Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 167
- Security measures 164
- Computer networks 125
- Historia 95
- Engineering & Applied Sciences 74
- Subirachs, Josep M. 67
- Data protection 59
- Història 56
- Management 52
- Derecho penal 50
- Biblia 47
- Computer Science 46
- History 43
- Exposicions 40
- Filosofía 39
- Computer crimes 32
- Derecho 31
- Information technology 31
- Ubach, Bonaventura 31
- Cloud computing 30
- Historia y crítica 28
- Materiales 28
- Crítica e interpretación 27
- Electrical & Computer Engineering 24
- Física 23
- Law and legislation 23
- Penetration testing (Computer security) 23
- Catequesi 22
- Internet 20
- Catequesis 19
-
3361Publicado 2014“…Heather Buckley, Co-Founder and Director of Silicon Beach Training "This book will help everyone understand that a few small changes can add up to big changes in our happiness and success." …”
Libro electrónico -
3362Publicado 2003“…In the following months, beaches and cliffs were affected by the oil slick, threatening the delicate ecological balance of Galicia, one of the areas of the world richest in marine biodiversity. …”
DVD -
3363Publicado 2018“…[This book provides an overview of] how mediation mitigates difficulties in such IP areas as the following: disputes on trademarks, designs, patents, copyrights and other IP rights; allegations of breach of contract; licences and transfers; and R&D cooperation agreements. …”
Libro electrónico -
3364Publicado 2023“…In this focused guide, you'll explore relevant, real-world examples like protecting secrets in a code repository, securing keys with HashiCorp Vault, and adding layers to maintain protection after a breach. Along the way, you'll pick up secrets management techniques you can use outside Kubernetes, as well…”
Libro electrónico -
3365Publicado 2021“…The book includes an overall account of the contemporary laws of war and delves into whether states should be able to continue to claim so-called 'belligerent rights' over their enemies and those accused of breaching expectations of neutrality. A central claim in the book is as follows: while there is general agreement that war has been abolished as a legal institution for settling disputes, the time has come to admit that the belligerent rights that once accompanied states at war are no longer available. …”
Libro -
3366Publicado 2016“…Internet-enabled devices creep into the spaces we inhabit, and these devices report back on spatial conditions such as light, radiation, air quality and temperature, count the number of people stopping at retail displays minute by minute, detect intruders and security breaches, monitor locations and track characteristics of equipment and supply chain elements, enable us to open locked doors remotely using our mobile devices, and pass terabytes of data to backend systems that analyze, report, and modify the environments we occupy. …”
Libro electrónico -
3367Publicado 2009“…Manage network equipment with Best Common Practices Enhance scalability by adjusting network designs and protocols Combine the IGP and BGP networks of two merging companies Perform network audits Identify JUNOScripting techniques to maintain high availability Secure network equipment against breaches, and contain DoS attacks Automate network configuration through specific strategies and tools This book is a core part of the Juniper Networks Technical LibraryTM…”
Libro electrónico -
3368Publicado 2022“…The skills you acquire in this cybersecurity book will help you deal with all types of modern malware, strengthen your defenses, and prevent or promptly mitigate breaches regardless of the platforms involved. By the end of this book, you will have learned how to efficiently analyze samples, investigate suspicious activity, and build innovative solutions to handle malware incidents…”
Libro electrónico -
3369Publicado 2024“…In its latest third edition, this book goes further to guide you on how to setup your labs and explains breaches using enterprise networks. This book is designed for newcomers and those curious about penetration testing, this guide is your fast track to learning pentesting with Kali Linux 2024.x. …”
Libro electrónico -
3370Publicado 2022“…Web application security is the process of securing websites, web applications, and other internet-based services from cyber-attacks, breaches, and security threats that leverage loopholes, misconfigurations, and vulnerabilities in these applications or their codes. …”
Video -
3371Publicado 2024“…As the course advances, discover methods to identify internal server errors and data leaks in URLs—common breaches that pose significant security threats. Learn how to spot insecure HTTP web pages that could jeopardize both user and organizational safety. …”
Video -
3372por Cartwright, John, 1957-“…After a general introduction to the common law system-how a common lawyer reasons and finds the law-the book explains the principles of the law of contract in English law covering all the aspects of a contract from its formation to the remedies available for breach, whilst directing attention in particular to those areas where the approach of English law is in marked contrast to that taken in many civil law systems…”
Publicado 2013
Biblioteca de la Universidad de Navarra (Otras Fuentes: Biblioteca Universidad de Deusto)Libro -
3373Publicado 2009“…Mientras nieva su noche de bodas, los recién casados John y Jenny Grogan deciden que dejarán atrás los duros inviernos de Michigan para iniciar sus nuevas vidas en la soleada West Palm Beach, Florida. Los dos consiguen empleo con dos periódicos rivales, compran su primera casa y se abren camino mientras enfrentan los retos del matrimonio, nuevas carreras y quizá la llegada de un nuevo miembro a la familia. …”
Video -
3374Publicado 2017“…Beaches are places that give and take, bringing unexpected surprises to society, and pulling essentials away from it. …”
Libro electrónico -
3375Publicado 2018“…Die Ausschließlichkeit hat aber eine Kehrseite: Verbietet der Rechtsinhaber Nutzungen, ohne sie (auf eine bestimmte Art) selbst vorzunehmen, liegen vergriffene Werke brach, werden Innovationen behindert und wissenschaftliche Zeitschriften prohibitiv verteuert. …”
Libro electrónico -
3376por Rummler, Geary A.“…With multiple charts, checklists, hands-on tools, and case studies, Rummler and Brache document how they have implemented this Performance Improvement and Management methodology in over 250 successful projects with clients such as Hewlett-Packard, 3M, Shell Oil, and Citibank…”
Publicado 1995
Libro electrónico -
3377por Southwick, Steven M.“…Maybe you were on the beach in Thailand during a tsunami, or in New Orleans during Hurricane Katrina. …”
Publicado 2012
Libro electrónico -
3378Publicado 2018“…This was a moral-patriotic framework, born of both pre-war socio-cultural norms and daily interaction with the enemy, that guided conduct and was especially concerned with what was considered acceptable and unacceptable behaviour. Those who breached the limits of this occupied culture faced criticism and sometimes punishment. …”
Libro electrónico -
3379por Wittkop, Jeremy. author“…Budgets have increased and executives are implementing stronger defenses. Nonetheless, breaches continue to increase in frequency and scope. …”
Publicado 2016
Libro electrónico -
3380Publicado 2018“…Finally, you will cover injection attacks, a common exploit technique used to detect flaws and breaches in websites. What You Will Learn Exploit your network and perform penetration tests Footprint and scan networks and websites for vulnerabilities Be aware of key vulnerabilities to watch out for within your network and website Who This Video Is For Network security experts, web security specialists, application security experts, penetration testers, and ethical hackers…”