Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 92
- Computer security 80
- Computer networks 63
- Cloud computing 20
- Penetration testing (Computer security) 18
- Examinations 16
- History 16
- Management 16
- Certification 14
- Politics and government 14
- Data protection 13
- United States 13
- Artificial intelligence 12
- Engineering & Applied Sciences 12
- Application software 11
- Development 11
- Information technology 11
- National security 11
- Electronic data processing personnel 10
- Foreign relations 10
- Prevention 10
- Business enterprises 9
- Computer crimes 9
- Python (Computer program language) 9
- Access control 8
- Armed Forces 8
- Computers 8
- Electrical & Computer Engineering 7
- Military policy 7
- Operating systems (Computers) 7
-
341Publicado 2023Libro electrónico
-
342Publicado 2018Libro electrónico
-
343
-
344por Mascarenhas, Oswald A. J.Tabla de Contenidos: “…Virtue as the Theory of Ends…”
Publicado 2019
Electrónico -
345Publicado 2018Libro electrónico
-
346por Tripathi, PadmeshTabla de Contenidos: “…Cover -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 Elevating Surveillance Integrity-Mathematical Insights into Background Subtraction in Image Processing -- 1.1 Introduction -- 1.2 Background Subtraction -- 1.3 Mathematics Behind Background Subtraction -- 1.4 Gaussian Mixture Model -- 1.4.1 Gaussian Mixture Model (GMM) Algorithm for Background Subtraction -- 1.4.2 Gaussian Mixture Model (GMM) Algorithm - A Simple Example -- 1.5 Principal Component Analysis -- 1.6 Applications -- 1.6.1 Military Surveillance -- 1.6.2 Visual Observation of Animals in Forests -- 1.6.3 Marine Surveillance -- 1.6.4 Defense Surveillance Systems -- 1.7 Conclusion -- References -- Chapter 2 Machine Learning and Artificial Intelligence in the Detection of Moving Objects Using Image Processing -- 2.1 Introduction -- 2.2 Moving Object Detection -- 2.3 Envisaging the Object Detection -- 2.3.1 Filtering Algorithm -- 2.3.2 Identification of Object Detection in Bad Weather Circumstance -- 2.3.3 Color Clustering -- 2.3.4 Dangerous Animal Detection -- 2.3.5 UAV Video End-of-Line Detection and Tracking in Live Traffic -- 2.3.5.1 Contextual Detection -- 2.3.5.2 Calculation of Location of a Car -- 2.3.6 Estimation of Crowd -- 2.3.7 Parking Lot Management -- 2.3.8 Public Automatic Anomaly Detection Systems -- 2.3.9 Modification of Robust Principal Component Analysis -- 2.3.10 Logistics Automation -- 2.3.11 Detection of Criminal Behavior in Humans -- 2.3.12 UAV Collision Avoidance and Control System -- 2.3.13 An Overview of Potato Growth Stages -- 2.4 Conclusion -- References -- Chapter 3 Machine Learning and Imaging-Based Vehicle Classification for Traffic Monitoring Systems -- 3.1 Introduction -- 3.2 Methods -- 3.2.1 Data Preparation -- 3.2.2 Model Training -- 3.2.3 Hardware and Software Configuration -- 3.3 Result -- 3.4 Conclusion…”
Publicado 2024
Libro electrónico -
347
-
348
-
349
-
350Publicado 2024Libro electrónico
-
351por Finocchiaro, Maurice A.“…And an essential thread of the subsequent controversy has been the emergence of many arguments claiming that his condemnation was right, as well as defenses of Galileo from such criticisms. The book’s particular yet overarching thesis is that today the proper defense of Galileo can and should have the reasoned, critical, and fair-minded character which his own defense of Copernicus had…”
Publicado 2010
Libro electrónico -
352Publicado 2023“…By the end of this book, you will have a deep understanding of Microsoft 365 Defender, and how to protect and respond to security threats. …”
Libro electrónico -
353por Woods, Kevin M.“…During the 2003 war that ended Saddam Hussein's regime, coalition forces captured thousands of hours of secret recordings of meetings, phone calls, and conferences. …”
Publicado 2011
Libro -
354por Peterson, John, 1937-“…John Peterson discusses metaphysics and the essence-existence distinction and presents what he believes is Aquinas' strongest theistic proof. He offers a new defense Aquinas' idea of natural ends based on the distinction between immanent and transient change. …”
Publicado 2013
Libro -
355Publicado 2017“…New York Times bestselling author Mark Murphy returns, with the latest science and techniques for delivering tough messages without causing anger or defensiveness. The greatest workplaces have one thing in common; they speak the truth! …”
Grabación no musical -
356por Foltz, Kevin“…This is a unique approach to end-to-end security and fills a niche in the market. …”
Publicado 2020
Libro electrónico -
357por Alexandre Bidon, Danièle“…The city developed as a result of contact with both Burgundian and Germanic culture and by the end of the 14th century had become a commercial and religious centre. …”
Publicado 2021
Electrónico -
358por Liska, Allan“…He systematically identifies today's most widespread security mistakes and vulnerabilities--and offers realistic solutions you can begin implementing right away.Coverage Includes: Quantifying security risks and "selling" security throughout the organization Defining security models that reflect your company's philosophy Translating your security model into effective, enforceable policies Making your routers and switches your first lines of network defense Controlling access via authentication, authorization, and accounting Configuring secure VPNs and remote access Securing wireless LANs and WANs Establishing a DMZ between your network and the public Internet Securing Web/application servers, DNS servers, email servers, and file/print servers Implementing effective day-to-day network security administration, monitoring, and logging Responding to attacks: detect, isolate, halt, report, and prosecute Liska integrates these techniques in an end-to-end case study, showing you how to redesign an insecure enterprise network for maximum security--one step at a time…”
Publicado 2003
Libro electrónico -
359A CISO Guide to Cyber Resilience A How-To Guide for Every CISO to Build a Resilient Security ProgramPublicado 2024“…By the end of this book, you'll be equipped with the knowledge and skills necessary to build, manage, and improve a resilient cybersecurity program, ensuring your organization remains protected against evolving threats. …”
Libro electrónico -
360Publicado 2014“…This report proposes a more enterprise-oriented approach to measuring ACS manpower requirements by synthesizing combatant commander operational plans, Defense Planning Scenarios, functional area deployment rules, and subject-matter expert input. …”
Libro electrónico