Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 167
- Security measures 164
- Computer networks 125
- Historia 95
- Engineering & Applied Sciences 74
- Subirachs, Josep M. 67
- Data protection 59
- Història 56
- Management 52
- Derecho penal 50
- Biblia 47
- Computer Science 46
- History 43
- Exposicions 40
- Filosofía 39
- Computer crimes 32
- Derecho 31
- Information technology 31
- Ubach, Bonaventura 31
- Cloud computing 30
- Historia y crítica 28
- Materiales 28
- Crítica e interpretación 27
- Electrical & Computer Engineering 24
- Física 23
- Law and legislation 23
- Penetration testing (Computer security) 23
- Catequesi 22
- Internet 20
- Catequesis 19
-
3521Publicado 2015“…Compliance and compliance programmes Consequences of a breach How do you comply with the requirements of the Standard? …”
Libro electrónico -
3522por Brown, Jason“…Develop strategic plans for building cybersecurity programs and prepare your organization for compliance investigations and audits Key Features Get started as a cybersecurity executive and design an infallible security program Perform assessments and build a strong risk management framework Promote the importance of security within the organization through awareness and training sessions Book Description Ransomware, phishing, and data breaches are major concerns affecting all organizations as a new cyber threat seems to emerge every day, making it paramount to protect the security of your organization and be prepared for potential cyberattacks. …”
Publicado 2023
Libro electrónico -
3523Publicado 2022“…Learn how to set up, configure, and use Microsoft Sentinel to provide security incident and event management services for your multi-cloud environment Key Features Collect, normalize, and analyze security information from multiple data sources Integrate AI, machine learning, built-in and custom threat analyses, and automation to build optimal security solutions Detect and investigate possible security breaches to tackle complex and advanced cyber threats Book Description Microsoft Sentinel is a security information and event management (SIEM) tool developed by Microsoft that helps you to integrate cloud security and artificial intelligence (AI). …”
Libro electrónico -
3524Publicado 2007“…The authors also offer tips for monitoring your network and show what to do in the event of a security breach. Specifically, you will learn how to: Home Network Security Simplified features engaging four-color illustrations throughout, as well as informative security tips and pointers to other resources for more advanced information. …”
Libro electrónico -
3525por Carter, Earl“…The Cisco Intrusion Detection Sensors and Management options work as a united system to provide detection, notification, and aggressive lockdown to malicious network breaches. CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS), Second Edition , offers in-depth configuration and deployment information for the reliable and intensive intrusion detection solutions from Cisco Systems. …”
Publicado 2004
Libro electrónico -
3526por Fowler, Kevvie“…Rose and Associates and coauthor of Real Digital Forensics The Authoritative, Step-by-Step Guide to Investigating SQL Server Database Intrusions Many forensics investigations lead to the discovery that an SQL Server database might have been breached. If investigators cannot assess and qualify the scope of an intrusion, they may be forced to report it publicly–a disclosure that is painful for companies and customers alike. …”
Publicado 2009
Libro electrónico -
3527Publicado 2020“…What you will learn The threats and opportunities presented by AI How to mitigate social engineering and other human threats Developing cybersecurity strategies for the cloud Major data breaches, their causes, consequences, and key takeaways Blockchain applications for cybersecurity Implications of IoT and how to secure IoT services The role of security in cyberterrorism and state-sponsored cyber attacks Who this book is for This book is essential reading for business leaders, the C-Suite, board members, IT decision m..…”
Libro electrónico -
3528Publicado 2020“…Tackle security and networking issues using Python libraries such as Nmap, requests, asyncio, and scapyKey FeaturesEnhance your Python programming skills in securing systems and executing networking tasksExplore Python scripts to debug and secure complex networksLearn to avoid common cyber events with modern Python scriptingBook DescriptionIt’s now more apparent than ever that security is a critical aspect of IT infrastructure, and that devastating data breaches can occur from simple network line hacks. …”
Libro electrónico -
3529Publicado 2024“…What you will learn Build a strong foundation in web API fundamentals Explore the ASP.NET Core 8 framework and other industry-standard libraries and tools for high-performance, scalable web APIs Apply essential software design patterns such as MVC, dependency injection, and the repository pattern Use Entity Framework Core for database operations and complex query creation Implement robust security measures to protect against malicious attacks and data breaches Deploy your application to the cloud using Azure and leverage Azure DevOps to implement CI/CD Who this book is for This book is for developers who want to learn how to build web APIs with ASP.NET Core and create flexible, maintainable, scalable applications with .NET platform. …”
Libro electrónico -
3530por Lorenz, David“…What you will learn Explore essential features for effective web app development Handle user registration, login/logout processes, and user metadata Navigate multi-tenant applications and understand the potential pitfalls and best practices Discover how to implement real-time functionality Find out how to upload, download, and manipulate files Explore preventive measures against data manipulation and security breaches, ensuring robust web app security Increase efficiency and streamline task automation through personalized email communication, webhooks, and cron jobs Who this book is for This book is for developers looking for a hassle-free, universal solution to building robust apps using Supabase and its integration libraries. …”
Publicado 2024
Libro electrónico -
3531Publicado 2022“…There's a practical element to the book as well--you'll prepare policies and procedures to prevent your company from being breached. You'll complete your learning journey by exploring cloud security and the complex nature of privacy laws in the US. …”
Libro electrónico -
3532por Jonah Berger“…Hay muchos ejemplos de cosas que han triunfado: las pulseras amarillas Livestrong, el yogur griego desnatado, el modelo de gestión de Six Sigma, la prohibición del tabaco, las dietas bajas en calorías y luego la moda de la dietas Atkins, South Beach o las bajas en carbohidratos. La misma dinámica tiene lugar a pequeña escala a nivel local. …”
Publicado 2014
Texto completo en Odilo
Otros -
3533Publicado 2007“…This volume contains the proceedings of the Eighth Middleware Conference, held in Newport Beach, California, USA, November 26--30, 2007. Middleware is a series of conferences that started in 1998 with the aim of being the premier conference on middleware research and technology, where researchers from academia and industry can present and discuss the latest middleware results. …”
Libro electrónico -
3534Publicado 2022“…4+ Hours of Video Instruction 4+ hours of deep-dive training covering key system privacy and data protection concepts Overview: Cybersecurity is not only about preventing data breaches and hunting for attackers, it also involves many aspects of system and data privacy. …”
Video -
3535Publicado 2023“…Engage in proactive threat hunting to pre-empt potential security breaches. Audience The CompTIA CySA+ (CS0-003) course is ideal for aspiring and current cybersecurity professionals, IT staff looking to specialize in security, and students in related fields. …”
Video -
3536Publicado 2009“…They might already have breached what security you have and could be running amok with your personal data. …”
Libro electrónico -
3537Publicado 2023“…You will learn how to implement encryption, access controls, data classification, and data retention policies to safeguard data from unauthorized access and prevent data breaches. Real-world case studies will be used to illustrate best practices and provide practical insights into securing data and applications in Azure. …”
Video -
3538Publicado 2024“…Compare various threat types to better understand security breaches. Explain cryptographic solutions to secure organizational data. …”
Video -
3539Publicado 2022“…You'll see how the simple act of removing personally identifiable information (PII) from a dataset lowers the risk of social engineering attacks.By the end of this machine learning book, you'll have an increased awareness of the various attacks and the techniques to secure your ML systems effectively.What You Will Learn:Explore methods to detect and prevent illegal access to your systemImplement detection techniques when access does occurEmploy machine learning techniques to determine motivationsMitigate hacker access once security is breachedPerform statistical measurement and behavior analysisRepair damage to your data and applicationsUse ethical data collection methods to reduce security risksWho this book is for:Whether you're a data scientist, researcher, or manager working with machine learning techniques in any aspect, this security book is a must-have . …”
Libro electrónico -
3540Publicado 2010“…Steven Fine, vice president for administration, Mount Sinai Medical Center, Miami Beach, Florida “Alan has provided some of the best thinking on the issue of leadership conversations. …”
Grabación de sonido