Mostrando 3,101 - 3,120 Resultados de 3,562 Para Buscar 'Uberach~', tiempo de consulta: 1.48s Limitar resultados
  1. 3101
    Publicado 2023
    Tabla de Contenidos: “…6.3 The Necessity of Whistleblowing in Counter Crime Framework -- 6.4 Protection and Guarantees for Whistleblowers -- 6.5 Channels and Procedures of Disclosure for Whistleblowers -- 6.6 Incentives and Remedies for Whistleblowers -- 6.7 Sanctions on Whistleblower Protection Breaches -- 6.8 Transposition Progress of the WBPD -- 6.9 Human Factors in Whistleblowing -- 6.10 Conclusion -- 7. …”
    Libro electrónico
  2. 3102
    Publicado 2023
    Tabla de Contenidos: “…System intrusions and data breaches -- 6.4.4. Disinformation and malicious communications -- 6.4.5. …”
    Libro electrónico
  3. 3103
    Publicado 2024
    Tabla de Contenidos: “…10.3 Issues, Challenges and Problem Statement -- 10.3.1 Time and Memory Constraints -- 10.3.2 Class Imbalance -- 10.3.3 Concept Drift -- 10.4 Cybersecurity and IoT -- 10.5 Conclusion -- Chapter 11 A Study on Image Detection and Extraction to Estimate Distracted Drivers Using CNN and IoT -- 11.1 Introduction -- 11.2 Motivations -- 11.3 Literature Survey or Related Work -- 11.4 Existing System -- 11.5 Methodology and Objectives -- 11.5.1 Device Initialisation Module -- 11.5.2 Drowsiness Detection Module -- 11.5.3 Alert Module -- 11.6 Proposed System -- 11.7 Face Detection Using OpenCV -- 11.8 Search Strategy -- 11.9 Conclusion -- 11.10 Future Enhancement -- Chapter 12 Social Engineering: Cyberattacks, Countermeasures, and Conclusions -- 12.1 Introduction -- 12.2 Case Study on Social Engg Attack-IBMReport [25] -- 12.2.1 The Cost of Average Social Engineering-Related Breach -- 12.3 Methodology and Detection -- 12.3.1 Social Engineering Toolkit for SMS Spoofing -- 12.3.2 SMS Spam Message Detection with Term Frequency-Inverse Document Frequency (TF-IDF) and Random Forest Algorithm -- 12.4 Results -- 12.5 Conclusion -- 12.6 Acknowledgment -- Index…”
    Libro electrónico
  4. 3104
    Publicado 2023
    “…Implement industry best practices to identify vulnerabilities and protect your data, models, environment, and applications while learning how to recover from a security breach Key Features Learn about machine learning attacks and assess your workloads for vulnerabilities Gain insights into securing data, infrastructure, and workloads effectively Discover how to set and maintain a better security posture with the Azure Machine Learning platform Purchase of the print or Kindle book includes a free PDF eBook Book Description With AI and machine learning (ML) models gaining popularity and integrating into more and more applications, it is more important than ever to ensure that models perform accurately and are not vulnerable to cyberattacks. …”
    Libro electrónico
  5. 3105
    Publicado 2023
    “…Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. …”
    Libro electrónico
  6. 3106
    Publicado 2023
    Tabla de Contenidos: “…Security risk is business risk -- Security is a business enabler -- Security is everyone's responsibility -- Security risk accountability starts at the top -- Assume compromise (assume breach) -- Explicit validation of trust -- Asset-centric and data-centric security -- Cybersecurity is a team sport -- Factor three - human empathy -- Zero Trust provides a competitive advantage -- Key cultural themes -- Summary -- Chapter 8: Adoption with the Three-Pillar Model -- Introduction to the three pillars -- Playbook structure -- Playbook layout -- The strategic pillar -- The operational pillar -- The operating model pillar -- Stitching it all together with the Zero Trust Playbook -- Zero Trust integration drives changes -- Summary -- Chapter 9: The Zero Trust Six-Stage Plan -- Overview of the six-stage plan -- Using the playbook stages effectively -- The playbook stages in detail -- Stage 1 - Establish a strategy -- Stage 2 - Set up an operating model -- Stage 3 - Create the architecture and model -- Stage 4 - Tailor to the business -- Stage 5 - Implement and improve -- Stage 6 - Continuously monitor and evolve -- Summary -- Chapter 10: Zero Trust Playbook Roles -- Role-based approach -- Integration of roles with the six-stage plan -- Zero Trust affects everyone -- Role definition and naming -- Illustrative list of roles -- Per-role guidance -- Role mission and purpose -- Role creation and evolution -- Key role relationships -- Required skills and knowledge -- Tooling and capabilities for each role -- Zero Trust impact and imperatives for each role -- Playbook-stage involvement for each role -- A day in the life of Zero Trust for each role -- Defining and measuring success -- Summary of per-role guidance -- Making it real -- Summary -- Book 1 summary -- What's next in The Zero Trust Playbook Series -- Index -- Other Books You May Enjoy…”
    Libro electrónico
  7. 3107
    Publicado 2018
    Tabla de Contenidos: “…-- Summary -- Chapter 2: Producing the Right Feedback When Failing -- Location, location, location -- Tests are living documentation -- Reliability -- The test automation team that works in isolation -- Oh, that test always flickers - don't worry about it -- Baking in reliability -- Git -- Subversion -- Continuous integration is key -- Setting up TeamCity -- Setting up Jenkins -- Extending our capabilities by using a Selenium-Grid -- A picture paints a thousand words -- Don't be afraid of the big bad stack trace -- Summary -- Chapter 3: Exceptions Are Actually Oracles -- NoSuchElementException -- NoSuchFrameException -- NoSuchWindowException -- ElementNotVisibleException -- StaleElementReferenceException -- InvalidElementStateException -- UnsupportedCommandException -- UnreachableBrowserException -- SessionNotFoundException -- WebDriverException - element is not clickable at point -- NoAlertPresentException -- Summary -- Chapter 4: The Waiting Game -- Are we nearly ready yet? …”
    Libro electrónico
  8. 3108
    por Akin, Thomas
    Publicado 2002
    Tabla de Contenidos:
    Libro electrónico
  9. 3109
    Publicado 2008
    Tabla de Contenidos: “…Latte e formaggio nel mondo monastico / Gabriele Archetti -- Il formaggio nella liturgia e nelle consuetudini monastiche bizantine / Stefano Parenti -- Qualche osservazione sul latte nell'imaginario religioso del medioevo occidentale / Nicolangelo d'Acunto -- Il latte e il formaggio nei testi penitenziali e nelle fonti canonistiche / Roberto Bellini -- Beatus venter qui te portavit et ubera quae suxisti . Elementi per un'iconografia / Giuseppe Fusari -- La Lactatio mistica di san Bernardo. …”
    Libro
  10. 3110
    Publicado 2023
    Tabla de Contenidos: “…Subnetting and IP addressing -- Load balancing -- CDNs -- Considerations and cost optimization strategies for networks -- Network security -- Performance optimization -- Cost optimization -- Summary -- Part 3: Security, Compliance, and Databases -- Chapter 6: Security and Compliance 1 - Cloud Perspective -- Technical requirements -- Introduction to security in cloud computing -- Understanding cloud security risks -- Data breaches -- Insider threats -- Data loss and recovery -- Insecure APIs -- DoS attacks -- Shared technology vulnerabilities -- Cloud security tools and technologies -- IAM -- Encryption and data protection -- Firewalls and network security -- IDS/IPS -- Summary -- Chapter 7: Security and Compliance 2 - Cloud Perspective -- Technical requirements -- Compliance and legal considerations -- AWS Artifact -- Azure Compliance Manager -- IR and cloud forensics -- Tools and services for IR and cloud forensics -- Managing cloud security at scale -- Evolving threat landscape -- Cloud security best practices -- Summary -- Chapter 8: Database Services 1 - Cloud Perspective -- Technical requirements -- Overview of database services in the cloud -- Types of databases - relational and NoSQL -- Setting up OCI -- Data warehousing services in the cloud -- Setting up Amazon Redshift -- Setting up Google BigQuery -- Databases beyond the traditional realm -- Document database -- In-memory database -- Graph database -- Columnar database -- Key-value store -- Time-series database -- Converged database -- Wide-column store -- Summary -- Chapter 9: Database Services 2 - Cloud Perspective -- Data modeling and schema design -- Conceptual data model -- Physical data model -- Normalization -- Denormalization -- Benefits of data modeling and schema design -- Database provisioning and configuration -- Database provisioning -- Database configuration…”
    Libro electrónico
  11. 3111
    por Groschupp, Steffen
    Publicado 2022
    Tabla de Contenidos: “…Erkundungsaufstellungen - Online -- 14.1 Die Politik lernt im Dialog mit Aristoteles und Hegel -- 14.2 Die Nachhaltigkeit entdeckt den Spannungsbogen -- 14.3 Ein neues Zeichen hilft uns zu Verstehen -- 14.4 Die Metapher bekommt ein Kind -- 14.5 In der Bewusstseinsmitte steht nur scheinbar die ‚Wahrheit -- 14.6 Die Reflexion in eine andere Dimension -- 14.7 Alles Wissen ist in uns und überall -- 15. Letzter Halt vor der nächsten Dimension -- 15.1 Über die Unschlüssigkeit im Bahnhof der 15. …”
    Libro electrónico
  12. 3112
    Publicado 2023
    Tabla de Contenidos: “…Automatic inspection of finished goods or parts -- Summary -- Chapter 8: Pattern Implementation in the Agriculture Domain -- An overview of smart agriculture -- Key terms/definitions -- Factors influencing greater adoption of smart agriculture technologies -- Use cases of IoT in smart agriculture -- Resolving agricultural challenges with a land consolidation platform -- Mitigating agricultural challenges -- Summary -- Part 3: Implementation Considerations -- Chapter 9: Sensors and Actuator Selection -- Key terms/definitions -- Usage scenarios of sensors -- Operation and usage scenarios of actuators -- Key characteristics of actuator types -- Use cases for actuators -- Use case - connected coffee vending machine -- Factors to be considered while selecting a sensor or actuator -- Introducing wireless sensor and actuator networks -- Summary -- Chapter 10: Analytics in an IoT Context -- Key terms/definitions -- Implementing IoT analytics -- Stages of implementing IoT analytics -- Integrating ML capabilities into IoT analytics -- Understanding the importance of data quality -- Relevance of edge analytics -- Considerations for IoT visualization -- Summary -- Chapter 11: Security in the IoT Context -- Key terms/definitions -- Comparing IoT security and IT security -- Challenges in securing IoT solutions -- IoT security vulnerabilities -- Major IoT security breaches -- Mitigating IoT security vulnerabilities -- Domain-specific security considerations -- Applicable security standards and best practices -- Summary -- Part 4: Extending IoT Solutions -- Chapter 12: Exploring Synergies with Emerging Technologies -- Blockchain -- Benefits of combining IoT and blockchain -- Possible use cases -- Generative AI -- Benefits of combining IoT and generative AI -- Possible use cases -- Large language models -- Benefits of combining IoT and LLM -- Possible use cases…”
    Libro electrónico
  13. 3113
    Publicado 2023
    Tabla de Contenidos: “…5.1 Becoming Aware of Tensions Between Situational and Contractual Norms -- 5.2 Developing a More Precise Formulation of a Situational Norm: The Diagrammatic Register -- 5.3 After Detecting Breaches of Norms: Justifying Actions and the Professional Obligations -- 6 Theorizing by Connecting Practical Rationality Constructs to Those from Other Theories -- 6.1 Connecting Mathematical Knowledge for Teaching to Practical Rationality -- 6.2 Connecting Teachers' Beliefs to Practical Rationality -- 6.3 The Uses of Practical Rationality -- 7 Conclusion: Addressing the Questions Posed -- References -- Chapter 8: Theory for Teaching and Teaching for Theory: Artifacts as Tangible Entities for Storing and Improving Professional Knowledge for Teaching -- 1 What Is a Theory (of Teaching)? …”
    Libro electrónico
  14. 3114
    por Laudon, Kenneth
    Publicado 2021
    Tabla de Contenidos: “…-- Dimensions of E-commerce Security -- The Tension Between Security and Other Values -- Security versus Ease of Use -- Public Safety and the Criminal Uses of the Internet -- 5.2 Security Threats in the E-commerce Environment -- Malicious Code -- Potentially Unwanted Programs (PUPs) -- Phishing -- Hacking, Cybervandalism, and Hacktivism -- Data Breaches -- Credit Card Fraud/Theft -- Insight on Society: The Marriott Data Breach -- Identity Fraud -- Spoofing, Pharming, and Spam (Junk) Websites -- Sniffing and Man-in-the-Middle Attacks -- Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks -- Insider Attacks…”
    Libro electrónico
  15. 3115
    Publicado 2017
    “…Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. …”
    Libro electrónico
  16. 3116
    Publicado 2023
    Tabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Preface -- Contents -- Table of Cases -- Introduction -- 1 Deconstructing Positive Obligations -- Introduction -- 1.1 The State as an Institutional Mediator -- 1.2 Justifications for Positive Obligations -- 1.3 Plurality of Obligations Owed by the State -- 1.4 Priority of Rights as Organizational Principles -- 1.5 Trigger, Scope, Content, and Types of Positive Obligations -- Conclusion -- 2 State Knowledge -- Introduction -- 2.1 The Role of Fault in State Responsibility -- 2.2 Triggering and Breach of Positive Obligations under ECHR -- 2.3 Actual Knowledge versus Putative Knowledge -- 2.3.1 Different Possible Ways of Assessing Putative Knowledge -- 2.3.2 State Knowledge Necessarily Implies Normative Assessment -- 2.4 Assessment of Knowledge -- 2.5 No Benefit of Hindsight -- 2.6 Burden of Proof -- 2.7 The Nature and the Level of Risk -- 2.7.1 The 'Real and Immediate Risk' Standard -- 2.7.2 Man-made versus Natural Harms -- 2.8 Contributory Fault of the Victim -- Conclusion -- 3 Causation -- Introduction -- 3.1 The Role and the Standard of Causation -- 3.2 Control and Causation -- 3.2.1 The Rules on Attribution -- 3.2.2 The Role of Control and the Extension of the Logic of the Rules on Attribution -- 3.2.3 Control and Prevention of State-inflicted Harm -- 3.2.4 Assumption of Control in the Area of Public Services -- 3.2.5 Source of the Harm and the Related Level of Control -- 3.2.6 Assumption of Control over the Victim -- 3.3 Techniques for Avoiding Causation -- 3.3.1 Domestic Legality -- 3.3.2 Procedural Protection -- 3.4 Technique for Limiting Responsibility when Causation is Present -- Conclusion -- 4 Reasonableness -- Introduction -- 4.1 Intertwinement with Knowledge and Causation -- 4.1.1 Weak Causation Counterbalanced by the Reasonableness Standard…”
    Libro electrónico
  17. 3117
    por Enea, Constantin
    Publicado 2023
    Tabla de Contenidos: “…References -- Partial Quantifier Elimination and Property Generation -- 1 Introduction -- 2 Basic Definitions -- 3 Property Generation by PQE -- 3.1 High-Level View of Property Generation by PQE -- 3.2 Property Generation as Generalization of Testing -- 3.3 Computing Properties Efficiently -- 3.4 Using Design Coverage for Generation of Unwanted Properties -- 3.5 High-Quality Tests Specified by a Property Generated by PQE -- 4 Invariant Generation by PQE -- 4.1 Bugs Making States Unreachable -- 4.2 Proving Operative State Unreachability by Invariant Generation -- 5 Introducing EG-PQE -- 5.1 An Example -- 5.2 Description of EG-PQE -- 5.3 Discussion -- 6 Introducing EG-PQE+ -- 6.1 Main Idea -- 6.2 Discussion -- 7 Experiment with FIFO Buffers -- 7.1 Buffer Description -- 7.2 Bug Detection by Invariant Generation -- 7.3 Detection of the Bug by Conventional Methods -- 8 Experiments with HWMCC Benchmarks -- 8.1 Experiment 1 -- 8.2 Experiment 2 -- 8.3 Experiment 3 -- 9 Properties Mimicking Symbolic Simulation -- 10 Some Background -- 11 Conclusions and Directions for Future Research -- References -- Rounding Meets Approximate Model Counting -- 1 Introduction -- 2 Notation and Preliminaries -- 2.1 Universal Hash Functions -- 2.2 Helpful Combinatorial Inequality -- 3 Related Work -- 4 Weakness of ApproxMC -- 5 Rounding Model Counting -- 5.1 Algorithm -- 5.2 Repetition Reduction -- 5.3 Proof of Lemma 4 for Case 2-1&lt -- 1 -- 6 Experimental Evaluation -- 6.1 RQ1. …”
    Libro electrónico
  18. 3118
    por Solterbeck, Sven
    Publicado 2018
    “…Ein Konkurs bedrohte zudem den Besitzstand einer Adelsfamilie, der überaus wichtig für ihren ständischen Rang war. Wie reagierten eine Adelsfamilie und ihre Umwelt auf dieses Spannungsverhältnis und was waren die Folgen eines Konkurses? …”
    Tesis
  19. 3119
    Publicado 2019
    “…Nicht nur, aber auch in der Medienwissenschaft wünscht man dieser Anthologie viele Lesende und Anschlussuntersuchungen.« Malte Hagener, MEDIENwissenschaft, 2-3 (2020) »Der Sammelband leistet einen wichtigen Beitrag zum Verständnis der zunehmend (auch) digitalisierten Struktur von Öffentlichkeit.« Frank Überall, www.socialnet.de, 16.03.2020 O-Ton: »Wie affektgetrieben ist das Netz?…”
    Electrónico
  20. 3120
    Publicado 2019
    Tabla de Contenidos: “…. -- Humans Are the Last Line of Defense -- Data Breaches Tell the Story -- Auditors and Regulators Recognize the Need for Security Awareness Training -- Traditional Security Awareness Program Methods Fall Short of Their Goals -- Key Takeaways -- References -- Chapter 2 Choosing a Transformational Approach -- Your "Why" Determines Your "What" -- Down the Rabbit Hole -- Outlining the Key Components and Tools of a Transformational Program -- A Map of What's to Come -- Part 1 in a Nutshell -- Part 2 in a Nutshell -- Part 3 in a Nutshell -- Key Takeaways -- Notes and References -- Part II The Tools of Transformation -- Chapter 3 Marketing and Communications 101 for Security Awareness Leaders -- The Communications Conundrum -- The Marketing Connection -- Defining Marketing -- Embedding Your Messages -- Get the Right Message to the Right Person at the Right Time -- Campaigns: If You Aren't Reinforcing, Your Audience Is Forgetting -- Tracking Results and Measuring Effectiveness -- Know When to Ask for Help -- Key Takeaways -- Notes and References -- Additional Reading -- Chapter 4 Behavior Management 101 for Security Awareness Leaders -- Your Users Aren't Stupid, They're Human -- Thinking, Fast and Slow -- System 1 Thinking -- System 2 Thinking -- Working with Human Nature Rather Than Against -- The Nuts and Bolts of Shaping Behavior -- The Fogg Behavior Model -- The Problem with Motivation -- Nudge Them in the Right Direction -- Frames: Why Context Is Everything -- Designing and Debugging Behavior -- Being Intentional with Target Groups…”
    Libro electrónico