Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 77
- Management 56
- Computer networks 30
- Engineering & Applied Sciences 26
- Business & Economics 24
- Computer security 23
- Security measures 22
- Finance 21
- Leadership 21
- Business 20
- Historia 20
- Social aspects 20
- Computer science 19
- Data processing 18
- Information technology 18
- Development 17
- Examinations 17
- Application software 15
- Computer Science 15
- Electronic data processing 15
- Politics and government 15
- Prevention 15
- Economic aspects 14
- Certification 13
- Social conditions 13
- International business enterprises 12
- Success in business 12
- Technological innovations 12
- Big data 11
- Data mining 11
-
741
-
742
-
743
-
744Publicado 2014“…Taken together, they also function as a general working hypothesis about the role of constitutions in the establishment and maintenance of a domestically and internationally imbalanced status quo, of which we are the present-day inheritors. …”
Libro -
745
-
746
-
747
-
748Publicado 2019Electrónico
-
749Publicado 2013Libro electrónico
-
750Publicado 2011Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico
-
751Publicado 2017Tabla de Contenidos: “…-- Trading Ranges -- Prior Major Highs and Lows -- Concentrations of Relative Highs and Relative Lows -- Trend Lines, Channels, and Internal Trend Lines -- Price Envelope Bands -- Chapter 9: Chart Patterns -- One-Day Patterns -- Continuation Patterns -- Top and Bottom Formations -- Notes -- Chapter 10: Is Chart Analysis Still Valid? …”
Libro electrónico -
752Publicado 2023Libro electrónico
-
753
-
754
-
755
-
756Publicado 2015Tabla de Contenidos: “…Conclusion -- References -- Chapter 5 - Internal intelligence sources -- Information in This Chapter: -- Introduction -- Asset, vulnerability, and configuration management -- Configuration management -- Network logging -- The trouble with SIEMs -- The power of SIEMs -- Managed security service providers -- Access control -- Network monitoring -- Conclusion -- References -- Chapter 6 - External intelligence sources -- Information in This Chapter: -- Introduction -- Brand monitoring versus intelligence -- Asset, vulnerability, and configuration management -- Network logging -- IP addresses as pivot points -- Domain names as pivot points -- File hashes as pivot points -- Pivoting from MSSP alerts -- Network monitoring -- YARA -- Protecting against zero-day attacks -- Incident response and intelligence -- Collaborative research into threats -- Conclusion -- ReferenceS -- Chapter 7 - Fusing internal and external intelligence -- Information in This Chapter: -- Introduction -- Security awareness training -- Customer security awareness training -- OpenIOC, CyBOX, STIX, and TAXII -- OpenIOC -- CyBOX -- STIX and TAXII -- Threat intelligence management platforms -- TIMPs as a Rosetta Stone -- Big data security analytics -- Hadoop -- Conclusion -- Reference -- Chapter 8 - CERTs, ISACs, and intelligence-sharing communities -- Information in This Chapter: -- Introduction -- CERTs and CSIRTs -- CERT/Coordination Center -- US-CERT and country-level CSIRTs -- Company-level CSIRTs -- ISACs -- The ISACs -- Intelligence-sharing communities -- Conclusion -- References -- Chapter 9 - Advanced intelligence capabilities -- Information in This Chapter: -- Introduction -- Malware analysis -- Why it is a bad idea -- Setting up a malware lab -- Planning the network -- Virtual machines versus cloning -- Getting the malware to the lab -- Malware tools -- System tools -- Sandbox…”
Libro electrónico -
757Publicado 2017Libro electrónico
-
758
-
759
-
760