Mostrando 281 - 300 Resultados de 417 Para Buscar 'Defensive end', tiempo de consulta: 0.11s Limitar resultados
  1. 281
    Publicado 2019
    Tabla de Contenidos: “…-- Chapter 18: Realizing the Infrastructure -- Approaching Infrastructure Realization -- Listing Key Infrastructure Considerations for AI and ML Support -- Location -- Capacity -- Data center setup -- End-to-end management -- Network infrastructure -- Security and ethics -- Advisory and supporting services -- Ecosystem fit -- Automating Workflows in Your Data Infrastructure -- Enabling an Efficient Workspace for Data Engineers and Data Scientists -- Part 5: Data as a Business -- Chapter 19: Investing in Data as a Business -- Exploring How to Monetize Data -- Approaching data monetization is about treating data as an asset -- Data monetization in a data economy -- Looking to the Future of the Data Economy -- Chapter 20: Using Data for Insights or Commercial Opportunities -- Focusing Your Data Science Investment -- Determining the Drivers for Internal Business Insights -- Recognizing data science categories for practical implementation -- Applying data-science-driven internal business insights -- Using Data for Commercial Opportunities -- Defining a data product -- Distinguishing between categories of data products -- Balancing Strategic Objectives -- Chapter 21: Engaging Differently with Your Customers -- Understanding Your Customers -- Step 1: Engage your customers -- Step 2: Identify what drives your customers -- Step 3: Apply analytics and machine learning to customer actions -- Step 4: Predict and prepare for the next step -- Step 5: Imagine your customer's future -- Keeping Your Customers Happy…”
    Libro electrónico
  2. 282
    “…Cisco NAC Appliance Enforcing Host Security with Clean Access Authenticate, inspect, remediate, and authorize end-point devices using Cisco NAC Appliance Jamey Heary, CCIE® No. 7680 Contributing authors: Jerry Lin, CCIE No. 6469, Chad Sullivan, CCIE No. 6493, and Alok Agrawal With today's security challenges and threats growing more sophisticated, perimeter defense alone is no longer sufficient. …”
    Libro electrónico
  3. 283
    “…ROSSUM, J.A.. VAN: The end of the Batavian auxiliaries as ‘national’ units. …”
    Libro electrónico
  4. 284
    Publicado 2023
    Libro electrónico
  5. 285
    por Thomas, Jacob
    Publicado 2015
    Libro electrónico
  6. 286
    Publicado 2022
    Libro electrónico
  7. 287
    Publicado 2005
    “…He also shows us how the defense system of the place developed from a modest rectangular fort built by François Martin to the Fort Louis and the large outer fortification at the time of Dupleix, until its final decay at the end of the 18th century. …”
    Libro electrónico
  8. 288
    Publicado 2023
    “…The book is packed with practical examples, tooling, and attack-defense guidelines to help you assess and improve the security of your real-life environments. …”
    Libro electrónico
  9. 289
    Publicado 2024
    “…Take charge of your cyber defenses with the power of Microsoft's unified XDR and SIEM solution. …”
    Libro electrónico
  10. 290
    Publicado 2007
    Libro electrónico
  11. 291
    Publicado 2023
    Tabla de Contenidos: “…-- The bring your own device model -- The choose your own device model -- Key considerations -- Comparing options -- Protection and governance options -- Identity and access management -- Information protection -- Device configuration -- Application management -- Storage sync options -- OneDrive for Business -- Work Folders -- Alternative EUC delivery options -- Windows 365 Cloud PC and Azure Virtual Desktop -- Enabling virtual private networks -- Publishing applications via proxy -- End user behavior analytics -- Summary -- Chapter 8: Windows 11 Security -- Introducing security posture -- Zero trust -- Defense in depth -- Ensuring hardware security -- TPM -- Microsoft Pluton security processor -- Windows Defender System Guard -- Hypervisor-protected Code Integrity -- Ensuring that we operate system security -- Introducing Secure Boot and Trusted Boot -- Exploring the Windows Security app -- Using BitLocker for encryption -- Security baselines -- Ensuring user identity security -- Windows Hello for Business -- Microsoft Defender Credential Guard -- Summary -- Chapter 9: Advanced Configurations -- Virtual desktops -- On-prem virtual desktop best practices -- VDI configurations -- The Windows Configuration Designer -- Windows 11 Kiosk Mode -- Windows Autopilot -- The Set up School PCs application -- Device lockdown -- Windows Subsystem for Linux -- Group Policy Editor -- Remote Desktop Protocol -- Windows Hello and Windows Hello for Business -- Windows Firewall with Advanced Security -- Hyper-V -- Windows Task Scheduler -- Enabling BitLocker drive encryption -- Storage Spaces Direct -- Windows Defender Application Guard -- Summary -- Chapter 10: Windows 11 21H2 and 22H2 Changes (versus Windows 10) -- New Start menu and taskbar…”
    Libro electrónico
  12. 292
    Publicado 2021
    “…Throughout the book, you'll explore industrial equipment, port and service discovery, pivoting, and much more, before finally launching attacks against systems in an industrial network. By the end of this penetration testing book, you'll not only understand how to analyze and navigate the intricacies of an industrial control system (ICS), but you'll also have developed essential offensive and defensive skills to proactively protect industrial networks from modern cyberattacks. …”
    Libro electrónico
  13. 293
    Publicado 2024
    Tabla de Contenidos: “…-- 12.1 Methodology -- 12.2 Clinical Care -- 12.3 Administrative and Operations -- 12.4 Life Sciences -- References -- Chapter 13 The Business Model for Buyers of Health AI Solutions -- 13.1 Clinical Care -- 13.2 Administrative and Operations -- 13.3 Life Sciences -- 13.4 Guide for Buyer Assessment of Health AI Solutions -- References -- Chapter 14 How to Build and Invest in the Best Health AI Companies -- 14.1 Barriers to Entry and Intellectual Property (IP) -- 14.1.1 Creating Defensible Products -- 14.2 Startups Versus Large Companies -- 14.3 Sales and Marketing -- 14.4 Initial Customers -- 14.5 Direct-to-Consumer (D2C) -- 14.6 Planning Your Entrepreneurial Health AI Journey -- 14.7 Assessment of Companies by Investors -- 14.7.1 Key Areas to Explore for a Health AI Company for Investment -- References -- Index -- EULA…”
    Libro electrónico
  14. 294
    por Edmondson, Amy C.
    Publicado 2012
    Libro electrónico
  15. 295
    por Falcone, Paul
    Publicado 2010
    Libro electrónico
  16. 296
    Publicado 2021
    “…In parallel, the radiofrequency front-end of GPR systems has been optimized in terms of compactness (e.g., smaller Tx/Rx antennas) and cost. …”
    Libro electrónico
  17. 297
    Publicado 2023
    Libro electrónico
  18. 298
    Publicado 2023
    Tabla de Contenidos: “…Intersection of cybersecurity with other disciplines -- Tool management -- Planning -- Acquisition and integration of supplier components -- Supplier capability assessment and the role of the CSIA -- The concept phase -- Item-level concept -- Cybersecurity concept -- Implications to component-level development -- Design and implementation -- Post-development requirements -- Configuration and calibration -- Weakness analysis -- Unit implementation -- Verification testing -- Validation testing -- Product release -- Cybersecurity case -- Cybersecurity assessment -- Production planning -- Operations and maintenance -- Monitoring -- Vulnerability analysis -- Vulnerability management -- Updates -- End of life -- Summary -- Chapter 6: Interactions Between Functional Safety and Cybersecurity -- A tale of two standards -- A unified versus integrated approach -- Establishing a foundational understanding of functional safety and cybersecurity -- Understanding the unique aspects and interdependencies between the two domains -- Differences between safety and security scope -- Differences in the level of interdependence between safety and security requirements -- Conflict resolution -- Extending the safety and quality supporting processes -- Planning -- Supplier management -- Concept -- Design -- Implementation -- Testing and validation -- Release -- Production -- End of life -- Creating synergies in the concept phase -- Item functions -- Item boundaries and operational environments -- Damage scenarios and hazards -- Safety and security goals -- Safety and security requirements -- Finding synergies and conflicts in the design phase -- Leveraging safety and security mechanisms -- Self-tests across safety and security -- Leveraging error detection safety mechanisms -- Eliminating inconsistencies in the error response -- Parallels in design principles…”
    Libro electrónico
  19. 299
    Publicado 2024
    Tabla de Contenidos: “…The art of security automation - fundamentals and benefits -- The benefits of cybersecurity automation -- Functions of cybersecurity automation -- Cybersecurity automation best practices -- What is an API? -- Designing end-to-end security pipelines with Python -- Integrating third-party tools for enhanced functionality -- Why automate ZAP with Python? …”
    Libro electrónico
  20. 300
    por Wahli, Ueli
    Publicado 2005
    Tabla de Contenidos: “…Apply common sense (also known as being defensive)…”
    Libro electrónico