Mostrando 741 - 760 Resultados de 1,115 Para Buscar 'One Day International', tiempo de consulta: 0.12s Limitar resultados
  1. 741
    Publicado 2018
    Libro electrónico
  2. 742
    Publicado 2024
    Libro electrónico
  3. 743
    Publicado 2009
    Libro
  4. 744
    Publicado 2014
    “…Taken together, they also function as a general working hypothesis about the role of constitutions in the establishment and maintenance of a domestically and internationally imbalanced status quo, of which we are the present-day inheritors. …”
    Libro
  5. 745
    por Benedict, Mark Quentin
    Publicado 2022
    Libro electrónico
  6. 746
    Publicado 2011
    Libro electrónico
  7. 747
    Publicado 2020
    Libro electrónico
  8. 748
    Publicado 2019
    Electrónico
  9. 749
    Publicado 2013
    Libro electrónico
  10. 750
  11. 751
    Publicado 2017
    Tabla de Contenidos: “…-- Trading Ranges -- Prior Major Highs and Lows -- Concentrations of Relative Highs and Relative Lows -- Trend Lines, Channels, and Internal Trend Lines -- Price Envelope Bands -- Chapter 9: Chart Patterns -- One-Day Patterns -- Continuation Patterns -- Top and Bottom Formations -- Notes -- Chapter 10: Is Chart Analysis Still Valid? …”
    Libro electrónico
  12. 752
    Publicado 2023
    Libro electrónico
  13. 753
    por Fuller, David
    Publicado 2021
    Libro electrónico
  14. 754
    Publicado 2014
    Libro electrónico
  15. 755
    por Bourne, Kelly C.
    Publicado 2014
    Libro electrónico
  16. 756
    Publicado 2015
    Tabla de Contenidos: “…Conclusion -- References -- Chapter 5 - Internal intelligence sources -- Information in This Chapter: -- Introduction -- Asset, vulnerability, and configuration management -- Configuration management -- Network logging -- The trouble with SIEMs -- The power of SIEMs -- Managed security service providers -- Access control -- Network monitoring -- Conclusion -- References -- Chapter 6 - External intelligence sources -- Information in This Chapter: -- Introduction -- Brand monitoring versus intelligence -- Asset, vulnerability, and configuration management -- Network logging -- IP addresses as pivot points -- Domain names as pivot points -- File hashes as pivot points -- Pivoting from MSSP alerts -- Network monitoring -- YARA -- Protecting against zero-day attacks -- Incident response and intelligence -- Collaborative research into threats -- Conclusion -- ReferenceS -- Chapter 7 - Fusing internal and external intelligence -- Information in This Chapter: -- Introduction -- Security awareness training -- Customer security awareness training -- OpenIOC, CyBOX, STIX, and TAXII -- OpenIOC -- CyBOX -- STIX and TAXII -- Threat intelligence management platforms -- TIMPs as a Rosetta Stone -- Big data security analytics -- Hadoop -- Conclusion -- Reference -- Chapter 8 - CERTs, ISACs, and intelligence-sharing communities -- Information in This Chapter: -- Introduction -- CERTs and CSIRTs -- CERT/Coordination Center -- US-CERT and country-level CSIRTs -- Company-level CSIRTs -- ISACs -- The ISACs -- Intelligence-sharing communities -- Conclusion -- References -- Chapter 9 - Advanced intelligence capabilities -- Information in This Chapter: -- Introduction -- Malware analysis -- Why it is a bad idea -- Setting up a malware lab -- Planning the network -- Virtual machines versus cloning -- Getting the malware to the lab -- Malware tools -- System tools -- Sandbox…”
    Libro electrónico
  17. 757
    Publicado 2017
    Libro electrónico
  18. 758
    por Weiss-Krejci, Estella
    Publicado 2022
    Libro electrónico
  19. 759
    Publicado 2007
    Libro electrónico
  20. 760
    Publicado 2014
    Libro electrónico