Mostrando 221 - 240 Resultados de 392 Para Buscar 'defensive end', tiempo de consulta: 0.11s Limitar resultados
  1. 221
    Publicado 2017
    “…Every day, civilians in dozens of countries around the world are injured and killed by landmines and other lethal leftovers of conflict, years after hostilities of war have ended. Once planted, a mine will never be able to tell the difference between a military and civilian footstep, and a bomblet will continue to attract children and metal dealers. …”
    Libro electrónico
  2. 222
    Publicado 2006
    “…From December 1944 until the end of March 1945, there existed a forced labour camp for Hungarian Jews in Engerau (today town district Petrzalka of the Slovakian capital Bratislava), which war part of the "Reich Defense Line" ("Wüdostwall"). …”
    Libro electrónico
  3. 223
    por Berman, Aaron, 1952-
    Publicado 2018
    “…Aaron Berman takes a moderate and measured approach to one of the most emotional issues in American Jewish historiography, namely, the response of American Jews to Nazism and the extermination of European Jewry.In remarkably large numbers, American Jews joined the Zionist crusade to create a Jewish state that would finally end the problem of Jewish homelessness, which they believed was the basic cause not only of the Holocaust but of all anti-Semitism. …”
    Libro electrónico
  4. 224
    Publicado 2022
    Tabla de Contenidos: “…Monitoring and measurement -- Reporting -- Continuous improvement -- Risk frameworks -- Understand and Apply Threat Modeling Concepts and Methodologies -- Identifying threats -- Determining and diagramming potential attacks -- Performing reduction analysis -- Remediating threats -- Apply Supply Chain Risk Management (SCRM) Concepts -- Risks associated with hardware, software, and services -- Third-party assessment and monitoring -- Fourth-party risk -- Minimum security requirements -- Service-level agreement requirements -- Establish and Maintain a Security Awareness, Education, and Training Program -- Methods and techniques to present awareness and training -- Periodic content reviews -- Program effectiveness evaluation -- Chapter 4 Asset Security -- Identify and Classify Information and Assets -- Data classification -- Asset classification -- Establish Information and Asset Handling Requirements -- Provision Resources Securely -- Information and asset ownership -- Asset inventory -- Asset management -- Manage Data Life Cycle -- Data roles -- Data collection -- Data location -- Data maintenance -- Data retention -- Data remanence -- Data destruction -- Ensure Appropriate Asset Retention -- End of life -- End of support -- Determine Data Security Controls and Compliance Requirements -- Data states -- Scoping and tailoring -- Standards selection -- Data protection methods -- Chapter 5 Security Architecture and Engineering -- Research, Implement, and Manage Engineering Processes Using Secure Design Principles -- Threat modeling -- Least privilege (and need to know) -- Defense in depth -- Secure defaults -- Fail securely -- Separation of duties -- Keep it simple -- Zero trust -- Privacy by design -- Trust but verify -- Shared responsibility -- Understand the Fundamental Concepts of Security Models…”
    Libro electrónico
  5. 225
    por Tank, WAI Architecture Think
    Publicado 2023
    Tabla de Contenidos: “…86 Metabolism: Architectures that grow and adapt like a body -- 87 Brutalism: Raw honesty of materials, programs, labor, and extraction -- 88 Avant-Garde: Experimental approach to design with the aim of changing the world -- 89 Modernities: Plans that implement social conditions and improve living conditions -- 90 Post-Colonial Architecture: Mitigating the impact of colonization and reimagining life without it -- 91 Panopticon: Spatial conditions of continuous surveillance -- 92 Abolitionist Architecture: Design for the end slavery, prisons, and other oppressive institutions -- 93 Anti-Racist Architecture: Design that exposes and subverts racist practices and processes -- 94 Feminist City: Design addressing the needs of women and nonbinary and trans people -- 95 Self-Sustaining Architecture: Addressing all aspects of maintenance and sustenance of architecture -- 96 Virtual City: Design of urban conditions that exist solely on computers -- 97 Playground City: Conceiving spaces for play, where humans are players -- 98 Relationality: Design for relations between species, the living, and the nonliving -- 99 Planetary Design: Design philosophy that tackles challenges at the scale of the planet -- 100 Intergalactic Architecture: Speculative and scientific design of structures in space -- Glossary -- Acknowledgments -- About the Authors -- Index -- Dedication -- Copyright…”
    Libro electrónico
  6. 226
    Publicado 2015
    “…Then you will switch to defense, selecting the best available solutions and countermeasures. …”
    Libro electrónico
  7. 227
    por Gompert, David C.
    Publicado 2010
    Libro electrónico
  8. 228
    Publicado 2012
    Tabla de Contenidos: “…Federated Identity Management -- eXtensible Access Control Markup Language (XACML) -- Simple Object Access Protocol (SOAP) -- Single Sign On (SSO) -- Service Provisioning Markup Language (SPML) -- Certificate-based Authentication -- Attestation -- Two-Minute Drill -- Q&amp -- A Self Test -- Lab Question -- Self Test Answers -- Lab Answer -- 18 Security Activities Across the Technology Life Cycle -- End-to-End Solution Ownership -- Understanding the Results of Solutions in Advance -- Systems Development Life Cycle -- Adapt Solutions to Address Emerging Threats and Security Trends -- Validate the System Design -- Two-Minute Drill -- Q&amp -- A Self Test -- Lab Question -- Self Test Answers -- Lab Answer -- Appendix: About the Download -- Downloading the ISO File -- System Requirements -- Installing and Running MasterExam -- MasterExam -- LearnKey Online Training -- Help -- Removing Installations -- Technical Support -- LearnKey Technical Support -- Glossary…”
    Libro electrónico
  9. 229
    por Kusterer, Ruth
    Publicado 2013
    Libro electrónico
  10. 230
    Publicado 2017
    Libro electrónico
  11. 231
    Publicado 2023
    “…You'll explore maintainable code through SOLID principles and defensive coding techniques made possible in newer versions of C#. …”
    Libro electrónico
  12. 232
    Publicado 2021
    Tabla de Contenidos: “…3 Nostalgia for the Lost Homeland: An Anticipatory Analysis of the Cultural Turn and the Surprising Parallels between Cultural Relativism and the Insider-Phenomenological Approach -- 4 Science Is Not for the Stateless: An Anticipatory Critique of the Cultural Turn Based on the Ethnocentric Imperative -- Chapter 7 The Ethos of Transcendence (1965-1977): Decision and the Moral Imperative as Anticipatory Response to Postmodernism -- 1 The Philosophical Afterlife of The End of the World: Enzo Paci's Existentialist Historicism and the Moral Imperative Grounded in the Contemporaneity of History -- 2 Impossible Nostalgia and the Anticipatory Analysis of the Discursive Turn -- 3 The Ethos of Transcendence of Life in Value as an Anticipatory Critique of the Discursive Turn -- 3.1 Finding Value in Concreteness, Practice, and Morality Instead of Meaning, Interpretation, and Play -- 3.2 The Ethos of Transcendence as Dialectical Process: Between Loyalty to the Past and New Valorization in the Present -- Conclusion: Let the Earth Shake (Again) or Why Rebirth Must Lead to a New Crisis -- References -- Index…”
    Libro electrónico
  13. 233
    Publicado 2021
    Libro electrónico
  14. 234
    Publicado 2013
    “…The course is designed for both technical managers seeking high-level understanding of the platform as well as developers warming up for a deep dive into programming for Android. By the end of this course, you will have a complete, high-level understanding of the entire operating system. …”
    Video
  15. 235
    Publicado 2017
    Libro electrónico
  16. 236
    por Scholz, James A.
    Publicado 2013
    Tabla de Contenidos: “…Setting the Foundation Building the Enterprise Infrastructure Security Categorization Applied to Information Types Security Categorization Applied to Information Systems Minimum Security Requirements Specifications for Minimum Security Requirements Security Control Selection Infrastructure Security Model Components Developing the Security Architecture Model Dataflow Defense Data in Transit, Data in Motion, and Data at Rest Network Client-Side Security Server-Side Security Strategy vs. …”
    Libro electrónico
  17. 237
    Publicado 2014
    Libro electrónico
  18. 238
    Publicado 2023
    Tabla de Contenidos: “…Propositions/acts passed by other countries -- Special regulations for children and minority groups -- Promoting equality for minority groups -- Educational initiatives -- International AI initiatives and cooperative actions -- Next steps for trustworthy AI -- Proposed solutions and improvement areas -- Summary -- Further reading -- Part 2: Building Blocks and Patterns for a Next-Generation AI Ecosystem -- Chapter 4: Privacy Management in Big Data and Model Design Pipelines -- Technical requirements -- Designing privacy-proven pipelines -- Big data pipelines -- Architecting model design pipelines -- Incremental/continual ML training and retraining -- Scaling defense pipelines -- Enabling differential privacy in scalable architectures -- Designing secure microservices -- Vault -- Cloud security architecture -- Developing in a sandbox environment -- Managing secrets in cloud orchestration services -- Monitoring and threat detection -- Summary -- Further reading -- Chapter 5: ML Pipeline, Model Evaluation, and Handling Uncertainty -- Technical requirements -- Understanding different components of ML pipelines -- ML tasks and algorithms -- Uncertainty in ML -- Types of uncertainty -- Quantifying uncertainty -- Uncertainty in regression tasks -- Uncertainty in classification tasks -- Tools for benchmarking and quantifying uncertainty -- The Uncertainty Baselines library -- Keras-Uncertainty -- Robustness metrics -- Summary -- References -- Chapter 6: Hyperparameter Tuning, MLOps, and AutoML -- Technical requirements -- Introduction to AutoML -- Introducing H2O AutoML -- Understanding Amazon SageMaker Autopilot -- The need for MLOps -- TFX - a scalable end-to-end platform for AI/ML workflows -- Understanding Kubeflow -- Katib for hyperparameter tuning -- Vertex AI -- Datasets -- Training and experiments in Vertex AI -- Vertex AI Workbench -- Summary…”
    Libro electrónico
  19. 239
    Publicado 2017
    “…Deviating from the usual focus on routing and energy efficiency, Building Sensor Networks: From Design to Applications attempts to stitch together the path from conceptual development of applications, on one end, to actual complete applications at the other. …”
    Libro electrónico
  20. 240
    Publicado 2015
    “…"In January 2012, the Department of Defense (DoD) announced plans for a large-scale reduction, or drawdown, of its military force. …”
    Libro electrónico