Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 167
- Security measures 164
- Computer networks 125
- Historia 95
- Engineering & Applied Sciences 74
- Subirachs, Josep M. 67
- Data protection 59
- Història 56
- Management 52
- Derecho penal 50
- Biblia 47
- Computer Science 46
- History 43
- Exposicions 40
- Filosofía 39
- Computer crimes 32
- Derecho 31
- Information technology 31
- Ubach, Bonaventura 31
- Cloud computing 30
- Historia y crítica 28
- Materiales 28
- Crítica e interpretación 27
- Electrical & Computer Engineering 24
- Física 23
- Law and legislation 23
- Penetration testing (Computer security) 23
- Catequesi 22
- Internet 20
- Catequesis 19
-
3341Publicado 2014“…In an increasingly interconnected world, data breaches grab headlines. The security of sensitive information is vital, and new requirements and regulatory bodies such as the Payment Card Industry Data Security Standard (PCI-DSS), Health Insurance Portability and Accountability Act (HIPAA), and Sarbanes-Oxley (SOX) create challenges for enterprises that use encryption to protect their information. …”
Libro electrónico -
3342Publicado 2021“…In recent years, popular media have inundated audiences with sensationalised headlines recounting data breaches, new forms of surveillance and other dangers of our digital age. …”
Libro electrónico -
3343“…At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building applications. …”
Libro electrónico -
3344Publicado 2020“…By the end of this course, you’ll be well-versed with cybersecurity and have the skills you need to prevent attacks and breaches…”
-
3345Publicado 2013“…Mullins includes an entirely new chapter on the DBA’s role in regulatory compliance, with substantial new material on data breaches, auditing, encryption, retention, and metadata management. …”
Libro electrónico -
3346Publicado 2020“…This revised and updated second edition includes expanded coverage of innovative statistical methods and new cases of current risk management issues such as data breaches and natural disasters…”
Grabación musical -
3347
Grabación musical -
3348Publicado 2024“…. - Learn what social engineering and phishing are, why they are so dangerous to your cybersecurity, and how to defend against them - Educate yourself and other users on how to identify and avoid phishing scams, to stop attacks before they begin - Discover the latest tools and strategies for locking down data when phishing has taken place, and stop breaches from spreading - Develop technology and security policies that protect your organization against the most common types of social engineering and phishing…”
Grabación no musical -
3349Publicado 2022“…Complete control over packages, from provenance to deployment, is critical for security during the software development lifecycle. As recent breaches attest, securing your software supply chain is now more critical than ever. …”
Libro electrónico -
3350por Organisation for Economic Co-operation and Development.“…It finds that well-intended policies to allay concerns about breaches of confidentiality and potential misuse of personal health data may be limiting data use, but that the next five years appear promising, in terms of both the number of countries that plan to implement national electronic health record systems and the number that consider it likely that data from these systems will be used for some aspects of health care quality monitoring. …”
Publicado 2013
Libro electrónico -
3351Publicado 2017“…Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. …”
Libro electrónico -
3352“…Successfully navigate through the ever-changing world of technology and ethics and reconcile system administration principles for separation of duty, account segmentation, administrative groups and data protection. As security breaches become more common, businesses need to protect themselves when facing ethical dilemmas in today’s digital landscape. …”
Libro electrónico -
3353por Carrasco Molina, Manuel. author“…Not only is developing with privacy in mind good from a moral standpoint, but it also helps you create leaner apps that set themselves up for less potential data breaches and issues later on in distribution. While a basic understanding of app creation is expected, no deep understanding of Cocoa(Touch) or Swift will be required as code will point to the Apple Documentation…”
Publicado 2019
Libro electrónico -
3354Publicado 2020“…It can help minimize the risk and impact of data loss and privacy breaches when collecting and storing sensitive data. …”
Libro electrónico -
3355Publicado 2018“…Learn how machine learning has contributed to the success of modern spam filters Quickly detect anomalies, including breaches, fraud, and impending system failure Conduct malware analysis by extracting useful information from computer binaries Uncover attackers within the network by finding patterns inside datasets Examine how attackers exploit consumer-facing websites and app functionality Translate your machine learning algorithms from the lab to production Understand the threat attackers pose to machine learning solutions…”
Libro electrónico -
3356Publicado 2019“…"All EU Member States have now transposed Directive 2014/104/EU on damages actions for breaches of competition law into national law. The directive (and the soft-law instruments accompanying it) does not only mark a new phase for private enforcement of competition law but also, more generally, a novel and thought-provoking instance of EU harmonization of aspects of private law and civil litigation. …”
Libro electrónico -
3357Publicado 2019“…Written in easy-to-understand language, this book targets directors and executives who want to protect themselves from risks ranging from massive cyber security breaches to digital infrastructure investment mistakes.Most board members don't have the information they need to understand digital information systems, modern high-speed networks, and rapidly evolving software and hardware ecosystems. …”
Grabación musical -
3358Publicado 2023“…By the end of this book, you’ll be able to robustly counter computer intrusions and breaches, untangle digital complexities with unwavering assurance, and stride confidently in the realm of digital forensics…”
Libro electrónico -
3359Publicado 1997“…In Usable Pasts, fourteen authors examine the manipulation of traditional expressions among a variety of groups from the United States and Canada: the development of a pictorial style by Navajo weavers in response to traders, Mexican American responses to the appropriation of traditional foods by Anglos, the expressive forms of communication that engender and sustain a sense of community in an African American women's social club and among elderly Yiddish folksingers in Miami Beach, the incorporation of mass media images into the "C & Ts" (customs and traditions) of a Boy Scout troop, the changing meaning of their defining Exodus-like migration to Mormons, Newfoundlanders' appropriation through the rum-drinking ritual called the Schreech-In of outsiders' stereotypes, outsiders' imposition of the once-despised lobster as the emblem of Maine, the contest over Texas's heroic Alamo legend and its departures from historical fact, and how yellow ribbons were transformed from an image in a pop song to a national symbol of "resolve."…”
Libro electrónico -
3360por Organisation for Economic Co-operation and Development.“…It focuses on five ports: Los Angeles and Long Beach, California, the United States; Rotterdam, the Netherlands; Port Metro Vancouver, Canada; and Busan, Korea. …”
Publicado 2011
Libro electrónico