Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 167
- Security measures 164
- Computer networks 125
- Historia 95
- Engineering & Applied Sciences 74
- Subirachs, Josep M. 67
- Data protection 59
- Història 56
- Management 52
- Derecho penal 50
- Biblia 47
- Computer Science 46
- History 43
- Exposicions 40
- Filosofía 39
- Computer crimes 32
- Derecho 31
- Information technology 31
- Ubach, Bonaventura 31
- Cloud computing 30
- Historia y crítica 28
- Materiales 28
- Crítica e interpretación 27
- Electrical & Computer Engineering 24
- Física 23
- Law and legislation 23
- Penetration testing (Computer security) 23
- Catequesi 22
- Internet 20
- Catequesis 19
-
3321Publicado 2002“…From reports and memos about disputes over wages, layoffs, accidents at work and breaches of contract, a novel and exciting story of English labour law in the industrial age is created. …”
Tesis -
3322
-
3323Publicado 2006“…Their book, Rags to Riches , was featured on Oprah's television show and hit two best-seller lists. They live in Palm Beach Gardens, Florida…”
Libro electrónico -
3324Publicado 2004“…People catch large numbers of the shellfish for food or pick up the shells on the beach to make door curtains. As a result, the modern hermit crabs in Kenting National Park in Taiwan have a brand new style. …”
DVD -
3325Publicado 2021“…Simulate real-world attacks using tactics, techniques, and procedures that adversaries use during cloud breachesKey Features:Understand the different Azure attack techniques and methodologies used by hackersFind out how you can ensure end-to-end cybersecurity in the Azure ecosystemDiscover various tools and techniques to perform successful penetration tests on your Azure infrastructureBook Description:Security professionals working with Azure will be able to put their knowledge to work with this practical guide to penetration testing. …”
Libro electrónico -
3326Publicado 2015“…To secure your data properly, you also need to use a separate, secondary authentication factor. Data breaches are now commonplace In recent years, large-scale data breaches have increased dramatically in both severity and number, and the loss of personal information – including password data – has become commonplace. …”
Libro electrónico -
3327Publicado 2019“…The book will also help if you're simply looking to learn more about ethical hacking and various security breaches. Although prior knowledge of Kali Linux i..…”
Libro electrónico -
3328por Koske, Isabell“…An adjustment account that serves to register breaches of fiscal rules and eliminates them over time could help in coping with projection errors. …”
Publicado 2009
Capítulo de libro electrónico -
3329Publicado 2017“…How prepared is your response team to handle critical, time-sensitive events such as service disruptions and security breaches? IT professionals looking for effective response models have successfully adopted the Incident Management System (IMS) used by firefighters throughout the US. …”
Libro electrónico -
3330Publicado 2022“…As cyberattacks continue to increase, the cost and reputation impacts of data breaches remain a top concern across all enterprises. …”
Libro electrónico -
3331Publicado 2019“…Using real-world security breaches as examples, Foundations of Information Security explores common applications of these concepts, such as operations security, network design, hardening and patching operating systems, securing mobile devices, as well as tools for assessing the security of hosts and applications. …”
Libro electrónico -
3332Publicado 2015“…These are the practitioners whose foundational knowledge and experience unite healthcare information security and privacy best practices and techniques under one credential to protect organizations and sensitive patient data against emerging threats and breaches. The Official (ISC)2 (R) Guide to the HCISPPSM CBK (R) is a comprehensive resource that provides an in-depth look at the six domains of the HCISPP Common Body of Knowledge (CBK). …”
Libro electrónico -
3333Publicado 2017“…You will learn: The ease with which you can scale an application’s services up and down How Reactive systems provide process resilience during service interruptions Techniques for performing a rolling upgrade of an application’s key services How the Lightbend Enterprise Suite enables callers to locate the correct service addresses A solution for collecting and consolidating logs generated by the application Out-of-the-box defenses against network partitions that occur when parts of the network become unreachable…”
Libro electrónico -
3334Publicado 2017“…A retirement of nonstop leisure is not just unreachable, but for most, undesirable. How Do I Get There from Here? …”
Libro electrónico -
3335Publicado 2009“…Der interdisziplinäre, epochenübergreifende Ansatz des Sammelbandes, der Beiträge eines Kolloquiums zu Ehren Alexander Demandts vereint, erweist sich dabei als überaus fruchtbar und ermöglicht neue Einblicke in den Umgang mit der Geschichte in der Vergangenheit…”
Libro electrónico -
3336por Shreve, Anita“…But when the Edwards' two grown sons, Ben and Jeff, arrive at the beach house, Sydney finds herself caught up in a destructive web of old tensions and bitter divisions. …”
Publicado 2007
Libro -
3337Publicado 2016“…Learn how FINRA migrated their portfolio from a data warehouse to the Hadoop cloud ecosystem Understand what’s required to support data governance in finance, and learn about the infrastructure Capital One implemented Delve into Hadoop’s security maturity model, compliance-ready security controls, and enterprise data hub for preventing breaches Examine the architecture of a Customer Event Hub, a tool that’s pushing the boundaries of how organizations interact with customers…”
Libro electrónico -
3338Publicado 2022“…In recent years, popular media have inundated audiences with sensationalised headlines recounting data breaches, new forms of surveillance and other dangers of our digital age. …”
Libro electrónico -
3339por Stahl, Bernd Carsten“…But undesirable and ethically problematic consequences are possible too: biases and discrimination, breaches of privacy and security, and societal distortions such as unemployment, economic exploitation and weakened democratic processes. …”
Publicado 2021
Libro electrónico -
3340Publicado 2020“…As countless breaches have proved, application security is no longer optional. …”
Libro electrónico