Mostrando 1 - 8 Resultados de 8 Para Buscar 'Front Line Defenders', tiempo de consulta: 0.09s Limitar resultados
  1. 1
    Publicado 2012
    Libro electrónico
  2. 2
    Publicado 2020
    Tabla de Contenidos: “…Climate change claim on behalf of New Zealand's indigenous Maori peoples / Michael Sharp, Nicole Smith and Tania Te Whenua -- 21 France: L'affaire du siècle : the story of a mass mobilization for climate / Marie Toussaint -- Part IV: Coming generations on the front line -- 22. Introduction to Part IV / Claude Henry -- 23. …”
    Libro electrónico
  3. 3
    por Knapp, Eric D.
    Publicado 2024
    Tabla de Contenidos: “…-- Standards and best practices for risk management -- Methodologies for assessing risk within industrial control systems -- Security tests -- Security audits -- Security and vulnerability assessments -- Establishing a testing and assessment methodology -- Tailoring a methodology for industrial networks -- Theoretical versus physical tests -- On-line versus off-line physical tests -- System characterization -- Data collection…”
    Libro electrónico
  4. 4
    Publicado 2022
    Tabla de Contenidos: “…Security monitoring and audit trails using Azure Monitor -- Best practices for using Azure Monitor -- Security monitoring and approval process using Customer Lockbox -- Best practices for using Customer Lockbox -- Security monitoring and audit trail using Google Cloud Logging -- Security monitoring using Google Security Command Center -- Security monitoring and approval process using Access Transparency and Access Approval -- Conducting threat detection and response -- Using Amazon Detective for threat detection -- Using Amazon GuardDuty for threat detection -- Security monitoring using Microsoft Defender for Cloud -- Using Azure Sentinel for threat detection -- Using Azure Defender for threat detection -- Using Google Security Command Center for threat detection and prevention -- Conducting incident response and digital forensics -- Conducting incident response in AWS -- Conducting incident response in Azure -- Conducting incident response in Google Cloud Platform -- Summary -- Chapter 7: Applying Encryption in Cloud Services -- Technical requirements -- Introduction to encryption -- Symmetric encryption -- Asymmetric encryption -- Best practices for deploying KMSes -- AWS Key Management Service (KMS) -- AWS CloudHSM -- Azure Key Vault -- Azure Dedicated/Managed HSM -- Google Cloud Key Management Service (KMS) -- Best practices for deploying secrets management services -- AWS Secrets Manager -- Google Secret Manager -- Best practices for using encryption in transit -- IPSec -- Transport Layer Security (TLS) -- Best practices for using encryption at rest -- Object storage encryption -- Block storage encryption -- Full database encryption -- Row-level security -- Encryption in use -- AWS Nitro Enclaves -- Azure Confidential Computing -- Google Confidential Computing -- Summary -- Section 3: Threats and Compliance Management…”
    Libro electrónico
  5. 5
    Publicado 2007
    Libro electrónico
  6. 6
    Publicado 2008
    Libro electrónico
  7. 7
    “…Williams, and Abdul Aslam have fought on the front lines of cybersecurity against advanced persistent threats to government, military, and business entities…”
    Libro electrónico
  8. 8
    Publicado 2013
    Libro electrónico