Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 92
- Computer security 80
- Computer networks 63
- Cloud computing 20
- Penetration testing (Computer security) 18
- Examinations 16
- History 16
- Management 16
- Certification 14
- Politics and government 14
- Data protection 13
- United States 13
- Artificial intelligence 12
- Engineering & Applied Sciences 12
- Application software 11
- Development 11
- Information technology 11
- National security 11
- Electronic data processing personnel 10
- Foreign relations 10
- Prevention 10
- Business enterprises 9
- Computer crimes 9
- Python (Computer program language) 9
- Access control 8
- Armed Forces 8
- Computers 8
- Electrical & Computer Engineering 7
- Military policy 7
- Operating systems (Computers) 7
-
361por Barraud, Dany“…However, in their general conception, the construction methods of the rampart, the details of organisation of defensive structures (positioning of towers, small number of gates, absence of ditches, abundance or rarety of reused building materials), these fortified towns do not represent individual cases but take their place within a system of defence created at different dates between the gallic empire and the end of roman domination in south-west Gaul…”
Publicado 2021
Electrónico -
362por Gregg, Michael“…Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. …”
Publicado 2014
Libro electrónico -
363Publicado 2015“…The requirement that NATO may now have to build a much more robust deterrence and defense posture in Eastern Europe would require the Army and the Air Force to revisit their planning assumptions that have minimized U.S. military commitments to the region since the end of the Cold War…”
Libro electrónico -
364Publicado 2023“…Whether you work in a large enterprise, a government agency, or a small business, the principles and strategies presented in this book are adaptable and scalable to suit your specific needs. By the end of this book, you’ll have all the tools and guidance needed to fortify your organization’s defenses and expand your capabilities as an information security practitioner…”
Libro electrónico -
365Publicado 2022“…By the end of this book, you will have learned how to efficiently analyze samples, investigate suspicious activity, and build innovative solutions to handle malware incidents…”
Libro electrónico -
366Publicado 2023“…Geospatial analysis is used in almost every domain you can think of, including defense, farming, and even medicine. In this special 10th anniversary edition, you'll embark on an exhilarating geospatial analysis adventure using Python. …”
Libro electrónico -
367Publicado 2024“…You'll learn about essential components such as data masking, secure data retrieval, and prompt defense to ensure a robust AI integration into Salesforce systems. …”
Vídeo online -
368Publicado 2019“…We will create a virtual network with two secure LANs, a DMZ and a public Internet connection with robust security features. By the end of this course, you will be confident using pfSense to secure physical and virtual networks using the industry's most exciting network perimeter defense system…”
-
369Publicado 2022“…Wrapping up with post-exploitation strategies, you'll be able to go deeper and keep your access. By the end of this book, you'll be well-versed in identifying vulnerabilities within your clients' environments and providing the necessary insight for proper remediation…”
Libro electrónico -
370Publicado 2022“…By the end of the book, you'll have gained the knowledge you need to take the SC-900 certification exam and implement solutions in real-life scenarios. …”
Libro electrónico -
371Publicado 2019“…By the end of this book, you'll be ready to develop intelligent systems that can detect unusual and suspicious patterns and attacks, thereby developing strong network security defenses using AI. …”
Libro electrónico -
372por Farwell, James P.“…"Power and Persuasion" stands apart for its critical evaluation of the concepts, doctrines, and activities that the US Department of Defense and Department of State employ for the art of strategic communication including psychological operations, military information support operations, propaganda, and public diplomacy. …”
Publicado 2012
Libro -
373Publicado 2017“…This book will also keep you updated with the latest security techniques and methods that can be directly applied to scan, test, hack, and secure networks and systems with Metasploit. By the end of this book, you'll get the hang of bypassing different defenses, after which you'll learn how hackers use the network to gain access into different systems. …”
Libro electrónico -
374Publicado 2022“…Build your organization's cyber defense system by effectively applying digital forensics, incident management, and investigation techniques to real-world cyber threats. …”
Libro electrónico -
375por McBreen, Pete“…Today’s software development projects are often based on the traditional software engineering model, which was created to develop large-scale defense projects. Projects that use this antiquated industrial model tend to take longer, promise more, and deliver less. …”
Publicado 2002
Libro electrónico -
376Publicado 2016“…By the end of this book you will be able to turn Raspberry Pi 3 into a hacking arsenal to leverage the most popular open source toolkit, Kali Linux 2.0. …”
Libro electrónico -
377por Wong, Reginald“…Lastly, you will learn how to analyse other types of files that contain code. By the end of this book, you will have the confidence to perform reverse engineering. …”
Publicado 2018
Libro electrónico -
378Publicado 2021“…You'll learn the concepts of zero trust methodology, shared responsibility model, and defense in depth. After that, you'll cover Microsoft Identity and Access Management Solutions. …”
Video -
379Publicado 2022“…Next, you will understand security concepts, defense-in-depth, and key security services such as Network Security Groups and Azure Firewall, as well as security operations tooling such as Azure Security Center and Azure Sentinel. …”
Grabación no musical -
380Publicado 2023“…Finally, in addition to various incident response activities, the audiobook will address malware analysis and demonstrate how you can proactively use your digital forensic skills in threat hunting. By the end of this audiobook, you'll be able to investigate and report unwanted security breaches and incidents in your organization. …”
Grabación no musical