Mostrando 241 - 260 Resultados de 392 Para Buscar 'defensive end', tiempo de consulta: 0.10s Limitar resultados
  1. 241
    Publicado 2005
    “…More recently, it has drawn organizations such as the Defense Intelligence Agency, Navy SEALS, Federal law enforcement agencies, and national TV to seek his insights about “how to” as well as “why.” …”
    Libro electrónico
  2. 242
    Publicado 2023
    “…The Study Guide now contains more end of chapter review questions and more online practice tests. …”
    Libro electrónico
  3. 243
    Publicado 2013
    “…., the uninterrupted flow of material, information, and coordination from the initial supplier to the end customer. Therefore, it is necessary to adopt adequate measures that take into consideration not only potential losses but also potential gains (so-called speculative risks). …”
    Libro electrónico
  4. 244
    Publicado 2012
    Tabla de Contenidos: “…-- Isolating the Problem -- Distinguishing Threat Objectives -- Responding to Actionable Intelligence -- Cyber Threat Acquisition -- Distinguishing Between Threats -- Processing Collected Intelligence -- Determining Available Engagement Tactics -- Engaging the Threat -- Within Your Enterprise -- External to Your Enterprise -- Working with Law Enforcement -- To Hack or Not to Hack (Back) -- To What End? -- Understanding Lines (Not to Cross) -- Conclusion -- Chapter 13: Implementation and Validation -- Vetting Your Operations -- Vetting Deceptions -- Vetting Perceptual Consistency in a Deception -- Vetting Engagements -- Putting This Book to Use with Aid from Professionals -- How to Evaluate Success -- Getting to the End Game -- Conclusion -- Glossary -- Index…”
    Libro electrónico
  5. 245
    Publicado 2022
    “…Work with one of the most efficient open-source FreeBSD-based firewall and routing solutions to secure your network with ease Key Features Learn end-to-end OPNsense firewall implementation and management Defend against attacks by leveraging third-party plugins such as Nginx and Sensei Grasp hands-on examples and labs to become proficient with OPNsense firewall Book Description OPNsense is one of the most powerful open source firewalls and routing platforms available. …”
    Libro electrónico
  6. 246
    por Bruce, James B.
    Publicado 2010
    Libro electrónico
  7. 247
    Publicado 2017
    Tabla de Contenidos: “…THE APPLICATION PERFORMANCE MANAGEMENT ECOSYSTEM -- INSTRUMENTATION AND DATA SOURCES SUPPORTING APPLICATION PERFORMANCE MANAGEMENT -- ENTERPRISE MANAGEMENT ASSOCIATES APPLICATION MANAGEMENT SEMANTIC MODEL -- TOOLS, DATA, AND ANALYTICS, AND THE END-TO-END PERSPECTIVE -- TAXONOMY OF PRODUCT CATEGORIES SUPPORTING APPLICATION PERFORMANCE MANAGEMENT -- THE CONFIGURATION MANAGEMENT DATABASE SYSTEM -- DATA CENTER INSTRUMENTATION -- APPLICATION DISCOVERY AND DEPENDENCY MAPPING -- APPLICATION CODE ANALYTICS -- APPLICATION INTEGRATION ANALYTICS -- NETWORKED APPLICATION MANAGEMENT -- ADVANCED IT ANALYTICS LAYER -- USER EXPERIENCE MANAGEMENT -- INTRODUCTION -- TYPES OF USER EXPERIENCE MANAGEMENT SOLUTIONS -- SUMMARY -- KEY TAKEAWAYS -- 13 - MANAGING CONTAINERIZED APPLICATIONS -- INTRODUCTION -- WHY CONTAINERIZE? …”
    Libro electrónico
  8. 248
    por Das, Ravindra
    Publicado 2024
    Libro electrónico
  9. 249
    Publicado 2023
    Tabla de Contenidos: “…7.5 Artificial Intelligence in Distributed Operating Systems -- 7.6 Current Progress -- 7.7 Quantum Artificial Intelligence -- 7.8 Conclusion -- References -- 8 Techno-Nationalism and Techno-Globalization: A Perspective from the National Security Act -- 8.1 Introduction -- 8.2 Conclusion -- Acknowledgement -- References -- 9 Quantum Computing Based on Cybersecurity -- 9.1 Introduction -- 9.2 Preliminaries -- 9.3 Threat Landscape -- 9.4 Defensive Measurements, Countermeasures, and Best Practises -- 9.5 Conclusion -- References -- 10 Quantum Cryptography for the Future Internet and the Security Analysis -- 10.1 Introduction -- 10.2 Related Works -- 10.3 Preliminaries -- 10.4 Quantum Cryptography for Future Internet -- 10.5 Conclusion -- References -- 11 Security Aspects of Quantum Cryptography -- 11.1 Introduction -- 11.2 Literature Survey -- 11.3 Quantum Key Distribution -- 11.4 Cryptography -- 11.5 Quantum Cryptography with Faint Laser Pulses -- 11.6 Eavesdropping -- 11.7 Conclusion -- References -- 12 Security Aspects of Quantum Machine Learning: Opportunities, Threats and Defenses -- 12.1 Introduction -- 12.2 Quantum Computing Basics -- 12.3 Security Applications -- 12.4 Quantum Machine Learning -- 12.5 Conclusion -- References -- 13 Cyber Forensics and Cybersecurity: Threat Analysis, Research Statement and Opportunities for the Future -- 13.1 Introduction -- 13.2 Background -- 13.3 Scope of this Work -- 13.4 Methodology and Analysis of Simulation Results -- 13.5 Quantum-Based Cybersecurity and Forensics -- 13.6 Conclusion and Future Works -- References -- 14 Quantum Computing: A Software Engineering Approach -- 14.1 Introduction -- 14.2 Background of Research Area -- 14.3 Why Cryptography? …”
    Libro electrónico
  10. 250
    Publicado 2018
    Tabla de Contenidos: “…. -- There's more -- Sending an email notification dynamically to the end user -- Getting ready -- How to do it... -- Accepting the new email parameter in the RegisterUser function -- Retrieving the UserProfile information in the SendNotifications trigger -- How it works... -- There's more... -- Implementing email logging in Azure Blob Storage -- How to do it... -- How it works... -- Modifying the email content to include an attachment -- Getting ready -- How to do it…”
    Libro electrónico
  11. 251
    Publicado 2017
    Tabla de Contenidos: “…. -- See also -- Sending an email notification to the end user dynamically -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Implementing email logging in the Blob storage -- How to do it... -- How it works... -- Modifying the email content to include an attachment -- Getting ready -- How to do it... -- Customizing the log file name using IBinder interface -- Adding an attachment to the email…”
    Libro electrónico
  12. 252
    Publicado 2018
    Libro electrónico
  13. 253
    Publicado 2011
    Tabla de Contenidos: “…Horvath -- Problems at both ends? Neil Kaplan -- Law, para-regulatory texts and people in international arbitration : predictability or fureur reglementaire? …”
    Libro electrónico
  14. 254
    Publicado 2015
    Libro electrónico
  15. 255
  16. 256
    Publicado 2016
    “…Due to its simplified design, which is adapted from nature, the Data Vault 2.0 standard helps prevent typical data warehousing failures. " Building a Scalable Data Warehouse " covers everything one needs to know to create a scalable data warehouse end to end, including a presentation of the Data Vault modeling technique, which provides the foundations to create a technical data warehouse layer. …”
    Libro electrónico
  17. 257
    Publicado 2022
    Tabla de Contenidos: “…Internet Usage Policy -- E-mail Usage Policy -- Social Media Analysis -- Clean Desk Policy -- Bring-Your-Own-Device (BYOD) Policy -- Privacy Policy -- Due Care and Due Diligence -- Due Process -- Incident Response Policies and Procedures -- Security Awareness and Training -- Diversity of Training Techniques -- Security Policy Training and Procedures -- User Training -- Role-Based Training -- Continuing Education -- Compliance with Laws, Best Practices, and Standards -- User Habits -- Training Metrics and Compliance -- Standard Operating Procedures -- Third-Party Risk Management -- Vendors -- Supply Chain -- Business Partners -- Interoperability Agreements -- Service Level Agreement (SLA) -- Memorandum of Understanding (MOU) -- Measurement Systems Analysis (MSA) -- Business Partnership Agreement (BPA) -- Interconnection Security Agreement (ISA) -- NDA -- End of Service Life (EOSL) -- End of Life (EOL) -- Chapter 3 Review -- Chapter 4 The Role of People in Security -- People-A Security Problem -- Social Engineering -- Tools -- Principles (Reasons for Effectiveness) -- Defenses -- Attacks -- Impersonation -- Phishing -- Smishing -- Vishing -- Spam -- Spam over Internet Messaging (SPIM) -- Spear Phishing -- Whaling -- Pharming -- Dumpster Diving -- Shoulder Surfing -- Tailgating/Piggybacking -- Eliciting Information -- Prepending -- Identity Fraud -- Invoice Scams -- Credential Harvesting -- Reverse Social Engineering -- Reconnaissance -- Hoax -- Watering Hole Attack -- Typo Squatting -- Influence Campaigns -- Poor Security Practices -- Password Selection -- Shoulder Surfing -- Piggybacking -- Dumpster Diving -- Installing Unauthorized Hardware and Software -- Data Handling -- Physical Access by Non-Employees -- Clean Desk Policies -- People as a Security Tool -- Security Awareness -- Security Policy Training and Procedures -- Chapter 4 Review…”
    Libro electrónico
  18. 258
    por Lorell, Mark A., 1947-
    Publicado 2003
    Libro electrónico
  19. 259
    Publicado 2019
    Tabla de Contenidos: “…-- Chapter 18: Realizing the Infrastructure -- Approaching Infrastructure Realization -- Listing Key Infrastructure Considerations for AI and ML Support -- Location -- Capacity -- Data center setup -- End-to-end management -- Network infrastructure -- Security and ethics -- Advisory and supporting services -- Ecosystem fit -- Automating Workflows in Your Data Infrastructure -- Enabling an Efficient Workspace for Data Engineers and Data Scientists -- Part 5: Data as a Business -- Chapter 19: Investing in Data as a Business -- Exploring How to Monetize Data -- Approaching data monetization is about treating data as an asset -- Data monetization in a data economy -- Looking to the Future of the Data Economy -- Chapter 20: Using Data for Insights or Commercial Opportunities -- Focusing Your Data Science Investment -- Determining the Drivers for Internal Business Insights -- Recognizing data science categories for practical implementation -- Applying data-science-driven internal business insights -- Using Data for Commercial Opportunities -- Defining a data product -- Distinguishing between categories of data products -- Balancing Strategic Objectives -- Chapter 21: Engaging Differently with Your Customers -- Understanding Your Customers -- Step 1: Engage your customers -- Step 2: Identify what drives your customers -- Step 3: Apply analytics and machine learning to customer actions -- Step 4: Predict and prepare for the next step -- Step 5: Imagine your customer's future -- Keeping Your Customers Happy…”
    Libro electrónico
  20. 260
    Publicado 2022
    Libro electrónico