Mostrando 241 - 260 Resultados de 417 Para Buscar 'Defensive end', tiempo de consulta: 0.11s Limitar resultados
  1. 241
    Publicado 2023
    Libro electrónico
  2. 242
    por Sjostrom, Kristine L.
    Publicado 2020
    “…After the successful defense of the upper Illinois settlements of St. Louis and Cahokia against the Anglo-inspired attack of May 26, 1780, however, measures were taken to ensure the continued defense of the region. …”
    Libro
  3. 243
    Publicado 2023
    Tabla de Contenidos: “…-- Cloud Environment Security Objectives -- Confidentiality -- Integrity -- Availability -- Nonrepudiation -- Common Security Issues -- Principle of Least Privilege -- Zero-Trust Model -- Defense in Depth -- Avoid Security through Obscurity -- The AAAs of Access Management -- Encryption -- End-to-End Encryption -- Symmetric Key Encryption -- Asymmetric Key Encryption -- Network Segmentation -- Basic Network Configuration -- Unsegmented Network Example -- Internal and External Compliance -- Cybersecurity Considerations for the Cloud Environment -- Configuration Management -- Unauthorized Access -- Insecure Interfaces/APIs -- Hijacking of Accounts -- Compliance -- Lack of Visibility -- Accurate Logging -- Cloud Storage -- Vendor Contracts -- Link Sharing -- Major Cybersecurity Threats -- DDoS -- Social Engineering -- Password Attacks -- Malware -- Summary -- Exam Essentials -- Review Questions -- Chapter 2 Managing Identity and Access in Microsoft Azure -- Identity and Access Management -- Identifying Individuals in a System -- Identifying and Assigning Roles in a System and to an Individual -- Assigning Access Levels to Individuals or Groups -- Adding, Removing, and Updating Individuals and Their Roles in a System -- Protecting a System's Sensitive Data and Securing the System -- Enforcing Accountability -- IAM in the Microsoft Azure Platform…”
    Libro electrónico
  4. 244
    Publicado 2013
    “…The course is designed for both technical managers seeking high-level understanding of the platform as well as developers warming up for a deep dive into programming for Android. By the end of this course, you will have a complete, high-level understanding of the entire operating system. …”
    Video
  5. 245
    Publicado 2023
    “…You'll explore maintainable code through SOLID principles and defensive coding techniques made possible in newer versions of C#. …”
    Libro electrónico
  6. 246
    por Weigand, Robert A.
    Publicado 2014
    Libro electrónico
  7. 247
    Publicado 2023
    Libro electrónico
  8. 248
    Publicado 2017
    Libro electrónico
  9. 249
    Publicado 2012
    Tabla de Contenidos: “…Federated Identity Management -- eXtensible Access Control Markup Language (XACML) -- Simple Object Access Protocol (SOAP) -- Single Sign On (SSO) -- Service Provisioning Markup Language (SPML) -- Certificate-based Authentication -- Attestation -- Two-Minute Drill -- Q&amp -- A Self Test -- Lab Question -- Self Test Answers -- Lab Answer -- 18 Security Activities Across the Technology Life Cycle -- End-to-End Solution Ownership -- Understanding the Results of Solutions in Advance -- Systems Development Life Cycle -- Adapt Solutions to Address Emerging Threats and Security Trends -- Validate the System Design -- Two-Minute Drill -- Q&amp -- A Self Test -- Lab Question -- Self Test Answers -- Lab Answer -- Appendix: About the Download -- Downloading the ISO File -- System Requirements -- Installing and Running MasterExam -- MasterExam -- LearnKey Online Training -- Help -- Removing Installations -- Technical Support -- LearnKey Technical Support -- Glossary…”
    Libro electrónico
  10. 250
    Publicado 2017
    “…Deviating from the usual focus on routing and energy efficiency, Building Sensor Networks: From Design to Applications attempts to stitch together the path from conceptual development of applications, on one end, to actual complete applications at the other. …”
    Libro electrónico
  11. 251
    Publicado 2019
    Tabla de Contenidos: “…-- Equipment failure -- Platform instability -- Database design flaws -- Data-entry errors -- Operator error -- Taking Advantage of RAID -- Striping -- RAID levels -- Backing Up Your System -- Preparation for the worst -- Full or incremental backup -- Frequency -- Backup maintenance -- Coping with Internet Threats -- Viruses -- Trojan horses -- Worms -- Denial-of-service attacks -- SQL injection attacks -- Phishing scams -- Zombie spambots -- Installing Layers of Protection -- Network-layer firewalls -- Application-layer firewalls -- Antivirus software -- Vulnerabilities, exploits, and patches -- Education -- Alertness -- Chapter 2 Protecting Against User Errors and Conflicts -- Reducing Data-Entry Errors -- Data types: The first line of defense -- Constraints: The second line of defense -- Sharp-eyed humans: The third line of defense -- Coping with Errors in Database Design -- Handling Programming Errors -- Solving Concurrent-Operation Conflicts -- Passing the ACID Test: Atomicity, Consistency, Isolation, and Durability -- Operating with Transactions -- Using the SET TRANSACTION statement -- Starting a transaction -- Committing a transaction…”
    Libro electrónico
  12. 252
    por Ihnatko, Andy
    Publicado 2010
    Tabla de Contenidos: “…; Chapter 10: Comic Books; Finding Free Comics Online; Loading Comics Onto Your iPhone; Longbox Digital: At Long Last, Love?; In Defense of the Comix Reader; Chapter 11: Comic Strips; Stripping For Fun; The Newspaper With Great Comics; Comic Envi; Dark Gate Comic Slurper; Chapter 12: Crosswords…”
    Libro electrónico
  13. 253
    por Kusterer, Ruth
    Publicado 2013
    Libro electrónico
  14. 254
    Publicado 2015
    “…"In January 2012, the Department of Defense (DoD) announced plans for a large-scale reduction, or drawdown, of its military force. …”
    Libro electrónico
  15. 255
    Publicado 2005
    “…More recently, it has drawn organizations such as the Defense Intelligence Agency, Navy SEALS, Federal law enforcement agencies, and national TV to seek his insights about “how to” as well as “why.” …”
    Libro electrónico
  16. 256
    Publicado 2023
    “…The Study Guide now contains more end of chapter review questions and more online practice tests. …”
    Libro electrónico
  17. 257
    Publicado 2013
    “…., the uninterrupted flow of material, information, and coordination from the initial supplier to the end customer. Therefore, it is necessary to adopt adequate measures that take into consideration not only potential losses but also potential gains (so-called speculative risks). …”
    Libro electrónico
  18. 258
    Publicado 2022
    Tabla de Contenidos: “…Monitoring and measurement -- Reporting -- Continuous improvement -- Risk frameworks -- Understand and Apply Threat Modeling Concepts and Methodologies -- Identifying threats -- Determining and diagramming potential attacks -- Performing reduction analysis -- Remediating threats -- Apply Supply Chain Risk Management (SCRM) Concepts -- Risks associated with hardware, software, and services -- Third-party assessment and monitoring -- Fourth-party risk -- Minimum security requirements -- Service-level agreement requirements -- Establish and Maintain a Security Awareness, Education, and Training Program -- Methods and techniques to present awareness and training -- Periodic content reviews -- Program effectiveness evaluation -- Chapter 4 Asset Security -- Identify and Classify Information and Assets -- Data classification -- Asset classification -- Establish Information and Asset Handling Requirements -- Provision Resources Securely -- Information and asset ownership -- Asset inventory -- Asset management -- Manage Data Life Cycle -- Data roles -- Data collection -- Data location -- Data maintenance -- Data retention -- Data remanence -- Data destruction -- Ensure Appropriate Asset Retention -- End of life -- End of support -- Determine Data Security Controls and Compliance Requirements -- Data states -- Scoping and tailoring -- Standards selection -- Data protection methods -- Chapter 5 Security Architecture and Engineering -- Research, Implement, and Manage Engineering Processes Using Secure Design Principles -- Threat modeling -- Least privilege (and need to know) -- Defense in depth -- Secure defaults -- Fail securely -- Separation of duties -- Keep it simple -- Zero trust -- Privacy by design -- Trust but verify -- Shared responsibility -- Understand the Fundamental Concepts of Security Models…”
    Libro electrónico
  19. 259
    Publicado 2021
    Tabla de Contenidos: “…3 Nostalgia for the Lost Homeland: An Anticipatory Analysis of the Cultural Turn and the Surprising Parallels between Cultural Relativism and the Insider-Phenomenological Approach -- 4 Science Is Not for the Stateless: An Anticipatory Critique of the Cultural Turn Based on the Ethnocentric Imperative -- Chapter 7 The Ethos of Transcendence (1965-1977): Decision and the Moral Imperative as Anticipatory Response to Postmodernism -- 1 The Philosophical Afterlife of The End of the World: Enzo Paci's Existentialist Historicism and the Moral Imperative Grounded in the Contemporaneity of History -- 2 Impossible Nostalgia and the Anticipatory Analysis of the Discursive Turn -- 3 The Ethos of Transcendence of Life in Value as an Anticipatory Critique of the Discursive Turn -- 3.1 Finding Value in Concreteness, Practice, and Morality Instead of Meaning, Interpretation, and Play -- 3.2 The Ethos of Transcendence as Dialectical Process: Between Loyalty to the Past and New Valorization in the Present -- Conclusion: Let the Earth Shake (Again) or Why Rebirth Must Lead to a New Crisis -- References -- Index…”
    Libro electrónico
  20. 260
    Publicado 2021
    Libro electrónico