Mostrando 141 - 160 Resultados de 417 Para Buscar 'Defensive end', tiempo de consulta: 0.10s Limitar resultados
  1. 141
    Publicado 2020
    “…Tools such as sqlmap and others are then covered, helping you understand how to use them effectively to perform SQL injection attacks. By the end of this book, you will be well-versed with SQL injection, from both the attack and defense perspective. …”
    Libro electrónico
  2. 142
    Publicado 2019
    Tabla de Contenidos: “…Psychiatry and the Individual in Interwar Germany -- Russian Psychiatry beyond Foucault: Violence, Humanism, and Psychiatric Power in the Russian Empire at the End of the Nineteenth and Early Twentieth Century -- Patients and Observers: Specific Data Collection Methods in an Interwar Transylvanian Hospital -- Contemporary Criticism and Defenses of Psychiatry’s Moral-Medical Kinds in Light of Foucault’s Lectures on the Abnormal -- V. …”
    Libro electrónico
  3. 143
    Publicado 2024
    Tabla de Contenidos: “…John Witte and the uses of the law / Nomos, agape, and a sacramental jurisprudence / When Catholicism was part of the common law : the influence of the Catholic intellectual tradition / The reception of the medieval Ius Commune in the protestant reformation / Church laws as a means of ecumenical dialogue / Bearing witness to truth : Christianity at the crossroads of race and law / Human dignity and the Christian foundations of law and liberty / Calvinism and the logic of self-defense : rights, religion, and revolution / Scriptural interpretation and the New England tradition of rights after the glorious revolution : the example of Cotton Mather / Religious liberty in the Thirteenth Colony / "A wall of separation" : church-state relations in America and beyond / The shifting law and logic behind mandatory bible reading in American public schools / An integrative approach to government religious speech / Freedom of the church : religious autonomy in a secular age / Obeying conscience : the commands and costs of resisting the law / The legal basis of the sacramental theology of marriage / Law, religion, and education / Christianity, child well-being, and corporal punishment / To ratify or not to ratify the UN Convention on the Rights of the Child : gains and losses / Faith-based family law arbitration in secular democracies-is the end near? …”
    Libro electrónico
  4. 144
    Publicado 1984
    Tabla de Contenidos: “…""Possible Consequences Beyond the First Year"" ""RISK FACTORS""; ""Characteristics of Bereaved Individuals""; ""Relationship to the Deceased""; ""Nature of the Death""; ""Risk Factors Appearing After the Death""; ""CONCLUSIONS AND RECOMMENDATIONS""; ""REFERENCES""; ""Adults' Reactions to Bereavement""; ""CHAPTER 3 Adults' Reactions to Bereavement ""; ""THE PHENOMENOLOGY OF GRIEF""; ""Changes in Emotions and Thought Processes""; ""Behavioral Changes""; ""Interpersonal and Social Changes""; ""Physical Complaints""; ""THE END OF THE BEREAVEMENT PROCESS""; ""Favorable Outcomes""…”
    Libro electrónico
  5. 145
    Publicado 2020
    Libro electrónico
  6. 146
    Publicado 2024
    Libro
  7. 147
    Publicado 2007
    “…This security primer provides unique insight into the entire range of Cisco security solutions, showing what each element is capable of doing and how all of the pieces work together to form an end-to-end Self-Defending Network. While other books tend to focus on individual security components, providing in-depth configuration guidelines for various devices and technologies, Self-Defending Networks instead presents a high-level overview of the entire range of technologies and techniques that comprise the latest thinking in proactive network security defenses. …”
    Libro electrónico
  8. 148
    por Weissman, Fred
    Publicado 2016
    Libro electrónico
  9. 149
    Publicado 2014
    Tabla de Contenidos: “…8 Challenges and Countermeasures8.1 Real-Time Challenges; 8.1.1 Persisting False Sense of Security; 8.1.2 Myths About Malware Infections and Protection; 8.2 Countermeasures and Future Developments; 8.2.1 Building a Strong Response Plan; 8.2.2 End System Security; 8.2.3 User Centric Security; 8.2.4 Network Level Security; 8.2.5 Security Assessment and Patch Management; 8.2.6 Next-generation Defenses; References; 9 Conclusion; References; Abbreviations…”
    Libro electrónico
  10. 150
    Publicado 2014
    Libro electrónico
  11. 151
    por Stueben, Michael. author
    Publicado 2018
    Libro electrónico
  12. 152
    Publicado 2022
    “…Build and mature a threat hunting team capable of repeatably stalking and trapping advanced adversaries in the darkest parts of an enterprise Key Features Learn foundational concepts for effective threat hunting teams in pursuit of cyber adversaries Recognize processes and requirements for executing and conducting a hunt Customize a defensive cyber framework needed to grow and mature a hunt team Book Description Threat hunting is a concept that takes traditional cyber defense and spins it onto its head. …”
    Libro electrónico
  13. 153
    Publicado 2013
    Libro electrónico
  14. 154
    Publicado 2017
    Tabla de Contenidos: “…Chapter 10: An Integrated Framework for Hierarchical Internal Controls -- 10.1 Internal Control Principles and the Integration of Internal Control, Risk Management, and Governance -- 10.2 Methodological Basis -- 10.3 Examples -- 10.4 Incorporation of Internal Control Principles into the Control Loop Approach -- 10.5 Summary of Observations -- Note -- References -- Appendix A: Acronyms -- Appendix B: Definitions -- About the Companion Website -- About the Author -- Index -- End User License Agreement…”
    Libro electrónico
  15. 155
    Publicado 2023
    “…You'll also develop an understanding of the evolving cybersecurity compliance landscape with regulations such as GDPR and CCPA, and gain insights into the global efforts in curbing cyber threats. By the end of this book, you'll have a firm grasp on the modern malware lifecycle and how you can employ data science within cybersecurity to ward off new and evolving threats. …”
    Libro electrónico
  16. 156
    Publicado 2023
    “…What's more, there are chapter-end self-assessment questions for you to test all that you've learned, as well as two book-end practice quizzes to really give you a leg up. …”
    Libro electrónico
  17. 157
    por WICKHAM, HADLEY
    Publicado 2017
    Libro electrónico
  18. 158
    Publicado 2017
    “…The book's final two chapters greatly draw on Lua and TShark, the command-line interface of Wireshark. By the end of the book you will gain the following: -Master the basics of Wireshark -Explore the virtual w4sp-lab environment that mimics a real-world network -Gain experience using the Debian-based Kali OS among other systems -Understand the technical details behind network attacks -Execute exploitation and grasp offensive and defensive activities, exploring them through Wireshark -Employ Lua to extend Wireshark features and create useful scripts To sum up, the book content, labs and online material, coupled with many referenced sources of PCAP traces, together present a dynamic and robust manual for information security professionals seeking to leverage Wireshark…”
    Libro electrónico
  19. 159
    por Gordon, John, 1956-
    Publicado 2008
    Libro electrónico
  20. 160
    Publicado 2015
    Libro electrónico