Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 167
- Security measures 164
- Computer networks 125
- Historia 95
- Engineering & Applied Sciences 74
- Subirachs, Josep M. 67
- Data protection 59
- Història 56
- Management 52
- Derecho penal 50
- Biblia 47
- Computer Science 46
- History 43
- Exposicions 40
- Filosofía 39
- Computer crimes 32
- Derecho 31
- Information technology 31
- Ubach, Bonaventura 31
- Cloud computing 30
- Historia y crítica 28
- Materiales 28
- Crítica e interpretación 27
- Electrical & Computer Engineering 24
- Física 23
- Law and legislation 23
- Penetration testing (Computer security) 23
- Catequesi 22
- Internet 20
- Catequesis 19
-
2841Publicado 2015Tabla de Contenidos: “…Eine Re-Lektüre des Marsyas-Mythos im Kontext aktueller Veränderungen von Arbeitswelten 107 Genealogie des Prekariats 121 Ist Prekarität überall? 139 VirtuosInnen der Freiheit - Zur Implosion von politischer Virtuosität und produktiver Arbeit 153 Prekäre Superhelden: Zur Entwicklung politischer Handlungsmöglichkeiten in postfordistischen Verhältnissen 165 "Mit 13 Mark 20 die Woche ist die Freiheit nen Dreck wert" - Film, Theorie und Prekarisierung 183 Zu dumm um sich zu wehren? …”
Electrónico -
2842Publicado 2021Tabla de Contenidos: “…-- Scope and structure of the Code Chapter 1: Data protection requirements 5.1 Terms and conditions of the Cloud services agreement 5.2 Processing personal data lawfully 5.3 Sub-processing 5.4 International transfers of customer's personal data 5.5 Right to audit 5.6 Liability 5.7 Cooperation with the customer 5.8 Records of processing 5.9 Data protection point of contact 5.10 Rights of the data subject 5.11 Cooperation with supervisory authorities 5.12 Confidentiality of the processing 5.13 Assistance with personal data breaches 5.14 Termination of the Cloud services agreement Chapter 2: Security requirements 6.1 General security requirements Chapter 3: Detailed security objectives Objective 1 Management direction for information security Objective 2Organisation of information security Objective 3 Human resources security Objective 4 Asset management Objective 5 Access controls Objective 6 Encryption Objective 7 Physical and environmental security Objective 8 Operational security Objective 9 Communications security Objective 10 System development and maintenance Objective 11 Suppliers Objective 12 Information security incident management Objective 13 Information security in business continuity Chapter 4: Transparency Chapter 5: Assessment and certification Initial assessment Ongoing assessment and monitoring Chapter 6: Conclusion Further reading…”
Libro electrónico -
2843Publicado 1999Tabla de Contenidos: “…The nature of the Community: integration, democracy, and legitimacy / Paul Craig -- The institutional development of the EU: a constitutional analysis / Gráinne de Búrca -- The EU as a 'layered' international organization: institutional unity in disguise / Deirdre Curtin and Ige Dekker -- External relations and external competence: the emergence of an integrated policy / Marise Cremona -- Direct effect, supremacy, and the nature of the legal order / Bruno de Witte -- Article 177 in social and political context / Thomas de la Mare -- European administrative law and the global challenge / Carol Harlow -- Remedies for breaches of EC law in national courts: legal variation and selection / Rachel Craufurd Smith -- The European Court of Justice / Martin Shapiro -- The constitution of the common market place: text and context in the evolution of the free movement of goods / J.H.H. …”
Biblioteca Universidad de Deusto (Otras Fuentes: Biblioteca de la Universidad de Navarra)Libro -
2844Publicado 2018Tabla de Contenidos: “…-- TensorFlow-Elemente -- tf.app.flags -- Cluster und Server -- Replikation von Berechnungsgraphen über mehrere Prozessoren -- Überwachte Sessions -- Die Prozessorzuteilung -- Beispiel mit verteiltem Rechnen -- Zusammenfassung -- Kapitel 10: Modelle mit TensorFlow exportieren und via Server bereitstellen -- Unser Modell speichern und exportieren -- Geladene Gewichte zuweisen -- Die Klasse Saver -- Einführung in TensorFlow Serving -- Überblick -- Installation -- Bauen und exportieren -- Zusammenfassung -- Anhang: Tipps zur Erstellung von Modellen und Verwendung von TensorFlow Serving -- Index -- Über die Autoren -- Kolophon…”
Libro electrónico -
2845Publicado 2021Tabla de Contenidos: “…State Authority -- Financial Data -- Credit History -- California Financial Information Privacy Act -- Data Security -- Recent Developments -- Data Breach Notification Laws -- Elements of State Data Breach Notification Laws -- Key Differences Among States Today -- Recent Developments -- Marketing Laws -- Summary -- Exam Essentials -- Review Questions -- Chapter 9 International Privacy Regulation -- International Data Transfers -- European Union General Data Protection Regulation -- Adequacy Decisions -- U.S.…”
Libro electrónico -
2846Publicado 2015“…As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponentially. This practical book not only shows Hadoop administrators and security architects how to protect Hadoop data from unauthorized access, it also shows how to limit the ability of an attacker to corrupt or modify data in the event of a security breach…”
Libro electrónico -
2847Publicado 2024Tabla de Contenidos: “…3 Duty Not to Take Part in Hostilities and Impede Relief Actions -- Part 3 Arbitrary Withholding of Consent to Relief Operations -- Chapter 11 Characteristics of Withholding of Consent -- 1 Withholding and Withdrawing of Consent -- 2 Forms of Expression -- 2.1 Explicit Withholding and Withdrawing -- 2.2 Implicit Withholding -- 2.3 Implicit Withdrawing -- Chapter 12 Prohibition of Arbitrary Withholding of Consent -- 1 Legal Basis -- 1.1 Rule of Customary Law -- 1.2 Grammatical and Effective Interpretation of ap s -- 1.3 Historical Perspective -- 1.4 Subsequent State Practice and Agreements -- 2 Assessing Arbitrariness -- 2.1 Distinction from a Valid Refusal -- 2.2 Situations of Arbitrary Withholding of Consent -- 2.2.1 No Legitimate Aim -- 2.2.2 Violation of Other Obligations of the Concerned Conflict Party with Respect to the Civilian Population -- 2.2.3 Violation of the Principle of Necessity and Proportionality -- 2.2.4 In Other Way Inappropriate under International Law -- Chapter 13 Violation of Other International Obligations -- 1 Relevant Breaches of Law -- 2 Breaches of IHL Obligations -- 2.1 Humane Treatment as a Basic Principle -- 2.2 Prohibition of Starvation of the Civilian Population -- 2.3 Prohibition of Collective Punishments -- 2.4 Prohibition of Adverse Distinction -- 2.5 Prohibition of Violence to Life and Person -- 2.5.1 Murder -- 2.5.2 Torture -- 2.5.3 Cruel Treatment -- 3 Breaches of IHRL Obligations -- 3.1 Prohibition of Torture and Other Cruel, Inhuman Treatment -- 3.1.1 Legal Sources and Definition -- 3.1.2 Consideration of Degrading Treatment -- 3.1.3 Duty of Omission and Duty to Fulfil -- 3.1.3.1 In General -- 3.1.3.2 Withholding of Consent as an Act of Action and Omission -- 3.1.3.3 A Duty to Fulfil and Provide Relief -- 3.1.4 Severity of Suffering and Pain -- 3.2 Prohibition of Discrimination…”
Libro electrónico -
2848
-
2849Publicado 2020“…Dass Chemie als Naturwissenschaft der Beschreibung der Natur dient, um deren Stoffe und Stoffumwandlungen zu erklären, ist dem Laien selten bewusst. Chemie findet überall statt, insbesondere in der Natur! Genau an diesem Punkt setzt das Unterrichtskonzept "Chemie Pur - Unterrichten in der Naturglqq an. …”
Libro electrónico -
2850Publicado 1999Libro electrónico
-
2851Publicado 2011“…<br/><br/>Die traditionellen Topoi der deutschen Imagologie, die überall in Europa eine große Resonanz gefunden haben (das romantische Deutschland, das Land der Dichter und Denker, aber ab dem Krieg von 1870 auch das preußische Feindbild), werden dabei in Betracht gezogen.…”
Libro electrónico -
2852por Schwertner, Siegfried M., 1936-
Publicado 2014Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca de la Universidad de Navarra, Universidad Loyola - Universidad Loyola Granada)Libro -
2853Publicado 2017Tabla de Contenidos: “…. -- Viewing SLA warnings and breaches -- Getting ready -- How to do it... -- How it works... -- There's more... -- RAG status in console -- Setting up SLA notifications for warnings and breaches -- Getting ready -- How to do it... -- How it works... -- There's more... -- Notification for breaches -- Creating repeated notifications before SLA breaches with escalation -- Getting ready -- How to do it... -- How it works... -- There's more... -- Notification timings depending on priority -- Notification for breaches -- Chapter 4: Building the Configuration Management Database (CMDB) -- Introduction -- Adding configuration items manually -- How to do it... -- How it works... -- There's more... -- Importing Active Directory configuration items -- Getting ready -- How to do it... -- How it works... -- There's more... -- Mapping Active Directory domain attributes to Service Manager properties -- Changing the Active Directory connector schedule via PowerShell -- Importing Configuration Manager configuration items -- Getting ready -- How to do it... -- How it works... -- There's more... -- Mapping Configuration Manager attributes to Service Manager properties -- Importing Operations Manager configuration items -- Getting ready -- How to do it... -- How it works... -- There's more... -- Adding new Operations Manager CIs -- Importing Virtual Machine Manager configuration items -- Getting ready -- How to do it... -- How it works... -- There's more... -- Need to use an account that isn't a local administrator? …”
Libro electrónico -
2854por Aravilli, Srinivas RaoTabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Introduction to Data Privacy and Machine Learning -- Chapter 1: Introduction to Data Privacy, Privacy Breaches, and Threat Modeling -- What do privacy and data privacy mean? …”
Publicado 2023
Libro electrónico -
2855por Crockford, DouglasTabla de Contenidos: “…JSLint; Members; Options; Semicolon; Line Breaking; Comma; Required Blocks; Forbidden Blocks; Expression Statements; for in Statement; switch Statement; var Statement; with Statement; =; == and !=; Labels; Unreachable Code; Confusing Pluses and Minuses; ++ and --; Bitwise Operators; eval Is Evil; void; Regular Expressions; Constructors and new; Not Looked For; HTML; JSON; Report; D. …”
Publicado 2008
Libro electrónico -
2856Publicado 2015“…., toothbrushing, food intake) a day. The breach in this homeostasis can occur for instance if the perturbations become too excessive (e.g., frequent carbohydrate intake leading to acidification of the community) or the host is compromised (e.g., inadequate immune response resulting in persistent inflammation of periodontal tissue). …”
Libro electrónico -
2857por Diogenes, Yuri“…"Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats to cybersecurity Key Features Covers the latest security threats and defense strategies for 2020 Introduces techniques and skillsets required to conduct threat hunting and deal with a system breach Provides new information on Cloud Security Posture Management, Microsoft Azure Threat Protection, Zero Trust Network strategies, Nation State attacks, the use of Azure Sentinel as a cloud-based SIEM for logging and investigation, and much more Book Description Cybersecurity - Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book, covering the very latest security threats and defense mechanisms including a detailed overview of Cloud Security Posture Management (CSPM) and an assessment of the current threat landscape, with additional focus on new IoT threats and cryptomining. …”
Publicado 2019
Libro electrónico -
2858por Fowler, Bradley“…You will also see how to assess and categorize the level of risk within each technology tool, as well as the impact of an information security breach on the organization. As you progress through the book, you'll review privacy issues relating to your organization, develop and manage a privacy compliance risk profile, and develop and manage a privacy compliance control profile. …”
Publicado 2023
Libro electrónico -
2859por Carter, Peter A. author“…The multi-layered approach in this book helps ensure that a single breach doesn't lead to loss or compromise of your data that is confidential and important to the business. …”
Publicado 2016
Libro electrónico -
2860por Lakshmi, Vasantha. author“…As part of this discussion you’ll cover how secure boot can help an enterprise with pre-breach scenarios. Next, you will learn how to set up Office 365 to address phishing and spam, and you will gain an understanding of how to protect your company's Windows devices. …”
Publicado 2019
Libro electrónico