Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 92
- Computer security 80
- Computer networks 63
- Cloud computing 20
- Penetration testing (Computer security) 18
- Examinations 16
- History 16
- Management 16
- Certification 14
- Politics and government 14
- Data protection 13
- United States 13
- Artificial intelligence 12
- Engineering & Applied Sciences 12
- Application software 11
- Development 11
- Information technology 11
- National security 11
- Electronic data processing personnel 10
- Foreign relations 10
- Prevention 10
- Business enterprises 9
- Computer crimes 9
- Python (Computer program language) 9
- Access control 8
- Armed Forces 8
- Computers 8
- Electrical & Computer Engineering 7
- Military policy 7
- Operating systems (Computers) 7
-
261Publicado 2023“…The book is packed with practical examples, tooling, and attack-defense guidelines to help you assess and improve the security of your real-life environments. …”
Libro electrónico -
262“…Cisco NAC Appliance Enforcing Host Security with Clean Access Authenticate, inspect, remediate, and authorize end-point devices using Cisco NAC Appliance Jamey Heary, CCIE® No. 7680 Contributing authors: Jerry Lin, CCIE No. 6469, Chad Sullivan, CCIE No. 6493, and Alok Agrawal With today's security challenges and threats growing more sophisticated, perimeter defense alone is no longer sufficient. …”
Libro electrónico -
263Publicado 2023Tabla de Contenidos: “…-- The bring your own device model -- The choose your own device model -- Key considerations -- Comparing options -- Protection and governance options -- Identity and access management -- Information protection -- Device configuration -- Application management -- Storage sync options -- OneDrive for Business -- Work Folders -- Alternative EUC delivery options -- Windows 365 Cloud PC and Azure Virtual Desktop -- Enabling virtual private networks -- Publishing applications via proxy -- End user behavior analytics -- Summary -- Chapter 8: Windows 11 Security -- Introducing security posture -- Zero trust -- Defense in depth -- Ensuring hardware security -- TPM -- Microsoft Pluton security processor -- Windows Defender System Guard -- Hypervisor-protected Code Integrity -- Ensuring that we operate system security -- Introducing Secure Boot and Trusted Boot -- Exploring the Windows Security app -- Using BitLocker for encryption -- Security baselines -- Ensuring user identity security -- Windows Hello for Business -- Microsoft Defender Credential Guard -- Summary -- Chapter 9: Advanced Configurations -- Virtual desktops -- On-prem virtual desktop best practices -- VDI configurations -- The Windows Configuration Designer -- Windows 11 Kiosk Mode -- Windows Autopilot -- The Set up School PCs application -- Device lockdown -- Windows Subsystem for Linux -- Group Policy Editor -- Remote Desktop Protocol -- Windows Hello and Windows Hello for Business -- Windows Firewall with Advanced Security -- Hyper-V -- Windows Task Scheduler -- Enabling BitLocker drive encryption -- Storage Spaces Direct -- Windows Defender Application Guard -- Summary -- Chapter 10: Windows 11 21H2 and 22H2 Changes (versus Windows 10) -- New Start menu and taskbar…”
Libro electrónico -
264Publicado 2024Tabla de Contenidos: “…-- 12.1 Methodology -- 12.2 Clinical Care -- 12.3 Administrative and Operations -- 12.4 Life Sciences -- References -- Chapter 13 The Business Model for Buyers of Health AI Solutions -- 13.1 Clinical Care -- 13.2 Administrative and Operations -- 13.3 Life Sciences -- 13.4 Guide for Buyer Assessment of Health AI Solutions -- References -- Chapter 14 How to Build and Invest in the Best Health AI Companies -- 14.1 Barriers to Entry and Intellectual Property (IP) -- 14.1.1 Creating Defensible Products -- 14.2 Startups Versus Large Companies -- 14.3 Sales and Marketing -- 14.4 Initial Customers -- 14.5 Direct-to-Consumer (D2C) -- 14.6 Planning Your Entrepreneurial Health AI Journey -- 14.7 Assessment of Companies by Investors -- 14.7.1 Key Areas to Explore for a Health AI Company for Investment -- References -- Index -- EULA…”
Libro electrónico -
265por Impact of Empire (Organization).“…ROSSUM, J.A.. VAN: The end of the Batavian auxiliaries as ‘national’ units. …”
Publicado 2004
Libro electrónico -
266
-
267
-
268Publicado 2005“…He also shows us how the defense system of the place developed from a modest rectangular fort built by François Martin to the Fort Louis and the large outer fortification at the time of Dupleix, until its final decay at the end of the 18th century. …”
Libro electrónico -
269
-
270Publicado 2023Tabla de Contenidos: “…Intersection of cybersecurity with other disciplines -- Tool management -- Planning -- Acquisition and integration of supplier components -- Supplier capability assessment and the role of the CSIA -- The concept phase -- Item-level concept -- Cybersecurity concept -- Implications to component-level development -- Design and implementation -- Post-development requirements -- Configuration and calibration -- Weakness analysis -- Unit implementation -- Verification testing -- Validation testing -- Product release -- Cybersecurity case -- Cybersecurity assessment -- Production planning -- Operations and maintenance -- Monitoring -- Vulnerability analysis -- Vulnerability management -- Updates -- End of life -- Summary -- Chapter 6: Interactions Between Functional Safety and Cybersecurity -- A tale of two standards -- A unified versus integrated approach -- Establishing a foundational understanding of functional safety and cybersecurity -- Understanding the unique aspects and interdependencies between the two domains -- Differences between safety and security scope -- Differences in the level of interdependence between safety and security requirements -- Conflict resolution -- Extending the safety and quality supporting processes -- Planning -- Supplier management -- Concept -- Design -- Implementation -- Testing and validation -- Release -- Production -- End of life -- Creating synergies in the concept phase -- Item functions -- Item boundaries and operational environments -- Damage scenarios and hazards -- Safety and security goals -- Safety and security requirements -- Finding synergies and conflicts in the design phase -- Leveraging safety and security mechanisms -- Self-tests across safety and security -- Leveraging error detection safety mechanisms -- Eliminating inconsistencies in the error response -- Parallels in design principles…”
Libro electrónico -
271Publicado 2024“…Take charge of your cyber defenses with the power of Microsoft's unified XDR and SIEM solution. …”
Libro electrónico -
272Publicado 2023Libro electrónico
-
273Publicado 2007Libro electrónico
-
274Publicado 2021“…Throughout the book, you'll explore industrial equipment, port and service discovery, pivoting, and much more, before finally launching attacks against systems in an industrial network. By the end of this penetration testing book, you'll not only understand how to analyze and navigate the intricacies of an industrial control system (ICS), but you'll also have developed essential offensive and defensive skills to proactively protect industrial networks from modern cyberattacks. …”
Libro electrónico -
275
-
276Publicado 2022Tabla de Contenidos: “…-- Trade Finance Ecosystem -- Trade Finance Functional Architecture -- Case Study: Collateral Management -- Collateral Management Functional Architecture -- Collateral Management Architecture -- Microservices and User Interface: Micro Front End -- Routing -- Composition -- Communication -- Pros and Cons of Micro Front Ends -- Microservice Architecture in Artificial Intelligence -- AI Subcategories -- Microservices Vertical Components: Speech AI -- Summary -- Chapter 6: Event-Driven Architecture -- Evolution of Event-Driven Architecture -- Tightly Coupled World to Loosely Coupled World -- Message Broker World to Event World -- Event -- Business Events -- Technical Events -- Processing an Event -- Event Handling in Domain Context -- Event Governance -- What Is Event-Driven Architecture? …”
Libro electrónico -
277Publicado 2022Tabla de Contenidos: “…Part IV Communication and Network Security -- Chapter 11 Networking Fundamentals -- Data Communications Foundations -- Network Reference Models -- Protocols -- Application Layer -- Presentation Layer -- Session Layer -- Transport Layer -- Network Layer -- Data Link Layer -- Physical Layer -- Functions and Protocols in the OSI Model -- Tying the Layers Together -- Local Area Networks -- Network Topology -- Medium Access Control Mechanisms -- Layer 2 Protocols -- Transmission Methods -- Layer 2 Security Standards -- Internet Protocol Networking -- TCP -- IP Addressing -- IPv6 -- Address Resolution Protocol -- Dynamic Host Configuration Protocol -- Internet Control Message Protocol -- Simple Network Management Protocol -- Domain Name Service -- Network Address Translation -- Routing Protocols -- Intranets and Extranets -- Metropolitan Area Networks -- Metro Ethernet -- Wide Area Networks -- Dedicated Links -- WAN Technologies -- Chapter Review -- Quick Review -- Questions -- Answers -- Chapter 12 Wireless Networking -- Wireless Communications Techniques -- Spread Spectrum -- Orthogonal Frequency Division Multiplexing -- Wireless Networking Fundamentals -- WLAN Components -- WLAN Standards -- Other Wireless Network Standards -- Other Important Standards -- Evolution of WLAN Security -- 802.11 -- 802.11i -- 802.11w -- WPA3 -- 802.1X -- Best Practices for Securing WLANs -- Mobile Wireless Communication -- Multiple Access Technologies -- Generations of Mobile Wireless -- Satellites -- Chapter Review -- Quick Review -- Questions -- Answers -- Chapter 13 Securing the Network -- Applying Secure Design Principles to Network Architectures -- Secure Networking -- Link Encryption vs. End-to-End Encryption -- TLS -- VPN -- Secure Protocols -- Web Services -- Domain Name System -- Electronic Mail -- Multilayer Protocols -- Distributed Network Protocol 3.…”
Libro electrónico -
278Publicado 2021“…In parallel, the radiofrequency front-end of GPR systems has been optimized in terms of compactness (e.g., smaller Tx/Rx antennas) and cost. …”
Libro electrónico -
279Publicado 2024Tabla de Contenidos: “…The art of security automation - fundamentals and benefits -- The benefits of cybersecurity automation -- Functions of cybersecurity automation -- Cybersecurity automation best practices -- What is an API? -- Designing end-to-end security pipelines with Python -- Integrating third-party tools for enhanced functionality -- Why automate ZAP with Python? …”
Libro electrónico -
280por Wahli, UeliTabla de Contenidos: “…Apply common sense (also known as being defensive)…”
Publicado 2005
Libro electrónico