Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 167
- Security measures 164
- Computer networks 125
- Historia 95
- Engineering & Applied Sciences 74
- Subirachs, Josep M. 67
- Data protection 59
- Història 56
- Management 52
- Derecho penal 50
- Biblia 47
- Computer Science 46
- History 43
- Exposicions 40
- Filosofía 39
- Computer crimes 32
- Derecho 31
- Information technology 31
- Ubach, Bonaventura 31
- Cloud computing 30
- Historia y crítica 28
- Materiales 28
- Crítica e interpretación 27
- Electrical & Computer Engineering 24
- Física 23
- Law and legislation 23
- Penetration testing (Computer security) 23
- Catequesi 22
- Internet 20
- Catequesis 19
-
2801Publicado 2020“…Internal network security testing is a critical aspect of any security program, while not knowing if an attacker has successfully identified a flaw that has led to a breach could be disastrous. In this course, you will learn about several modules to use Nmap in real life situations, discovering vulnerabilities, and emulate an attack on a system. …”
-
2802Publicado 2018“…About This Video You will learn to better understand these scenarios, what caused the outage/breach. Why managers may have made the decisions they did that led up to them. …”
-
2803Publicado 2024“…He takes you through a full zero trust implementation cycle, from initial breach to cybersecurity program maintenance and upkeep. …”
Libro electrónico -
2804Publicado 2021“…Security and Privacy Issues in IoT Devices and Sensor Networks investigates security breach issues in IoT and sensor networks, exploring various solutions. …”
Libro electrónico -
2805Publicado 2024“…No Fae may enter the library, but there is a chance a human might be able to breach the cursed doors. She convinces him that she will risk her life for wealth, but really she's after the one thing the Fae covet above all: magic of her own. …”
Libro -
2806Publicado 2022Tabla de Contenidos: “…-- Cybersecurity Budgets -- Design Your Perfect Security Team -- Chapter 3 Step 3: Regulatory Compliance -- What Are Data Breaches, and Why Are They Bad? -- The Scary Truth Found in Data Breach Research -- An Introduction to Common Data Privacy Regulations -- The General Data Protection Regulation -- The California Consumer Privacy Act -- The Health Insurance Portability and Accountability Act -- The Gramm-Leach-Bliley Act -- Payment Card Industry Data Security Standard -- Governance, Risk Management, and Compliance -- More About Risk Management -- Threat Modeling -- Chapter 4 Step 4: Frequent Security Testing -- What Is Security Testing? …”
Libro electrónico -
2807Publicado 2015Tabla de Contenidos: “…USE OF TEXT MINING TECHNIQUES TO ANALYZE AND FIND PATTERNS IN UNSTRUCTURED DATASTEP BY STEP TEXT MINING EXAMPLE IN R; OTHER APPLICABLE SECURITY AREAS AND SCENARIOS; Chapter 7 - Security Intelligence and Next Steps; OVERVIEW; SECURITY INTELLIGENCE; SECURITY BREACHES; PRACTICAL APPLICATION; CONCLUDING REMARKS; Index…”
Libro electrónico -
2808Publicado 2015Tabla de Contenidos: “…Analyzing Application Security RisksChapter 3 Existing Threat Modeling Approaches; Security, Software, Risk-Based Variants; Chapter 4 Threat Modeling Within the SDLC; Building Security in SDLC with Threat Modeling; Integrating Threat Modeling Within The Different Types of SDLCs; Chapter 5 Threat Modeling and Risk Management; Data Breach Incidents and Lessons for Risk Management; Threats and Risk Analysis; Risk-Based Threat Modeling; Threat Modeling in Information Security and Risk Management Processes; Threat Modeling Within Security Incident Response Processes; Chapter 6 Intro to PASTA…”
Libro electrónico -
2809Publicado 2022Tabla de Contenidos: “…Emotion and experience in the history of medicine : elaborating a theory and seeking a method / Rob Boddice and Bettina Hitzer -- Feeling the dis-ease of ebola : an invisible war / Emmanuel King Urey-Yarkpawolo -- Ebola wahala : breaching experiments in a Sierra Leonean border town / Luisa Enria and Angus Fayia Tengbeh -- History before corona : memory, experience, and emotions / Bettina Hitzer -- The binary logic of emotion in the sensorium of virtual health : the case of Happify / Kirsten Ostherr -- Third person : narrating dis-ease and knowledge in psychiatric case histories / Marietta Meier -- Feeling (and falling) ill : finding a language of illness / Franziska Gygax -- Beyond symptomology : listening to how Palestinians conceive of their own suffering and well-being / Heidi Morrison -- Forensic sense : sexual violence, medical professionals, and the senses / Joanna Bourke -- The concept of Leidensdruck in West-Ferman criminal therapy, 1960-85 / Marcel Streng -- The efficacy of Arcadia : constructing emotions of nature in the pained body through landscape imagery, c.1945-present / Brenda Lynn Edgar -- 'Fashionable' diseases in Georgian Britain : medical theory, cultural meanings and lived experience / James Kennaway -- From a patient's point of view : a sensual-perceptual approach to bed treatment / Monika Ankele -- Feeling Penfield / Annmarie Adams…”
Libro -
2810Publicado 1975Tabla de Contenidos: “…--Risse, H. T. Oradour beginnt überall.--Schmidt, W. de. Versöhnung mit Polen.--Messerschmid, F. …”
Biblioteca de la Universidad de Navarra (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada)Libro -
2811Publicado 2017Tabla de Contenidos: “…9 1.1.4 FTC June 2015 Guidance on Data Security 11 1.1.5 FTC Protecting Personal Information Guide 14 1.1.6 Lessons from FTC Cybersecurity Complaints 15 1.1.6.1 Failure to Secure Highly Sensitive Information 16 1.1.6.1.1 Use Industry-Standard Encryption for Sensitive Data 16 1.1.6.1.2 Routine Audits and Penetration Testing are Expected 17 1.1.6.1.3 Health-Related Data Requires Especially Strong Safeguards 18 1.1.6.1.4 Data Security Protection Extends to Paper Documents 19 1.1.6.1.5 Business-to-Business Providers also are Accountable to the FTC For Security of Sensitive Data 20 1.1.6.1.6 Companies are Responsible for the Data Security Practices of Their Contractors 22 1.1.6.1.7 Make Sure that Every Employee Receives Regular Data Security Training for Processing Sensitive Data 23 1.1.6.1.8 Privacy Matters, Even in Data Security 23 1.1.6.1.9 Limit the Sensitive Information Provided to Third Parties 24 1.1.6.2 Failure to Secure Payment Card Information 24 1.1.6.2.1 Adhere to Security Claims about Payment Card Data 24 1.1.6.2.2 Always Encrypt Payment Card Data 25 1.1.6.2.3 Payment Card Data Should be Encrypted Both in Storage and at Rest 26 1.1.6.2.4 In-Store Purchases Pose Significant Cybersecurity Risks 26 1.1.6.2.5 Minimize Duration of Storage of Payment Card Data 28 1.1.6.2.6 Monitor Systems and Networks for Unauthorized Software 29 1.1.6.2.7 Apps Should Never Override Default App Store Security Settings 29 1.1.6.3 Failure to Adhere to Security Claims 30 1.1.6.3.1 Companies Must Address Commonly Known Security Vulnerabilities 30 1.1.6.3.2 Ensure that Security Controls are Sufficient to Abide by Promises about Security and Privacy 31 1.1.6.3.3 Omissions about Key Security Flaws can also be Misleading 33 1.1.6.3.4 Companies Must Abide by Promises for Security-Related Consent Choices 33 1.1.6.3.5 Companies that Promise Security Must Ensure Adequate Authentication Procedures 34 1.1.6.3.6 Adhere to Promises about Encryption 35 1.2 State Data Breach Notification Laws 36 1.2.1 When Consumer Notifications are Required 37 1.2.1.1 Definition of Personal Information 37 1.2.1.2 Encrypted Data 38 1.2.1.3 Risk of Harm 39 1.2.1.4 Safe Harbors and Exceptions to Notice Requirement 39 1.2.2 Notice to Individuals 40 1.2.2.1 Timing of Notice 40 1.2.2.2 Form of Notice 40 1.2.2.3 Content of Notice 41 1.2.3 Notice to Regulators and Consumer Reporting Agencies 41 1.2.4 Penalties for Violating State Breach Notification Laws 42 1.3 State Data Security Laws 42 1.3.1 Oregon 43 1.3.2 Rhode Island 45 1.3.3 Nevada 45 1.3.4 Massachusetts 46 1.4 State Data Disposal Laws 49 2 Cybersecurity Litigation 51 2.1 Article III Standing 52 2.1.1 Applicable Supreme Court Rulings on Standing 53 2.1.2 Lower Court Rulings on Standing in Data Breach Cases 57 2.1.2.1 Injury-in-Fact 57 2.1.2.1.1 Broad View of Injury-in-Fact 57 2.1.2.1.2 Narrow View of Injury-in-Fact 60 2.1.2.2 Fairly Traceable 62 2.1.2.3 Redressability 63 2.2 Common Causes of Action Arising from Data Breaches 64 2.2.1 Negligence 64 2.2.1.1 Legal Duty and Breach of Duty 65 2.2.1.2 Cognizable Injury 67 2.2.1.3 Causation 69 2.2.2 Negligent Misrepresentation or Omission 70 2.2.3 Breach of Contract 72 2.2.4 Breach of Implied Warranty 76 2.2.5 Invasion of Privacy by Publication of Private Facts 80 2.2.6 Unjust Enrichment 81 2.2.7 State Consumer Protection Laws 82 2.3 Class Action Certification in Data Breach Litigation 84 2.4 Insurance Coverage for Cybersecurity Incidents 90 2.5 Protecting Cybersecurity Work Product and Communications from Discovery 94 2.5.1 Attorney-Client Privilege 96 2.5.2 Work Product Doctrine 98 2.5.3 Non-Testifying Expert Privilege 101 2.5.4 Applying the Three Privileges to Cybersecurity: Genesco v. …”
Libro electrónico -
2812por Hagen, SilviaTabla de Contenidos: “…IPv6 Addresses with Embedded IPv4 Addresses6to4 Addresses; ISATAP addresses; Teredo Addresses; Link- and Site-Local Addresses; Anycast Address; Multicast Address; Well-Known Multicast Addresses; Solicited-Node Multicast Address; Dynamic Allocation of Multicast Addresses; Required Addresses; Default Address Selection; References; RFCs; Drafts; ICMPv6; General Message Format; Type (1 Byte); Code (1 Byte); Checksum (2 Bytes); Message Body (Variable Size); ICMP Error Messages; Destination Unreachable; Packet Too Big; Time Exceeded; Parameter Problem; ICMP Informational Messages…”
Publicado 2009
Libro electrónico -
2813por Tiffon, Bernat-NTabla de Contenidos: “….); 2. EL CASO DEL PEREJIL BEACH; 3. EL CASO DE LOS PEREJILOU; ACTO II. «LAS ENAJENACIONES PELIGROSAS »; 1. …”
Publicado 2015
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca Universitat Ramon Llull)Enlace del recurso
Libro electrónico -
2814por Brunskill, CharlotteTabla de Contenidos: “…Responsibilities; 7. Procedures; 8. Breach of policy; 9. Review 10. Date of approval…”
Publicado 2012
Libro electrónico -
2815Publicado 2014Tabla de Contenidos: “…; A Few Common Cost Factors; What about Unreported Breaches?…”
Libro electrónico -
2816
-
2817Publicado 2006“…Im praktischen Kleinformat lässt sich das Bändchen überall hin mitnehmen und ist stets griffbereit, wenn Sie beispielsweise die genaue Syntax eines bestimmten Befehls nachschlagen wollen. …”
Libro electrónico -
2818por Wolf, Frauke“…Dabei wird insbesondere deutlich, daß die Konzepte weit über ihre ursprünglichen Anwendungsbereiche hinaus in neuen Forschungsgebieten überaus erfolgversprechend eingesetzt werden können. …”
Publicado 2018
Tesis -
2819
-
2820Publicado 2022“…Vigilanz wird alltäglich ausgeübt, etwa im Bereich der Sicherheit, des Rechts, der Religionen oder auch der Öffentlichen Gesundheit: überall dort, wo wir auf etwas achten, gegebenenfalls auch etwas tun oder melden sollen. …”
Libro electrónico