Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 167
- Security measures 164
- Computer networks 125
- Historia 95
- Engineering & Applied Sciences 74
- Subirachs, Josep M. 67
- Data protection 59
- Història 56
- Management 52
- Derecho penal 50
- Biblia 47
- Computer Science 46
- History 43
- Exposicions 40
- Filosofía 39
- Computer crimes 32
- Derecho 31
- Information technology 31
- Ubach, Bonaventura 31
- Cloud computing 30
- Historia y crítica 28
- Materiales 28
- Crítica e interpretación 27
- Electrical & Computer Engineering 24
- Física 23
- Law and legislation 23
- Penetration testing (Computer security) 23
- Catequesi 22
- Internet 20
- Catequesis 19
-
3481Publicado 2017“…S Corp) • Whether or not you need a physical, brick-and-mortar location • The equipment you need • Planning a shoot • The value of internships • Setting your fees • Pricing your work • Why you need insurance • Surviving an IRS audit • Contracts for editorial, commercial, and corporate clients, as well as weddings and rites of passage • The art of negotiation • How video can be incorporated into your business • Marketing, branding, and social media • Publishing a book of your work • Practical finance advice and guidance, from working with accountants to setting up QuickBooks • How to protect your work • Releases for models, property, and more • How to handle a breach of contract • Licensing your work • Digital asset management Whether you’re just starting a photography business or you’re a veteran shooter looking to improve your finances, Best Business Practices for Photographers, 3rd Edition , is for you. …”
Libro electrónico -
3482Publicado 2019“…Gain a practical understanding of modern cellular, Wi-Fi, Internet, cloud, and carrier technologies Discover how key technical, business, and regulatory innovations are changing the industry See how streaming video, social media, cloud computing, smartphones, and the Internet of Things are transforming networks Explore growing concerns about security and privacy, and review modern strategies for detecting and mitigating network breaches Learn how Software Defined Networks (SDN) and Network Function Virtualization (NFV) add intelligence to networks, enabling automation, flexible configurations, and advanced networks Preview cutting-edge, telecom-enabled applications and gear—from mobile payments to drones Whether you’re an aspiring network engineer looking for a broad understanding o..…”
Libro electrónico -
3483Publicado 2017“…Lastly, you will learn modern Mobile Device Management for effective BYOD and how to enable enhanced data protection, system hardening, and enterprise-level security with the new Windows 10 in order to prevent data breaches and impede attacks. By the end of this book, you will know the key technologies and capabilities in Windows 10 and will confidently be able to manage and deploy these features in your organization. …”
Libro electrónico -
3484Publicado 2023“…There's a practical element to the book as well--you'll prepare policies and procedures to prevent your company from being breached. You'll complete your learning journey by exploring cloud security and the complex nature of privacy laws in the US. …”
Grabación no musical -
3485Publicado 2023“…By the end of this audiobook, you'll be able to investigate and report unwanted security breaches and incidents in your organization. Audience This book is for cybersecurity and information security professionals who want to implement digital forensics and incident response in their organizations. …”
Grabación no musical -
3486Publicado 2009“…Coverage includes • Viewing virtualization from the attacker’s perspective, and understanding the new security problems it can introduce • Discovering which security threats the vmkernel does (and doesn’t) address • Learning how VMsafe enables third-party security tools to access the vmkernel API • Understanding the security implications of VMI, paravirtualization, and VMware Tools • Securing virtualized storage: authentication, disk encryption, virtual storage networks, isolation, and more • Protecting clustered virtual environments that use VMware High Availability, Dynamic Resource Scheduling, Fault Tolerance, vMotion, and Storage vMotion • Securing the deployment and management of virtual machines across the network • Mitigating risks associated with backup, performance management, and other day-to-day operations • Using multiple security zones and other advanced virtual network techniques • Securing Virtual Desktop Infrastructure (VDI) • Auditing virtual infrastructure, and conducting forensic investigations after a possible breach informit.com/ph www.Astroarch.com…”
Libro electrónico -
3487Publicado 2017“…The key requirements of the GDPR, including: Which fines apply to which Articles; The six principles that should be applied to any collection and processing of personal data; The Regulation’s applicability; Data subjects’ rights; Data protection impact assessments (DPIAs); The role of the data protection officer (DPO) and whether you need one; Data breaches, and the notification of supervisory authorities and data subjects; Obligations for international data transfers. …”
Libro electrónico -
3488Publicado 2013“…Seacord systematically identifies the program errors most likely to lead to security breaches, shows how they can be exploited, reviews the potential consequences, and presents secure alternatives. …”
Libro electrónico -
3489Publicado 2023“…Avoid MFA pitfalls--learn how to choose, implement, and troubleshoot MFA in your company Key Features Gain proficiency in using solutions like Okta, Ping Identity, and ForgeRock within the IAM domain Thwart authentication breaches using pragmatic strategies and lessons derived from real-world scenarios Choose the right MFA solutions to enhance your organization's security Book Description MFA has emerged as an essential defense strategy in the wide-ranging landscape of cybersecurity. …”
Libro electrónico -
3490Publicado 2012“…Doubts about the superiority of the Communist system, breaches of regulations as well as offences, which were really "only" a matter of criminal law, were considered politically motivated and served as a sign of the ideological and political fickleness of the concerned party. …”
Libro electrónico -
3491Publicado 2015“…Three were not analysed due to low numbers in 2008-2009. 3. Breach of maximum waiting times. 1.1. In 2012 19 conditions had 50% or more extended waiting times per referral. 1.2. …”
Libro electrónico -
3492Publicado 2017“…Aus dem Inhalt: Datenanalytisches Denken lernen Der Data-Mining-Prozess Überwachtes und unüberwachtes Data Mining Einführung in die Vorhersagemodellbildung: von der Korrelation zur überwachten Segmentierung Anhand der Daten optimale Modellparameter finden mit Verfahren wie lineare und logistische Regression sowie Support Vector Machines Prinzip und Berechnung der Ähnlichkeit Nächste-Nachbarn-Methoden und Clustering Entscheidungsanalyse I: Was ist ein gutes Modell Visualisierung der Leistung von Modellen Evidenz und Wahrscheinlichkeiten Texte repräsentieren und auswerten Entscheidungsanalyse II: Analytisches Engineering Data Science und Geschäftsstrategie…”
Libro electrónico -
3493Publicado 2014“…She reveals all the secrets of her trade, including proven ways to: Find and enter the best network "ecosystem" to meet your goals Reach even the most unreachable people quickly and effectively Get anyone's contact information within 30 seconds Create a "3-D connection" that adds value to multiple people at the same time Access key infl uencers through industry and community events Subtly seed conversation with information about interests and needs Use social media to your best advantage Robinett has based her methods on solid research proving that social groups begin to break up when they become larger than 150 people, and that 50 members is the optimal size for group communication. …”
Libro electrónico -
3494por Chalonge, Florence de“…Son monde survit cependant par le développement du cycle, ou plutôt par son enroulement, à travers Le Vice-consul et L’Amour, décrivant, sur le tracé de la danse inaugurale, un soir de bal au casino municipal de T. Beach, une large boucle spiralée. Chez Marguerite Duras, le récit accorde à l’espace l’importance qu’il refuse à l’intrigue. …”
Publicado 2020
Electrónico -
3495por Nicholls, R. J.“…The top 10 cities in terms of assets exposed are Miami, Greater New York, New Orleans, Osaka-Kobe, Tokyo, Amsterdam, Rotterdam, Nagoya, Tampa-St Petersburg and Virginia Beach. These cities contain 60% of the total exposure, but are from only three (wealthy) countries: USA, Japan and the Netherlands. …”
Publicado 2008
Capítulo de libro electrónico -
3496Publicado 2019“…It is our great pleasure to welcome you to the 16th ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN'19) that takes place in Miami Beach, FL, USA, on November 25th - 29th, 2019. This year's ACM PEWASUN symposium brings together scientists, engineers, and practitioners to share and exchange their experiences, discuss challenges, and report state-of-the-art and in-progress research on all aspects of wireless ad hoc, sensor, and ubiquitous networks with a specific emphasis on their performance evaluation and analysis. …”
Libro electrónico -
3497Publicado 2005“…The key to success is their resilience, according to the founders of the innovative Hardiness Institute in Newport Beach, California. More than experience or training, resilience in the face of stressful situations and rapid changes determines whether you ultimately succeed or fail in the workplace. …”
Libro electrónico -
3498Publicado 2012“…The insights into finance and financial planning should help the entrepreneur not make many of the mistakes I did!" Jim Beach, Director of Education at The Entrepreneur School and author of School for Start-Ups "An exhaustive and invaluable resource for companies seeking funding at any stage of their life cycle." …”
Libro electrónico -
3499Publicado 2020“…We learn about the woman who endures an exceptionally painful labor by completing breathing exercises on a digital beach, the schizophrenic patient who literally confronts the demon inside his head, the burn victims who are able to manage their pain better after traversing snowy virtual landscapes, and the doctor who confronted his own fear of mortality by watching himself die. …”
Libro -
3500Publicado 2017“…What You Will Learn Use SET to clone webpages including the login page Understand the concept of Wi-Fi cracking and use PCAP file to obtain passwords Attack using a USB as payload injector Familiarize yourself with the process of trojan attacks Use Shodan to identify honeypots, rogue access points, vulnerable webcams, and other exploits found in the database Explore various tools for wireless penetration testing and auditing Create an evil twin to intercept network traffic Identify human patterns in networks attacks In Detail Computer networks are increasing at an exponential rate and the most challenging factor organisations are currently facing is network security. Breaching a network is not considered an ingenious effort anymore, so it is very important to gain expertise in securing your network. …”
Libro electrónico