Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 92
- Computer security 80
- Computer networks 63
- Cloud computing 20
- Penetration testing (Computer security) 18
- Examinations 16
- History 16
- Management 16
- Certification 14
- Politics and government 14
- Data protection 13
- United States 13
- Artificial intelligence 12
- Engineering & Applied Sciences 12
- Application software 11
- Development 11
- Information technology 11
- National security 11
- Electronic data processing personnel 10
- Foreign relations 10
- Prevention 10
- Business enterprises 9
- Computer crimes 9
- Python (Computer program language) 9
- Access control 8
- Armed Forces 8
- Computers 8
- Electrical & Computer Engineering 7
- Military policy 7
- Operating systems (Computers) 7
-
101por Amada, GeraldTabla de Contenidos: “…; chapter 20. how do my defense mechanisms work?; chapter 21. when should i end psychotherapy?…”
Publicado 2010
Libro electrónico -
102Publicado 2018Libro electrónico
-
103
-
104Publicado 2015Tabla de Contenidos: “…'A Statistical Time Series Approach to the Use of Mark by Matthew and Luke' -- Andris Abakuks7. 'Matthew's Ending and the Genesis of Acts: The Farrer Hypothesis and the Composition of Luke's Two Volumes' -- Jeffrey Peterson8. …”
Libro -
105Publicado 2014Libro electrónico
-
106por Davis, Paul K., 1943-Tabla de Contenidos: “…Chapter Six - A Second Example: Ballistic Missile Defense Defining Ballistic Missile Defense Missions; A Parameterized Scenario Space for BMD; CONOPS and Critical Components; Framework for Portfolio Analysis; Shortfalls, Opportunities, and Surpluses for the BMD Program; Identifying, Evaluating, and Comparing BMD Options; Chapter Seven - Conclusions and Next Steps; Conclusions; Next Steps; Appendix A - Joint Capability Areas; Appendix B - Implications for Systems Engineering and Modeling and Simulation; Appendix C - RAND's Portfolio-Analysis Tools; End notes; Bibliography…”
Publicado 2008
Libro electrónico -
107por Sherwood, LauraleeTabla de Contenidos: “…The Blood. 12. Body Defenses. 13. The Respiratory System. 14. The Urinary System. 15. …”
Publicado 2010
Libro -
108
-
109Publicado 2004“…For the later periods, investigation has proceeded on the Great Defensive Wall of Parthian age, and on the large edifice in the lower city…”
Libro electrónico -
110por Porche, Isaac, 1968-Tabla de Contenidos: “…Avoid Long Lists of Capabilities to Define IO Arguments Can Be Made That IO Is Everything; Discussion of Possible Ends to Be Sought; The List of Relevant Capabilities Remains Too Long to Be Useful; Pros and Cons of a Narrow Set of Ends; Information Tasks as Potential Ends; Influence as an End; Command-and-Control Warfare; A Proposed Definition of Information Operations; Proposed Definition; IIO and ITO: Compartmentalizing the Definition; CHAPTER FIVE How Electronic Warfare Overlaps with Other Areas; Analysis of Electronic Warfare and Electromagnetic Spectrum Operations…”
Publicado 2013
Libro electrónico -
111por Kummel, GerhardTabla de Contenidos: “…Change and Persistence in Patterns of Civil-Military Relations in Germany before and after the End of the Cold War -- Conscription in Germany Today: A Military Necessity or a Mere Symbol? …”
Publicado 2009
Libro electrónico -
112por Wilson, John K., 1969-Tabla de Contenidos: “…10 Making Crime a Progressive Issue11 Winning the Culture Wars; 12 Equality for Every Child: Reforming Education; 13 Fighting the Union Label: Labor on the Left; 14 The Race for Justice: Defending Affirmative Action; 15 Universal Health Care; 16 Greener Politics: Progressives and the Environment; 17 Why We Need Welfare and How to Change It; 18 Ending Corporate Welfare As We Know It; 19 The Defense Industry: How to Protect America byCutting the Military; 20 Saving Social Security; 21 The Future of Progressives: Generation Left; About the Author…”
Publicado 2001
Libro electrónico -
113Publicado 2019“…Debates within the participants in these projects are also focused. The book ends with a defense of liberal democracy, exploring departures from it in contemporary Hungary and Poland, but also the US"…”
Libro -
114Publicado 2020Tabla de Contenidos: “…Visas -- Help from Eleanor Roosevelt and Other Americans -- Three Crucial Meetings on December 27, -- 1940 Correspondence -- Eva's Other Activities before the End of -- Further Pleas to Help Otto and Other Refugees -- Otto's Wait for Visa in Southern France -- Otto's Escape to America -- Eva's Defense of Her Decision to Marry Otto -- Part VI. …”
Libro electrónico -
115Practical cyber intelligence how action-based intelligence can be an effective response to incidentsPublicado 2018Tabla de Contenidos: “…Security Configuration Management - Discovery and Detection -- Security Configuration Management - Risk Mitigation -- Security Configuration Management - Security State Analysis -- Security Configuration Management - Data Exposure and Sharing -- Prelude - integrating like services -- Integrating cyber intel from different services -- Overview - red team methodology -- Red team - testing methods -- White box -- Gray box -- Black box -- Red team constraints -- Red team - graphical representation -- Data integration challenges -- The end user perspective -- The service level perspective - cyber intelligence - Data Exposure and Sharing -- The SOC perspective -- Capability Maturity Model - InfoSec and cyber intel -- Capability Maturity Model - InfoSec and cyber intel - initial phase -- Capability Maturity Model - InfoSec and cyber intel - Phase A -- Capability Maturity Model - InfoSec and cyber intel - Phase B -- Capability Maturity Model - InfoSec and cyber intel - Phase C -- Collaboration + Capability = Active Defense -- Summary -- Chapter 9: Driving Cyber Intel -- The gap -- Another set of eyes -- The logic -- Event -- Incident -- Mapping events and incidents to InfoSec capabilities -- Capability Maturity Model - security awareness -- Capability Maturity Model - security awareness Phase - Initial -- Capability Maturity Model - security awareness - Phase A -- Capability Maturity Model - security awareness - Phase B -- Capability Maturity Model - security awareness - Phase C -- Capability Maturity Model - security awareness - Phase C + -- Just another day part 1 -- Summary -- Chapter 10: Baselines and Anomalies -- Setting up camp -- Baselines and anomalies -- Continuous monitoring - the challenge -- Part 1 -- Part 2 -- Part 3 -- Capability Maturity Model - continuous monitoring overview -- Level 1 - phase A -- Level 1 - phase B -- Level 1 - phase C.…”
Libro electrónico -
116por Landale, AnthonyTabla de Contenidos: “…2.8 Working with Scapegoating2.9 Negotiation Skills; 2.10 Facilitator Support; PART THREE Creative Facilitation; 3.1 One-to-One Facilitation; 3.2 Powering Up Self-Confidence; 3.3 Facilitating without Words; 3.4 Defense Patterns; 3.5 Consultancy Skills; 3.6 Working in the Here and Now; 3.7 Creative Facilitation; 3.8 Imaginal Work; 3.9 Using Stories to Facilitate Learning; 3.10 Endings…”
Publicado 2008
Libro electrónico -
117
-
118Publicado 2019Tabla de Contenidos: “…Visas Help from Eleanor Roosevelt and Other Americans Three Crucial Meetings on December 27,1940 1940 Correspondence Eva's Other Activities before the End of 1940 Further Pleas to Help Otto and Other Refugees Otto's Wait for Visa in Southern France Otto's Escape to America Eva's Defense of Her Decision to Marry Otto Part VI. …”
Libro electrónico -
119
-
120Publicado 2018Libro electrónico