Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 5
- Security measures 3
- Application software 1
- Chief executive officers 1
- Cloud computing 1
- Cryptology 1
- Data encryption (Computer science) 1
- Data protection 1
- Environmental degradation 1
- Environmental economics 1
- Executive ability 1
- Framleiðslustjórnun 1
- Mac OS 1
- Malware (Computer software) 1
- Mælingar 1
- Organizational change 1
- Process control 1
- Security 1
- Sustainable development 1
- Tölvuöryggi 1
-
1
-
2Publicado 2020Tabla de Contenidos: “…Climate change claim on behalf of New Zealand's indigenous Maori peoples / Michael Sharp, Nicole Smith and Tania Te Whenua -- 21 France: L'affaire du siècle : the story of a mass mobilization for climate / Marie Toussaint -- Part IV: Coming generations on the front line -- 22. Introduction to Part IV / Claude Henry -- 23. …”
Libro electrónico -
3por Knapp, Eric D.Tabla de Contenidos: “…-- Standards and best practices for risk management -- Methodologies for assessing risk within industrial control systems -- Security tests -- Security audits -- Security and vulnerability assessments -- Establishing a testing and assessment methodology -- Tailoring a methodology for industrial networks -- Theoretical versus physical tests -- On-line versus off-line physical tests -- System characterization -- Data collection…”
Publicado 2024
Libro electrónico -
4Publicado 2022Tabla de Contenidos: “…Security monitoring and audit trails using Azure Monitor -- Best practices for using Azure Monitor -- Security monitoring and approval process using Customer Lockbox -- Best practices for using Customer Lockbox -- Security monitoring and audit trail using Google Cloud Logging -- Security monitoring using Google Security Command Center -- Security monitoring and approval process using Access Transparency and Access Approval -- Conducting threat detection and response -- Using Amazon Detective for threat detection -- Using Amazon GuardDuty for threat detection -- Security monitoring using Microsoft Defender for Cloud -- Using Azure Sentinel for threat detection -- Using Azure Defender for threat detection -- Using Google Security Command Center for threat detection and prevention -- Conducting incident response and digital forensics -- Conducting incident response in AWS -- Conducting incident response in Azure -- Conducting incident response in Google Cloud Platform -- Summary -- Chapter 7: Applying Encryption in Cloud Services -- Technical requirements -- Introduction to encryption -- Symmetric encryption -- Asymmetric encryption -- Best practices for deploying KMSes -- AWS Key Management Service (KMS) -- AWS CloudHSM -- Azure Key Vault -- Azure Dedicated/Managed HSM -- Google Cloud Key Management Service (KMS) -- Best practices for deploying secrets management services -- AWS Secrets Manager -- Google Secret Manager -- Best practices for using encryption in transit -- IPSec -- Transport Layer Security (TLS) -- Best practices for using encryption at rest -- Object storage encryption -- Block storage encryption -- Full database encryption -- Row-level security -- Encryption in use -- AWS Nitro Enclaves -- Azure Confidential Computing -- Google Confidential Computing -- Summary -- Section 3: Threats and Compliance Management…”
Libro electrónico -
5
-
6
-
7por Donaldson, Scott E., author, Siegel, Stanley. author, Williams, Chris K. author, Aslam, Abdul. author“…Williams, and Abdul Aslam have fought on the front lines of cybersecurity against advanced persistent threats to government, military, and business entities…”
Publicado 2015
Libro electrónico -
8