Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 167
- Security measures 164
- Computer networks 125
- Historia 95
- Engineering & Applied Sciences 74
- Subirachs, Josep M. 67
- Data protection 59
- Història 56
- Management 52
- Derecho penal 50
- Biblia 47
- Computer Science 46
- History 43
- Exposicions 40
- Filosofía 39
- Computer crimes 32
- Derecho 31
- Information technology 31
- Ubach, Bonaventura 31
- Cloud computing 30
- Historia y crítica 28
- Materiales 28
- Crítica e interpretación 27
- Electrical & Computer Engineering 24
- Física 23
- Law and legislation 23
- Penetration testing (Computer security) 23
- Catequesi 22
- Internet 20
- Catequesis 19
-
3461Publicado 2023“…How should we conceptualize the extensive and diverse networks of activities that surrounded the lake? What kind of Ladoga beaches did the Finns have to cede to the Soviet Union at the end of the war in 1944? …”
Libro electrónico -
3462Publicado 2013“…Las vicisitudes de la publicación del Ulises, uno de los libros más reseñados y menos leídos de la historia, tiene muchos protagonistas, empezando por Sylvia Beach y su edición parisina de mil ejemplares y acabando al otro lado del Océano con la censura y la sucesiva operación de marketing ideada por Random House en 1934. …”
Libro -
3463Publicado 2018“…What You Will Learn Use various techniques to prevent intruders from accessing sensitive data Prevent intruders from planting malware, and detect whether malware has been planted Prevent insiders from accessing data that they aren't authorized to access Do quick checks to see whether a computer is running network services that it doesn't need to run Learn security techniques that are common to all Linux distros, and some that are distro-specific In Detail This book has extensive coverage of techniques that will help prevent attackers from breaching your system, by building a much more secure Linux environment. …”
Libro electrónico -
3464Publicado 2019“…We must understand how an attacker approaches a web application and the implications of breaching its defenses. Through the first part of the book, Adrian Pruteanu walks you through commonly encountered vulnerabilities and how to take advantage of them to achieve your goal. …”
Libro electrónico -
3465por Katzer, Matthew. author“…This book includes the best approaches to managing mobile devices both on your local network and outside the office. Data breaches, compliance fines, and distribution of personally identifiable information (PII) without encryption or safeguards place businesses of all types at risk. …”
Publicado 2018
Libro electrónico -
3466Publicado 2016“…A comprehensive guide for deploying, configuring, and troubleshooting NetFlow and learning big data analytics technologies for cyber security Today’s world of network security is full of cyber security vulnerabilities, incidents, breaches, and many headaches. Visibility into the network is an indispensable tool for network and security professionals and Cisco NetFlow creates an environment where network administrators and security professionals have the tools to understand who, what, when, where, and how network traffic is flowing. …”
Libro electrónico -
3467Publicado 2023“…At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building applications. …”
Libro electrónico -
3468Publicado 2023“…What You Will Learn Integrate SQL Server with Azure for hybrid cloud scenarios Audit changes and prevent malicious data changes with SQL Server’s Ledger Secure and encrypt data to protect against embarrassing data breaches Ensure 24 x 7 x 365 access through high availability and disaster recovery features in today’s hybrid world Use Azure tooling, including Arc, to gain insight into and manage your SQL Server enterprise Install and configure SQL Server on Windows, Linux, and in containers Perform routine maintenance tasks, such as backups and database consistency checks Optimize performance and undertake troubleshooting in the Database Engine…”
Libro electrónico -
3469Publicado 2024“…You'll dive into the OWASP Top Ten, encryption, and secure session management, gaining the foresight to preempt security breaches. The course wraps up by honing your skills in error handling, testing for security, and effective logging, transforming you into an invaluable asset for any development team focused on creating cyber-secure applications. …”
Video -
3470Publicado 2005“…Understand the total cost of ownership and return on investment for network security solutions Understand what motivates hackers and how to classify threats Learn how to recognize common vulnerabilities and common types of attacks Examine modern day security systems, devices, and mitigation techniques Integrate policies and personnel with security equipment to effectively lessen security risks Analyze the greater implications of security breaches facing corporations and executives today Understand the governance aspects of network security to help implement a climate of change throughout your organization Learn how to qualify your organization’s aversion to risk Quantify the hard costs of attacks versus the cost of security technology investment to determine ROI Learn the essential elements of security policy development and how to continually assess security needs and vulnerabilities The Business Case for Network Security: Advocacy, Governance, and ROI addresses the needs of networking professionals and business executives who seek to assess their organization’s risks and objectively quantify both costs and cost savings related to network security technology investments. …”
Libro electrónico -
3471Publicado 2017“…Hear Ruchi Shah (Google) describe the 15 security issues that worry Google the most Listen as Matt Stine (Pivotal) defines the three most critical principles of cloud-native security Watch Jen Ellis (Rapid7) outline the crisis communication strategy to follow when systems are breached Learn from the "Teachable Moments" sessions where security successes and failures are openly discussed Discover how Alexandra Ulsh (Mapbox) launches and runs highly successful bug bounty programs See Alex Pinto (Niddel) demo automated threat hunting techniques that incorporate analyst intuitions Watch Jack Naglieri (Airbnb) survey the top techniques to build, deploy, and debug serverless security Take in Michee Smith's (Google) analysis of the pluses and minuses of transparency reporting Hear Jason Hoenich's (Habitu8) call for an industry shift to a better form of security awareness Get tutorials on maximizing container security, automated assessment tools, and common threat defenses See the winners of the 2017 O'Reilly Defender Awards and learn why they were chosen Enjoy unlimited access to Security 2017 NYC's keynotes, tutorials, and technical sessions View it all right here on Safari…”
-
3472por Fietze, Beate“…Drittens bringt sie das Thema der historischen Generationen [...] in die Nähe der Untersuchung von sozialen Bewegungen.« Werner Fuchs-Heinritz, Soziologische Revue, 33 (2010) »Fietzes textnahe Interpretation von Mannheims Theorie und ihr spezifisches Modell, seinen Generationsentwurf für die Erforschung politischer Generationen im öffentlichen Raum zu rehabilitieren und in die Gegenwart zu transformieren, [ist] ein wichtiger Beitrag für die Generationsforschung, nicht nur in der Soziologie.« Astrid Barwolf, H-Soz-u-Kult, 09.08.2010 »Beate Fietze greift in ihrer lesenwerten und für andere Fachgebiete überaus ertragreichen Studie Mannheims Generationentheorie auf und fragt insbesondere nach ihrer [...] kulturtheoretischen Grundierung.« Ulrike Jureit, Historische Anthropologie, 18 (2010) Besprochen in: Zeitschrift für Soziologie der Erziehung und Sozialisation, 30/3 (2010)…”
Publicado 2015
Electrónico -
3473Publicado 2020“…Within the vast Ovidian bibliography, taking the opportunity provided by the celebrations of the Bimillenary of the poet's death (17-2017), the volume aims at offering a useful tool to deepen, in a diachronic and synchronic perspective, not only the multifarious virtues of Ovid's poetry, his extraordinary Alexandrian ars, the stages of his Reception starting from antiquity, but also - if not above all - an undisputed and in some ways unreachable quality of the Ovidian language and style: the disruptive icastic strength, the ability to employ, like few others, the images in the construction of the poetic text, of its narrative plots, of its elegant refinement, of its effectiveness in the reader’s Reception. …”
Libro electrónico -
3474Publicado 2018“…Tim Desmond ofrece una orientación excepcionalmente clara, accesible e intuitiva. Doctora Tara Brach Los investigadores comprenden ahora que la autocompasión es una habilidad que puede fortalecerse a través de la práctica, y que mejora la salud mental y el bienestar. …”
Libro -
3475Publicado 2020“…No pierda la ocasión de concederse el regalo de este libro y compártalo con otras personas, porque sus enseñanzas pueden despertar muchos corazones. -Tara Brach PhDNeff y Germer son verdaderas autoridades en el campo de la autocompasión. …”
Libro -
3476por Organisation de coopération et de développement économiques.“…Elle s’appuie essentiellement sur les résultats d’études de cas consacrées à cinq des plus grands ports de la zone OCDE, – à savoir ceux de Los Angeles et Long Beach aux États-Unis, Rotterdam aux Pays-Bas, Vancouver au Canada et Busan en Corée. …”
Publicado 2011
Libro electrónico -
3477Publicado 2019“…Aus dem Inhalt: Notation und mathematische Grundlagen Überwachtes, teilüberwachtes und unüberwachtes Lernen Grundlegende Lernalgorithmen: Lineare und logistische Regression Entscheidungsbäume Support Vector Machines k-Nearest-Neighbors Optimierung mittels Gradientenabstieg Merkmalserstellung und Handhabung fehlender Merkmale Auswahl des passenden Lernalgorithmus Bias, Varianz und das Problem der Unter- und Überanpassung Regularisierung, Bewertung eines Modells und Abstimmung der Hyperparameter Deep Learning mit CNNs, RNNs und Autoencodern Multi-Class-, One-Class- und Multi-Label-Klassifikation Ensemble Learning Clustering, Dimensionsreduktion und Erkennen von Ausreißern Selbstüberwachtes Lernen Wort-Embeddings, One-Shot und Zero-Shot Learning Stimmen zum Buch: »Burkov hat sich der äußerst nützlichen, aber unglaublich schwierigen Aufgabe angenommen, fast das gesamte Machine Learning auf 200 Seiten zusammenzufassen. …”
Libro electrónico -
3478Publicado 2017“…Learn how cyber risk management can be integrated to better protect your enterprise Design and benchmark new and improved practical counter-cyber capabilities Examine planning and implementation approaches, models, methods, and more Adopt a new cyber risk maturity model tailored to your enterprise needs The need to manage cyber risk across the enterprise—inclusive of the IT operations—is a growing concern as massive data breaches make the news on an alarmingly frequent basis. …”
Libro electrónico -
3479Publicado 2018“…Day 6, you’ll create a database, using your code to read and update while securing it with Bcrypt from various breaches such as SQL injection attacks. By the end of the course, you’ll have built a mini-bank application that tracks users’ financial transactions over time, allowing them to view their history over time. …”
-
3480Publicado 2018“…Malware analysis and memory forensics have become must-have skills to fight advanced malware, targeted attacks, and security breaches. This book teaches you the concepts, techniques, and tools to understand the behavior and characteristics of malware through malware analysis. …”
Libro electrónico