Mostrando 3,321 - 3,340 Resultados de 3,562 Para Buscar 'Uberach~', tiempo de consulta: 1.79s Limitar resultados
  1. 3321
    Publicado 2002
    “…From reports and memos about disputes over wages, layoffs, accidents at work and breaches of contract, a novel and exciting story of English labour law in the industrial age is created. …”
    Tesis
  2. 3322
    Publicado 2000
    Fotografía
  3. 3323
    Publicado 2006
    “…Their book, Rags to Riches , was featured on Oprah's television show and hit two best-seller lists. They live in Palm Beach Gardens, Florida…”
    Libro electrónico
  4. 3324
    Publicado 2004
    “…People catch large numbers of the shellfish for food or pick up the shells on the beach to make door curtains. As a result, the modern hermit crabs in Kenting National Park in Taiwan have a brand new style. …”
    DVD
  5. 3325
    Publicado 2021
    “…Simulate real-world attacks using tactics, techniques, and procedures that adversaries use during cloud breachesKey Features:Understand the different Azure attack techniques and methodologies used by hackersFind out how you can ensure end-to-end cybersecurity in the Azure ecosystemDiscover various tools and techniques to perform successful penetration tests on your Azure infrastructureBook Description:Security professionals working with Azure will be able to put their knowledge to work with this practical guide to penetration testing. …”
    Libro electrónico
  6. 3326
    Publicado 2015
    “…To secure your data properly, you also need to use a separate, secondary authentication factor. Data breaches are now commonplace In recent years, large-scale data breaches have increased dramatically in both severity and number, and the loss of personal information – including password data – has become commonplace. …”
    Libro electrónico
  7. 3327
    Publicado 2019
    “…The book will also help if you're simply looking to learn more about ethical hacking and various security breaches. Although prior knowledge of Kali Linux i..…”
    Libro electrónico
  8. 3328
    por Koske, Isabell
    Publicado 2009
    “…An adjustment account that serves to register breaches of fiscal rules and eliminates them over time could help in coping with projection errors. …”
    Capítulo de libro electrónico
  9. 3329
    Publicado 2017
    “…How prepared is your response team to handle critical, time-sensitive events such as service disruptions and security breaches? IT professionals looking for effective response models have successfully adopted the Incident Management System (IMS) used by firefighters throughout the US. …”
    Libro electrónico
  10. 3330
    Publicado 2022
    “…As cyberattacks continue to increase, the cost and reputation impacts of data breaches remain a top concern across all enterprises. …”
    Libro electrónico
  11. 3331
    Publicado 2019
    “…Using real-world security breaches as examples, Foundations of Information Security explores common applications of these concepts, such as operations security, network design, hardening and patching operating systems, securing mobile devices, as well as tools for assessing the security of hosts and applications. …”
    Libro electrónico
  12. 3332
    Publicado 2015
    “…These are the practitioners whose foundational knowledge and experience unite healthcare information security and privacy best practices and techniques under one credential to protect organizations and sensitive patient data against emerging threats and breaches. The Official (ISC)2 (R) Guide to the HCISPPSM CBK (R) is a comprehensive resource that provides an in-depth look at the six domains of the HCISPP Common Body of Knowledge (CBK). …”
    Libro electrónico
  13. 3333
    Publicado 2017
    “…You will learn: The ease with which you can scale an application’s services up and down How Reactive systems provide process resilience during service interruptions Techniques for performing a rolling upgrade of an application’s key services How the Lightbend Enterprise Suite enables callers to locate the correct service addresses A solution for collecting and consolidating logs generated by the application Out-of-the-box defenses against network partitions that occur when parts of the network become unreachable…”
    Libro electrónico
  14. 3334
    Publicado 2017
    “…A retirement of nonstop leisure is not just unreachable, but for most, undesirable. How Do I Get There from Here? …”
    Libro electrónico
  15. 3335
    Publicado 2009
    “…Der interdisziplinäre, epochenübergreifende Ansatz des Sammelbandes, der Beiträge eines Kolloquiums zu Ehren Alexander Demandts vereint, erweist sich dabei als überaus fruchtbar und ermöglicht neue Einblicke in den Umgang mit der Geschichte in der Vergangenheit…”
    Libro electrónico
  16. 3336
    por Shreve, Anita
    Publicado 2007
    “…But when the Edwards' two grown sons, Ben and Jeff, arrive at the beach house, Sydney finds herself caught up in a destructive web of old tensions and bitter divisions. …”
    Libro
  17. 3337
    Publicado 2016
    “…Learn how FINRA migrated their portfolio from a data warehouse to the Hadoop cloud ecosystem Understand what’s required to support data governance in finance, and learn about the infrastructure Capital One implemented Delve into Hadoop’s security maturity model, compliance-ready security controls, and enterprise data hub for preventing breaches Examine the architecture of a Customer Event Hub, a tool that’s pushing the boundaries of how organizations interact with customers…”
    Libro electrónico
  18. 3338
    Publicado 2022
    “…In recent years, popular media have inundated audiences with sensationalised headlines recounting data breaches, new forms of surveillance and other dangers of our digital age. …”
    Libro electrónico
  19. 3339
    por Stahl, Bernd Carsten
    Publicado 2021
    “…But undesirable and ethically problematic consequences are possible too: biases and discrimination, breaches of privacy and security, and societal distortions such as unemployment, economic exploitation and weakened democratic processes. …”
    Libro electrónico
  20. 3340
    Publicado 2020
    “…As countless breaches have proved, application security is no longer optional. …”
    Libro electrónico