Mostrando 2,801 - 2,820 Resultados de 3,562 Para Buscar 'Uberach~', tiempo de consulta: 1.65s Limitar resultados
  1. 2801
    Publicado 2020
    “…Internal network security testing is a critical aspect of any security program, while not knowing if an attacker has successfully identified a flaw that has led to a breach could be disastrous. In this course, you will learn about several modules to use Nmap in real life situations, discovering vulnerabilities, and emulate an attack on a system. …”
    Video
  2. 2802
    Publicado 2018
    “…About This Video You will learn to better understand these scenarios, what caused the outage/breach. Why managers may have made the decisions they did that led up to them. …”
    Video
  3. 2803
    Publicado 2024
    “…He takes you through a full zero trust implementation cycle, from initial breach to cybersecurity program maintenance and upkeep. …”
    Libro electrónico
  4. 2804
    Publicado 2021
    “…Security and Privacy Issues in IoT Devices and Sensor Networks investigates security breach issues in IoT and sensor networks, exploring various solutions. …”
    Libro electrónico
  5. 2805
    Publicado 2024
    “…No Fae may enter the library, but there is a chance a human might be able to breach the cursed doors. She convinces him that she will risk her life for wealth, but really she's after the one thing the Fae covet above all: magic of her own. …”
    Libro
  6. 2806
    Publicado 2022
    Tabla de Contenidos: “…-- Cybersecurity Budgets -- Design Your Perfect Security Team -- Chapter 3 Step 3: Regulatory Compliance -- What Are Data Breaches, and Why Are They Bad? -- The Scary Truth Found in Data Breach Research -- An Introduction to Common Data Privacy Regulations -- The General Data Protection Regulation -- The California Consumer Privacy Act -- The Health Insurance Portability and Accountability Act -- The Gramm-Leach-Bliley Act -- Payment Card Industry Data Security Standard -- Governance, Risk Management, and Compliance -- More About Risk Management -- Threat Modeling -- Chapter 4 Step 4: Frequent Security Testing -- What Is Security Testing? …”
    Libro electrónico
  7. 2807
    Publicado 2015
    Tabla de Contenidos: “…USE OF TEXT MINING TECHNIQUES TO ANALYZE AND FIND PATTERNS IN UNSTRUCTURED DATASTEP BY STEP TEXT MINING EXAMPLE IN R; OTHER APPLICABLE SECURITY AREAS AND SCENARIOS; Chapter 7 - Security Intelligence and Next Steps; OVERVIEW; SECURITY INTELLIGENCE; SECURITY BREACHES; PRACTICAL APPLICATION; CONCLUDING REMARKS; Index…”
    Libro electrónico
  8. 2808
    Publicado 2015
    Tabla de Contenidos: “…Analyzing Application Security RisksChapter 3 Existing Threat Modeling Approaches; Security, Software, Risk-Based Variants; Chapter 4 Threat Modeling Within the SDLC; Building Security in SDLC with Threat Modeling; Integrating Threat Modeling Within The Different Types of SDLCs; Chapter 5 Threat Modeling and Risk Management; Data Breach Incidents and Lessons for Risk Management; Threats and Risk Analysis; Risk-Based Threat Modeling; Threat Modeling in Information Security and Risk Management Processes; Threat Modeling Within Security Incident Response Processes; Chapter 6 Intro to PASTA…”
    Libro electrónico
  9. 2809
    Publicado 2022
    Tabla de Contenidos: “…Emotion and experience in the history of medicine : elaborating a theory and seeking a method / Rob Boddice and Bettina Hitzer -- Feeling the dis-ease of ebola : an invisible war / Emmanuel King Urey-Yarkpawolo -- Ebola wahala : breaching experiments in a Sierra Leonean border town / Luisa Enria and Angus Fayia Tengbeh -- History before corona : memory, experience, and emotions / Bettina Hitzer -- The binary logic of emotion in the sensorium of virtual health : the case of Happify / Kirsten Ostherr -- Third person : narrating dis-ease and knowledge in psychiatric case histories / Marietta Meier -- Feeling (and falling) ill : finding a language of illness / Franziska Gygax -- Beyond symptomology : listening to how Palestinians conceive of their own suffering and well-being / Heidi Morrison -- Forensic sense : sexual violence, medical professionals, and the senses / Joanna Bourke -- The concept of Leidensdruck in West-Ferman criminal therapy, 1960-85 / Marcel Streng -- The efficacy of Arcadia : constructing emotions of nature in the pained body through landscape imagery, c.1945-present / Brenda Lynn Edgar -- 'Fashionable' diseases in Georgian Britain : medical theory, cultural meanings and lived experience / James Kennaway -- From a patient's point of view : a sensual-perceptual approach to bed treatment / Monika Ankele -- Feeling Penfield / Annmarie Adams…”
    Libro
  10. 2810
    Publicado 1975
    Tabla de Contenidos: “…--Risse, H. T. Oradour beginnt überall.--Schmidt, W. de. Versöhnung mit Polen.--Messerschmid, F. …”
    Libro
  11. 2811
    Publicado 2017
    Tabla de Contenidos: “…9 1.1.4 FTC June 2015 Guidance on Data Security 11 1.1.5 FTC Protecting Personal Information Guide 14 1.1.6 Lessons from FTC Cybersecurity Complaints 15 1.1.6.1 Failure to Secure Highly Sensitive Information 16 1.1.6.1.1 Use Industry-Standard Encryption for Sensitive Data 16 1.1.6.1.2 Routine Audits and Penetration Testing are Expected 17 1.1.6.1.3 Health-Related Data Requires Especially Strong Safeguards 18 1.1.6.1.4 Data Security Protection Extends to Paper Documents 19 1.1.6.1.5 Business-to-Business Providers also are Accountable to the FTC For Security of Sensitive Data 20 1.1.6.1.6 Companies are Responsible for the Data Security Practices of Their Contractors 22 1.1.6.1.7 Make Sure that Every Employee Receives Regular Data Security Training for Processing Sensitive Data 23 1.1.6.1.8 Privacy Matters, Even in Data Security 23 1.1.6.1.9 Limit the Sensitive Information Provided to Third Parties 24 1.1.6.2 Failure to Secure Payment Card Information 24 1.1.6.2.1 Adhere to Security Claims about Payment Card Data 24 1.1.6.2.2 Always Encrypt Payment Card Data 25 1.1.6.2.3 Payment Card Data Should be Encrypted Both in Storage and at Rest 26 1.1.6.2.4 In-Store Purchases Pose Significant Cybersecurity Risks 26 1.1.6.2.5 Minimize Duration of Storage of Payment Card Data 28 1.1.6.2.6 Monitor Systems and Networks for Unauthorized Software 29 1.1.6.2.7 Apps Should Never Override Default App Store Security Settings 29 1.1.6.3 Failure to Adhere to Security Claims 30 1.1.6.3.1 Companies Must Address Commonly Known Security Vulnerabilities 30 1.1.6.3.2 Ensure that Security Controls are Sufficient to Abide by Promises about Security and Privacy 31 1.1.6.3.3 Omissions about Key Security Flaws can also be Misleading 33 1.1.6.3.4 Companies Must Abide by Promises for Security-Related Consent Choices 33 1.1.6.3.5 Companies that Promise Security Must Ensure Adequate Authentication Procedures 34 1.1.6.3.6 Adhere to Promises about Encryption 35 1.2 State Data Breach Notification Laws 36 1.2.1 When Consumer Notifications are Required 37 1.2.1.1 Definition of Personal Information 37 1.2.1.2 Encrypted Data 38 1.2.1.3 Risk of Harm 39 1.2.1.4 Safe Harbors and Exceptions to Notice Requirement 39 1.2.2 Notice to Individuals 40 1.2.2.1 Timing of Notice 40 1.2.2.2 Form of Notice 40 1.2.2.3 Content of Notice 41 1.2.3 Notice to Regulators and Consumer Reporting Agencies 41 1.2.4 Penalties for Violating State Breach Notification Laws 42 1.3 State Data Security Laws 42 1.3.1 Oregon 43 1.3.2 Rhode Island 45 1.3.3 Nevada 45 1.3.4 Massachusetts 46 1.4 State Data Disposal Laws 49 2 Cybersecurity Litigation 51 2.1 Article III Standing 52 2.1.1 Applicable Supreme Court Rulings on Standing 53 2.1.2 Lower Court Rulings on Standing in Data Breach Cases 57 2.1.2.1 Injury-in-Fact 57 2.1.2.1.1 Broad View of Injury-in-Fact 57 2.1.2.1.2 Narrow View of Injury-in-Fact 60 2.1.2.2 Fairly Traceable 62 2.1.2.3 Redressability 63 2.2 Common Causes of Action Arising from Data Breaches 64 2.2.1 Negligence 64 2.2.1.1 Legal Duty and Breach of Duty 65 2.2.1.2 Cognizable Injury 67 2.2.1.3 Causation 69 2.2.2 Negligent Misrepresentation or Omission 70 2.2.3 Breach of Contract 72 2.2.4 Breach of Implied Warranty 76 2.2.5 Invasion of Privacy by Publication of Private Facts 80 2.2.6 Unjust Enrichment 81 2.2.7 State Consumer Protection Laws 82 2.3 Class Action Certification in Data Breach Litigation 84 2.4 Insurance Coverage for Cybersecurity Incidents 90 2.5 Protecting Cybersecurity Work Product and Communications from Discovery 94 2.5.1 Attorney-Client Privilege 96 2.5.2 Work Product Doctrine 98 2.5.3 Non-Testifying Expert Privilege 101 2.5.4 Applying the Three Privileges to Cybersecurity: Genesco v. …”
    Libro electrónico
  12. 2812
    por Hagen, Silvia
    Publicado 2009
    Tabla de Contenidos: “…IPv6 Addresses with Embedded IPv4 Addresses6to4 Addresses; ISATAP addresses; Teredo Addresses; Link- and Site-Local Addresses; Anycast Address; Multicast Address; Well-Known Multicast Addresses; Solicited-Node Multicast Address; Dynamic Allocation of Multicast Addresses; Required Addresses; Default Address Selection; References; RFCs; Drafts; ICMPv6; General Message Format; Type (1 Byte); Code (1 Byte); Checksum (2 Bytes); Message Body (Variable Size); ICMP Error Messages; Destination Unreachable; Packet Too Big; Time Exceeded; Parameter Problem; ICMP Informational Messages…”
    Libro electrónico
  13. 2813
    por Tiffon, Bernat-N
    Publicado 2015
    Tabla de Contenidos: “….); 2. EL CASO DEL PEREJIL BEACH; 3. EL CASO DE LOS PEREJILOU; ACTO II. «LAS ENAJENACIONES PELIGROSAS »; 1. …”
    Enlace del recurso
    Libro electrónico
  14. 2814
    por Brunskill, Charlotte
    Publicado 2012
    Tabla de Contenidos: “…Responsibilities; 7. Procedures; 8. Breach of policy; 9. Review 10. Date of approval…”
    Libro electrónico
  15. 2815
    Publicado 2014
    Tabla de Contenidos: “…; A Few Common Cost Factors; What about Unreported Breaches?…”
    Libro electrónico
  16. 2816
    Publicado 2008
    Libro electrónico
  17. 2817
    Publicado 2006
    “…Im praktischen Kleinformat lässt sich das Bändchen überall hin mitnehmen und ist stets griffbereit, wenn Sie beispielsweise die genaue Syntax eines bestimmten Befehls nachschlagen wollen. …”
    Libro electrónico
  18. 2818
    por Wolf, Frauke
    Publicado 2018
    “…Dabei wird insbesondere deutlich, daß die Konzepte weit über ihre ursprünglichen Anwendungsbereiche hinaus in neuen Forschungsgebieten überaus erfolgversprechend eingesetzt werden können. …”
    Tesis
  19. 2819
    por Wiegmann, Jochen
    Publicado 2018
    Tesis
  20. 2820
    Publicado 2022
    “…Vigilanz wird alltäglich ausgeübt, etwa im Bereich der Sicherheit, des Rechts, der Religionen oder auch der Öffentlichen Gesundheit: überall dort, wo wir auf etwas achten, gegebenenfalls auch etwas tun oder melden sollen. …”
    Libro electrónico