Mostrando 3,201 - 3,220 Resultados de 3,562 Para Buscar 'Uberach~', tiempo de consulta: 1.62s Limitar resultados
  1. 3201
  2. 3202
    Capítulo
  3. 3203
    Tabla de Contenidos:
    Libro electrónico
  4. 3204
    por Subirachs, Josep M., 1927-2014
    Publicado 1994
    Libro
  5. 3205
    Publicado 2017
    Tabla de Contenidos: “…ALERTS AND EVENTS -- Reconnaissance -- Default Password Breach -- The Basics -- 11. SGUIL: TUNING GRAPHICS PROCESSING UNIT RULES, ALERTS, AND RESPONSES -- Identifying Nuisance Rules…”
    Libro electrónico
  6. 3206
    Publicado 2023
    Tabla de Contenidos: “…Cover -- CopyRight -- Contributors -- Table of Contents -- Preface -- Section I: Setting up a Secure Linux System -- Chapter 1: Running Linux in a Virtual Environment -- Looking at the threat landscape -- Why do security breaches happen? -- Keeping up with security news -- Differences between physical, virtual, and cloud setups -- Introducing VirtualBox and Cygwin -- Installing a virtual machine in VirtualBox -- Installing the EPEL repository on the CentOS 7 virtual machine -- Installing the EPEL repository on the AlmaLinux 8/9 virtual machines -- Configuring a network for VirtualBox virtual machines -- Creating a virtual machine snapshot with VirtualBox -- Using Cygwin to connect to your virtual machines -- Installing Cygwin on your Windows host -- Using the Windows 10 SSH client to interface with Linux virtual machines -- Using the Windows 11 SSH client to interface with Linux virtual machines -- Cygwin versus the Windows shell -- Keeping the Linux systems updated -- Updating Debian-based systems -- Configuring auto updates for Ubuntu -- Updating Red Hat 7-based systems -- Updating Red Hat 8/9-based systems -- Managing updates in an enterprise -- Summary -- Questions -- Further reading -- Answers -- Chapter 2: Securing Administrative User Accounts -- The dangers of logging in as the root user -- The advantages of using sudo -- Setting up sudo privileges for full administrative users -- Adding users to a predefined admin group -- Creating an entry in the sudo policy file -- Setting up sudo for users with only certain delegated privileges -- Hands-on lab for assigning limited sudo privileges -- Advanced tips and tricks for using sudo -- The sudo timer -- View your sudo privileges -- Hands-on lab for disabling the sudo timer -- Preventing users from having root shell access -- Preventing users from using shell escapes…”
    Libro electrónico
  7. 3207
    por Köhler, Ben, 1989-
    Publicado 2021
    Tabla de Contenidos: “…Präventionsfunktion -- a) Verhinderung von Vertragsverletzungen (pacta sunt servanda) -- b) Rechtsökonomische Kritik (efficient breach of contract) -- c) Die Ablehnung eines Zufallsgewinns (windfall profit) -- 2. …”
    Libro electrónico
  8. 3208
    Publicado 2023
    Tabla de Contenidos: “…Potentially Unwanted Programs (PUPs) -- Phishing -- Hacking, Cybervandalism, and Hacktivism -- Data Breaches -- Credit Card Fraud/Theft -- Identity Fraud -- Spoofing, Pharming, and Spam (Junk) Websites -- Sniffing and Man-in-the-Middle Attacks -- Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks -- Insider Attacks -- Poorly Designed Software -- Social Network Security Issues -- Mobile Platform Security Issues -- Insight on Technology: Pegasus Exploits Zero-Day Vulnerabilities to Create Mobile Platform for Cyberespionage -- Cloud Security Issues -- Internet of Things Security Issues -- Metaverse Security Issues -- 5.3 Technology Solutions -- Protecting Internet Communications -- Encryption -- Securing Channels of Communication -- Protecting Networks -- Protecting Servers and Clients -- 5.4 Management Policies, Business Procedures, and Public Laws -- A Security Plan: Management Policies -- Insight on Business: Are Biometrics the Solution for E- commerce Security? …”
    Libro electrónico
  9. 3209
    Publicado 2025
    Tabla de Contenidos: “…ALERTS AND EVENTS -- Reconnaissance -- Default Password Breach -- The Basics -- 11. SGUIL: TUNING GRAPHICS PROCESSING UNIT RULES, ALERTS, AND RESPONSES -- Identifying Nuisance Rules -- Understanding the Enterprise Log Search and Archive Database Structure -- Too Many Alerts! …”
    Libro electrónico
  10. 3210
    por Creighton, Ryan Henson
    Publicado 2013
    Tabla de Contenidos: “…-- Somebody get me a bucket -- Time for action - declare a variable to store the Screen midpoint -- What just happened - we've gone too var -- Using all three dees -- Time for action - follow the y position of the mouse -- A keep-up game for robots -- Once more into the breach -- Time for action - re-visit the Unity Language Reference -- Our work here is done -- Time for action - add the sample code to your Script -- One final tweak -- What's a quaternion? …”
    Libro electrónico
  11. 3211
    por OECD
    Publicado 2023
    Tabla de Contenidos: “…Legislation to protect workers' fundamental rights -- Capacity for human determination and human interaction -- Breaches of privacy -- Bias and discrimination -- Freedom of association and the right to collective bargaining…”
    Libro electrónico
  12. 3212
    Capítulo
  13. 3213
    Publicado 1967
    Libro
  14. 3214
    Publicado 2018
    Tabla de Contenidos: “…8.2.1 Theft or Abuse of Network Assets 206 -- 8.2.2 Theft of Service 206 -- 8.2.3 Theft of IPTV-Related Data 208 -- 8.2.4 Disruption of Service 208 -- 8.2.5 Privacy Breach 209 -- 8.2.6 Compromise of Platform Integrity 209 -- 8.3 Security Issues of IPTV Delivery Networks 209 -- 8.3.1 Protocols Vulnerabilities 214 -- 8.3.1.1 IGMP 215 -- 8.3.1.2 PIM 215 -- 8.3.1.3 MBGP 216 -- 8.3.1.4 MSDP 217 -- 8.3.1.5 RTP and RTP Control Protocol (RTCP) 218 -- 8.4 Countering theThreats 219 -- 8.5 Open Research Issues 221 -- 8.6 Conclusions 222 -- References 222 -- 9 Anomaly Detection and Big Data in IPTV Networks 225 /Mohiuddin Ahmed andMd. …”
    Libro electrónico
  15. 3215
    por Saludes i Amat, Anna Maria
    Publicado 1998
    Libro
  16. 3216
    por Cerdà i Subirachs, Joan
    Publicado 1994
    Libro
  17. 3217
    Publicado 2018
    Tabla de Contenidos: “…10.2 Defending Against Buffer Overflows -- 10.3 Other forms of Overflow Attacks -- 10.4 Key Terms, Review Questions, and Problems -- Chapter 11 Software Security -- 11.1 Software Security Issues -- 11.2 Handling Program Input -- 11.3 Writing Safe Program Code -- 11.4 Interacting with the Operating System and Other Programs -- 11.5 Handling Program Output -- 11.6 Key Terms, Review Questions, and Problems -- Chapter 12 Operating System Security -- 12.1 Introduction to Operating System Security -- 12.2 System Security Planning -- 12.3 Operating Systems Hardening -- 12.4 Application Security -- 12.5 Security Maintenance -- 12.6 Linux/Unix Security -- 12.7 Windows Security -- 12.8 Virtualization Security -- 12.9 Key Terms, Review Questions, and Problems -- Chapter 13 Cloud and IoT Security -- 13.1 Cloud Computing -- 13.2 Cloud Security Concepts -- 13.3 Cloud Security Approaches -- 13.4 The Internet of Things -- 13.5 IoT Security -- 13.6 Key Terms and Review Questions -- Part Three Management Issues -- Chapter 14 IT Security Management and Risk Assessment -- 14.1 IT Security Management -- 14.2 Organizational Context and Security Policy -- 14.3 Security Risk Assessment -- 14.4 Detailed Security Risk Analysis -- 14.5 Case Study: Silver Star Mines -- 14.6 Key Terms, Review Questions, and Problems -- Chapter 15 IT Security Controls, Plans, and Procedures -- 15.1 IT Security Management Implementation -- 15.2 Security Controls or Safeguards -- 15.3 IT Security Plan -- 15.4 Implementation of Controls -- 15.5 Monitoring Risks -- 15.6 Case Study: Silver Star Mines -- 15.7 Key Terms, Review Questions, and Problems -- Chapter 16 Physical and Infrastructure Security -- 16.1 Overview -- 16.2 Physical Security Threats -- 16.3 Physical Security Prevention and Mitigation Measures -- 16.4 Recovery from Physical Security Breaches…”
    Libro electrónico
  18. 3218
    por Kumar, Sandeep
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 Impact of Technology on Daily Food Habits and Their Effects on Health -- 1.1 Introduction -- 1.1.1 Impacts of Food on Health -- 1.1.2 Impact of Technology on Our Eating Habits -- 1.2 Technologies, Foodies, and Consciousness -- 1.3 Government Programs to Encourage Healthy Choices -- 1.4 Technology's Impact on Our Food Consumption -- 1.5 Customized Food is the Future of Food -- 1.6 Impact of Food Technology and Innovation on Nutrition and Health -- 1.7 Top Prominent and Emerging Food Technology Trends -- 1.8 Discussion -- 1.9 Conclusions -- References -- Chapter 2 Issues in Healthcare and the Role of Machine Learning in Healthcare -- 2.1 Introduction -- 2.2 Issues in Healthcare -- 2.2.1 Increase in Volume of Data -- 2.2.1.1 Data Management -- 2.2.1.2 Economic Difficulties -- 2.2.2 Data Privacy Issues -- 2.2.2.1 Cyber Attack and Hacking -- 2.2.2.2 Data Sharing Trust in the Third Party -- 2.2.2.3 Data Breaching -- 2.2.2.4 Lack of Policy and Constitutional Limitations -- 2.2.2.5 Doctor-Patient Relationship -- 2.2.2.6 Data Storage and Management -- 2.2.3 Disease-Centric Database -- 2.2.4 Data Utilization -- 2.2.5 Lack of Technology and Infrastructure -- 2.3 Factors Affecting the Health -- 2.4 Machine Learning in Healthcare -- 2.4.1 Clinical Decision Support Systems in Healthcare -- 2.4.2 Use of Machine Learning in Public Health -- 2.5 Conclusion -- References -- Chapter 3 Improving Accuracy in Predicting Stress Levels of Working Women Using Convolutional Neural Networks -- 3.1 Introduction -- 3.2 Literature Survey -- 3.3 Proposed Methodology -- 3.3.1 Pre-Processing of Data -- 3.3.2 Features Extraction -- 3.3.3 Selection of Features -- 3.3.4 Classification -- 3.4 Result and Discussion -- 3.5 Conclusion and Future Scope -- References…”
    Libro electrónico
  19. 3219
    por Cots, Jordi, 1927-
    Publicado 1958
    Libro
  20. 3220
    Publicado 1995
    Libro