Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 2
- Access control 1
- Afghanistan 1
- Application software 1
- Automated vehicles 1
- Automobile industry and trade 1
- Automotive computers 1
- Cell phone equipment industry 1
- Cell phone systems 1
- Central Asia 1
- Certification 1
- Civilización occidental 1
- Coding theory 1
- Compilers (Computer programs) 1
- Computer programming 1
- Computer security 1
- Computer software 1
- Computer technicians 1
- Computers 1
- Computing Technology Industry Association 1
- Conservation 1
- Copyright and electronic data processing 1
- Cryptography 1
- Data compression (Computer science) 1
- Data protection 1
- Deportes 1
- Derecho y legislación 1
- Development 1
- Diagnosis 1
- Diagnostic and statistical manual of mental disorders 1
-
1Publicado 2006“…It grew into a full conference in 2003 in Preston, England, before moving to the United States with the conferences in 2004 in Maryland and 2005 in Boulder, Colorado. …”
Libro electrónico -
2
-
3Publicado 2016Libro electrónico
-
4
-
5Publicado 2020“…Marko Lehti is Professor at Tampere Peace Research Institute (TAPRI) at Tampere University, Finland. …”
Libro electrónico -
6
-
7Roslyn cookbook compiler as a service, static code analysis, code quality, code generation, and morePublicado 2017Tabla de Contenidos: “…. -- Identifying weak validation of data from external components to prevent attacks such as cross-site request forgery and path tampering -- Getting ready -- How to do it... -- Identifying performance improvements to source code using FxCop analyzers -- Getting ready -- How to do it... -- How it works... -- Chapter 6: Live Unit Testing in Visual Studio Enterprise -- Introduction -- Running live unit tests in Visual Studio for unit test projects based on NUnit, XUnit, and MSTest frameworks -- Getting started -- How to do it... -- Viewing and navigating live unit test results -- Getting started -- How to do it... -- Understanding incremental live unit test execution with code changes -- Getting started -- How to do it... -- How it works... -- Understanding Start/Stop/Pause/Continue/Restart functionality for fine grain control of LUT -- Getting started -- How to do it... -- Including and excluding subset of tests for live execution -- Getting started -- How to do it... -- Configuring different options for live unit testing using the Tools Options dialog -- Getting started -- How to do it... -- Chapter 7: C# Interactive and Scripting -- Introduction -- Writing a simple C# script and evaluating it within the Visual Studio interactive window -- Getting started -- How to do it... -- How it works... -- Using script directives and REPL commands in the C# interactive window -- Getting started -- How to do it... -- Using keyboard shortcuts for evaluating and navigating through script sessions in the C# interactive window -- Getting started -- How to do it... -- Initializing the C# interactive session from the existing C# project -- Getting started -- How to do it...…”
Libro electrónico -
8Publicado 2023Tabla de Contenidos: “…Protective failure -- Continuous protection -- Redundancy -- Use of standardized cryptography -- Summary -- Further reading -- Chapter 3: Threat Landscape against Vehicle Components -- Threats against external vehicle interfaces -- Backend-related threats -- Connectivity threats -- Threats against the E/E topology -- Highly distributed E/E architecture -- Domain-centralized E/E architecture -- Central vehicle computer architecture -- Threats against in-vehicle networks -- CAN -- FlexRay -- Ethernet -- The Unified Diagnostic Services (UDS) protocol -- SAE J1939 protocols -- SAE J2497 (PLC4TRUCKS) -- Threats against sensors -- Common ECU threats -- Debug ports -- Flash programming -- Power and mode manipulation -- Tampering with machine learning algorithms -- Software attacks -- Disclosure and tampering of cryptographic keys -- Summary -- References -- Part 2: Understanding the Secure Engineering Development Process -- Chapter 4: Exploring the Landscape of Automotive Cybersecurity Standards -- Primary standards -- UNECE WP.29 -- Chinese regulation and standardization -- Secondary standards -- IATF 16949:2016 -- Automotive SPICE (ASPICE) -- Trusted Information Security Assessment Exchange (TISAX) -- SAE J3101 - hardware-protected security for ground vehicles -- Coding and software standards -- NIST cryptographic standards -- Supporting standards and resources -- MITRE Common Weakness Enumeration (CWE) -- US DoT NHTSA Cybersecurity Best Practices for the Safety of Modern Vehicles -- ENISA good practices for the security of smart cars -- SAE J3061 - cybersecurity guidebook for cyber-physical vehicle systems -- ISO/IEC 27001 -- NIST SP 800-160 -- Uptane -- Summary -- References -- Chapter 5: Taking a Deep Dive into ISO/SAE21434 -- Notations -- At a glance - the ISO 21434 standard -- Organizational cybersecurity management -- Management systems…”
Libro electrónico -
9por Spendolini, ScottTabla de Contenidos: “…Cover; Title Page; Copyright Page; Dedication Page; Contents at a Glance; Table of Contents; Foreword; About the Author; About the Technical Reviewer; Acknowledgments; Introduction; About This Book; Security Planning & Assessment; APEX Security; User Access; Data Access & Protection; Downloading the Code; Contacting the Author; CHAPTER 1 Threat Analysis; Assessment; Home Security Assessment; Application Security Assessment; Data and Privileges; Types of Threats; Preventable; URL Tampering; SQL Injection; Cross-Site Scripting; Unpreventable; Summary; CHAPTER 2 Implementing a Security Plan…”
Publicado 2013
Libro electrónico -
10por Henderson, G. RobinTabla de Contenidos: “…5.1.2 Tests for evidence of special cause variation on Shewhart charts5.1.3 Xbar and R charts for samples (subgroups) of measurements; 5.2 Shewhart charts for attribute data; 5.2.1 P chart for proportion nonconforming; 5.2.2 NP chart for number nonconforming; 5.2.3 C chart for count of nonconformities; 5.2.4 U chart for nonconformities per unit; 5.2.5 Funnel plots; 5.3 Time-weighted control charts; 5.3.1 Moving averages and their applications; 5.3.2 Exponentially weighted moving average control charts; 5.3.3 Cumulative sum control charts; 5.4 Process adjustment; 5.4.1 Process tampering…”
Publicado 2011
Libro electrónico -
11Publicado 2024Tabla de Contenidos: “…5: 'What Is Illegal Offline, Should Be Illegal Online': The Development of the German NetzDG -- 5.1 The Task Force, 2015-2017 -- 5.1.1 Negotiating (Voluntary) Comitments -- 5.2 The Network Enforcement Act, 2017-2018 -- 5.2.1 Demand for Changing the (Collaborative Status QUO) -- 5.2.2 Attempts to Tamper Down Demand -- 5.2.3 Supply Factors -- 5.3 Berlin vs. …”
Libro electrónico -
12Publicado 2018Tabla de Contenidos: “…Server-Side Execution -- 6.3. Code Tamper-detection and Tamper-proofing -- 6.4. Cryptographic Obfuscation -- 6.5. …”
Libro electrónico -
13por Seemann, MarkTabla de Contenidos: “…8.1.6 Trennung von Befehlen und Abfragen -- 8.1.7 Kommunikationshierarchie -- 8.2 Beispiel für ein API-Design -- 8.2.1 Maître d'hôtel -- 8.2.2 Verwendung eines gekapselten Objekts -- 8.2.3 Implementierungsdetails -- 8.3 Fazit -- Kapitel 9: Zusammenarbeit -- 9.1 Git -- 9.1.1 Commit-Nachrichten -- 9.1.2 Continuos Integration -- 9.1.3 Kleine Commits -- 9.2 Gemeinsame Eigentümerschaft am Code -- 9.2.1 Paarprogrammierung -- 9.2.2 Mob-Programmierung -- 9.2.3 Verzögerungen durch Code-Reviews -- 9.2.4 Ablehnung von Änderungen -- 9.2.5 Code-Reviews -- 9.2.6 Pull-Requests -- 9.3 Fazit -- Teil II: Nachhaltigkeit -- Kapitel 10: Erweiterung des Codes -- 10.1 Feature-Flags -- 10.1.1 Kalender-Flag -- 10.2 Das Strangler-Pattern -- 10.2.1 Strangler auf Methodenebene -- 10.2.2 Strangler auf Klassenebene -- 10.3 Versionierung -- 10.3.1 Vorwarnung -- 10.4 Fazit -- Kapitel 11: Bearbeiten von Unit-Tests -- 11.1 Refactoring von Unit-Tests -- 11.1.1 Änderung des Sicherheitsnetzes -- 11.1.2 Hinzufügen von neuem Testcode -- 11.1.3 Refactoring von Test- und Produktionscode trennen -- 11.2 Fehlschlagende Tests -- 11.3 Fazit -- Kapitel 12: Fehlerbehebung -- 12.1 Verstehen -- 12.1.1 Wissenschaftliche Vorgehensweise -- 12.1.2 Vereinfachen -- 12.1.3 Quietscheentchen-Debugging -- 12.2 Fehler -- 12.2.1 Fehler durch Tests reproduzieren -- 12.2.2 Langsame Tests -- 12.2.3 Nichtdeterministische Fehler -- 12.3 Bisektion -- 12.3.1 Bisektion mit Git -- 12.4 Fazit -- Kapitel 13: Trennung von Zuständigkeiten -- 13.1 Komposition -- 13.1.1 Verschachtelte Komposition -- 13.1.2 Sequenzielle Komposition -- 13.1.3 Referenzielle Transparenz -- 13.2 Cross-Cutting Concerns -- 13.2.1 Logging -- 13.2.2 Decorator -- 13.2.3 Was protokolliert werden sollte -- 13.3 Fazit -- Kapitel 14: Rhythmus -- 14.1 Persönlicher Rhythmus -- 14.1.1 Zeiteinteilung -- 14.1.2 Pausieren -- 14.1.3 Zeit wohlüberlegt nutzen…”
Publicado 2022
Libro electrónico -
14Publicado 2018Tabla de Contenidos: “…Use case 4: Provide interruption information -- 2.9.5. Use case 5: Provide tamper history (tamper detection) -- 2.9.6. Use case 6: Apply electricity threshold and load management -- 2.10. …”
Libro electrónico -
15Publicado 2009Tabla de Contenidos: “…195 -- 12.3 Concluding Remarks 195 -- References 197 -- Further Reading 203 -- Appendix: A Brief Guide to Units and Spectrum 205 -- Index 207.…”
Libro electrónico -
16Publicado 2022Tabla de Contenidos: “…Virtual Desktop -- Authentication and Authorization Considerations -- In-Band vs Out-of-Band Management -- REVIEW -- 44 QUESTIONS -- 44 ANSWERS -- Objective 45 Explain the importance of physical security -- Detection Methods -- Camera -- Motion Detection -- Asset Tags -- Tamper Detection -- Prevention Methods -- Employee Training -- Access Control Hardware -- Locking Racks, Locking Cabinets -- Access Control Vestibule (Previously Known as a Mantrap) -- Smart Lockers -- Asset Disposal -- Factory Reset/Wipe Configuration -- Sanitize Devices for Disposal -- REVIEW -- 45 QUESTIONS -- 45 ANSWERS -- 00-FMindd 23 22/04/22 11:12 AM -- xxiv Mike Meyers' CompTIA Network+ Certification Passport -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- 50 Network Troubleshooting -- Objective 51 Explain the network troubleshooting methodology -- Identify the Problem -- Gather Information -- Question Users -- Identify Symptoms -- Determine if Anything Has Changed -- Duplicate the Problem, if Possible -- Approach Multiple Problems Individually -- Establish a Theory of Probable Cause -- Question the Obvious -- Consider Multiple Approaches -- Test the Theory to Determine the Cause -- If the Theory Is Confirmed, Determine the Next Steps -- to Resolve the Problem -- If the Theory Is Not Confirmed, Reestablish a New Theory or Escalate -- Establish a Plan of Action to Resolve the Problem and Identify -- Potential Effects -- Implement the Solution or Escalate As Necessary -- Verify Full System Functionality and, if Applicable, Implement -- Preventive Measures -- Document Findings, Actions, Outcomes, and Lessons Learned -- REVIEW -- 51 QUESTIONS -- 51 ANSWERS -- Objective 52 Given a scenario, troubleshoot common cable -- connectivity issues and select the appropriate tools -- Specifications and Limitations -- Throughput -- Speed -- Distance -- Cable Considerations -- Shielded and Unshielded -- Plenum and Riser-Rated -- Cable Application -- Rollover Cable/Console Cable -- Crossover Cable -- Power over Ethernet -- Common Issues -- Attenuation -- Interference -- 00-FMindd 24 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Decibel (dB) Loss -- Incorrect Pinout -- Bad Ports -- Open/Short -- Light-Emitting Diode (LED) Status Indicators -- Incorrect Transceivers -- Duplexing Issues -- Transmit and Receive (TX/RX) Reversed -- Dirty Optical Cables -- Common Tools -- Cable Crimper -- Punchdown Tool -- Tone Generator -- Loopback Adapter -- Optical Time-Domain Reflectometer (OTDR) -- Multimeter -- Cable Tester -- Wire Map -- Tap -- Fusion Splicers -- Spectrum Analyzers -- Snips/Cutters -- Cable Stripper -- Fiber Light Meter -- REVIEW -- 52 QUESTIONS -- 52 ANSWERS -- Objective 53 Given a scenario, use the appropriate network -- software tools and commands…”
Libro electrónico -
17Publicado 2020“…Rebecca was sent to the psych after it was suspected that she was tampering lines when admitted to the medical unit, an accusation Rebecca adamantly and angrily denies. …”
Vídeo online -
18Publicado 2019“…The call for papers attracted submissions from Europe, China, India, and the United States. The accepted papers cover topics ranging from deep neural networks for video analytics, network considerations in streaming the videos, tamper-proof video processing, and evolution of smart cameras with compute onboard. …”
Libro electrónico