Mostrando 3,301 - 3,320 Resultados de 3,562 Para Buscar 'Uberach~', tiempo de consulta: 1.57s Limitar resultados
  1. 3301
    Publicado 2018
    “…Survey the headlines: superstorms, data breaches, pandemics, system failures, and strikes occur regularly...somewhere. …”
    Libro electrónico
  2. 3302
    Publicado 2014
    “…Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics , Third Edition arms you with the information you need to get your organization out of trouble when data breaches occur. This practical resource covers the entire lifecycle of incident response, including preparation, data collection, data analysis, and remediation. …”
    Libro electrónico
  3. 3303
    Publicado 2023
    “…Businesses that earn their customers' trust maintain better relationships and reap better results. Meanwhile, breaches of trust between companies and the public are becoming more frequent-and more costly. …”
    Grabación no musical
  4. 3304
    Publicado 2025
    “…That alone can lead to vulnerabilities and invite data breaches. By using cloud native components in Kubernetes or similar platforms, organizations can implement a scalable, future-proof security architecture for their systems that follows a zero-trust approach to protect business data. …”
    Libro electrónico
  5. 3305
    Publicado 2020
    “…There is now simply no way to prevent the planet breaching the threshold of two degrees Celsius set by the Intergovernmental Panel on Climate Change. …”
    Libro
  6. 3306
    Publicado 2010
    “…Gruwell (Hilary Swank) es una joven profesora recién licenciada que empieza a dar clases de lengua en un instituto de Long Beach, California. Sus alumnos, que viven en barrios marginales, están marcados por la violencia de las bandas. …”
    CDROM
  7. 3307
    por Weiss, Andrea
    Publicado 2014
    “…El document dibuixa l'ambient intel·lectual femení del París d'entreguerres, hi apareixen Berenice Abbott, Margaret Anderson, Djuna Barnes, Natalie Clifford Barney, Sylvia Beach, Germaine Beaumont, Romaine Brooks, Bryther (Winifred Ellerman), Lily de Clermont-Tonnerre, Colette, Nancy Cunar, H. …”
    Libro
  8. 3308
    Publicado 2024
    “…Hugo Loetscher war ein Schriftsteller, der "erfahren wollte, was mir als Welt zugefallen war". Von der Schweiz aus brach er in alle Himmelsrichtungen auf, oft im Auftrag von Zeitungen und Magazinen, für die er kenntnis- und geistreiche, literarisch funkelnde Essays und Reportagen schrieb. …”
    Libro
  9. 3309
    Publicado 2004
    “…Zur Datenauswertung kommen verschiedene überwachte und unüberwachte Lernverfahren zum Einsatz. …”
    Libro electrónico
  10. 3310
    Publicado 2016
    “…She reports that at night she sometimes returns to the beach where her friend killed herself…”
    Vídeo online
  11. 3311
    Publicado 2016
    “…She reports that at night she sometimes returns to the beach where her friend killed herself…”
    Vídeo online
  12. 3312
    Publicado 2019
    “…Sometimes I pick up an assortment of scattered seashells while walking along the beautiful Torrey Pines Beach in San Diego. Likewise, this book contains an assortment of discussions of different aspects of serotonin to enrich our knowledge and understanding of this neurochemical. …”
    Libro electrónico
  13. 3313
    por Haswell-Smith, Hamish
    Publicado 2004
    “…From the abandoned crofts of Mingulay and the standing stones of Orkney to the white beaches of Colonsay and the spectacular Cuillins of Skye, this is a complete gazetteer covering all of Scotland's many hundreds of islands, including those which are uninhabited and those which are notoriously difficult to reach. …”
    Libro
  14. 3314
    por Battersby, Alan
    Publicado 2003
    “…As unidentified bodies are washed up on a beach, the search for proof takes him into the heart of the New York Russian-American community. …”
    Libro
  15. 3315
    Publicado 2020
    “…Develop your red team skills by learning essential foundational tactics, techniques, and procedures, and boost the overall security posture of your organization by leveraging the homefield advantage Key Features Build, manage, and measure an offensive red team program Leverage the homefield advantage to stay ahead of your adversaries Understand core adversarial tactics and techniques, and protect pentesters and pentesting assets Book Description It's now more important than ever for organizations to be ready to detect and respond to security events and breaches. Preventive measures alone are not enough for dealing with adversaries. …”
    Libro electrónico
  16. 3316
    Publicado 2021
    “…This book challenges such Eurocentric visions by retracing the evolution of modern institutions of collective decision-making in Eurasia. Breaching the divide between different area studies, the book provides nine case studies covering the area between the eastern edge of Asia and Eastern Europe, including the former Russian, Ottoman, Qing, and Japanese Empires as well as their successor states. …”
    Libro electrónico
  17. 3317
    Publicado 2017
    “…These expertly crafted, easily customizable write-ups address: Absenteeism Insubordination Sexual harassment Drug or alcohol abuse Substandard work Email and phone misuse Teamwork issues Managerial misconduct Confidentiality breaches Social media abuse And more With a focus on getting employees back on track, each sample document includes an incident description, a performance improvement plan, outcomes and consequences, and a section for employee rebuttal. …”
    Libro electrónico
  18. 3318
    por Dalsgaard, Thomas
    Publicado 1999
    “…Based on the estimated distribution of these shocks, stochastic simulations are performed to derive estimates of cyclically-adjusted budget balances that would have to be maintained to avoid breaching the Stability and Growth Pact’s 3 per cent of GDP deficit limit over different time horizons and with varying degrees of confidence. …”
    Capítulo de libro electrónico
  19. 3319
    Publicado 2016
    “…As stories continue to mount about security breaches in organizations and government agencies—such as the 2016 US Department of Justice hack—many people believe there’s really nothing they can do about it. …”
    Libro electrónico
  20. 3320
    Publicado 2016
    “…Recent breaches at the Internal Revenue Service are a stark reminder that cyber crime is alive and well. …”
    Libro electrónico