Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 551
- Computer networks 496
- Cloud computing 484
- Application software 478
- Management 457
- Engineering & Applied Sciences 381
- Security measures 363
- Taxation 355
- Examinations 283
- Database management 281
- Computer security 268
- Data processing 248
- Economic conditions 245
- Computer Science 243
- Historia 240
- Operating systems (Computers) 240
- Law and legislation 239
- Computer programs 215
- Certification 201
- Computer software 184
- Information technology 175
- Politics and government 171
- Electronic data processing personnel 168
- Artificial intelligence 167
- Medicine 161
- History 158
- Technology: general issues 154
- Ecology 153
- Economic history 143
- Linux 140
-
2021Publicado 2015“…Learn how to monitor your large IT environments using Zabbix with this one-stop, comprehensive guide to the Zabbix world…”
Libro electrónico -
2022
-
2023Publicado 2023Tabla de Contenidos: “…-- Missing asset inventory for IoT/OT devices -- Risk and vulnerability management -- Continuous IoT/OT threat monitoring, incident response, and threat intelligence -- The installation of the MDIoT service -- Summary -- Part 3: Best Practices to Achieve Continuous Monitoring, Vulnerability Management, Threat Monitoring and Hunting, and to Align the Business Model Toward Zero Trust -- Chapter 7: Asset Inventory -- The device inventory in an on-premises console or the sensor console and the Azure portal -- The sensor console -- An on-premises console -- MDIoT in the Azure portal -- Asset visibility - IoT/OT and identifying the crown jewels -- Important devices - generating attack vectors and risk assessment reports -- Summary -- Chapter 8: Continuous Monitoring -- The protocol violation detection engine -- The policy violation detection engine -- The industrial malware detection engine -- The anomaly detection engine -- The operational engine -- Summary -- Chapter 9: Vulnerability Management and Threat Monitoring -- Risk assessment -- Summary -- Chapter 10: Zero Trust Architecture and the NIST Cybersecurity Framework -- How MDIoT helps in implementing the NIST Cybersecurity Framework -- How MDIoT helps in ZTA implementations in an OT environment -- Visibility -- Protection -- Continuous monitoring -- Validating ZTA with attack vectors -- Summary -- Index -- Other Books You May Enjoy…”
Libro electrónico -
2024
Libro electrónico -
2025
-
2026Publicado 2020“…Tools available for monitoring and managing a SQL Server database, including automating health reviews, performance checks, and much more, will also be discussed in detail. …”
Libro electrónico -
2027
-
2028
-
2029
-
2030
-
2031
-
2032
-
2033
-
2034
-
2035
-
2036
-
2037
-
2038
-
2039The metabolic pathways and environmental controls of hydrocarbon biodegradation in marine ecosystemsPublicado 2015Materias:Libro electrónico
-
2040Publicado 2018Materias:Libro electrónico