Understanding the Results of Solutions in Advance -- Systems Development Life Cycle -- Adapt Solutions to Address Emerging Threats and Security Trends -- Validate the System Design -- Two-Minute Drill -- Q& -- A Self Test -- Lab Question -- Self Test Answers -- Lab Answer -- Appendix: About the Download -- Downloading the ISO File -- System Requirements -- Installing and Running MasterExam -- MasterExam -- LearnKey Online Training -- Help -- Removing Installations -- Technical Support -- LearnKey Technical Support -- Glossary…”
Libro electrónico -
250Publicado 2017“…Deviating from the usual focus on routing and energy efficiency, Building Sensor Networks: From Design to Applications attempts to stitch together the path from conceptual development of applications, on one end, to actual complete applications at the other. …”
Libro electrónico -
251Publicado 2019Tabla de Contenidos: “…-- Equipment failure -- Platform instability -- Database design flaws -- Data-entry errors -- Operator error -- Taking Advantage of RAID -- Striping -- RAID levels -- Backing Up Your System -- Preparation for the worst -- Full or incremental backup -- Frequency -- Backup maintenance -- Coping with Internet Threats -- Viruses -- Trojan horses -- Worms -- Denial-of-service attacks -- SQL injection attacks -- Phishing scams -- Zombie spambots -- Installing Layers of Protection -- Network-layer firewalls -- Application-layer firewalls -- Antivirus software -- Vulnerabilities, exploits, and patches -- Education -- Alertness -- Chapter 2 Protecting Against User Errors and Conflicts -- Reducing Data-Entry Errors -- Data types: The first line of defense -- Constraints: The second line of defense -- Sharp-eyed humans: The third line of defense -- Coping with Errors in Database Design -- Handling Programming Errors -- Solving Concurrent-Operation Conflicts -- Passing the ACID Test: Atomicity, Consistency, Isolation, and Durability -- Operating with Transactions -- Using the SET TRANSACTION statement -- Starting a transaction -- Committing a transaction…”
Libro electrónico -
252por Ihnatko, AndyTabla de Contenidos: “…; Chapter 10: Comic Books; Finding Free Comics Online; Loading Comics Onto Your iPhone; Longbox Digital: At Long Last, Love?; In Defense of the Comix Reader; Chapter 11: Comic Strips; Stripping For Fun; The Newspaper With Great Comics; Comic Envi; Dark Gate Comic Slurper; Chapter 12: Crosswords…”
Publicado 2010
Libro electrónico -
253
-
254Publicado 2015“…"In January 2012, the Department of Defense (DoD) announced plans for a large-scale reduction, or drawdown, of its military force. …”
Libro electrónico -
255Publicado 2005“…More recently, it has drawn organizations such as the Defense Intelligence Agency, Navy SEALS, Federal law enforcement agencies, and national TV to seek his insights about “how to” as well as “why.” …”
Libro electrónico -
256Publicado 2023“…The Study Guide now contains more end of chapter review questions and more online practice tests. …”
Libro electrónico -
257Publicado 2013“…., the uninterrupted flow of material, information, and coordination from the initial supplier to the end customer. Therefore, it is necessary to adopt adequate measures that take into consideration not only potential losses but also potential gains (so-called speculative risks). …”
Libro electrónico -
258Publicado 2022Tabla de Contenidos: “…Monitoring and measurement -- Reporting -- Continuous improvement -- Risk frameworks -- Understand and Apply Threat Modeling Concepts and Methodologies -- Identifying threats -- Determining and diagramming potential attacks -- Performing reduction analysis -- Remediating threats -- Apply Supply Chain Risk Management (SCRM) Concepts -- Risks associated with hardware, software, and services -- Third-party assessment and monitoring -- Fourth-party risk -- Minimum security requirements -- Service-level agreement requirements -- Establish and Maintain a Security Awareness, Education, and Training Program -- Methods and techniques to present awareness and training -- Periodic content reviews -- Program effectiveness evaluation -- Chapter 4 Asset Security -- Identify and Classify Information and Assets -- Data classification -- Asset classification -- Establish Information and Asset Handling Requirements -- Provision Resources Securely -- Information and asset ownership -- Asset inventory -- Asset management -- Manage Data Life Cycle -- Data roles -- Data collection -- Data location -- Data maintenance -- Data retention -- Data remanence -- Data destruction -- Ensure Appropriate Asset Retention -- End of life -- End of support -- Determine Data Security Controls and Compliance Requirements -- Data states -- Scoping and tailoring -- Standards selection -- Data protection methods -- Chapter 5 Security Architecture and Engineering -- Research, Implement, and Manage Engineering Processes Using Secure Design Principles -- Threat modeling -- Least privilege (and need to know) -- Defense in depth -- Secure defaults -- Fail securely -- Separation of duties -- Keep it simple -- Zero trust -- Privacy by design -- Trust but verify -- Shared responsibility -- Understand the Fundamental Concepts of Security Models…”
Libro electrónico -
259Publicado 2021Tabla de Contenidos: “…3 Nostalgia for the Lost Homeland: An Anticipatory Analysis of the Cultural Turn and the Surprising Parallels between Cultural Relativism and the Insider-Phenomenological Approach -- 4 Science Is Not for the Stateless: An Anticipatory Critique of the Cultural Turn Based on the Ethnocentric Imperative -- Chapter 7 The Ethos of Transcendence (1965-1977): Decision and the Moral Imperative as Anticipatory Response to Postmodernism -- 1 The Philosophical Afterlife of The End of the World: Enzo Paci's Existentialist Historicism and the Moral Imperative Grounded in the Contemporaneity of History -- 2 Impossible Nostalgia and the Anticipatory Analysis of the Discursive Turn -- 3 The Ethos of Transcendence of Life in Value as an Anticipatory Critique of the Discursive Turn -- 3.1 Finding Value in Concreteness, Practice, and Morality Instead of Meaning, Interpretation, and Play -- 3.2 The Ethos of Transcendence as Dialectical Process: Between Loyalty to the Past and New Valorization in the Present -- Conclusion: Let the Earth Shake (Again) or Why Rebirth Must Lead to a New Crisis -- References -- Index…”
Libro electrónico -
260Publicado 2021Libro electrónico