Mostrando 3,381 - 3,400 Resultados de 3,562 Para Buscar 'Uberach~', tiempo de consulta: 1.85s Limitar resultados
  1. 3381
    Publicado 2023
    “…You will also learn about future-proofing yourself against security breaches and data leaks involving your most sensitive information--all while being served entertaining industry anecdotes and commentary from leading industry personalities. …”
    Libro electrónico
  2. 3382
    Publicado 2017
    “…Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. …”
    Libro electrónico
  3. 3383
    Publicado 2016
    “…With the exponential growth of security breaches and the increasing dependency on external business partners to achieve organizational success, the effective use of ICT governance and enterprise-wide frameworks to guide the implementation of integrated security controls are critical in order to mitigate data theft. …”
    Libro electrónico
  4. 3384
    Publicado 2022
    “…You will: Work with the dev stack components Examine the success factors for infrastructure, consumer, enterprise, verticals, and the Metaverse Understand the risks of Web3, like the regulatory structure and security breaches…”
    Libro electrónico
  5. 3385
    Publicado 2024
    “…Hosts behind the firewall have no defenses of their own, so when a host in the ""trusted"" zone is breached, access to your data center is not far behind. …”
    Grabación no musical
  6. 3386
    por Van Wyk, Kenneth R.
    Publicado 2001
    “…Seventy percent of businesses reported security breaches in 2000, and the rate is on the rise. Is your organization ready to respond to such an incident head-on? …”
    Libro electrónico
  7. 3387
    Publicado 2020
    “…At a time when there are many news stories on cybersecurity breaches, it is crucial to think about security in your applications. …”
    Libro electrónico
  8. 3388
    Publicado 2018
    “…By the end of the course, you will be a cyber security specialist capable of preventing data breaches and data loss, as these measures could save a company thousands of dollars. …”
    Video
  9. 3389
    por Grimes, Roger A.
    Publicado 2024
    “…Learn what social engineering and phishing are, why they are so dangerous to your cybersecurity, and how to defend against them Educate yourself and other users on how to identify and avoid phishing scams, to stop attacks before they begin Discover the latest tools and strategies for locking down data when phishing has taken place, and stop breaches from spreading Develop technology and security policies that protect your organization against the most common types of social engineering and phishing Anyone looking to defend themselves or their organization from phishing will appreciate the uncommonly comprehensive approach in Fighting Phishing…”
    Libro electrónico
  10. 3390
    por McDonough, Bart R.
    Publicado 2023
    “…You'll also find: Examples of cases in which board members failed to adhere to regulatory and legal requirements to notify the victims of data breaches about a cybersecurity incident and the consequences they faced as a result Specific and actional cybersecurity implementation strategies written for readers without a technical background What to do to prevent a cybersecurity incident, as well as how to respond should one occur in your organization A practical and accessible resource for board members at firms of all shapes and sizes, Cyber Guardians is relevant across industries and sectors and a must-read guide for anyone with a stake in robust organizational cybersecurity…”
    Libro electrónico
  11. 3391
    Publicado 2024
    “…DevOps security often addresses vulnerability scanning, but it neglects broader discussions like authentication, authorization, and access control, potentially leaving the door open for breaches. That's where an identity security strategy focused on secrets management can help. …”
    Libro electrónico
  12. 3392
    por Dam, C. C. van
    Publicado 2014
    “…The second part, Requirements for Liability, analyses and compares the classic requirements for liability in a comparative and supranational perspective: rights and protected interests, intention and negligence, breach of statutory duty, stricter rules of liability, causation, damage, damages, and contributory negligence. …”
    Libro
  13. 3393
    Publicado 2019
    “…From the working class of Whitechapel to the beach sets of the Bahamas, and from well-heeled Mayfair to middle-class New York, Women in Wartime takes a wide-angled lens to the fashions and lifestyles of the women featured in Picture Post. …”
    Libro electrónico
  14. 3394
    Publicado 2019
    “…We welcome you to the 2019 ACM symposium on QoS and Security for Wireless and Mobile Networks (ACM Q2SWinet 2019), to be held at Miami Beach (USA). Continuing in the tradition of Q2SWinet symposium series, which have been established as well known meeting points for exchanging ideas, sharing experiences and discussing solutions among researches and professionals, this year's edition proposes an exciting program covering broad issues on QoS and security in wireless and mobile networked systems. …”
    Libro electrónico
  15. 3395
    Publicado 2005
    “…You see them on buses, in DMV lines, at the beach, and even in bars. Like your cell phone, this handy little digital device is so portable and convenient, it's become an iGeneration must-have and impossible to leave home without. …”
    Libro electrónico
  16. 3396
    por Barnwell, Ashley
    Publicado 2023
    “…From Queensland's sweeping Gulf Country, along the shelly beaches of south Sydney, Melbourne's city gardens and the rugged hills of South Australia, through Central Australia's dusty heart and up to the majestic Kimberley, the collection charts how interactions between Indigenous people, settlers and their descendants are both remembered and forgotten in social, political, and cultural spaces. …”
    Libro electrónico
  17. 3397
    Publicado 2024
    “…"Débarquée à Omaha Beach le 12 août 1944, Lee Miller arrive à Saint-Malo le lendemain. …”
    Libro
  18. 3398
    por Berns, Walter, 1919-
    Publicado 2001
    “…The graves at Arlington and Gettysburg and Omaha Beach in Normandy bear witness to the fact that self-interested individuals can become patriots, and Making Patriots is a compelling exploration of how this was done and how it might be again…”
    Sumario
    Libro
  19. 3399
    por Francis, Sharon
    Publicado 2019
    “…It includes work by cutting edge artists such Yayoi Kusama, Christo, and Anish Kapoor and by well-known fashion-designers such as Balenciaga, Yohji Yamamoto, Comme des Garçons, and many more.Following in the footsteps of Nanotecture, Mobitecture, and Pet-tecture, this guide is a must-have for designers, architects, and artist, both professional and students, as well as anyone who has every blown up a beach ball!…”
    Libro
  20. 3400
    Publicado 2021
    “…Victor, as the intellectual founder of the Victorine school; several of his Victorine brothers and disciples: Richard, Achard, Andrew, Godfrey, Absalon, up to late and little known Victorine masters as Pierre Leduc and Henri le Boulangier, at the time of the Great Schism (with critical edition of inedited texts); their influences on twelfth century texts as Ysagoge in theologiam or Speculum Ecclesiae, on Franciscan authors including Antony of Padua, Bonaventure, Rudolf of Biberach, and Duns Scotus, on romance literature of troubadours, on Carmelite authors of the sixteenth century and - a still uncharted territory - on Polish culture from the Middle Ages to contemporary times -- Contracubierta…”
    Libro