Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 92
- Computer security 80
- Computer networks 63
- Cloud computing 20
- Penetration testing (Computer security) 18
- Examinations 16
- History 16
- Management 16
- Certification 14
- Politics and government 14
- Data protection 13
- United States 13
- Artificial intelligence 12
- Engineering & Applied Sciences 12
- Application software 11
- Development 11
- Information technology 11
- National security 11
- Electronic data processing personnel 10
- Foreign relations 10
- Prevention 10
- Business enterprises 9
- Computer crimes 9
- Python (Computer program language) 9
- Access control 8
- Armed Forces 8
- Computers 8
- Electrical & Computer Engineering 7
- Military policy 7
- Operating systems (Computers) 7
-
201Publicado 2013Tabla de Contenidos: “…Der Krieg und die Verhandlungen um ein Ende desselben; Der Zorn der Habsburger und reichsständische Friedensbemühungen; Die Lage der Habsburger und des Landgrafen während des Krieges; Die doppeldeutige Verhandlungsstrategie des Landgrafen; Die Frage der Afterlehenschaft…”
Libro electrónico -
202Publicado 2024“…It finds that many policymakers are only weakly supportive of the nonprofit sector. In the end, this Element points to an uneasy, shifting balance in nonprofit sector advocacy between informal, decentralized, issue-based coalitions focused on short-term, if vital, legislative victories, on one hand, and the public good mandate embraced by some sector-wide advocates, which attends to longer time horizons and a broad conception of the defense of civil society, on the other. …”
Libro electrónico -
203Publicado 2017Tabla de Contenidos: “…/ chapter 37 Simulating Character Knowledge Phenomena in Talk of the Town / section VI Odds and Ends -- chapter 38 Procedural Level and Story Generation Using Tag-Based Content Selection / chapter 39 Recommendation Systems in Games / chapter 40 Vintage Random Number Generators / chapter 41 Leveraging Plausibility Orderings to Achieve Extremely Efficient Data Compression / chapter 42 Building Custom Static Checkers Using Declarative Programming…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
204Publicado 2024Tabla de Contenidos: “…. -- Preparing for Sale -- Getting to the Magic Number -- Knowing What You're Going To, as Well as Going From -- Prepare to Modify Your Behaviour -- Selling a Business Is a Full-Time Job -- Tie Up Any Loose Ends at the Outset -- Finally, "Quality" of Earnings -- The Key People Involved in the Sale -- Accelerants -- Beartraps and Blockers -- And Finally: Alternative Approaches to Realising Value…”
Libro electrónico -
205Publicado 2018“…Making informed decisions about how to address such concerns requires a realistic assessment of the capabilities that could be misused. To that end, the U.S. Department of Defense, working with other agencies involved in biodefense, asked the National Academies of Sciences, Engineering, and Medicine to develop a framework to guide an assessment of the security concerns related to advances in synthetic biology, to assess the levels of concern warranted for such advances, and to identify options that could help mitigate those concerns"--…”
Libro electrónico -
206Publicado 2022“…Through guided, hands-on exercises, you'll quickly progress through several levels of security--from building a defensible network architecture to protecting your network from adversaries and monitoring for suspicious activity. …”
Libro electrónico -
207Publicado 2021“…The book shows you the laws of the mindset and the techniques attackers use, from persistence to "start with the end" strategies and non-linear thinking, that make them so dangerous. …”
Libro electrónico -
208Publicado 2023“…We also introduce you to the world of data processing with Pandas, where you'll get hands-on experience with series, Dataframes, and advanced data manipulation techniques. By the end of this course, not only will you have a strong foundation in Python programming, but you'll also be equipped with the skills to apply these concepts in real-world scenarios, giving you a significant edge in your professional journey. …”
Video -
209Publicado 2023Libro electrónico
-
210Publicado 2015“…What happens if we bet too heavily on unmanned systems, cyber warfare, and special operations in our defense?In today's U.S. defense policy debates, big land wars are out. …”
Libro electrónico -
211Publicado 2008“…The first section provides a brief overview of the essential components of the Internet Protocol and IP networking. At the end of this section, you will understand the fundamental principles of defense in depth and breadth security as applied to IP traffic planes. …”
Libro electrónico -
212Publicado 2023“…It's also perfect for compliance and risk management personnel, government or defense employees, and technical support staff seeking comprehensive cybersecurity knowledge. …”
Video -
213Publicado 2023“…Whether you're preparing for this foundational exam as a steppingstone to the more advanced Security+ certification or as an end in itself, you'll advance your knowledge of security concepts, encryption, node, device, and storage security, network and service security, and identity and privacy concepts. …”
Libro electrónico -
214Publicado 2023“…Mark's training clients include the Department of Defense, Lockheed Martin, Discover Card Services, and Kai3ser Permanente. …”
Video -
215
-
216por Ihnatko, AndyTabla de Contenidos: “…; Chapter 10: Comic Books; Finding Free Comics Online; Loading Comics Onto Your iPhone; Longbox Digital: At Long Last, Love?; In Defense of the Comix Reader; Chapter 11: Comic Strips; Stripping For Fun; The Newspaper With Great Comics; Comic Envi; Dark Gate Comic Slurper; Chapter 12: Crosswords…”
Publicado 2010
Libro electrónico -
217
-
218Publicado 2024“…By the end of this book, you’ll have sharpened your administrative skills, gleaned actionable insights, and learned best practices. …”
Libro electrónico -
219Publicado 2023Tabla de Contenidos: “…-- Cloud Environment Security Objectives -- Confidentiality -- Integrity -- Availability -- Nonrepudiation -- Common Security Issues -- Principle of Least Privilege -- Zero-Trust Model -- Defense in Depth -- Avoid Security through Obscurity -- The AAAs of Access Management -- Encryption -- End-to-End Encryption -- Symmetric Key Encryption -- Asymmetric Key Encryption -- Network Segmentation -- Basic Network Configuration -- Unsegmented Network Example -- Internal and External Compliance -- Cybersecurity Considerations for the Cloud Environment -- Configuration Management -- Unauthorized Access -- Insecure Interfaces/APIs -- Hijacking of Accounts -- Compliance -- Lack of Visibility -- Accurate Logging -- Cloud Storage -- Vendor Contracts -- Link Sharing -- Major Cybersecurity Threats -- DDoS -- Social Engineering -- Password Attacks -- Malware -- Summary -- Exam Essentials -- Review Questions -- Chapter 2 Managing Identity and Access in Microsoft Azure -- Identity and Access Management -- Identifying Individuals in a System -- Identifying and Assigning Roles in a System and to an Individual -- Assigning Access Levels to Individuals or Groups -- Adding, Removing, and Updating Individuals and Their Roles in a System -- Protecting a System's Sensitive Data and Securing the System -- Enforcing Accountability -- IAM in the Microsoft Azure Platform…”
Libro electrónico -
220Publicado 2019Tabla de Contenidos: “…-- Equipment failure -- Platform instability -- Database design flaws -- Data-entry errors -- Operator error -- Taking Advantage of RAID -- Striping -- RAID levels -- Backing Up Your System -- Preparation for the worst -- Full or incremental backup -- Frequency -- Backup maintenance -- Coping with Internet Threats -- Viruses -- Trojan horses -- Worms -- Denial-of-service attacks -- SQL injection attacks -- Phishing scams -- Zombie spambots -- Installing Layers of Protection -- Network-layer firewalls -- Application-layer firewalls -- Antivirus software -- Vulnerabilities, exploits, and patches -- Education -- Alertness -- Chapter 2 Protecting Against User Errors and Conflicts -- Reducing Data-Entry Errors -- Data types: The first line of defense -- Constraints: The second line of defense -- Sharp-eyed humans: The third line of defense -- Coping with Errors in Database Design -- Handling Programming Errors -- Solving Concurrent-Operation Conflicts -- Passing the ACID Test: Atomicity, Consistency, Isolation, and Durability -- Operating with Transactions -- Using the SET TRANSACTION statement -- Starting a transaction -- Committing a transaction…”
Libro electrónico