Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 92
- Computer security 80
- Computer networks 63
- Cloud computing 20
- Penetration testing (Computer security) 18
- Examinations 16
- History 16
- Management 16
- Certification 14
- Politics and government 14
- Data protection 13
- United States 13
- Artificial intelligence 12
- Engineering & Applied Sciences 12
- Application software 11
- Development 11
- Information technology 11
- National security 11
- Electronic data processing personnel 10
- Foreign relations 10
- Prevention 10
- Business enterprises 9
- Computer crimes 9
- Python (Computer program language) 9
- Access control 8
- Armed Forces 8
- Computers 8
- Electrical & Computer Engineering 7
- Military policy 7
- Operating systems (Computers) 7
-
161Publicado 2023“…Use this practical guide to understand the concepts behind Intelligent Multimode Security Systems (IMSS) and how to implement security within an IMSS system to improve the robustness of the devices and of the end-to-end solution. There are nearly half a billion active IMSS cameras globally, with over 100 million added annually. …”
Libro electrónico -
162Publicado 2024Libro electrónico
-
163
-
164
-
165
-
166Publicado 2023“…By the end of this social engineering book, you'll be proficient in identifying cyberattacks and safeguarding against the ever-growing threat of social engineering with your defensive arsenal. …”
Libro electrónico -
167
-
168por Jonas, GilbertTabla de Contenidos: “…Negro determination : the NAACP's assault on Jim Crow places it in mortal combat with the Ku Klux Klan and the White Citizens Councils -- Leading the quest for political power : James Weldon Johnson leads the fight against lynching, then Walter White defeats President Hoover's Supreme Court nominee -- Comes the revolution : the struggle between the NAACP and the Communist Party USA : White and Wilkins thwart the communist attempts to win the loyalty of American Negroes -- World Wwar II and its consequences for race : the NAACP presses FDR to utilize Negro troops and open up defense industry jobs to Negroes with Mrs. Roosevelt's help --…”
Publicado 2005
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
169Publicado 2010Tabla de Contenidos: “…Thinking beyond means-ends analysis: the role of impulse-driven human creativity in the design of artificially intelligent systems Dongming Xu Yonggui Wang Sukanto Bhattacharya University of Queensland 11. …”
Libro electrónico -
170Publicado 2023“…Send files and messages with end-to-end encryption. Secure your home network and keep your smart devices from spying on you. …”
Libro electrónico -
171
-
172Publicado 2024“…The curriculum is thoughtfully structured and covers a wide range of topics, making it accessible and engaging for learners at various levels. By the end of this course, you'll possess a comprehensive understanding of network security and defense, preparing you to tackle real-world challenges in the field…”
Video -
173Publicado 2020“…In addition to this, you'll be equipped with the tools you need to ensure compliance and continuous monitoring through security operations. By the end of this book, you'll have developed a full understanding of the processes and tools involved in securing and hardening your Windows environment. …”
Libro electrónico -
174
-
175Publicado 2024Tabla de Contenidos: “…-- 4.2 Die Natural Law Defense -- 4.3 Kritische Reflexion -- Kapitel 5 Möglichkeiten und Grenzen der theoretischen Theodizee: Eine Zwischenreflexion im Anschluss an Immanuel Kant -- 5.1 Das Ende philosophischer Theodizee? …”
Libro electrónico -
176Publicado 2020Tabla de Contenidos: “…Gavin -- Part I: Applied History and Future Scenarios -- Ends of Epidemics / Jeremy A. Greene and Dora Vargha -- The World after COVID: A Perspective from History / Margaret MacMillan -- Future Scenarios: "We are all failed states, now" / Philip Bobbitt -- Part II: Global Public Health and Mitigation Strategies -- Make Pandemics Lose Their Power / Tom Inglesby -- Origins of the COVID-19 Pandemic and the Path Forward: A Global Public Health Policy Perspective / Lainie Rutkow -- Bioethics in a Post- COVID World: Time for Future- Facing Global Health Ethics / Jeffrey P. …”
Libro electrónico -
177por Fritsch, WinstonTabla de Contenidos: “…s Role in World Affairs: The Old Perception and the End of the Dream""; ""Brazilâ€?s Emerging Regional Role in the Hemisphere""; ""The U.S. …”
Publicado 1992
Capítulo de libro electrónico -
178por Natarajan, Jay. author, Bruchez, Rudi. author, Coles, Michael. author, Shaw, Scott. author, Cebollero, Miguel. authorTabla de Contenidos: “…Declarative Languages""; ""SQL Basics""; ""Statements""; ""Databases""; ""Transaction Logs""; ""Schemas""; ""Tables""; ""Views""; ""Indexes""; ""Stored Procedures""; ""User-Defined Functions""; ""SQL CLR Assemblies""; ""Elements of Style""; ""Whitespace""; ""Naming Conventions""; ""One Entry, One Exit""; ""Defensive Coding""; ""The SELECT * Statement""…”
Publicado 2015
Libro electrónico -
179Publicado 2015Tabla de Contenidos: “…The early thinking of Karl PolanyiContemporary criticisms of neoliberalism; Neoliberalism as Exception; Neoliberalism: The Case of Israel; The End of History; The Death of Neoliberalism?; Neo-Marxian Theoretical Alternatives to Neoliberalism; Transnational capitalism; Empire; Chapter Summary; Discussion Questions; Additional Readings; Notes; Chapter 5 Global Political Structures and Processes; On Political Processes and Flows; The Nation-State; Threats to the nation-state; In Defense of the Nation-State; "Imagined Community"; Changes in Global Nation-State Relations…”
Libro electrónico -
180Publicado 2006Tabla de Contenidos: “…E-MAIL ABUSE AND POLICY-BASED SOLUTIONSCONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; E-Commerce Vulnerabilities; INTRODUCTION; E-SHOPLIFTING; CREDIT CARD PAYMENTS; PROTECTING CREDIT CARD PAYMENTS; ONLINE AUCTIONS; NONREPUDIATION; TRUST AND REPUTATION; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; Hacking Techniques in Wired Networks Hacking; INTRODUCTION; PRINCIPLES OF HACKING; ATTACKS AGAINST THE INTERNET INFRASTRUCTURE; ATTACKS AGAINST END SYSTEMS OF THE INTERNET; ATTACKS AGAINST ENTERPRISE NETWORK SYSTEMS; CONCLUSION; ACKNOWLEDGEMENTS; GLOSSARY…”
Libro electrónico