Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 167
- Security measures 164
- Computer networks 125
- Historia 95
- Engineering & Applied Sciences 74
- Subirachs, Josep M. 67
- Data protection 59
- Història 56
- Management 52
- Derecho penal 50
- Biblia 47
- Computer Science 46
- History 43
- Exposicions 40
- Filosofía 39
- Computer crimes 32
- Derecho 31
- Information technology 31
- Ubach, Bonaventura 31
- Cloud computing 30
- Historia y crítica 28
- Materiales 28
- Crítica e interpretación 27
- Electrical & Computer Engineering 24
- Física 23
- Law and legislation 23
- Penetration testing (Computer security) 23
- Catequesi 22
- Internet 20
- Catequesis 19
-
3381Publicado 2023“…You will also learn about future-proofing yourself against security breaches and data leaks involving your most sensitive information--all while being served entertaining industry anecdotes and commentary from leading industry personalities. …”
Libro electrónico -
3382Publicado 2017“…Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. …”
Libro electrónico -
3383Publicado 2016“…With the exponential growth of security breaches and the increasing dependency on external business partners to achieve organizational success, the effective use of ICT governance and enterprise-wide frameworks to guide the implementation of integrated security controls are critical in order to mitigate data theft. …”
Libro electrónico -
3384Publicado 2022“…You will: Work with the dev stack components Examine the success factors for infrastructure, consumer, enterprise, verticals, and the Metaverse Understand the risks of Web3, like the regulatory structure and security breaches…”
Libro electrónico -
3385Publicado 2024“…Hosts behind the firewall have no defenses of their own, so when a host in the ""trusted"" zone is breached, access to your data center is not far behind. …”
Grabación no musical -
3386por Van Wyk, Kenneth R.“…Seventy percent of businesses reported security breaches in 2000, and the rate is on the rise. Is your organization ready to respond to such an incident head-on? …”
Publicado 2001
Libro electrónico -
3387Publicado 2020“…At a time when there are many news stories on cybersecurity breaches, it is crucial to think about security in your applications. …”
Libro electrónico -
3388Publicado 2018“…By the end of the course, you will be a cyber security specialist capable of preventing data breaches and data loss, as these measures could save a company thousands of dollars. …”
-
3389por Grimes, Roger A.“…Learn what social engineering and phishing are, why they are so dangerous to your cybersecurity, and how to defend against them Educate yourself and other users on how to identify and avoid phishing scams, to stop attacks before they begin Discover the latest tools and strategies for locking down data when phishing has taken place, and stop breaches from spreading Develop technology and security policies that protect your organization against the most common types of social engineering and phishing Anyone looking to defend themselves or their organization from phishing will appreciate the uncommonly comprehensive approach in Fighting Phishing…”
Publicado 2024
Libro electrónico -
3390por McDonough, Bart R.“…You'll also find: Examples of cases in which board members failed to adhere to regulatory and legal requirements to notify the victims of data breaches about a cybersecurity incident and the consequences they faced as a result Specific and actional cybersecurity implementation strategies written for readers without a technical background What to do to prevent a cybersecurity incident, as well as how to respond should one occur in your organization A practical and accessible resource for board members at firms of all shapes and sizes, Cyber Guardians is relevant across industries and sectors and a must-read guide for anyone with a stake in robust organizational cybersecurity…”
Publicado 2023
Libro electrónico -
3391Publicado 2024“…DevOps security often addresses vulnerability scanning, but it neglects broader discussions like authentication, authorization, and access control, potentially leaving the door open for breaches. That's where an identity security strategy focused on secrets management can help. …”
Libro electrónico -
3392por Dam, C. C. van“…The second part, Requirements for Liability, analyses and compares the classic requirements for liability in a comparative and supranational perspective: rights and protected interests, intention and negligence, breach of statutory duty, stricter rules of liability, causation, damage, damages, and contributory negligence. …”
Publicado 2014
Libro -
3393Publicado 2019“…From the working class of Whitechapel to the beach sets of the Bahamas, and from well-heeled Mayfair to middle-class New York, Women in Wartime takes a wide-angled lens to the fashions and lifestyles of the women featured in Picture Post. …”
Libro electrónico -
3394Publicado 2019“…We welcome you to the 2019 ACM symposium on QoS and Security for Wireless and Mobile Networks (ACM Q2SWinet 2019), to be held at Miami Beach (USA). Continuing in the tradition of Q2SWinet symposium series, which have been established as well known meeting points for exchanging ideas, sharing experiences and discussing solutions among researches and professionals, this year's edition proposes an exciting program covering broad issues on QoS and security in wireless and mobile networked systems. …”
Libro electrónico -
3395Publicado 2005“…You see them on buses, in DMV lines, at the beach, and even in bars. Like your cell phone, this handy little digital device is so portable and convenient, it's become an iGeneration must-have and impossible to leave home without. …”
Libro electrónico -
3396por Barnwell, Ashley“…From Queensland's sweeping Gulf Country, along the shelly beaches of south Sydney, Melbourne's city gardens and the rugged hills of South Australia, through Central Australia's dusty heart and up to the majestic Kimberley, the collection charts how interactions between Indigenous people, settlers and their descendants are both remembered and forgotten in social, political, and cultural spaces. …”
Publicado 2023
Libro electrónico -
3397Publicado 2024“…"Débarquée à Omaha Beach le 12 août 1944, Lee Miller arrive à Saint-Malo le lendemain. …”
Libro -
3398por Berns, Walter, 1919-“…The graves at Arlington and Gettysburg and Omaha Beach in Normandy bear witness to the fact that self-interested individuals can become patriots, and Making Patriots is a compelling exploration of how this was done and how it might be again…”
Publicado 2001
Sumario
Libro -
3399por Francis, Sharon“…It includes work by cutting edge artists such Yayoi Kusama, Christo, and Anish Kapoor and by well-known fashion-designers such as Balenciaga, Yohji Yamamoto, Comme des Garçons, and many more.Following in the footsteps of Nanotecture, Mobitecture, and Pet-tecture, this guide is a must-have for designers, architects, and artist, both professional and students, as well as anyone who has every blown up a beach ball!…”
Publicado 2019
Libro -
3400Publicado 2021“…Victor, as the intellectual founder of the Victorine school; several of his Victorine brothers and disciples: Richard, Achard, Andrew, Godfrey, Absalon, up to late and little known Victorine masters as Pierre Leduc and Henri le Boulangier, at the time of the Great Schism (with critical edition of inedited texts); their influences on twelfth century texts as Ysagoge in theologiam or Speculum Ecclesiae, on Franciscan authors including Antony of Padua, Bonaventure, Rudolf of Biberach, and Duns Scotus, on romance literature of troubadours, on Carmelite authors of the sixteenth century and - a still uncharted territory - on Polish culture from the Middle Ages to contemporary times -- Contracubierta…”
Biblioteca de la Universidad de Navarra (Otras Fuentes: Biblioteca del Seminario Diocesano de Vitoria-Gasteiz)Libro