Mostrando 261 - 280 Resultados de 392 Para Buscar 'defensive end', tiempo de consulta: 0.11s Limitar resultados
  1. 261
    Publicado 2023
    “…The book is packed with practical examples, tooling, and attack-defense guidelines to help you assess and improve the security of your real-life environments. …”
    Libro electrónico
  2. 262
    “…Cisco NAC Appliance Enforcing Host Security with Clean Access Authenticate, inspect, remediate, and authorize end-point devices using Cisco NAC Appliance Jamey Heary, CCIE® No. 7680 Contributing authors: Jerry Lin, CCIE No. 6469, Chad Sullivan, CCIE No. 6493, and Alok Agrawal With today's security challenges and threats growing more sophisticated, perimeter defense alone is no longer sufficient. …”
    Libro electrónico
  3. 263
    Publicado 2023
    Tabla de Contenidos: “…-- The bring your own device model -- The choose your own device model -- Key considerations -- Comparing options -- Protection and governance options -- Identity and access management -- Information protection -- Device configuration -- Application management -- Storage sync options -- OneDrive for Business -- Work Folders -- Alternative EUC delivery options -- Windows 365 Cloud PC and Azure Virtual Desktop -- Enabling virtual private networks -- Publishing applications via proxy -- End user behavior analytics -- Summary -- Chapter 8: Windows 11 Security -- Introducing security posture -- Zero trust -- Defense in depth -- Ensuring hardware security -- TPM -- Microsoft Pluton security processor -- Windows Defender System Guard -- Hypervisor-protected Code Integrity -- Ensuring that we operate system security -- Introducing Secure Boot and Trusted Boot -- Exploring the Windows Security app -- Using BitLocker for encryption -- Security baselines -- Ensuring user identity security -- Windows Hello for Business -- Microsoft Defender Credential Guard -- Summary -- Chapter 9: Advanced Configurations -- Virtual desktops -- On-prem virtual desktop best practices -- VDI configurations -- The Windows Configuration Designer -- Windows 11 Kiosk Mode -- Windows Autopilot -- The Set up School PCs application -- Device lockdown -- Windows Subsystem for Linux -- Group Policy Editor -- Remote Desktop Protocol -- Windows Hello and Windows Hello for Business -- Windows Firewall with Advanced Security -- Hyper-V -- Windows Task Scheduler -- Enabling BitLocker drive encryption -- Storage Spaces Direct -- Windows Defender Application Guard -- Summary -- Chapter 10: Windows 11 21H2 and 22H2 Changes (versus Windows 10) -- New Start menu and taskbar…”
    Libro electrónico
  4. 264
    Publicado 2024
    Tabla de Contenidos: “…-- 12.1 Methodology -- 12.2 Clinical Care -- 12.3 Administrative and Operations -- 12.4 Life Sciences -- References -- Chapter 13 The Business Model for Buyers of Health AI Solutions -- 13.1 Clinical Care -- 13.2 Administrative and Operations -- 13.3 Life Sciences -- 13.4 Guide for Buyer Assessment of Health AI Solutions -- References -- Chapter 14 How to Build and Invest in the Best Health AI Companies -- 14.1 Barriers to Entry and Intellectual Property (IP) -- 14.1.1 Creating Defensible Products -- 14.2 Startups Versus Large Companies -- 14.3 Sales and Marketing -- 14.4 Initial Customers -- 14.5 Direct-to-Consumer (D2C) -- 14.6 Planning Your Entrepreneurial Health AI Journey -- 14.7 Assessment of Companies by Investors -- 14.7.1 Key Areas to Explore for a Health AI Company for Investment -- References -- Index -- EULA…”
    Libro electrónico
  5. 265
    “…ROSSUM, J.A.. VAN: The end of the Batavian auxiliaries as ‘national’ units. …”
    Libro electrónico
  6. 266
    Publicado 2023
    Libro electrónico
  7. 267
    por Thomas, Jacob
    Publicado 2015
    Libro electrónico
  8. 268
    Publicado 2005
    “…He also shows us how the defense system of the place developed from a modest rectangular fort built by François Martin to the Fort Louis and the large outer fortification at the time of Dupleix, until its final decay at the end of the 18th century. …”
    Libro electrónico
  9. 269
    por Edmondson, Amy C.
    Publicado 2012
    Libro electrónico
  10. 270
    Publicado 2023
    Tabla de Contenidos: “…Intersection of cybersecurity with other disciplines -- Tool management -- Planning -- Acquisition and integration of supplier components -- Supplier capability assessment and the role of the CSIA -- The concept phase -- Item-level concept -- Cybersecurity concept -- Implications to component-level development -- Design and implementation -- Post-development requirements -- Configuration and calibration -- Weakness analysis -- Unit implementation -- Verification testing -- Validation testing -- Product release -- Cybersecurity case -- Cybersecurity assessment -- Production planning -- Operations and maintenance -- Monitoring -- Vulnerability analysis -- Vulnerability management -- Updates -- End of life -- Summary -- Chapter 6: Interactions Between Functional Safety and Cybersecurity -- A tale of two standards -- A unified versus integrated approach -- Establishing a foundational understanding of functional safety and cybersecurity -- Understanding the unique aspects and interdependencies between the two domains -- Differences between safety and security scope -- Differences in the level of interdependence between safety and security requirements -- Conflict resolution -- Extending the safety and quality supporting processes -- Planning -- Supplier management -- Concept -- Design -- Implementation -- Testing and validation -- Release -- Production -- End of life -- Creating synergies in the concept phase -- Item functions -- Item boundaries and operational environments -- Damage scenarios and hazards -- Safety and security goals -- Safety and security requirements -- Finding synergies and conflicts in the design phase -- Leveraging safety and security mechanisms -- Self-tests across safety and security -- Leveraging error detection safety mechanisms -- Eliminating inconsistencies in the error response -- Parallels in design principles…”
    Libro electrónico
  11. 271
    Publicado 2024
    “…Take charge of your cyber defenses with the power of Microsoft's unified XDR and SIEM solution. …”
    Libro electrónico
  12. 272
    Publicado 2023
    Libro electrónico
  13. 273
    Publicado 2007
    Libro electrónico
  14. 274
    Publicado 2021
    “…Throughout the book, you'll explore industrial equipment, port and service discovery, pivoting, and much more, before finally launching attacks against systems in an industrial network. By the end of this penetration testing book, you'll not only understand how to analyze and navigate the intricacies of an industrial control system (ICS), but you'll also have developed essential offensive and defensive skills to proactively protect industrial networks from modern cyberattacks. …”
    Libro electrónico
  15. 275
    por Falcone, Paul
    Publicado 2010
    Libro electrónico
  16. 276
    Publicado 2022
    Tabla de Contenidos: “…-- Trade Finance Ecosystem -- Trade Finance Functional Architecture -- Case Study: Collateral Management -- Collateral Management Functional Architecture -- Collateral Management Architecture -- Microservices and User Interface: Micro Front End -- Routing -- Composition -- Communication -- Pros and Cons of Micro Front Ends -- Microservice Architecture in Artificial Intelligence -- AI Subcategories -- Microservices Vertical Components: Speech AI -- Summary -- Chapter 6: Event-Driven Architecture -- Evolution of Event-Driven Architecture -- Tightly Coupled World to Loosely Coupled World -- Message Broker World to Event World -- Event -- Business Events -- Technical Events -- Processing an Event -- Event Handling in Domain Context -- Event Governance -- What Is Event-Driven Architecture? …”
    Libro electrónico
  17. 277
    Publicado 2022
    Tabla de Contenidos: “…Part IV Communication and Network Security -- Chapter 11 Networking Fundamentals -- Data Communications Foundations -- Network Reference Models -- Protocols -- Application Layer -- Presentation Layer -- Session Layer -- Transport Layer -- Network Layer -- Data Link Layer -- Physical Layer -- Functions and Protocols in the OSI Model -- Tying the Layers Together -- Local Area Networks -- Network Topology -- Medium Access Control Mechanisms -- Layer 2 Protocols -- Transmission Methods -- Layer 2 Security Standards -- Internet Protocol Networking -- TCP -- IP Addressing -- IPv6 -- Address Resolution Protocol -- Dynamic Host Configuration Protocol -- Internet Control Message Protocol -- Simple Network Management Protocol -- Domain Name Service -- Network Address Translation -- Routing Protocols -- Intranets and Extranets -- Metropolitan Area Networks -- Metro Ethernet -- Wide Area Networks -- Dedicated Links -- WAN Technologies -- Chapter Review -- Quick Review -- Questions -- Answers -- Chapter 12 Wireless Networking -- Wireless Communications Techniques -- Spread Spectrum -- Orthogonal Frequency Division Multiplexing -- Wireless Networking Fundamentals -- WLAN Components -- WLAN Standards -- Other Wireless Network Standards -- Other Important Standards -- Evolution of WLAN Security -- 802.11 -- 802.11i -- 802.11w -- WPA3 -- 802.1X -- Best Practices for Securing WLANs -- Mobile Wireless Communication -- Multiple Access Technologies -- Generations of Mobile Wireless -- Satellites -- Chapter Review -- Quick Review -- Questions -- Answers -- Chapter 13 Securing the Network -- Applying Secure Design Principles to Network Architectures -- Secure Networking -- Link Encryption vs. End-to-End Encryption -- TLS -- VPN -- Secure Protocols -- Web Services -- Domain Name System -- Electronic Mail -- Multilayer Protocols -- Distributed Network Protocol 3.…”
    Libro electrónico
  18. 278
    Publicado 2021
    “…In parallel, the radiofrequency front-end of GPR systems has been optimized in terms of compactness (e.g., smaller Tx/Rx antennas) and cost. …”
    Libro electrónico
  19. 279
    Publicado 2024
    Tabla de Contenidos: “…The art of security automation - fundamentals and benefits -- The benefits of cybersecurity automation -- Functions of cybersecurity automation -- Cybersecurity automation best practices -- What is an API? -- Designing end-to-end security pipelines with Python -- Integrating third-party tools for enhanced functionality -- Why automate ZAP with Python? …”
    Libro electrónico
  20. 280
    por Wahli, Ueli
    Publicado 2005
    Tabla de Contenidos: “…Apply common sense (also known as being defensive)…”
    Libro electrónico