Mostrando 201 - 220 Resultados de 392 Para Buscar 'defensive end', tiempo de consulta: 0.09s Limitar resultados
  1. 201
    Publicado 2013
    Tabla de Contenidos: “…Der Krieg und die Verhandlungen um ein Ende desselben; Der Zorn der Habsburger und reichsständische Friedensbemühungen; Die Lage der Habsburger und des Landgrafen während des Krieges; Die doppeldeutige Verhandlungsstrategie des Landgrafen; Die Frage der Afterlehenschaft…”
    Libro electrónico
  2. 202
    Publicado 2024
    “…It finds that many policymakers are only weakly supportive of the nonprofit sector. In the end, this Element points to an uneasy, shifting balance in nonprofit sector advocacy between informal, decentralized, issue-based coalitions focused on short-term, if vital, legislative victories, on one hand, and the public good mandate embraced by some sector-wide advocates, which attends to longer time horizons and a broad conception of the defense of civil society, on the other. …”
    Libro electrónico
  3. 203
    Publicado 2017
    Tabla de Contenidos: “…/ chapter 37 Simulating Character Knowledge Phenomena in Talk of the Town / section VI Odds and Ends -- chapter 38 Procedural Level and Story Generation Using Tag-Based Content Selection / chapter 39 Recommendation Systems in Games / chapter 40 Vintage Random Number Generators / chapter 41 Leveraging Plausibility Orderings to Achieve Extremely Efficient Data Compression / chapter 42 Building Custom Static Checkers Using Declarative Programming…”
    Libro electrónico
  4. 204
    Publicado 2024
    Tabla de Contenidos: “…. -- Preparing for Sale -- Getting to the Magic Number -- Knowing What You're Going To, as Well as Going From -- Prepare to Modify Your Behaviour -- Selling a Business Is a Full-Time Job -- Tie Up Any Loose Ends at the Outset -- Finally, "Quality" of Earnings -- The Key People Involved in the Sale -- Accelerants -- Beartraps and Blockers -- And Finally: Alternative Approaches to Realising Value…”
    Libro electrónico
  5. 205
    Publicado 2018
    “…Making informed decisions about how to address such concerns requires a realistic assessment of the capabilities that could be misused. To that end, the U.S. Department of Defense, working with other agencies involved in biodefense, asked the National Academies of Sciences, Engineering, and Medicine to develop a framework to guide an assessment of the security concerns related to advances in synthetic biology, to assess the levels of concern warranted for such advances, and to identify options that could help mitigate those concerns"--…”
    Libro electrónico
  6. 206
    Publicado 2022
    “…Through guided, hands-on exercises, you'll quickly progress through several levels of security--from building a defensible network architecture to protecting your network from adversaries and monitoring for suspicious activity. …”
    Libro electrónico
  7. 207
    Publicado 2021
    “…The book shows you the laws of the mindset and the techniques attackers use, from persistence to "start with the end" strategies and non-linear thinking, that make them so dangerous. …”
    Libro electrónico
  8. 208
    Publicado 2023
    “…We also introduce you to the world of data processing with Pandas, where you'll get hands-on experience with series, Dataframes, and advanced data manipulation techniques. By the end of this course, not only will you have a strong foundation in Python programming, but you'll also be equipped with the skills to apply these concepts in real-world scenarios, giving you a significant edge in your professional journey. …”
    Video
  9. 209
    Publicado 2023
    Libro electrónico
  10. 210
    Publicado 2015
    “…What happens if we bet too heavily on unmanned systems, cyber warfare, and special operations in our defense?In today's U.S. defense policy debates, big land wars are out. …”
    Libro electrónico
  11. 211
    Publicado 2008
    “…The first section provides a brief overview of the essential components of the Internet Protocol and IP networking. At the end of this section, you will understand the fundamental principles of defense in depth and breadth security as applied to IP traffic planes. …”
    Libro electrónico
  12. 212
    Publicado 2023
    “…It's also perfect for compliance and risk management personnel, government or defense employees, and technical support staff seeking comprehensive cybersecurity knowledge. …”
    Video
  13. 213
    Publicado 2023
    “…Whether you're preparing for this foundational exam as a steppingstone to the more advanced Security+ certification or as an end in itself, you'll advance your knowledge of security concepts, encryption, node, device, and storage security, network and service security, and identity and privacy concepts. …”
    Libro electrónico
  14. 214
    Publicado 2023
    “…Mark's training clients include the Department of Defense, Lockheed Martin, Discover Card Services, and Kai3ser Permanente. …”
    Video
  15. 215
    Publicado 2023
    Libro electrónico
  16. 216
    por Ihnatko, Andy
    Publicado 2010
    Tabla de Contenidos: “…; Chapter 10: Comic Books; Finding Free Comics Online; Loading Comics Onto Your iPhone; Longbox Digital: At Long Last, Love?; In Defense of the Comix Reader; Chapter 11: Comic Strips; Stripping For Fun; The Newspaper With Great Comics; Comic Envi; Dark Gate Comic Slurper; Chapter 12: Crosswords…”
    Libro electrónico
  17. 217
    por Weigand, Robert A.
    Publicado 2014
    Libro electrónico
  18. 218
    Publicado 2024
    “…By the end of this book, you’ll have sharpened your administrative skills, gleaned actionable insights, and learned best practices. …”
    Libro electrónico
  19. 219
    Publicado 2023
    Tabla de Contenidos: “…-- Cloud Environment Security Objectives -- Confidentiality -- Integrity -- Availability -- Nonrepudiation -- Common Security Issues -- Principle of Least Privilege -- Zero-Trust Model -- Defense in Depth -- Avoid Security through Obscurity -- The AAAs of Access Management -- Encryption -- End-to-End Encryption -- Symmetric Key Encryption -- Asymmetric Key Encryption -- Network Segmentation -- Basic Network Configuration -- Unsegmented Network Example -- Internal and External Compliance -- Cybersecurity Considerations for the Cloud Environment -- Configuration Management -- Unauthorized Access -- Insecure Interfaces/APIs -- Hijacking of Accounts -- Compliance -- Lack of Visibility -- Accurate Logging -- Cloud Storage -- Vendor Contracts -- Link Sharing -- Major Cybersecurity Threats -- DDoS -- Social Engineering -- Password Attacks -- Malware -- Summary -- Exam Essentials -- Review Questions -- Chapter 2 Managing Identity and Access in Microsoft Azure -- Identity and Access Management -- Identifying Individuals in a System -- Identifying and Assigning Roles in a System and to an Individual -- Assigning Access Levels to Individuals or Groups -- Adding, Removing, and Updating Individuals and Their Roles in a System -- Protecting a System's Sensitive Data and Securing the System -- Enforcing Accountability -- IAM in the Microsoft Azure Platform…”
    Libro electrónico
  20. 220
    Publicado 2019
    Tabla de Contenidos: “…-- Equipment failure -- Platform instability -- Database design flaws -- Data-entry errors -- Operator error -- Taking Advantage of RAID -- Striping -- RAID levels -- Backing Up Your System -- Preparation for the worst -- Full or incremental backup -- Frequency -- Backup maintenance -- Coping with Internet Threats -- Viruses -- Trojan horses -- Worms -- Denial-of-service attacks -- SQL injection attacks -- Phishing scams -- Zombie spambots -- Installing Layers of Protection -- Network-layer firewalls -- Application-layer firewalls -- Antivirus software -- Vulnerabilities, exploits, and patches -- Education -- Alertness -- Chapter 2 Protecting Against User Errors and Conflicts -- Reducing Data-Entry Errors -- Data types: The first line of defense -- Constraints: The second line of defense -- Sharp-eyed humans: The third line of defense -- Coping with Errors in Database Design -- Handling Programming Errors -- Solving Concurrent-Operation Conflicts -- Passing the ACID Test: Atomicity, Consistency, Isolation, and Durability -- Operating with Transactions -- Using the SET TRANSACTION statement -- Starting a transaction -- Committing a transaction…”
    Libro electrónico