Mostrando 3,341 - 3,360 Resultados de 3,562 Para Buscar 'Uberach~', tiempo de consulta: 1.42s Limitar resultados
  1. 3341
    Publicado 2014
    “…In an increasingly interconnected world, data breaches grab headlines. The security of sensitive information is vital, and new requirements and regulatory bodies such as the Payment Card Industry Data Security Standard (PCI-DSS), Health Insurance Portability and Accountability Act (HIPAA), and Sarbanes-Oxley (SOX) create challenges for enterprises that use encryption to protect their information. …”
    Libro electrónico
  2. 3342
    Publicado 2021
    “…In recent years, popular media have inundated audiences with sensationalised headlines recounting data breaches, new forms of surveillance and other dangers of our digital age. …”
    Libro electrónico
  3. 3343
    “…At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building applications. …”
    Libro electrónico
  4. 3344
    Publicado 2020
    “…By the end of this course, you’ll be well-versed with cybersecurity and have the skills you need to prevent attacks and breaches…”
    Video
  5. 3345
    Publicado 2013
    “…Mullins includes an entirely new chapter on the DBA’s role in regulatory compliance, with substantial new material on data breaches, auditing, encryption, retention, and metadata management. …”
    Libro electrónico
  6. 3346
    Publicado 2020
    “…This revised and updated second edition includes expanded coverage of innovative statistical methods and new cases of current risk management issues such as data breaches and natural disasters…”
    Grabación musical
  7. 3347
    “…Only with this kind of defense in depth can organizations hope to prevent the worst of the cybersecurity breaches and other user-initiated losses.Using lessons from tested and proven disciplines like military kill-chain analysis, counterterrorism analysis, industrial safety programs, and more, Ira Winkler and Dr. …”
    Grabación musical
  8. 3348
    Publicado 2024
    “…. - Learn what social engineering and phishing are, why they are so dangerous to your cybersecurity, and how to defend against them - Educate yourself and other users on how to identify and avoid phishing scams, to stop attacks before they begin - Discover the latest tools and strategies for locking down data when phishing has taken place, and stop breaches from spreading - Develop technology and security policies that protect your organization against the most common types of social engineering and phishing…”
    Grabación no musical
  9. 3349
    Publicado 2022
    “…Complete control over packages, from provenance to deployment, is critical for security during the software development lifecycle. As recent breaches attest, securing your software supply chain is now more critical than ever. …”
    Libro electrónico
  10. 3350
    “…It finds that well-intended policies to allay concerns about breaches of confidentiality and potential misuse of personal health data may be limiting data use, but that the next five years appear promising, in terms of both the number of countries that plan to implement national electronic health record systems and the number that consider it likely that data from these systems will be used for some aspects of health care quality monitoring. …”
    Libro electrónico
  11. 3351
    Publicado 2017
    “…Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. …”
    Libro electrónico
  12. 3352
    “…Successfully navigate through the ever-changing world of technology and ethics and reconcile system administration principles for separation of duty, account segmentation, administrative groups and data protection. As security breaches become more common, businesses need to protect themselves when facing ethical dilemmas in today’s digital landscape. …”
    Libro electrónico
  13. 3353
    por Carrasco Molina, Manuel. author
    Publicado 2019
    “…Not only is developing with privacy in mind good from a moral standpoint, but it also helps you create leaner apps that set themselves up for less potential data breaches and issues later on in distribution. While a basic understanding of app creation is expected, no deep understanding of Cocoa(Touch) or Swift will be required as code will point to the Apple Documentation…”
    Libro electrónico
  14. 3354
    Publicado 2020
    “…It can help minimize the risk and impact of data loss and privacy breaches when collecting and storing sensitive data. …”
    Libro electrónico
  15. 3355
    Publicado 2018
    “…Learn how machine learning has contributed to the success of modern spam filters Quickly detect anomalies, including breaches, fraud, and impending system failure Conduct malware analysis by extracting useful information from computer binaries Uncover attackers within the network by finding patterns inside datasets Examine how attackers exploit consumer-facing websites and app functionality Translate your machine learning algorithms from the lab to production Understand the threat attackers pose to machine learning solutions…”
    Libro electrónico
  16. 3356
    Publicado 2019
    “…"All EU Member States have now transposed Directive 2014/104/EU on damages actions for breaches of competition law into national law. The directive (and the soft-law instruments accompanying it) does not only mark a new phase for private enforcement of competition law but also, more generally, a novel and thought-provoking instance of EU harmonization of aspects of private law and civil litigation. …”
    Libro electrónico
  17. 3357
    Publicado 2019
    “…Written in easy-to-understand language, this book targets directors and executives who want to protect themselves from risks ranging from massive cyber security breaches to digital infrastructure investment mistakes.Most board members don't have the information they need to understand digital information systems, modern high-speed networks, and rapidly evolving software and hardware ecosystems. …”
    Grabación musical
  18. 3358
    Publicado 2023
    “…By the end of this book, you’ll be able to robustly counter computer intrusions and breaches, untangle digital complexities with unwavering assurance, and stride confidently in the realm of digital forensics…”
    Libro electrónico
  19. 3359
    Publicado 1997
    “…In Usable Pasts, fourteen authors examine the manipulation of traditional expressions among a variety of groups from the United States and Canada: the development of a pictorial style by Navajo weavers in response to traders, Mexican American responses to the appropriation of traditional foods by Anglos, the expressive forms of communication that engender and sustain a sense of community in an African American women's social club and among elderly Yiddish folksingers in Miami Beach, the incorporation of mass media images into the "C & Ts" (customs and traditions) of a Boy Scout troop, the changing meaning of their defining Exodus-like migration to Mormons, Newfoundlanders' appropriation through the rum-drinking ritual called the Schreech-In of outsiders' stereotypes, outsiders' imposition of the once-despised lobster as the emblem of Maine, the contest over Texas's heroic Alamo legend and its departures from historical fact, and how yellow ribbons were transformed from an image in a pop song to a national symbol of "resolve."…”
    Libro electrónico
  20. 3360
    “…It focuses on five ports: Los Angeles and Long Beach, California, the United States; Rotterdam, the Netherlands; Port Metro Vancouver, Canada; and Busan, Korea. …”
    Libro electrónico