Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 92
- Computer security 80
- Computer networks 63
- Cloud computing 20
- Penetration testing (Computer security) 18
- Examinations 16
- History 16
- Management 16
- Certification 14
- Politics and government 14
- Data protection 13
- United States 13
- Artificial intelligence 12
- Engineering & Applied Sciences 12
- Application software 11
- Development 11
- Information technology 11
- National security 11
- Electronic data processing personnel 10
- Foreign relations 10
- Prevention 10
- Business enterprises 9
- Computer crimes 9
- Python (Computer program language) 9
- Access control 8
- Armed Forces 8
- Computers 8
- Electrical & Computer Engineering 7
- Military policy 7
- Operating systems (Computers) 7
-
241Publicado 2005“…More recently, it has drawn organizations such as the Defense Intelligence Agency, Navy SEALS, Federal law enforcement agencies, and national TV to seek his insights about “how to” as well as “why.” …”
Libro electrónico -
242Publicado 2023“…The Study Guide now contains more end of chapter review questions and more online practice tests. …”
Libro electrónico -
243Publicado 2013“…., the uninterrupted flow of material, information, and coordination from the initial supplier to the end customer. Therefore, it is necessary to adopt adequate measures that take into consideration not only potential losses but also potential gains (so-called speculative risks). …”
Libro electrónico -
244Publicado 2012Tabla de Contenidos: “…-- Isolating the Problem -- Distinguishing Threat Objectives -- Responding to Actionable Intelligence -- Cyber Threat Acquisition -- Distinguishing Between Threats -- Processing Collected Intelligence -- Determining Available Engagement Tactics -- Engaging the Threat -- Within Your Enterprise -- External to Your Enterprise -- Working with Law Enforcement -- To Hack or Not to Hack (Back) -- To What End? -- Understanding Lines (Not to Cross) -- Conclusion -- Chapter 13: Implementation and Validation -- Vetting Your Operations -- Vetting Deceptions -- Vetting Perceptual Consistency in a Deception -- Vetting Engagements -- Putting This Book to Use with Aid from Professionals -- How to Evaluate Success -- Getting to the End Game -- Conclusion -- Glossary -- Index…”
Libro electrónico -
245Publicado 2022“…Work with one of the most efficient open-source FreeBSD-based firewall and routing solutions to secure your network with ease Key Features Learn end-to-end OPNsense firewall implementation and management Defend against attacks by leveraging third-party plugins such as Nginx and Sensei Grasp hands-on examples and labs to become proficient with OPNsense firewall Book Description OPNsense is one of the most powerful open source firewalls and routing platforms available. …”
Libro electrónico -
246
-
247Publicado 2017Tabla de Contenidos: “…THE APPLICATION PERFORMANCE MANAGEMENT ECOSYSTEM -- INSTRUMENTATION AND DATA SOURCES SUPPORTING APPLICATION PERFORMANCE MANAGEMENT -- ENTERPRISE MANAGEMENT ASSOCIATES APPLICATION MANAGEMENT SEMANTIC MODEL -- TOOLS, DATA, AND ANALYTICS, AND THE END-TO-END PERSPECTIVE -- TAXONOMY OF PRODUCT CATEGORIES SUPPORTING APPLICATION PERFORMANCE MANAGEMENT -- THE CONFIGURATION MANAGEMENT DATABASE SYSTEM -- DATA CENTER INSTRUMENTATION -- APPLICATION DISCOVERY AND DEPENDENCY MAPPING -- APPLICATION CODE ANALYTICS -- APPLICATION INTEGRATION ANALYTICS -- NETWORKED APPLICATION MANAGEMENT -- ADVANCED IT ANALYTICS LAYER -- USER EXPERIENCE MANAGEMENT -- INTRODUCTION -- TYPES OF USER EXPERIENCE MANAGEMENT SOLUTIONS -- SUMMARY -- KEY TAKEAWAYS -- 13 - MANAGING CONTAINERIZED APPLICATIONS -- INTRODUCTION -- WHY CONTAINERIZE? …”
Libro electrónico -
248
-
249Publicado 2023Tabla de Contenidos: “…7.5 Artificial Intelligence in Distributed Operating Systems -- 7.6 Current Progress -- 7.7 Quantum Artificial Intelligence -- 7.8 Conclusion -- References -- 8 Techno-Nationalism and Techno-Globalization: A Perspective from the National Security Act -- 8.1 Introduction -- 8.2 Conclusion -- Acknowledgement -- References -- 9 Quantum Computing Based on Cybersecurity -- 9.1 Introduction -- 9.2 Preliminaries -- 9.3 Threat Landscape -- 9.4 Defensive Measurements, Countermeasures, and Best Practises -- 9.5 Conclusion -- References -- 10 Quantum Cryptography for the Future Internet and the Security Analysis -- 10.1 Introduction -- 10.2 Related Works -- 10.3 Preliminaries -- 10.4 Quantum Cryptography for Future Internet -- 10.5 Conclusion -- References -- 11 Security Aspects of Quantum Cryptography -- 11.1 Introduction -- 11.2 Literature Survey -- 11.3 Quantum Key Distribution -- 11.4 Cryptography -- 11.5 Quantum Cryptography with Faint Laser Pulses -- 11.6 Eavesdropping -- 11.7 Conclusion -- References -- 12 Security Aspects of Quantum Machine Learning: Opportunities, Threats and Defenses -- 12.1 Introduction -- 12.2 Quantum Computing Basics -- 12.3 Security Applications -- 12.4 Quantum Machine Learning -- 12.5 Conclusion -- References -- 13 Cyber Forensics and Cybersecurity: Threat Analysis, Research Statement and Opportunities for the Future -- 13.1 Introduction -- 13.2 Background -- 13.3 Scope of this Work -- 13.4 Methodology and Analysis of Simulation Results -- 13.5 Quantum-Based Cybersecurity and Forensics -- 13.6 Conclusion and Future Works -- References -- 14 Quantum Computing: A Software Engineering Approach -- 14.1 Introduction -- 14.2 Background of Research Area -- 14.3 Why Cryptography? …”
Libro electrónico -
250Publicado 2018Tabla de Contenidos: “…. -- There's more -- Sending an email notification dynamically to the end user -- Getting ready -- How to do it... -- Accepting the new email parameter in the RegisterUser function -- Retrieving the UserProfile information in the SendNotifications trigger -- How it works... -- There's more... -- Implementing email logging in Azure Blob Storage -- How to do it... -- How it works... -- Modifying the email content to include an attachment -- Getting ready -- How to do it…”
Libro electrónico -
251Publicado 2017Tabla de Contenidos: “…. -- See also -- Sending an email notification to the end user dynamically -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Implementing email logging in the Blob storage -- How to do it... -- How it works... -- Modifying the email content to include an attachment -- Getting ready -- How to do it... -- Customizing the log file name using IBinder interface -- Adding an attachment to the email…”
Libro electrónico -
252
-
253Publicado 2011Tabla de Contenidos: “…Horvath -- Problems at both ends? Neil Kaplan -- Law, para-regulatory texts and people in international arbitration : predictability or fureur reglementaire? …”
Libro electrónico -
254Publicado 2015Libro electrónico
-
255
-
256Publicado 2016“…Due to its simplified design, which is adapted from nature, the Data Vault 2.0 standard helps prevent typical data warehousing failures. " Building a Scalable Data Warehouse " covers everything one needs to know to create a scalable data warehouse end to end, including a presentation of the Data Vault modeling technique, which provides the foundations to create a technical data warehouse layer. …”
Libro electrónico -
257Publicado 2022Tabla de Contenidos: “…Internet Usage Policy -- E-mail Usage Policy -- Social Media Analysis -- Clean Desk Policy -- Bring-Your-Own-Device (BYOD) Policy -- Privacy Policy -- Due Care and Due Diligence -- Due Process -- Incident Response Policies and Procedures -- Security Awareness and Training -- Diversity of Training Techniques -- Security Policy Training and Procedures -- User Training -- Role-Based Training -- Continuing Education -- Compliance with Laws, Best Practices, and Standards -- User Habits -- Training Metrics and Compliance -- Standard Operating Procedures -- Third-Party Risk Management -- Vendors -- Supply Chain -- Business Partners -- Interoperability Agreements -- Service Level Agreement (SLA) -- Memorandum of Understanding (MOU) -- Measurement Systems Analysis (MSA) -- Business Partnership Agreement (BPA) -- Interconnection Security Agreement (ISA) -- NDA -- End of Service Life (EOSL) -- End of Life (EOL) -- Chapter 3 Review -- Chapter 4 The Role of People in Security -- People-A Security Problem -- Social Engineering -- Tools -- Principles (Reasons for Effectiveness) -- Defenses -- Attacks -- Impersonation -- Phishing -- Smishing -- Vishing -- Spam -- Spam over Internet Messaging (SPIM) -- Spear Phishing -- Whaling -- Pharming -- Dumpster Diving -- Shoulder Surfing -- Tailgating/Piggybacking -- Eliciting Information -- Prepending -- Identity Fraud -- Invoice Scams -- Credential Harvesting -- Reverse Social Engineering -- Reconnaissance -- Hoax -- Watering Hole Attack -- Typo Squatting -- Influence Campaigns -- Poor Security Practices -- Password Selection -- Shoulder Surfing -- Piggybacking -- Dumpster Diving -- Installing Unauthorized Hardware and Software -- Data Handling -- Physical Access by Non-Employees -- Clean Desk Policies -- People as a Security Tool -- Security Awareness -- Security Policy Training and Procedures -- Chapter 4 Review…”
Libro electrónico -
258
-
259Publicado 2019Tabla de Contenidos: “…-- Chapter 18: Realizing the Infrastructure -- Approaching Infrastructure Realization -- Listing Key Infrastructure Considerations for AI and ML Support -- Location -- Capacity -- Data center setup -- End-to-end management -- Network infrastructure -- Security and ethics -- Advisory and supporting services -- Ecosystem fit -- Automating Workflows in Your Data Infrastructure -- Enabling an Efficient Workspace for Data Engineers and Data Scientists -- Part 5: Data as a Business -- Chapter 19: Investing in Data as a Business -- Exploring How to Monetize Data -- Approaching data monetization is about treating data as an asset -- Data monetization in a data economy -- Looking to the Future of the Data Economy -- Chapter 20: Using Data for Insights or Commercial Opportunities -- Focusing Your Data Science Investment -- Determining the Drivers for Internal Business Insights -- Recognizing data science categories for practical implementation -- Applying data-science-driven internal business insights -- Using Data for Commercial Opportunities -- Defining a data product -- Distinguishing between categories of data products -- Balancing Strategic Objectives -- Chapter 21: Engaging Differently with Your Customers -- Understanding Your Customers -- Step 1: Engage your customers -- Step 2: Identify what drives your customers -- Step 3: Apply analytics and machine learning to customer actions -- Step 4: Predict and prepare for the next step -- Step 5: Imagine your customer's future -- Keeping Your Customers Happy…”
Libro electrónico -
260Publicado 2022Libro electrónico