Mostrando 271,401 - 271,420 Resultados de 272,211 Para Buscar 'IS*', tiempo de consulta: 0.59s Limitar resultados
  1. 271401
    Publicado 2023
    “…The research papers included in this Special Issue will undoubtedly contribute to progress towards the objective of more electric flights…”
    Libro electrónico
  2. 271402
    Publicado 2022
    “…., as a continuing education and also to remedy the gaps in their initial training, besides being able to better understand the issues related to learning difficulties, thus allowing them to help their students. …”
    Libro electrónico
  3. 271403
    Publicado 2023
    “…In this regard, this Special Issue is established to explore precisely how the newly emerged social manufacturing paradigm influences the trends of mass customization and the configuration/operation patterns during order delivery, and exactly how the advanced information technologies can boost the development and application of social manufacturing…”
    Libro electrónico
  4. 271404
    Publicado 2023
    “…These are vital parameters in a multiagency approach to disasters and major incidents, in which several organizations with diverse backgrounds, knowledge, limitations, and abilities need to work together. The aim of this issue is to bring researchers and practitioners together to discuss and describe issues and solutions regarding the evidence-based management of victims of disasters and major incidents, with a particular focus on triage, treatment, and transportation. …”
    Libro electrónico
  5. 271405
    Publicado 2023
    “…The correct interpretation of analytical data, especially to elucidate the extent of impairment induced by a certain substance, and "old" issues related to the correct interpretation of post-mortem data (given the impossibility of translating the therapeutic ranges defined in vivo) represent further areas of research and debate among scientists. …”
    Libro electrónico
  6. 271406
    por Ruppel, Samantha
    Publicado 2023
    “…Die Autorin Samantha Ruppel ist Leiterin der African-German Leadership Academy am German Institute of Development and Sustainability und assoziierte Forscherin an der Hessischen Stiftung Friedens- und Konfliktforschung. …”
    Libro electrónico
  7. 271407
    por Biekart, Kees 1958-
    Publicado 2023
    “…Kees Biekart is Associate Professor at the International Institute of Social Studies (ISS) of Erasmus University (The Netherlands). He focuses on social movements, NGOs, civil society, civic-driven change, and participatory action research. …”
    Libro electrónico
  8. 271408
    Publicado 2023
    “…Understand the promising links between deep learning and tabular data, and when a deep learning approach is or isn’t appropriate. Apply promising research and unique modeling approaches in real-world data contexts. …”
    Libro electrónico
  9. 271409
    Publicado 2023
    “…You will have the knowledge and skills required to do the following: Architect, engineer, integrate, and implement secure solutions across complex environments to support a resilient enterprise Use monitoring, detection, incident response, and automation to proactively support ongoing security operations in an enterprise environment Apply security practices to cloud, on-premises, endpoint, and mobile infrastructure, while considering cryptographic technologies and techniques Consider the impact of governance, risk, and compliance requirements throughout the enterprise The 4 courses in the CASP series covers the following topics: Architecture Analyze security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network Services Deperimeterization/zero trust Merging of networks from various organizations Software-defined networking Analyze organizational requirements to determine proper infrastructure security design Scalability Resiliency Automation Performance Containerization Virtualization Content delivery network Caching Integrate software applications securely into an enterprise architecture Baseline and templates Software assurance Considerations of integrating enterprise applications Integrating security into development life cycle Implement data security techniques for securing enterprise architecture Data loss prevention Data loss detection Data classification, labeling, and tagging Obfuscation Anonymization Encrypted versus unencrypted Data life cycle Data inventory and mapping Data integrity management Data storage, backup, and recovery Analyze security requirements and objectives to provide appropriate authentication and authorization controls Credential management Password policies Federation Access control Protocols Multifactor authentication One-time password Hardware root of trust Single sign-on JavaScript Object Notation web token Attestation and identity proofing Implement secure cloud and virtualization solutions Virtualization strategies Provisioning and deprovisioning Middleware Metadata and tags Deployment models and considerations Hosting models Service models Cloud provider limitations Extending appropriate on-premises controls Storage models Explain how cryptography and public key infrastructure support security objectives and requirements Privacy and confidentiality requirements Integrity requirements Non-repudiation Compliance and policy requirements Common cryptography use cases Common Public key infrastructure use cases Explain impact of emerging technologies on enterprise security and privacy Artificial intelligence Machine learning Quantum computing Blockchain Homomorphic encryption Secure multiparty computation Distributed consensus Big Data Virtual reality Three Dimetional printing Passwordless authentication Nano technology Deep learning Biometric impersonation Operations Perform threat management activities Intelligence types Actor types Threat actor properties Intelligence collection methods Frameworks Analyze indicators of compromise and formulate an appropriate response Indicators of compromise Response Rules Perform vulnerability management activities Vulnerability scans Security Content Automation Protocol Self-assessment or third party vendor assessment Patch management Information sources Use appropriate vulnerability assessment and penetration testing methods and tools Methods Tools Dependency management Requirements Analyze vulnerabilities and recommend risk mitigations Vulnerabilities Inherently vulnerable system or application Attacks Use processes to reduce risk Proactive and detection Security data analytics Preventive Application control Security automation Physical security Given an incident, implement appropriate response Event classifications Triage event Preescalation tasks Incident response process Specific response playbooks Communication plan Stakeholder management Explain importance of forensic concepts Legal versus internal corporate purposes Forensic process Integrity preservation Cryptanalysis Steganalysis Use forensic analysis tools File carving tools Binary analysis tools Analysis tools Imaging tools Hashing utilities Live collection versus post-mortem tools Engineering and Cryptography Apply secure configurations to enterprise mobility Managed configurations Deployment scenarios Security considerations Configure and implement endpoint security controls Hardening techniques Processes Mandatory access control Trustworthy computing Compensating controls Explain security considerations impacting specific sectors and operational technologies Embedded ICS/supervisory control and data acquisition Protocols Sectors Explain how cloud technology adoption impacts organizational security Automation and orchestration Encryption configuration Logs Monitoring configurations Key ownership and location Key life-cycle management Backup and recovery methods Infrastructure versus serverless computing Application virtualization Software-defined networking Misconfigurations Collaboration tools Storage configurations Cloud access security broker Given a business requirement, implement appropriate Public key infrastructure solution Public key infrastructure hierarchy Certificate types Certificate usages/profiles/templates Extensions Trusted providers Trust model Cross-certification Configure profiles Life-cycle management Public and private keys Digital signature Certificate pinning Certificate stapling Certificate signing requests Online Certificate Status Protocol versus certificate revocation list HTTP Strict Transport Security Given a business requirement, implement appropriate cryptographic protocols and algorithms Hashing Symmetric algorithms Symetric Complexity Contruction Asymmetric algorithms Protocols Elliptic curve cryptography Forward secrecy Authenticated encryption with associated data Key stretching Troubleshoot issues with cryptographic implementations Implementation and configuration issues Keys Governance, Risk, and Compliance Given a set of requirements, apply appropriate risk strategies Risk assessment Risk handling techniques Risk types Risk management life cycle Risk tracking Risk appetite Risk tolerance Policies and security practices Explain importance of managing and mitigating vendor risk Shared responsibility model Vendor lock-in and vendor lockout Vendor viability Meeting client requirements Support availability Geographical considerations Supply chain visibility Incident reporting requirements Source code escrows Ongoing vendor assessment tools Third-party dependencies Technical considerations Explain compliance frameworks and legal considerations, and IR organizational impact Security concerns of integrating diverse industries Data considerations Geographic considerations Third-party attestation of compliance Regulations, accreditations, and standards Legal considerations Contract and agreement types Explain importance of business continuity and disaster recovery concepts Business impact analysis Privacy impact assessment Disaster recovery plan Business continuity plan Incident response plan Testing plans…”
    Video
  10. 271410
    Publicado 2023
    “…By leveraging the author's expertise, you'll explore different challenges that can lead to project failure or cost/time overruns, along with customized solutions to maneuver past those issues for a successful outcome. By the end of the book, you'll be able to identify potential issues that can negatively impact the delivery of the project and make design decisions that will prevent any potential negative impact on the design and functionality of the system at go-live stage. …”
    Libro electrónico
  11. 271411
    Publicado 2023
    “…What you will learn Create clear and concise Vitest unit tests helping the implementation of Svelte components Use Playwright and Cucumber.js to develop end-to-end tests that simulate user interactions and test the functionality of your application Leverage component mocks to isolate and test individual components Write unit tests for a range of Svelte framework features Explore effective refactoring techniques to keep your Svelte application code and test suites clean Build high-quality Svelte applications that are well-tested, performant, and resilient to changes Who this book is for This book is an essential guide for Svelte developers seeking to enhance their development process by learning the TDD workflow and its application. …”
    Libro electrónico
  12. 271412
    por Campbell, Robert K.
    Publicado 2023
    “…Presenting operationally relevant issues and solutions supported by sound theory, this invaluable resource: Presents leading models, theories, and frameworks for situational awareness and decision making, including FEMA Community Lifelines Highlights complex challenges in different operating contexts and complicating factors such as stress and diversity, equity, and inclusion of stakeholders Emphasizes engaging the whole community to enhance preparedness and facilitate the decision-making process to chart a clear path to recovery Contains practical exercises designed to strengthen crisis leadership and decision-making skills Includes numerous case studies and example strategies, objectives, and scenarios Crisis-ready Leadership: Building Resilient Organizations and Communities is required reading for all those with leadership and decision-making responsibilities before, during, and after crisis events, including emergency managers, police and fire department leaders, C-suite executives, government agency and military leaders, public health directors, and industrial facility health, safety, security, and environmental directors…”
    Libro electrónico
  13. 271413
    por Trometer, August
    Publicado 2007
    “…Optimizing Your Website for Mobile Safari (Digital Short Cut) August Trometer ISBN-10: 0-321-54401-3 ISBN-13: 978-0-321-54401-8 Table of Contents Chapter 1: iPhone Basics Chapter 2: Getting Standard Chapter 3: Getting Compatible Chapter 4: Getting Optimized Chapter 5: Using Rich Media Chapter 6: How-To's and Other Quick Tips Appendix: Resources About the Author Written by August Trometer, an Indianapolis-based web developer, you'll learn the ins and outs of making your website work on the iPhone and iPod touch by someone who's been there himself. …”
    Libro electrónico
  14. 271414
    Publicado 2005
    “…Part III addresses design issues in adding services to an IPSec VPN such as voice and multicast. …”
    Libro electrónico
  15. 271415
    por Lingamallu, Phani Kumar
    Publicado 2023
    “…With a fair mix of concepts and examples, this book helps you gain hands-on experience in implementing end-to-end AWS observability in your applications and navigating and troubleshooting performance issues with the help of use cases. You'll also learn best practices and guidelines, such as how observability relates to the Well-Architected Framework. …”
    Libro electrónico
  16. 271416
    por Longley, Neil. author
    Publicado 2013
    “…The multi-disciplinary nature of the issue should make the book of interest to scholars in a number of fields, including strategic management, sport management, and economics. …”
    Libro electrónico
  17. 271417
    Publicado 1996
    “…The popularity of the "female page" is examined as a playful literary and theatrical way of confronting, avoiding, or merely exploiting issues such as the place of women in a patriarchal culture and the representation of women on stage. …”
    Libro electrónico
  18. 271418
    Publicado 2023
    “…Dieser dritte Band in der »Kriegelstein-Trilogie« ist eine Bereicherung für jede fotografische Buchsammlung…”
    Libro electrónico
  19. 271419
    Publicado 2023
    “…As Karen Casey puts it, "Progress is guaranteed. Perfection isn't expected."…”
    Grabación no musical
  20. 271420
    Publicado 2024
    “…That way, you get back to editing your images fast. This isn't a book of theory, full of confusing jargon and detailed multi-step concepts. …”
    Libro electrónico