Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 92
- Computer security 80
- Computer networks 63
- Cloud computing 20
- Penetration testing (Computer security) 18
- Examinations 16
- History 16
- Management 16
- Certification 14
- Politics and government 14
- Data protection 13
- United States 13
- Artificial intelligence 12
- Engineering & Applied Sciences 12
- Application software 11
- Development 11
- Information technology 11
- National security 11
- Electronic data processing personnel 10
- Foreign relations 10
- Prevention 10
- Business enterprises 9
- Computer crimes 9
- Python (Computer program language) 9
- Access control 8
- Armed Forces 8
- Computers 8
- Electrical & Computer Engineering 7
- Military policy 7
- Operating systems (Computers) 7
-
281Publicado 2021Tabla de Contenidos: “…Step 1: Generate Your API Token in Cloud App Security -- Step 2: Create Your Trigger in Microsoft Flow -- Step 3: Create the Teams Message Action in Microsoft Flow -- Step 4: Generate an Email in Microsoft Flow -- Connecting the Flow in Cloud App Security -- Performing an Automated Response Using Azure Security Center -- Using Machine Learning and Artificial Intelligence in Threat Response -- Overview of Fusion Detections -- Overview of Azure Machine Learning -- Summary -- Chapter 5 Microsoft Cybersecurity Reference Architecture and Capability Map -- Introduction -- Microsoft Security Architecture versus the NIST Cybersecurity Framework (CSF) -- Microsoft Security Architecture -- The Identify Function -- The Protect Function -- The Detect Function -- The Respond Function -- The Recover Function -- Using the Microsoft Reference Architecture -- Microsoft Threat Intelligence -- Service Trust Portal -- Security Development Lifecycle (SDL) -- Protecting the Hybrid Cloud Infrastructure -- Azure Marketplace -- Private Link -- Azure Arc -- Azure Lighthouse -- Azure Firewall -- Azure Web Application Firewall (WAF) -- Azure DDOS Protection -- Azure Key Vault -- Azure Bastion -- Azure Site Recovery -- Azure Security Center (ASC) -- Microsoft Azure Secure Score -- Protecting Endpoints and Clients -- Microsoft Endpoint Manager (MEM) Configuration Manager -- Microsoft Intune -- Protecting Identities and Access -- Azure AD Conditional Access -- Passwordless for End-to-EndSecure Identity -- Azure Active Directory (aka Azure AD) -- Azure MFA -- Azure Active Directory Identity Protection -- Azure Active Directory Privilege Identity Management (PIM) -- Microsoft Defender for Identity -- Azure AD B2B and B2C -- Azure AD Identity Governance -- Protecting SaaS Apps -- Protecting Data and Information -- Azure Purview -- Microsoft Information Protection (MIP)…”
Libro electrónico -
282por Vanhove, SanderTabla de Contenidos: “…-- Networking in Godot Engine -- Learning about IP addresses -- Using port numbers -- Setting up the base networking code -- Creating the client-server connection -- Adding UI -- Running multiple debug instances at the same time -- Synchronizing different clients -- Updating the player scene for multiplayer -- Synchronizing EntitySpawner -- Synchronizing the enemy and collectibles -- Synchronizing the projectile -- Fixing the timer and end game -- Synchronizing the timer…”
Publicado 2024
Libro electrónico -
283por Gatti, Giovanni“…Bessarion initially attempted to incorporate Gatti's 'Notata' whole cloth into the 'In calumniatorem Platonis', but in the end he exploited it as a storehouse of the scholastic references, quotations, and arguments that made up the new Book III of the 1469 'In calumniatorem Platonis'. …”
Publicado 2021
Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca Universidad de Deusto, Universidad Loyola - Universidad Loyola Granada, Biblioteca del Seminario Diocesano de Vitoria-Gasteiz)Libro -
284Publicado 2017Libro electrónico
-
285
-
286Publicado 2022Libro electrónico
-
287Publicado 2023Libro electrónico
-
288Publicado 2015Libro electrónico
-
289Publicado 1998Tabla de Contenidos: “…Automated Categorization -- Search Engines -- Thesaurus Management Tools -- Portal or Enterprise Knowledge Platform -- Content Management Systems -- Analytics -- Diagramming Software -- Prototyping Tools -- User Research -- Questions to Ask -- Part V -- Making the Case for Information Architecture -- You Must Sell -- The Two Kinds of People in the World -- Running the Numbers -- Debunking the ROI Case -- Talking to the Reactionaries -- Other Case-Making Techniques -- The Information Architecture Value Checklist -- A Final Note -- Business Strategy -- The Origins of Strategy -- Defining Business Strategy -- Alignment -- Strategic Fit -- Exposing Gaps in Business Strategy -- One Best Way -- Many Good Ways -- Understanding Our Elephant -- Competitive Advantage -- The End of the Beginning -- Information Architecture for the Enterprise -- Information Architecture, Meet the Enterprise -- Finding Your Way Through an Enterprise Information Architecture -- What's the Goal of EIA? …”
Libro electrónico -
290Publicado 2018Libro electrónico
-
291Publicado 2010Tabla de Contenidos: “…Getting connected -- Going worldwide -- Connection technologies -- Choosing equipment -- Ordering the service -- Installing a modem for dial-up service -- Configuring a dial-up Internet connection -- Making and ending a dial-up connection -- Installing a network adapter for broadband service -- Configuring a high-speed connection -- Changing the default connection -- Managing multiple Internet connections -- 14. …”
Libro electrónico -
292
-
293
-
294Publicado 2008“…This comprehensive suite of tools provides end-to-e…”
Libro electrónico -
295Publicado 2018Libro electrónico
-
296Publicado 2018Libro electrónico
-
297Publicado 2023Tabla de Contenidos: “…Chapter 40 India Is Fostering a Solarized Digital Future -- India's Blockchain-Based Mobile Payment Systems -- Smart, Solar Cities -- Electric Vehicles -- Drones, Solar Power Satellite Systems, and Solar Missions -- Environmental Tax Policy in India -- Nonfungible Tokens -- Notes -- Chapter 41 Russia Leads Multinational Stablecoin Initiative -- Digitalization Is a Priority -- Solar Digital Initiatives for Power Plants and Waterways -- Solar Power Satellite (SPS) Systems -- Nonfungible Tokens -- Tax Policy in Russia and Member States -- Russia's Cryptocurrency Laws -- Notes -- Chapter 42 Africa's Solarized Digitalization Agenda in the Time of Coronavirus -- UNECA's Digital Agenda -- Digital Currencies in Africa -- Nigeria Is the World's Second-Largest Bitcoin Market -- Nonfungible Tokens -- The Solar Energy Potential of Africa -- Notes -- Chapter 43 The Need to Report Carbon Emissions Amid the Coronavirus Pandemic -- Global Environmental Tax Policy -- Carbon Tax -- Tax Credits -- Paris Agreement Climate Change Advocates -- Corporate Internal Carbon Pricing -- Country-by-Country Reporting Scheme -- Notes -- Chapter 44 The Pandemic Year Ends with a Tokenized Carbon Cap-and-Trade Solution -- World's First Tradable Carbon Token -- Cap-and-Trade Programs of the Top Six CO2-Emitting Countries/Regions of the World -- China -- United States -- European Union -- India -- Russia -- Japan -- Notes -- Chapter 45 The UN's COP26 Climate Change Goals Include Emerging Tech and Carbon Taxes -- Carbon Tax -- Notes -- Index -- EULA…”
Libro electrónico -
298Publicado 2023Libro electrónico
-
299por Nomani, Qamar“…The book begins by unraveling the fundamentals of cloud security, debunking myths about the shared responsibility model, and introducing key concepts such as defense-in-depth, the Zero Trust model, and compliance. …”
Publicado 2024
Libro electrónico -
300por Rajendran, SathiyarajTabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 Artificial Intelligence in Autonomous Vehicles-A Survey of Trends and Challenges -- 1.1 Introduction -- 1.2 Research Trends of AI for AV -- 1.3 AV-Pipeline Activities -- 1.3.1 Vehicle Detection -- 1.3.2 Rear-End Collision Avoidance -- 1.3.3 Traffic Signal and Sign Recognition -- 1.3.4 Lane Detection and Tracking -- 1.3.5 Pedestrian Detection -- 1.4 Datasets in the Literature of Autonomous Vehicles -- 1.4.1 Stereo and 3D Reconstruction -- 1.4.2 Optical Flow -- 1.4.3 Recognition and Segmentation of Objects -- 1.4.4 Tracking Datasets -- 1.4.5 Datasets for Aerial Images -- 1.4.6 Sensor Synchronization Datasets -- 1.5 Current Industry Standards in AV -- 1.6 Challenges and Opportunities in AV -- 1.6.1 Cost -- 1.6.2 Security Concerns -- 1.6.3 Standards and Regulations -- 1.7 Conclusion -- References -- Chapter 2 Age of Computational AI for Autonomous Vehicles -- 2.1 Introduction -- 2.1.1 Autonomous Vehicles -- 2.1.2 AI in Autonomous Vehicles -- 2.1.2.1 Functioning of AI in Autonomous Vehicles -- 2.2 Autonomy -- 2.2.1 Autonomy Phases -- 2.2.2 Learning Methodologies for Incessant Learning in Real-Life Autonomy Systems -- 2.2.2.1 Supervised Learning -- 2.2.2.2 Unsupervised Learning -- 2.2.2.3 Reinforcement Learning -- 2.2.3 Advancements in Intelligent Vehicles -- 2.2.3.1 Integration of Technologies -- 2.2.3.2 Earlier Application of AI in Automated Driving -- 2.3 Classification of Technological Advances in Vehicle Technology -- 2.4 Vehicle Architecture Adaptation -- 2.5 Future Directions of Autonomous Driving -- 2.6 Conclusion -- References -- Chapter 3 State of the Art of Artificial Intelligence Approaches Toward Driverless Technology -- 3.1 Introduction -- 3.2 Role of AI in Driverless Cars -- 3.2.1 What is Artificial Intelligence? …”
Publicado 2024
Libro electrónico