Mostrando 3,081 - 3,100 Resultados de 3,562 Para Buscar 'Uberach~', tiempo de consulta: 1.51s Limitar resultados
  1. 3081
    por Watson, David
    Publicado 2013
    Tabla de Contenidos: “…Introduction Purpose; Definitions; Scope; Audience; Policy statements; Responsibilities; Enforcement, monitoring, and breaches; Ownership; Review and maintenance; Approval; Chapter 3: Setting up the Forensic Laboratory; 3.1. …”
    Libro electrónico
  2. 3082
    Publicado 2021
    Tabla de Contenidos: “…-- Resources available to digital forensic investigators -- Conclusion -- References -- 2 Digital forensic approaches and best practices -- Introduction -- First response -- Responding to a case -- Conclusion -- References -- Other useful resources -- 3 Digital forensics tool kit -- Introduction -- Computer forensics -- Write blockers -- Imaging -- Add-ons and other technologies -- Tools -- Mobile forensics tools -- Visual analysis -- Secured storage -- Damaged media -- Summary -- References -- 4 Internet and e-mail examinations -- Introduction -- E-mail -- Chat and messaging logs -- Peer-to-peer -- Search engine activity -- Internet history -- Social networking and gaming -- Malware and viruses -- Summary -- 5 Mobile forensics -- Introduction -- Mobile phone technology -- How a call is made -- Forensic challenges -- Forensic process -- Digital cell phone investigation -- Geographic positioning systems -- Cameras -- Common extraction types -- Information sources and location information -- Summary -- Cellular communications technology overview -- References -- 6 Cloud computing and digital forensics -- Introduction -- Infrastructure as a service -- Platform as a service -- Software as a service -- Service and deployment models -- Customer versus cloud provider responsibilities -- Other service models -- Multi-tenancy -- User access and provisioning -- Data protection and breaches…”
    Libro electrónico
  3. 3083
    Publicado 2017
    “…Der Band [bietet] einen ersten breiten Überblick zu den aktuellen Entwicklungen im Saarland, der unterschiedliche Perspektiven ausbalanciert.« Philipp Krämer, Zeitschrift für französische Sprache und Literatur, 128 (2018) »Dem Sammelband [gelingt] die überaus facettenreiche und konstruktiv-kritische Kommentierung einer zugegeben ambitionierten politischen Vision. …”
    Libro electrónico
  4. 3084
    por Führer, Karl Christian
    Publicado 2017
    “…Die Gewerkschaft »Öffentliche Dienste, Transport und Verkehr« (ÖTV) und ihr Vorsitzender Heinz Kluncker galten in den 1960er und 1970er Jahren als überaus mächtig: Mit dem legendären zweistelligen Lohnabschluss von 1974 brachten sie sogar Bundeskanzler Willy Brandt in Bedrängnis. …”
    Libro electrónico
  5. 3085
    Publicado 2022
    “…Nicht nur der Wald, auch Wasser ist ein überaus lohnendes Fotomotiv - ob als spiegelnder See, geschwungener Bach- oder Flusslauf (Bildkomposition!) …”
    Libro electrónico
  6. 3086
    por Williams, Vanessa L.
    Publicado 2007
    “…Ein Portal, in dem alle wichtigen Informationen verfügbar sind und auf das man jederzeit und überall zugreifen kann - das ist Microsoft SharePoint. …”
    Libro electrónico
  7. 3087
    por Lemke, Harald
    Publicado 2014
    “…Nahrungskrisen, Hungerunruhen, ungerechter Welthandel, Lebensmittelskandale, Fastfood und Fettsucht - das Unbehagen in der globalen Esskultur wächst täglich und überall. Und immer mehr Menschen haben diese Verhältnisse offenbar satt. …”
    Libro electrónico
  8. 3088
    Publicado 2012
    Tabla de Contenidos: “…Self Test Answers -- Lab Answer -- 9 Risk Management Strategy and Controls -- Classify Information Types into Levels of CIA Based on Organization/Industry -- Determine the Aggregate Score of CIA -- Determine the Minimum Required Security Controls Based on Aggregate Score -- Conduct System-Specific Risk Analysis -- Make Risk Determination -- Decide Which Security Controls Should Be Applied Based on Minimum Requirements -- Implement Controls -- Enterprise Security Architecture (ESA) Frameworks -- Continuous Monitoring -- Two-Minute Drill -- Q&amp -- A Self Test -- LAB QUESTION -- Self Test Answers -- Lab Answer -- 10 E-discovery, Data Breaches, and Incident Response -- E-discovery -- Data Breach -- System Design to Facilitate Incident Response, Taking into Account Types of Violations -- Incident and Emergency Response -- Two-Minute Drill -- Q&amp -- A Self Test -- Lab Question -- Self Test Answers -- Lab Answer -- 11 Security and Privacy Policies -- Policy Development and Updates in Light of New Business, Technology, and Environment Changes -- Process/Procedure Development and Updates in Light of Policy, Environment, and Business Changes -- Support Legal Compliance and Advocacy by Partnering with HR, Legal, Management, and Other Entities -- Use Common Business Documents to Support Security -- Use General Privacy Principles for PII/Sensitive PII -- Support the Development of Policies -- Two-Minute Drill -- Q&amp -- A Self Test -- Lab Question -- Self Test Answers -- Lab Answer -- Part III: Research and Analysis -- 12 Industry Trends -- Ongoing Security Research -- Situational Awareness -- Research Security Implications of New Business Tools -- Global Information Assurance Industry/Community -- Security Requirements for Contracts -- Two-Minute Drill -- Q&amp -- A Self Test -- Lab Question -- Self Test Answers -- Lab Answer -- 13 Enterprise Security…”
    Libro electrónico
  9. 3089
    Publicado 2022
    Tabla de Contenidos: “…Intelligence data structuring and storing -- CTI data structuring -- CTI data storing requirements -- Intelligence data storing strategies -- Summary -- Chapter 8: Effective Defense Tactics and Data Protection -- Technical requirements -- Enforcing the CIA triad - overview -- Enforcing and maintaining confidentiality -- Enforcing and maintaining integrity -- Enforcing and maintaining availability -- Challenges and pitfalls of threat defense mechanisms -- Data security top challenges -- Threat defense mechanisms' pitfalls -- Data monitoring and active analytics -- Benefits of system monitoring -- High-level architecture -- Characteristics of a reliable monitoring system -- Vulnerability assessment and data risk analysis -- Vulnerability assessment methodology -- Vulnerability assessment process -- Vulnerability assessment tools -- Vulnerability and data risk assessment -- Encryption, tokenization, masking and quarantining -- Encryption as a defense mechanism -- Tokenization as a defense mechanism -- Masking and quarantining -- Endpoint management -- Reliable endpoint management requirements -- Mobile endpoint management -- Endpoint data breach use case - point of sale -- Summary -- Chapter 9: AI Applications in Cyber Threat Analytics -- Technical requirements -- AI and CTI -- Cyber threat hunting -- How adversaries can leverage AI -- AI's position in the CTI program and security stack -- AI integration - the IBM QRadar Advisor approach -- QRadar simplified architecture -- Deploying QRadar -- What's in it for you or your organization? …”
    Libro electrónico
  10. 3090
    Publicado 2022
    Tabla de Contenidos: “…Countermeasure Selection and Implementation -- Types of Controls -- Control Assessments -- Monitoring Risks -- Effectiveness Monitoring -- Change Monitoring -- Compliance Monitoring -- Risk Reporting -- Continuous Improvement -- Supply Chain Risk Management -- Upstream and Downstream Suppliers -- Risks Associated with Hardware, Software, and Services -- Other Third-Party Risks -- Minimum Security Requirements -- Service Level Agreements -- Business Continuity -- Standards and Best Practices -- Making BCM Part of the Enterprise Security Program -- Business Impact Analysis -- Chapter Review -- Quick Review -- Questions -- Answers -- Chapter 3 Compliance -- Laws and Regulations -- Types of Legal Systems -- Common Law Revisited -- Cybercrimes and Data Breaches -- Complexities in Cybercrime -- The Evolution of Attacks -- International Issues -- Data Breaches -- Import/Export Controls -- Transborder Data Flow -- Privacy -- Licensing and Intellectual Property Requirements -- Trade Secret -- Copyright -- Trademark -- Patent -- Internal Protection of Intellectual Property -- Software Piracy -- Compliance Requirements -- Contractual, Legal, Industry Standards, and Regulatory Requirements -- Privacy Requirements -- Liability and Its Ramifications -- Requirements for Investigations -- Administrative -- Criminal -- Civil -- Regulatory -- Chapter Review -- Quick Review -- Questions -- Answers -- Chapter 4 Frameworks -- Overview of Frameworks -- Risk Frameworks -- NIST RMF -- ISO/IEC 27005 -- OCTAVE -- FAIR -- Information Security Frameworks -- Security Program Frameworks -- Security Control Frameworks -- Enterprise Architecture Frameworks -- Why Do We Need Enterprise Architecture Frameworks? …”
    Libro electrónico
  11. 3091
    Publicado 2017
    Tabla de Contenidos: “…Pitfalls of Statutory Reform in Private Law: Recipient Liability for Breach of Trust -- 25. Recent Reforms to Australian Charity Law -- 26. …”
    Libro electrónico
  12. 3092
    Publicado 2021
    Tabla de Contenidos: “…Private Cloud -- Cloud Architectures and Deployment -- Responsive Design -- Cloud-Native Design -- Deployment -- Dealing with REST -- Common Cloud Threats -- Access Management -- Data Breach -- Web Application Compromise -- Credential Compromise -- Insider Threat -- Internet of Things -- Operational Technology -- Summary -- Review Questions -- Appendix Answers to Review Questions -- Chapter 2: Networking Foundations -- Chapter 3: Security Foundations -- Chapter 4: Footprinting and Reconnaissance -- Chapter 5: Scanning Networks -- Chapter 6: Enumeration -- Chapter 7: System Hacking -- Chapter 8: Malware -- Chapter 9: Sniffing -- Chapter 10: Social Engineering -- Chapter 11: Wireless Security -- Chapter 12: Attack and Defense -- Chapter 13: Cryptography -- Chapter 14: Security Architecture and Design -- Chapter 15: Cloud Computing and the Internet of Things -- Index -- Comprehensive Online Learning Environment -- Register and Access the Online Test Bank -- EULA…”
    Libro electrónico
  13. 3093
    Publicado 2022
    Tabla de Contenidos: “…Operational Considerations -- Exploring Visualization Types -- Charts -- Maps -- Waterfall -- Infographic -- Word Cloud -- Comparing Report Types -- Static and Dynamic -- Ad Hoc -- Self-Service (On-Demand) -- Recurring Reports -- Tactical and Research -- Summary -- Exam Essentials -- Review Questions -- Chapter 8 Data Governance -- Data Governance Concepts -- Data Governance Roles -- Access Requirements -- Security Requirements -- Storage Environment Requirements -- Use Requirements -- Entity Relationship Requirements -- Data Classification Requirements -- Jurisdiction Requirements -- Breach Reporting Requirements -- Understanding Master Data Management -- Processes -- Circumstances -- Summary -- Exam Essentials -- Review Questions -- Appendix Answers to the Review Questions -- Chapter 2: Understanding Data -- Chapter 3: Databases and Data Acquisition -- Chapter 4: Data Quality -- Chapter 5: Data Analysis and Statistics -- Chapter 6: Data Analytics Tools -- Chapter 7: Data Visualization with Reports and Dashboards -- Chapter 8: Data Governance -- Index -- EULA…”
    Libro electrónico
  14. 3094
    Publicado 2009
    Tabla de Contenidos: “…; Never Str eet; Epílogo; B) El muchacho eléctrico; Cementerio; La morte saison; Engranajes; Soles gemelos; El sexo de los ángeles; En el desierto óptico; Sin título; En blanco; En blanco; C) Almacén de centauros; Pregunta al air e libr e; Espaciolina; La casa de los guardas; Malibu Beach; El ocaso de los dioses; ¿Termómetro? son las horas; Página 51; Laughing in my grave; Matinal; Wet dr eams festival; Una princesa de Marte; Inventamos el sexo; Finale…”
    Libro electrónico
  15. 3095
    por Atorie Wan .
    Publicado 2008
    Tabla de Contenidos: “…Conté volum 2: House of Weeds, p.10; Mado Building, p. 12; Showa Kinen Park Hanamidori Cultural Center, p. 14; White Limousine Yatai, p. 17; Puppet Theater House, p. 18; Monkey Way, p. 19; Sway House, p. 20; Double Chimney, p. 22; Ikushima Library, p. 26; nLDK Deformation, p. 30; Pony Garden, p. 32; House Jungle Gym, p. 36; Machiya Guest House, p. 38; Bokutei, p. 40; Tread Machiya, p. 42; Small Case Study House, p. 44; Linz Super Branch, p. 46; Four Boxes Gallery, p. 48; Tower Machiya, p. 50; Split Machiya, p. 52; Beach House, p. 54; Global Center (Aichi Prefecture), p. 56; BMW Guggenheim Lab New York, p. 59; Miyashita Park, p. 64; Terrace House, p. 68; Izu Book Café, p. 70; Kitamoto Station West Square, p. 72; Antiparos Ring, p. 74; Koisuru-Bruta Laboratory, p. 77; Double Gable House, p. 80; Model Home, p. 82; House of Boat, p. 84; Micro Office, p. 88; BMW Guggenheim Lab Mumbai, p. 90; Logements Sociaux Rue Rebière, p. 92; Core House, p. 94; Takoshinmachi House, p. 96; Tama Loggia, p 100; Tama Machiya, p. 112; Magariya, p. 114…”
    Libro
  16. 3096
    Publicado 2016
    “…Mit Beiträgen von Heiner Bielefeldt (Erlangen-Nürnberg/Genf), Lotta Eriksson (Stockholm), Andreas Frewer (Erlangen-Nürnberg), Christina Heinicke (Erlangen-Nürnberg), Michael Krennerich (Erlangen-Nürnberg), Amrei Müller (Oslo), Andreas Reis (Genf), Abha Saxena (Genf), Martina Schmidhuber (Erlangen-Nürnberg/Salzburg) und Caroline Welsh (Berlin) sowie einem Anhang mit der deutschen Übersetzung des General Comment 14 »Das Recht auf ein Höchstmaß an Gesundheit« des UN-Ausschusses für wirtschaftliche, soziale und kulturelle Menschenrechte »Die interdisziplinäre Sicht auf die Gesundheit als Menschenrecht erweist sich als überaus produktiv. Sie zeigt eindringlich, dass erheblicher Forschungs-, aber eben auch Handlungsbedarf besteht. …”
    Libro electrónico
  17. 3097
    Publicado 2015
    “…Dabei steht nichts weniger als die Eignung von Raum als Zentralkategorie für eine neu zu konzipierende Kommunikationsgeschichte zur Disposition »All jenen, die sich für eine fruchtbare Verbindung von Geschichte und Geopraphie interessieren, sei dieser Sammelband wärmstens empfohlen.« Riccardo Bavaj, Westfälische Forschungen, 57 (2007) »So liegt hier ein Buch vor, das es auf faszinierende Weise schafft, den Raumbegriff davor zu bewahren substanzlose Modeerscheinung zu sein und zeigt, wie viele überaus spannende und wichtige neue Fragen unentdeckt in oft betrachteten Themen warten und durch eine Justierung des Blickwinkels sichtbar werden. …”
    Electrónico
  18. 3098
    Publicado 2014
    “…Ob auf dem stationären Rechner, dem Smartphone oder einfach im Netz – alle Dateien sind immer und überall verfügbar. So hilft Ihnen Dropbox über alle Plattformen hinweg beim effektiven Arbeiten.Christian Schilling erklärt in diesem Handbuch Schritt für Schritt, wie Sie Ihr Dropbox-Konto einrichten und die Software auf allen Geräten installieren. …”
    Libro electrónico
  19. 3099
    por Kneubühler, Lara A.
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Inhalt -- Vorwort -- Einleitung -- Literaturverzeichnis -- Überall mit queeren Menschen rechnen -- Literaturverzeichnis -- Queere Orthodoxien - wie queere Perspektiven alte Theologie neu entdecken lassen -- 1. …”
    Libro electrónico
  20. 3100
    Publicado 2014
    Tabla de Contenidos: “…; 1.2.1 The Ability to Perform as Intended; 1.2.2 For a Specified Time; 1.2.3 Life-Cycle Conditions; 1.2.4 Reliability as a Relative Measure; 1.3 Quality, Customer Satisfaction, and System Effectiveness; 1.4 Performance, Quality, and Reliability; 1.5 Reliability and the System Life Cycle; 1.6 Consequences of Failure; 1.6.1 Financial Loss; 1.6.2 Breach of Public Trust; 1.6.3 Legal Liability; 1.6.4 Intangible Losses…”
    Libro electrónico