Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 92
- Computer security 80
- Computer networks 63
- Cloud computing 20
- Penetration testing (Computer security) 18
- Examinations 16
- History 16
- Management 16
- Certification 14
- Politics and government 14
- Data protection 13
- United States 13
- Artificial intelligence 12
- Engineering & Applied Sciences 12
- Application software 11
- Development 11
- Information technology 11
- National security 11
- Electronic data processing personnel 10
- Foreign relations 10
- Prevention 10
- Business enterprises 9
- Computer crimes 9
- Python (Computer program language) 9
- Access control 8
- Armed Forces 8
- Computers 8
- Electrical & Computer Engineering 7
- Military policy 7
- Operating systems (Computers) 7
-
261
-
262Publicado 2022“…Work with one of the most efficient open-source FreeBSD-based firewall and routing solutions to secure your network with ease Key Features Learn end-to-end OPNsense firewall implementation and management Defend against attacks by leveraging third-party plugins such as Nginx and Sensei Grasp hands-on examples and labs to become proficient with OPNsense firewall Book Description OPNsense is one of the most powerful open source firewalls and routing platforms available. …”
Libro electrónico -
263Publicado 2014Libro electrónico
-
264
-
265por Scholz, James A.Tabla de Contenidos: “…Setting the Foundation Building the Enterprise Infrastructure Security Categorization Applied to Information Types Security Categorization Applied to Information Systems Minimum Security Requirements Specifications for Minimum Security Requirements Security Control Selection Infrastructure Security Model Components Developing the Security Architecture Model Dataflow Defense Data in Transit, Data in Motion, and Data at Rest Network Client-Side Security Server-Side Security Strategy vs. …”
Publicado 2013
Libro electrónico -
266
-
267Publicado 2023Tabla de Contenidos: “…Propositions/acts passed by other countries -- Special regulations for children and minority groups -- Promoting equality for minority groups -- Educational initiatives -- International AI initiatives and cooperative actions -- Next steps for trustworthy AI -- Proposed solutions and improvement areas -- Summary -- Further reading -- Part 2: Building Blocks and Patterns for a Next-Generation AI Ecosystem -- Chapter 4: Privacy Management in Big Data and Model Design Pipelines -- Technical requirements -- Designing privacy-proven pipelines -- Big data pipelines -- Architecting model design pipelines -- Incremental/continual ML training and retraining -- Scaling defense pipelines -- Enabling differential privacy in scalable architectures -- Designing secure microservices -- Vault -- Cloud security architecture -- Developing in a sandbox environment -- Managing secrets in cloud orchestration services -- Monitoring and threat detection -- Summary -- Further reading -- Chapter 5: ML Pipeline, Model Evaluation, and Handling Uncertainty -- Technical requirements -- Understanding different components of ML pipelines -- ML tasks and algorithms -- Uncertainty in ML -- Types of uncertainty -- Quantifying uncertainty -- Uncertainty in regression tasks -- Uncertainty in classification tasks -- Tools for benchmarking and quantifying uncertainty -- The Uncertainty Baselines library -- Keras-Uncertainty -- Robustness metrics -- Summary -- References -- Chapter 6: Hyperparameter Tuning, MLOps, and AutoML -- Technical requirements -- Introduction to AutoML -- Introducing H2O AutoML -- Understanding Amazon SageMaker Autopilot -- The need for MLOps -- TFX - a scalable end-to-end platform for AI/ML workflows -- Understanding Kubeflow -- Katib for hyperparameter tuning -- Vertex AI -- Datasets -- Training and experiments in Vertex AI -- Vertex AI Workbench -- Summary…”
Libro electrónico -
268
-
269Publicado 2015Libro electrónico
-
270Publicado 2017Tabla de Contenidos: “…THE APPLICATION PERFORMANCE MANAGEMENT ECOSYSTEM -- INSTRUMENTATION AND DATA SOURCES SUPPORTING APPLICATION PERFORMANCE MANAGEMENT -- ENTERPRISE MANAGEMENT ASSOCIATES APPLICATION MANAGEMENT SEMANTIC MODEL -- TOOLS, DATA, AND ANALYTICS, AND THE END-TO-END PERSPECTIVE -- TAXONOMY OF PRODUCT CATEGORIES SUPPORTING APPLICATION PERFORMANCE MANAGEMENT -- THE CONFIGURATION MANAGEMENT DATABASE SYSTEM -- DATA CENTER INSTRUMENTATION -- APPLICATION DISCOVERY AND DEPENDENCY MAPPING -- APPLICATION CODE ANALYTICS -- APPLICATION INTEGRATION ANALYTICS -- NETWORKED APPLICATION MANAGEMENT -- ADVANCED IT ANALYTICS LAYER -- USER EXPERIENCE MANAGEMENT -- INTRODUCTION -- TYPES OF USER EXPERIENCE MANAGEMENT SOLUTIONS -- SUMMARY -- KEY TAKEAWAYS -- 13 - MANAGING CONTAINERIZED APPLICATIONS -- INTRODUCTION -- WHY CONTAINERIZE? …”
Libro electrónico -
271Publicado 2012Tabla de Contenidos: “…-- Isolating the Problem -- Distinguishing Threat Objectives -- Responding to Actionable Intelligence -- Cyber Threat Acquisition -- Distinguishing Between Threats -- Processing Collected Intelligence -- Determining Available Engagement Tactics -- Engaging the Threat -- Within Your Enterprise -- External to Your Enterprise -- Working with Law Enforcement -- To Hack or Not to Hack (Back) -- To What End? -- Understanding Lines (Not to Cross) -- Conclusion -- Chapter 13: Implementation and Validation -- Vetting Your Operations -- Vetting Deceptions -- Vetting Perceptual Consistency in a Deception -- Vetting Engagements -- Putting This Book to Use with Aid from Professionals -- How to Evaluate Success -- Getting to the End Game -- Conclusion -- Glossary -- Index…”
Libro electrónico -
272Publicado 2018Tabla de Contenidos: “…. -- There's more -- Sending an email notification dynamically to the end user -- Getting ready -- How to do it... -- Accepting the new email parameter in the RegisterUser function -- Retrieving the UserProfile information in the SendNotifications trigger -- How it works... -- There's more... -- Implementing email logging in Azure Blob Storage -- How to do it... -- How it works... -- Modifying the email content to include an attachment -- Getting ready -- How to do it…”
Libro electrónico -
273Publicado 2017Tabla de Contenidos: “…. -- See also -- Sending an email notification to the end user dynamically -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Implementing email logging in the Blob storage -- How to do it... -- How it works... -- Modifying the email content to include an attachment -- Getting ready -- How to do it... -- Customizing the log file name using IBinder interface -- Adding an attachment to the email…”
Libro electrónico -
274Publicado 2017“…"At the end of World War Two, Americans clamored for their troops to come home. …”
Libro -
275Publicado 2016“…Due to its simplified design, which is adapted from nature, the Data Vault 2.0 standard helps prevent typical data warehousing failures. " Building a Scalable Data Warehouse " covers everything one needs to know to create a scalable data warehouse end to end, including a presentation of the Data Vault modeling technique, which provides the foundations to create a technical data warehouse layer. …”
Libro electrónico -
276Publicado 2023Tabla de Contenidos: “…7.5 Artificial Intelligence in Distributed Operating Systems -- 7.6 Current Progress -- 7.7 Quantum Artificial Intelligence -- 7.8 Conclusion -- References -- 8 Techno-Nationalism and Techno-Globalization: A Perspective from the National Security Act -- 8.1 Introduction -- 8.2 Conclusion -- Acknowledgement -- References -- 9 Quantum Computing Based on Cybersecurity -- 9.1 Introduction -- 9.2 Preliminaries -- 9.3 Threat Landscape -- 9.4 Defensive Measurements, Countermeasures, and Best Practises -- 9.5 Conclusion -- References -- 10 Quantum Cryptography for the Future Internet and the Security Analysis -- 10.1 Introduction -- 10.2 Related Works -- 10.3 Preliminaries -- 10.4 Quantum Cryptography for Future Internet -- 10.5 Conclusion -- References -- 11 Security Aspects of Quantum Cryptography -- 11.1 Introduction -- 11.2 Literature Survey -- 11.3 Quantum Key Distribution -- 11.4 Cryptography -- 11.5 Quantum Cryptography with Faint Laser Pulses -- 11.6 Eavesdropping -- 11.7 Conclusion -- References -- 12 Security Aspects of Quantum Machine Learning: Opportunities, Threats and Defenses -- 12.1 Introduction -- 12.2 Quantum Computing Basics -- 12.3 Security Applications -- 12.4 Quantum Machine Learning -- 12.5 Conclusion -- References -- 13 Cyber Forensics and Cybersecurity: Threat Analysis, Research Statement and Opportunities for the Future -- 13.1 Introduction -- 13.2 Background -- 13.3 Scope of this Work -- 13.4 Methodology and Analysis of Simulation Results -- 13.5 Quantum-Based Cybersecurity and Forensics -- 13.6 Conclusion and Future Works -- References -- 14 Quantum Computing: A Software Engineering Approach -- 14.1 Introduction -- 14.2 Background of Research Area -- 14.3 Why Cryptography? …”
Libro electrónico -
277
-
278Publicado 2022Tabla de Contenidos: “…Internet Usage Policy -- E-mail Usage Policy -- Social Media Analysis -- Clean Desk Policy -- Bring-Your-Own-Device (BYOD) Policy -- Privacy Policy -- Due Care and Due Diligence -- Due Process -- Incident Response Policies and Procedures -- Security Awareness and Training -- Diversity of Training Techniques -- Security Policy Training and Procedures -- User Training -- Role-Based Training -- Continuing Education -- Compliance with Laws, Best Practices, and Standards -- User Habits -- Training Metrics and Compliance -- Standard Operating Procedures -- Third-Party Risk Management -- Vendors -- Supply Chain -- Business Partners -- Interoperability Agreements -- Service Level Agreement (SLA) -- Memorandum of Understanding (MOU) -- Measurement Systems Analysis (MSA) -- Business Partnership Agreement (BPA) -- Interconnection Security Agreement (ISA) -- NDA -- End of Service Life (EOSL) -- End of Life (EOL) -- Chapter 3 Review -- Chapter 4 The Role of People in Security -- People-A Security Problem -- Social Engineering -- Tools -- Principles (Reasons for Effectiveness) -- Defenses -- Attacks -- Impersonation -- Phishing -- Smishing -- Vishing -- Spam -- Spam over Internet Messaging (SPIM) -- Spear Phishing -- Whaling -- Pharming -- Dumpster Diving -- Shoulder Surfing -- Tailgating/Piggybacking -- Eliciting Information -- Prepending -- Identity Fraud -- Invoice Scams -- Credential Harvesting -- Reverse Social Engineering -- Reconnaissance -- Hoax -- Watering Hole Attack -- Typo Squatting -- Influence Campaigns -- Poor Security Practices -- Password Selection -- Shoulder Surfing -- Piggybacking -- Dumpster Diving -- Installing Unauthorized Hardware and Software -- Data Handling -- Physical Access by Non-Employees -- Clean Desk Policies -- People as a Security Tool -- Security Awareness -- Security Policy Training and Procedures -- Chapter 4 Review…”
Libro electrónico -
279Publicado 2011Tabla de Contenidos: “…Horvath -- Problems at both ends? Neil Kaplan -- Law, para-regulatory texts and people in international arbitration : predictability or fureur reglementaire? …”
Libro electrónico -
280