Mostrando 3,521 - 3,540 Resultados de 3,562 Para Buscar 'Uberach~', tiempo de consulta: 1.47s Limitar resultados
  1. 3521
    Publicado 2015
    “…Compliance and compliance programmes Consequences of a breach How do you comply with the requirements of the Standard? …”
    Libro electrónico
  2. 3522
    por Brown, Jason
    Publicado 2023
    “…Develop strategic plans for building cybersecurity programs and prepare your organization for compliance investigations and audits Key Features Get started as a cybersecurity executive and design an infallible security program Perform assessments and build a strong risk management framework Promote the importance of security within the organization through awareness and training sessions Book Description Ransomware, phishing, and data breaches are major concerns affecting all organizations as a new cyber threat seems to emerge every day, making it paramount to protect the security of your organization and be prepared for potential cyberattacks. …”
    Libro electrónico
  3. 3523
    Publicado 2022
    “…Learn how to set up, configure, and use Microsoft Sentinel to provide security incident and event management services for your multi-cloud environment Key Features Collect, normalize, and analyze security information from multiple data sources Integrate AI, machine learning, built-in and custom threat analyses, and automation to build optimal security solutions Detect and investigate possible security breaches to tackle complex and advanced cyber threats Book Description Microsoft Sentinel is a security information and event management (SIEM) tool developed by Microsoft that helps you to integrate cloud security and artificial intelligence (AI). …”
    Libro electrónico
  4. 3524
    Publicado 2007
    “…The authors also offer tips for monitoring your network and show what to do in the event of a security breach. Specifically, you will learn how to: Home Network Security Simplified features engaging four-color illustrations throughout, as well as informative security tips and pointers to other resources for more advanced information. …”
    Libro electrónico
  5. 3525
    por Carter, Earl
    Publicado 2004
    “…The Cisco Intrusion Detection Sensors and Management options work as a united system to provide detection, notification, and aggressive lockdown to malicious network breaches. CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS), Second Edition , offers in-depth configuration and deployment information for the reliable and intensive intrusion detection solutions from Cisco Systems. …”
    Libro electrónico
  6. 3526
    por Fowler, Kevvie
    Publicado 2009
    “…Rose and Associates and coauthor of Real Digital Forensics The Authoritative, Step-by-Step Guide to Investigating SQL Server Database Intrusions Many forensics investigations lead to the discovery that an SQL Server database might have been breached. If investigators cannot assess and qualify the scope of an intrusion, they may be forced to report it publicly–a disclosure that is painful for companies and customers alike. …”
    Libro electrónico
  7. 3527
    Publicado 2020
    “…What you will learn The threats and opportunities presented by AI How to mitigate social engineering and other human threats Developing cybersecurity strategies for the cloud Major data breaches, their causes, consequences, and key takeaways Blockchain applications for cybersecurity Implications of IoT and how to secure IoT services The role of security in cyberterrorism and state-sponsored cyber attacks Who this book is for This book is essential reading for business leaders, the C-Suite, board members, IT decision m..…”
    Libro electrónico
  8. 3528
    Publicado 2020
    “…Tackle security and networking issues using Python libraries such as Nmap, requests, asyncio, and scapyKey FeaturesEnhance your Python programming skills in securing systems and executing networking tasksExplore Python scripts to debug and secure complex networksLearn to avoid common cyber events with modern Python scriptingBook DescriptionIt’s now more apparent than ever that security is a critical aspect of IT infrastructure, and that devastating data breaches can occur from simple network line hacks. …”
    Libro electrónico
  9. 3529
    Publicado 2024
    “…What you will learn Build a strong foundation in web API fundamentals Explore the ASP.NET Core 8 framework and other industry-standard libraries and tools for high-performance, scalable web APIs Apply essential software design patterns such as MVC, dependency injection, and the repository pattern Use Entity Framework Core for database operations and complex query creation Implement robust security measures to protect against malicious attacks and data breaches Deploy your application to the cloud using Azure and leverage Azure DevOps to implement CI/CD Who this book is for This book is for developers who want to learn how to build web APIs with ASP.NET Core and create flexible, maintainable, scalable applications with .NET platform. …”
    Libro electrónico
  10. 3530
    por Lorenz, David
    Publicado 2024
    “…What you will learn Explore essential features for effective web app development Handle user registration, login/logout processes, and user metadata Navigate multi-tenant applications and understand the potential pitfalls and best practices Discover how to implement real-time functionality Find out how to upload, download, and manipulate files Explore preventive measures against data manipulation and security breaches, ensuring robust web app security Increase efficiency and streamline task automation through personalized email communication, webhooks, and cron jobs Who this book is for This book is for developers looking for a hassle-free, universal solution to building robust apps using Supabase and its integration libraries. …”
    Libro electrónico
  11. 3531
    Publicado 2022
    “…There's a practical element to the book as well--you'll prepare policies and procedures to prevent your company from being breached. You'll complete your learning journey by exploring cloud security and the complex nature of privacy laws in the US. …”
    Libro electrónico
  12. 3532
    por Jonah Berger
    Publicado 2014
    “…Hay muchos ejemplos de cosas que han triunfado: las pulseras amarillas Livestrong, el yogur griego desnatado, el modelo de gestión de Six Sigma, la prohibición del tabaco, las dietas bajas en calorías y luego la moda de la dietas Atkins, South Beach o las bajas en carbohidratos. La misma dinámica tiene lugar a pequeña escala a nivel local. …”
    Texto completo en Odilo
    Otros
  13. 3533
    Publicado 2007
    “…This volume contains the proceedings of the Eighth Middleware Conference, held in Newport Beach, California, USA, November 26--30, 2007. Middleware is a series of conferences that started in 1998 with the aim of being the premier conference on middleware research and technology, where researchers from academia and industry can present and discuss the latest middleware results. …”
    Libro electrónico
  14. 3534
    Publicado 2022
    “…4+ Hours of Video Instruction 4+ hours of deep-dive training covering key system privacy and data protection concepts Overview: Cybersecurity is not only about preventing data breaches and hunting for attackers, it also involves many aspects of system and data privacy. …”
    Video
  15. 3535
    Publicado 2023
    “…Engage in proactive threat hunting to pre-empt potential security breaches. Audience The CompTIA CySA+ (CS0-003) course is ideal for aspiring and current cybersecurity professionals, IT staff looking to specialize in security, and students in related fields. …”
    Video
  16. 3536
    Publicado 2009
    “…They might already have breached what security you have and could be running amok with your personal data. …”
    Libro electrónico
  17. 3537
    Publicado 2023
    “…You will learn how to implement encryption, access controls, data classification, and data retention policies to safeguard data from unauthorized access and prevent data breaches. Real-world case studies will be used to illustrate best practices and provide practical insights into securing data and applications in Azure. …”
    Video
  18. 3538
    Publicado 2024
    “…Compare various threat types to better understand security breaches. Explain cryptographic solutions to secure organizational data. …”
    Video
  19. 3539
    Publicado 2022
    “…You'll see how the simple act of removing personally identifiable information (PII) from a dataset lowers the risk of social engineering attacks.By the end of this machine learning book, you'll have an increased awareness of the various attacks and the techniques to secure your ML systems effectively.What You Will Learn:Explore methods to detect and prevent illegal access to your systemImplement detection techniques when access does occurEmploy machine learning techniques to determine motivationsMitigate hacker access once security is breachedPerform statistical measurement and behavior analysisRepair damage to your data and applicationsUse ethical data collection methods to reduce security risksWho this book is for:Whether you're a data scientist, researcher, or manager working with machine learning techniques in any aspect, this security book is a must-have . …”
    Libro electrónico
  20. 3540
    Publicado 2010
    “…Steven Fine, vice president for administration, Mount Sinai Medical Center, Miami Beach, Florida “Alan has provided some of the best thinking on the issue of leadership conversations. …”
    Grabación de sonido