Mostrando 321 - 340 Resultados de 417 Para Buscar 'Defensive end', tiempo de consulta: 0.13s Limitar resultados
  1. 321
    por Nomani, Qamar
    Publicado 2024
    “…The book begins by unraveling the fundamentals of cloud security, debunking myths about the shared responsibility model, and introducing key concepts such as defense-in-depth, the Zero Trust model, and compliance. …”
    Libro electrónico
  2. 322
    por Rajendran, Sathiyaraj
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 Artificial Intelligence in Autonomous Vehicles-A Survey of Trends and Challenges -- 1.1 Introduction -- 1.2 Research Trends of AI for AV -- 1.3 AV-Pipeline Activities -- 1.3.1 Vehicle Detection -- 1.3.2 Rear-End Collision Avoidance -- 1.3.3 Traffic Signal and Sign Recognition -- 1.3.4 Lane Detection and Tracking -- 1.3.5 Pedestrian Detection -- 1.4 Datasets in the Literature of Autonomous Vehicles -- 1.4.1 Stereo and 3D Reconstruction -- 1.4.2 Optical Flow -- 1.4.3 Recognition and Segmentation of Objects -- 1.4.4 Tracking Datasets -- 1.4.5 Datasets for Aerial Images -- 1.4.6 Sensor Synchronization Datasets -- 1.5 Current Industry Standards in AV -- 1.6 Challenges and Opportunities in AV -- 1.6.1 Cost -- 1.6.2 Security Concerns -- 1.6.3 Standards and Regulations -- 1.7 Conclusion -- References -- Chapter 2 Age of Computational AI for Autonomous Vehicles -- 2.1 Introduction -- 2.1.1 Autonomous Vehicles -- 2.1.2 AI in Autonomous Vehicles -- 2.1.2.1 Functioning of AI in Autonomous Vehicles -- 2.2 Autonomy -- 2.2.1 Autonomy Phases -- 2.2.2 Learning Methodologies for Incessant Learning in Real-Life Autonomy Systems -- 2.2.2.1 Supervised Learning -- 2.2.2.2 Unsupervised Learning -- 2.2.2.3 Reinforcement Learning -- 2.2.3 Advancements in Intelligent Vehicles -- 2.2.3.1 Integration of Technologies -- 2.2.3.2 Earlier Application of AI in Automated Driving -- 2.3 Classification of Technological Advances in Vehicle Technology -- 2.4 Vehicle Architecture Adaptation -- 2.5 Future Directions of Autonomous Driving -- 2.6 Conclusion -- References -- Chapter 3 State of the Art of Artificial Intelligence Approaches Toward Driverless Technology -- 3.1 Introduction -- 3.2 Role of AI in Driverless Cars -- 3.2.1 What is Artificial Intelligence? …”
    Libro electrónico
  3. 323
    Publicado 2018
    Libro electrónico
  4. 324
    Publicado 2017
    Tabla de Contenidos: “…-- Revolution on the Last Mile -- 4.9 E-Government: Public Administration Goes Online -- Win Government-Wide and Agency-Deep Commitment to Specific Digital Targets -- Establish Government-Wide Coordination of Digital Investments -- Redesign Processes with the End User in Mind -- Hire and Nurture the Right Talent -- Use Big Data and Analytics to Improve Decision Making -- Protect Critical Infrastructure and Confidential Data -- Conclusion: Opportunities in the Emerging Ecosystems -- 5 What? …”
    Libro electrónico
  5. 325
    Publicado 2024
    Libro electrónico
  6. 326
    Publicado 2014
    Libro electrónico
  7. 327
    por Cochrane, Rexmond C. 1912-1986
    Publicado 1978
    Tabla de Contenidos: “…Geological Survey -- 6 The End of the Nineteenth Century -- WILLIAM BARTON ROGERS (1879-1882) -- OTHNIEL CHARLES MARSH (1883-1895) -- The Allison Commission (1884-1886) -- Debate of an Expanded Role for the Academy -- Efforts to Reorganize the Academy -- WOLCOTT GIBBS (1895-1900) -- The American Forestry Problem -- Recognition of the Academy as "High Tribunal…”
    Libro electrónico
  8. 328
    Publicado 2024
    “…Real-world case studies will illustrate the role of OSINT in anticipating, preventing, and responding to cyber threats. By the end of this book, you'll be equipped with the knowledge and tools to confidently navigate the digital landscape and unlock the power of information using OSINT. …”
    Libro electrónico
  9. 329
    por Chow, Dennis
    Publicado 2024
    “…Finally, you'll be able to customize a Detection as Code program that fits your organization's needs. By the end of the book, you'll have gained the expertise to automate nearly the entire use case development lifecycle for any enterprise. …”
    Libro electrónico
  10. 330
    Publicado 2019
    Tabla de Contenidos: “…-- 12.5 Worked Example - HALE UAV -- 12.6 Cells, Batteries, and Real Life -- 12.6.1 Cycle Life, Charge, and Discharge Rates -- 12.6.2 Payload -- 12.6.3 Avionics -- 12.6.4 Temperature -- 12.6.5 End‐of‐Life Performance -- 12.6.6 Protection -- 12.6.7 Balancing - Useful Capacity -- 12.6.8 Summary of Real‐World Issues -- 12.7 A Quick Aside on Regenerative Fuel Cells -- 12.8 So What Do We Need from Our Battery Suppliers? …”
    Libro electrónico
  11. 331
    Publicado 2018
    Tabla de Contenidos: “…-- Debugging Tips -- JSL Debugger -- Defensive Programming Strategies -- Chapter 6: The Dashboard and Application Builders -- Overview -- Combine Windows, the Dashboard Builder, and the Application Builder -- Summary -- Chapter 7: Advanced Topics -- Overview -- Building Custom Dialogs -- Navigating Reports Programmatically -- Expression Handling -- Summary -- Section 2 -- Chapter 8: Rows, Columns, and Tables -- Question 8.1: I can manipulate a data table interactively, such as by -- Question 8.2: How can I select rows where more than one condition is true? …”
    Libro electrónico
  12. 332
    Publicado 2024
    Tabla de Contenidos: “…-- Lessons Learned: How to Evaluate Digital Transformation -- The Path Forward -- Acknowledgments -- References -- Biographical Sketches -- Part III Tradespace Analysis in a Digital Engineering Ecosystem - Context and Implications -- Chapter 13 A Landscape of Trades: The Importance of Process, Ilities, and Practice -- Levels of Trades -- Defense Enterprise Levels of Concern -- System Design and Development Analytics -- Mission and Operational Effectiveness -- Common Challenges -- System Qualities: The Nonfunctional Requirements…”
    Libro electrónico
  13. 333
    Publicado 2010
    Tabla de Contenidos: “…E.5.3 DoDAF and Views and Beyond -- E.5.4 A Strategy to Use DoDAF to Document Software Architecture -- E.6 Where Architecture Documentation Ends -- E.7 A Final Word -- E.8 For Further Reading -- Appendix A: UML-Unified Modeling Language -- A.1 Introduction -- A.2 Documenting a Module View -- A.2.1 Decomposition Style -- A.2.2 Uses Style -- A.2.3 Generalization Style -- A.2.4 Layered Style -- A.2.5 Aspects Style -- A.2.6 Data Model Style -- Perspectives: UML Class Diagrams: Too Much, Too Little -- A.3 Documenting a Component-and-Connector View -- A.4 Documenting an Allocation View -- A.4.1 Deployment Style -- A.4.2 Install and Implementation Styles -- A.4.3 Work Assignment Style -- A.5 Documenting Behavior -- A.5.1 Activity Diagram -- A.5.2 Sequence Diagram -- A.5.3 Communication Diagram -- A.5.4 Timing Diagram -- A.5.5 Interaction Overview Diagram -- A.5.6 State Machine Diagram -- A.5.7 Use Case Diagram -- A.6 Documenting Interfaces -- Perspectives: UML Tools -- Appendix B: SysML-Systems Modeling Language -- B.1 Architecture Documentation -- B.2 Requirements -- B.3 Documenting a Module View -- B.4 Documenting a Component-and-Connector View -- B.5 Documenting an Allocation View -- B.6 Documenting Behavior -- B.7 Documenting Interfaces -- B.8 Summary -- Appendix C: AADL-The SAE Architecture Analysis and Design Language -- C.1 Introduction -- C.2 Documenting a Module Style -- C.3 Documenting a Component-and-Connector View -- C.4 Documenting a Deployment View -- C.5 Documenting Behavior -- C.6 Documenting Interfaces -- C.7 Summary -- Acronyms -- Glossary…”
    Libro electrónico
  14. 334
    Publicado 2024
    “…The examples in this book enable network administrators to understand the real-world application of Snort, while familiarizing them with the functionality and configuration aspects. By the end of this book, you'll be well-equipped to leverage Snort to improve the security posture of even the largest and most complex networks. …”
    Libro electrónico
  15. 335
    Publicado 2024
    Libro electrónico
  16. 336
    Publicado 2024
    “…Dedicated chapters on understanding vulnerabilities familiarize you with the threat landscape so that you can manage your server effectively, keeping bad actors at bay and configuring Moodle for optimal user and data protection. By the end of the book, you'll have gained a comprehensive understanding of Moodle's security issues and how to address them. …”
    Libro electrónico
  17. 337
    Publicado 2019
    Tabla de Contenidos: “…Chapter 16 Hiring and Staffing the Right People -- 16.1 Staffing for Reliability -- 16.1.1 A Reliability Engineering Background -- 16.1.2 HALT/HASS and ESS -- 16.1.3 Shock and Vibration Testing -- 16.1.4 Statistical Analysis -- 16.1.5 Failure Budgeting/Estimating -- 16.1.6 Failure Analysis -- 16.1.7 Conducting Reliability Training -- 16.1.8 Persuasive in Implementing New Concepts -- 16.1.9 A Degree in Engineering and/or Physics -- 16.2 Staffing for Software Engineers -- 16.3 Choosing the Wrong People for the Job -- Chapter 17 Implementing the Reliability Process -- 17.1 Reliability Is Everyone's Job -- 17.2 Formalizing the Reliability Process -- 17.3 Implementing the Reliability Process -- 17.4 Rolling Out the Reliability Process -- 17.5 Developing a Reliability Culture -- 17.6 Setting Reliability Goals -- 17.7 Training -- 17.8 Product Life Cycle Defined -- 17.8.1 Concept Phase -- 17.8.2 Design Phase -- 17.8.3 Production Phase -- 17.8.4 End‐of‐Life and Obsolescence Phase -- 17.9 Proactive and Reactive Reliability Activities -- Further Reading -- Reliability Process -- Part IV Reliability and Quality Process for Product Development -- Chapter 18 Product Concept Phase -- 18.1 Reliability Activities in the Product Concept Phase -- 18.2 Establish the Reliability Organization -- 18.3 Define the Reliability Process -- 18.4 Define the Product Reliability Requirements -- 18.5 Capture and Apply Lessons Learned -- 18.6 Mitigate Risk -- 18.6.1 Filling Out the Risk Mitigation Form -- 18.6.1.1 Identify and Analyze Risk -- 18.6.1.2 Risk Severity -- 18.6.1.3 Date Risk Is Identified -- 18.6.1.4 Risk Accepted -- 18.6.1.5 High‐Level Mitigation Plan -- 18.6.1.6 Resources Required -- 18.6.1.7 Completion Date -- 18.6.1.8 Success Metric -- 18.6.1.9 Investigate Alternative Solutions -- 18.6.2 Risk Mitigation Meeting -- Chapter 19 Design Concept Phase…”
    Libro electrónico
  18. 338
    Publicado 2017
    Libro electrónico
  19. 339
    Publicado 2018
    Libro electrónico
  20. 340
    Publicado 2018
    “…With real-life case studies, we take you on a journey through client-side attacks using Metasploit and various scripts built on the Metasploit framework. By the end of the book, you will be trained specifically on time-saving techniques using Metasploit. …”
    Libro electrónico