Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 92
- Computer security 80
- Computer networks 63
- Cloud computing 20
- Penetration testing (Computer security) 18
- Examinations 16
- History 16
- Management 16
- Certification 14
- Politics and government 14
- Data protection 13
- United States 13
- Artificial intelligence 12
- Engineering & Applied Sciences 12
- Application software 11
- Development 11
- Information technology 11
- National security 11
- Electronic data processing personnel 10
- Foreign relations 10
- Prevention 10
- Business enterprises 9
- Computer crimes 9
- Python (Computer program language) 9
- Access control 8
- Armed Forces 8
- Computers 8
- Electrical & Computer Engineering 7
- Military policy 7
- Operating systems (Computers) 7
-
281Publicado 2019Tabla de Contenidos: “…-- Chapter 18: Realizing the Infrastructure -- Approaching Infrastructure Realization -- Listing Key Infrastructure Considerations for AI and ML Support -- Location -- Capacity -- Data center setup -- End-to-end management -- Network infrastructure -- Security and ethics -- Advisory and supporting services -- Ecosystem fit -- Automating Workflows in Your Data Infrastructure -- Enabling an Efficient Workspace for Data Engineers and Data Scientists -- Part 5: Data as a Business -- Chapter 19: Investing in Data as a Business -- Exploring How to Monetize Data -- Approaching data monetization is about treating data as an asset -- Data monetization in a data economy -- Looking to the Future of the Data Economy -- Chapter 20: Using Data for Insights or Commercial Opportunities -- Focusing Your Data Science Investment -- Determining the Drivers for Internal Business Insights -- Recognizing data science categories for practical implementation -- Applying data-science-driven internal business insights -- Using Data for Commercial Opportunities -- Defining a data product -- Distinguishing between categories of data products -- Balancing Strategic Objectives -- Chapter 21: Engaging Differently with Your Customers -- Understanding Your Customers -- Step 1: Engage your customers -- Step 2: Identify what drives your customers -- Step 3: Apply analytics and machine learning to customer actions -- Step 4: Predict and prepare for the next step -- Step 5: Imagine your customer's future -- Keeping Your Customers Happy…”
Libro electrónico -
282“…Cisco NAC Appliance Enforcing Host Security with Clean Access Authenticate, inspect, remediate, and authorize end-point devices using Cisco NAC Appliance Jamey Heary, CCIE® No. 7680 Contributing authors: Jerry Lin, CCIE No. 6469, Chad Sullivan, CCIE No. 6493, and Alok Agrawal With today's security challenges and threats growing more sophisticated, perimeter defense alone is no longer sufficient. …”
Libro electrónico -
283por Impact of Empire (Organization).“…ROSSUM, J.A.. VAN: The end of the Batavian auxiliaries as ‘national’ units. …”
Publicado 2004
Libro electrónico -
284
-
285
-
286Publicado 2022Libro electrónico
-
287Publicado 2005“…He also shows us how the defense system of the place developed from a modest rectangular fort built by François Martin to the Fort Louis and the large outer fortification at the time of Dupleix, until its final decay at the end of the 18th century. …”
Libro electrónico -
288Publicado 2023“…The book is packed with practical examples, tooling, and attack-defense guidelines to help you assess and improve the security of your real-life environments. …”
Libro electrónico -
289Publicado 2024“…Take charge of your cyber defenses with the power of Microsoft's unified XDR and SIEM solution. …”
Libro electrónico -
290Publicado 2007Libro electrónico
-
291Publicado 2023Tabla de Contenidos: “…-- The bring your own device model -- The choose your own device model -- Key considerations -- Comparing options -- Protection and governance options -- Identity and access management -- Information protection -- Device configuration -- Application management -- Storage sync options -- OneDrive for Business -- Work Folders -- Alternative EUC delivery options -- Windows 365 Cloud PC and Azure Virtual Desktop -- Enabling virtual private networks -- Publishing applications via proxy -- End user behavior analytics -- Summary -- Chapter 8: Windows 11 Security -- Introducing security posture -- Zero trust -- Defense in depth -- Ensuring hardware security -- TPM -- Microsoft Pluton security processor -- Windows Defender System Guard -- Hypervisor-protected Code Integrity -- Ensuring that we operate system security -- Introducing Secure Boot and Trusted Boot -- Exploring the Windows Security app -- Using BitLocker for encryption -- Security baselines -- Ensuring user identity security -- Windows Hello for Business -- Microsoft Defender Credential Guard -- Summary -- Chapter 9: Advanced Configurations -- Virtual desktops -- On-prem virtual desktop best practices -- VDI configurations -- The Windows Configuration Designer -- Windows 11 Kiosk Mode -- Windows Autopilot -- The Set up School PCs application -- Device lockdown -- Windows Subsystem for Linux -- Group Policy Editor -- Remote Desktop Protocol -- Windows Hello and Windows Hello for Business -- Windows Firewall with Advanced Security -- Hyper-V -- Windows Task Scheduler -- Enabling BitLocker drive encryption -- Storage Spaces Direct -- Windows Defender Application Guard -- Summary -- Chapter 10: Windows 11 21H2 and 22H2 Changes (versus Windows 10) -- New Start menu and taskbar…”
Libro electrónico -
292Publicado 2021“…Throughout the book, you'll explore industrial equipment, port and service discovery, pivoting, and much more, before finally launching attacks against systems in an industrial network. By the end of this penetration testing book, you'll not only understand how to analyze and navigate the intricacies of an industrial control system (ICS), but you'll also have developed essential offensive and defensive skills to proactively protect industrial networks from modern cyberattacks. …”
Libro electrónico -
293Publicado 2024Tabla de Contenidos: “…-- 12.1 Methodology -- 12.2 Clinical Care -- 12.3 Administrative and Operations -- 12.4 Life Sciences -- References -- Chapter 13 The Business Model for Buyers of Health AI Solutions -- 13.1 Clinical Care -- 13.2 Administrative and Operations -- 13.3 Life Sciences -- 13.4 Guide for Buyer Assessment of Health AI Solutions -- References -- Chapter 14 How to Build and Invest in the Best Health AI Companies -- 14.1 Barriers to Entry and Intellectual Property (IP) -- 14.1.1 Creating Defensible Products -- 14.2 Startups Versus Large Companies -- 14.3 Sales and Marketing -- 14.4 Initial Customers -- 14.5 Direct-to-Consumer (D2C) -- 14.6 Planning Your Entrepreneurial Health AI Journey -- 14.7 Assessment of Companies by Investors -- 14.7.1 Key Areas to Explore for a Health AI Company for Investment -- References -- Index -- EULA…”
Libro electrónico -
294
-
295
-
296Publicado 2021“…In parallel, the radiofrequency front-end of GPR systems has been optimized in terms of compactness (e.g., smaller Tx/Rx antennas) and cost. …”
Libro electrónico -
297Publicado 2023Libro electrónico
-
298Publicado 2023Tabla de Contenidos: “…Intersection of cybersecurity with other disciplines -- Tool management -- Planning -- Acquisition and integration of supplier components -- Supplier capability assessment and the role of the CSIA -- The concept phase -- Item-level concept -- Cybersecurity concept -- Implications to component-level development -- Design and implementation -- Post-development requirements -- Configuration and calibration -- Weakness analysis -- Unit implementation -- Verification testing -- Validation testing -- Product release -- Cybersecurity case -- Cybersecurity assessment -- Production planning -- Operations and maintenance -- Monitoring -- Vulnerability analysis -- Vulnerability management -- Updates -- End of life -- Summary -- Chapter 6: Interactions Between Functional Safety and Cybersecurity -- A tale of two standards -- A unified versus integrated approach -- Establishing a foundational understanding of functional safety and cybersecurity -- Understanding the unique aspects and interdependencies between the two domains -- Differences between safety and security scope -- Differences in the level of interdependence between safety and security requirements -- Conflict resolution -- Extending the safety and quality supporting processes -- Planning -- Supplier management -- Concept -- Design -- Implementation -- Testing and validation -- Release -- Production -- End of life -- Creating synergies in the concept phase -- Item functions -- Item boundaries and operational environments -- Damage scenarios and hazards -- Safety and security goals -- Safety and security requirements -- Finding synergies and conflicts in the design phase -- Leveraging safety and security mechanisms -- Self-tests across safety and security -- Leveraging error detection safety mechanisms -- Eliminating inconsistencies in the error response -- Parallels in design principles…”
Libro electrónico -
299Publicado 2024Tabla de Contenidos: “…The art of security automation - fundamentals and benefits -- The benefits of cybersecurity automation -- Functions of cybersecurity automation -- Cybersecurity automation best practices -- What is an API? -- Designing end-to-end security pipelines with Python -- Integrating third-party tools for enhanced functionality -- Why automate ZAP with Python? …”
Libro electrónico -
300por Wahli, UeliTabla de Contenidos: “…Apply common sense (also known as being defensive)…”
Publicado 2005
Libro electrónico