Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 270
- Literatura cristiana oriental 240
- Management 213
- Patrística siria 208
- Application software 207
- Engineering & Applied Sciences 201
- Computer security 174
- Security measures 174
- Computer networks 159
- Computer Science 134
- Business & Economics 131
- History 122
- Leadership 120
- Artificial intelligence 111
- Computer programs 107
- Cloud computing 98
- Computer software 97
- Operating systems (Computers) 93
- Web site development 92
- Historia 91
- Data processing 80
- Computer programming 77
- Finance 72
- Technology: general issues 72
- Social aspects 69
- Database management 68
- Information technology 67
- Photography 67
- Web sites 66
- Design 64
-
6141Publicado 2021“…Suggesting that Beckett's work sticks with and witnesses catastrophe rather than crisis, the chapter uses The Lost Ones to explore Beckett's commitment to staying with a disaster that cannot be overcome, alongside the articulation of a giving up that is not a decision but part of a drive to go on. …”
Seriada digital -
6142Publicado 2023“…. * Write efficient and safe Rust code * Leverage Rust libraries and tools in your projects * Combine Rust with Python for improved application performance Additional Popular Resources 52 Weeks of AWS-The Complete Series Microsoft Azure Fundamentals (AZ-900) Certification Rust Bootcamp Python Bootcamp Google Professional Machine Learning Engineer Course 2023 (Rough Draft) Rust Data Engineering Building with the GitHub EcoSystem: Copilot, CodeSpaces, and GitHub Actions Microsoft Azure Fundamentals (AZ-900) Certification Google Professional Cloud Architect Certification Course 2023 (Rough Draft) AWS Solutions Architect Professional (SAP-C02) 2023.…”
Video -
6143Publicado 2024“…In this lesson, we'll walk you through the problem and provide a solution that ensures your Excel file stays up-to-date seamlessly. We'll guide you through an alternative approach using OneDrive to create your form. …”
Video -
6144Publicado 2022“…Any good company's leadership knows that competitiveness and innovation are necessary to stay relevant. Learning Objectives Learn the three key elements to being an intrapreneur Learn about some of the most successful innovative intrapreneurs in history…”
Grabación no musical -
6145Publicado 2012“…Can we be sure that products NGOs label as child-labor free are in fact so, that the coffee labeled as 'fair trade' is farmed in sustainable ways, or that the working conditions monitored by NGOs are safe and that the wages are reasonable? Can we know that humanitarian organizations are, in fact, using our donations to alleviate human suffering rather than pursuing other goals? …”
Libro -
6146Publicado 2021“…Occidente sufre los devastadores efectos de un virus espiritual que quiere eliminar a Dios de la vida de los hombres y de la sociedad. …”
Libro -
6147por Woods, John“…In a world plagued by disagreement and conflict one might expect that the exact sciences of logic and mathematics would provide a safe harbor. In fact these disciplines are rife with internal divisions between different, often incompatible, systems. …”
Publicado 2003
Sumario
Libro -
6148Publicado 2024“…Tuck traces our current representative view of democracy to Sieyès and contrasts him with Rousseau, a theorist of active self-rule by the people. …”
Libro -
6149Publicado 2017Tabla de Contenidos: “…9 1.1.4 FTC June 2015 Guidance on Data Security 11 1.1.5 FTC Protecting Personal Information Guide 14 1.1.6 Lessons from FTC Cybersecurity Complaints 15 1.1.6.1 Failure to Secure Highly Sensitive Information 16 1.1.6.1.1 Use Industry-Standard Encryption for Sensitive Data 16 1.1.6.1.2 Routine Audits and Penetration Testing are Expected 17 1.1.6.1.3 Health-Related Data Requires Especially Strong Safeguards 18 1.1.6.1.4 Data Security Protection Extends to Paper Documents 19 1.1.6.1.5 Business-to-Business Providers also are Accountable to the FTC For Security of Sensitive Data 20 1.1.6.1.6 Companies are Responsible for the Data Security Practices of Their Contractors 22 1.1.6.1.7 Make Sure that Every Employee Receives Regular Data Security Training for Processing Sensitive Data 23 1.1.6.1.8 Privacy Matters, Even in Data Security 23 1.1.6.1.9 Limit the Sensitive Information Provided to Third Parties 24 1.1.6.2 Failure to Secure Payment Card Information 24 1.1.6.2.1 Adhere to Security Claims about Payment Card Data 24 1.1.6.2.2 Always Encrypt Payment Card Data 25 1.1.6.2.3 Payment Card Data Should be Encrypted Both in Storage and at Rest 26 1.1.6.2.4 In-Store Purchases Pose Significant Cybersecurity Risks 26 1.1.6.2.5 Minimize Duration of Storage of Payment Card Data 28 1.1.6.2.6 Monitor Systems and Networks for Unauthorized Software 29 1.1.6.2.7 Apps Should Never Override Default App Store Security Settings 29 1.1.6.3 Failure to Adhere to Security Claims 30 1.1.6.3.1 Companies Must Address Commonly Known Security Vulnerabilities 30 1.1.6.3.2 Ensure that Security Controls are Sufficient to Abide by Promises about Security and Privacy 31 1.1.6.3.3 Omissions about Key Security Flaws can also be Misleading 33 1.1.6.3.4 Companies Must Abide by Promises for Security-Related Consent Choices 33 1.1.6.3.5 Companies that Promise Security Must Ensure Adequate Authentication Procedures 34 1.1.6.3.6 Adhere to Promises about Encryption 35 1.2 State Data Breach Notification Laws 36 1.2.1 When Consumer Notifications are Required 37 1.2.1.1 Definition of Personal Information 37 1.2.1.2 Encrypted Data 38 1.2.1.3 Risk of Harm 39 1.2.1.4 Safe Harbors and Exceptions to Notice Requirement 39 1.2.2 Notice to Individuals 40 1.2.2.1 Timing of Notice 40 1.2.2.2 Form of Notice 40 1.2.2.3 Content of Notice 41 1.2.3 Notice to Regulators and Consumer Reporting Agencies 41 1.2.4 Penalties for Violating State Breach Notification Laws 42 1.3 State Data Security Laws 42 1.3.1 Oregon 43 1.3.2 Rhode Island 45 1.3.3 Nevada 45 1.3.4 Massachusetts 46 1.4 State Data Disposal Laws 49 2 Cybersecurity Litigation 51 2.1 Article III Standing 52 2.1.1 Applicable Supreme Court Rulings on Standing 53 2.1.2 Lower Court Rulings on Standing in Data Breach Cases 57 2.1.2.1 Injury-in-Fact 57 2.1.2.1.1 Broad View of Injury-in-Fact 57 2.1.2.1.2 Narrow View of Injury-in-Fact 60 2.1.2.2 Fairly Traceable 62 2.1.2.3 Redressability 63 2.2 Common Causes of Action Arising from Data Breaches 64 2.2.1 Negligence 64 2.2.1.1 Legal Duty and Breach of Duty 65 2.2.1.2 Cognizable Injury 67 2.2.1.3 Causation 69 2.2.2 Negligent Misrepresentation or Omission 70 2.2.3 Breach of Contract 72 2.2.4 Breach of Implied Warranty 76 2.2.5 Invasion of Privacy by Publication of Private Facts 80 2.2.6 Unjust Enrichment 81 2.2.7 State Consumer Protection Laws 82 2.3 Class Action Certification in Data Breach Litigation 84 2.4 Insurance Coverage for Cybersecurity Incidents 90 2.5 Protecting Cybersecurity Work Product and Communications from Discovery 94 2.5.1 Attorney-Client Privilege 96 2.5.2 Work Product Doctrine 98 2.5.3 Non-Testifying Expert Privilege 101 2.5.4 Applying the Three Privileges to Cybersecurity: Genesco v. …”
Libro electrónico -
6150
-
6151Majallat al-ʻimārah wa-al-funūn wa-al-ʻulūm al-insānīyahمجلة العمارة والفنون والعلوم الانسانية /Publicado 2016Revista digital
-
6152
-
6153por Saito, Nagayuki“…The project formulated an Internet Literacy Assessment Indicator for Students (ILAS), which targeted 15-year-old students to measure their ability to utilise the Internet safely and securely. In 2011, a formative evaluation was conducted for a sample of 569 first-year high-school students from 14 high schools. …”
Publicado 2015
Capítulo de libro electrónico -
6154por Ruiz, Nicolas“…Masking methods for the safe dissemination of microdata consist of distorting the original data while preserving a pre-defined set of statistical properties in the microdata. …”
Publicado 2011
Capítulo de libro electrónico -
6155Publicado 2016“…Topics covered include: delivering successful story pitches, location scouting, navigating foreign work documentation and visa requirements, confronting press freedom restrictions, leveraging digital media opportunities, and the new challenges of reporting from conflict zones safely. As newspapers and networks are forced to close their overseas bureaus, news organizations are relying more than ever before on freelancers to fill the gap. …”
Libro electrónico -
6156Publicado 2023“…The book analyses case studies of effective sanitation programmes as well as experiments with innovative ideas in different regional contexts by CSOs to meet the contextual needs of the community and to ensure access to safe sanitation, especially among the urban poor. …”
Libro electrónico -
6157Publicado 2015“…Obfuscation will teach users to push back, software developers to keep their user data safe, and policy makers to gather data without misusing it.Brunton and Nissenbaum present a guide to the forms and formats that obfuscation has taken and explain how to craft its implementation to suit the goal and the adversary. …”
Grabación musical -
6158Publicado 2019“…Companies are investing an unprecedented amount of money to keep their data and assets safe, yet cyberattacks are on the rise-and the problem is worsening. …”
Grabación de sonido -
6159Publicado 2019“…Sollmann shines a bright light on the ever-widening world of flexwork-where women can find many interesting and exciting ways to tuck all generations of their families into a future that is financially secure and safe.WORK ENDS AT AGE SIXTY-FIVE. Women who leave the workforce and want to return in their forties, fifties, or sixties will be in good company as the ranks of older workers rise…”
Grabación musical -
6160Publicado 2022“…Within this system of care, healthcare professionals, including audiologists, can only practice safely and effectively if they possess an appreciation of the complexities and challenges that exist in that context. …”
Libro electrónico