Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 92
- Computer security 80
- Computer networks 63
- Cloud computing 20
- Penetration testing (Computer security) 18
- Examinations 16
- History 16
- Management 16
- Certification 14
- Politics and government 14
- Data protection 13
- United States 13
- Artificial intelligence 12
- Engineering & Applied Sciences 12
- Application software 11
- Development 11
- Information technology 11
- National security 11
- Electronic data processing personnel 10
- Foreign relations 10
- Prevention 10
- Business enterprises 9
- Computer crimes 9
- Python (Computer program language) 9
- Access control 8
- Armed Forces 8
- Computers 8
- Electrical & Computer Engineering 7
- Military policy 7
- Operating systems (Computers) 7
-
301por Cochrane, Rexmond C. 1912-1986Tabla de Contenidos: “…Geological Survey -- 6 The End of the Nineteenth Century -- WILLIAM BARTON ROGERS (1879-1882) -- OTHNIEL CHARLES MARSH (1883-1895) -- The Allison Commission (1884-1886) -- Debate of an Expanded Role for the Academy -- Efforts to Reorganize the Academy -- WOLCOTT GIBBS (1895-1900) -- The American Forestry Problem -- Recognition of the Academy as "High Tribunal…”
Publicado 1978
Libro electrónico -
302Publicado 2017Tabla de Contenidos: “…-- Revolution on the Last Mile -- 4.9 E-Government: Public Administration Goes Online -- Win Government-Wide and Agency-Deep Commitment to Specific Digital Targets -- Establish Government-Wide Coordination of Digital Investments -- Redesign Processes with the End User in Mind -- Hire and Nurture the Right Talent -- Use Big Data and Analytics to Improve Decision Making -- Protect Critical Infrastructure and Confidential Data -- Conclusion: Opportunities in the Emerging Ecosystems -- 5 What? …”
Libro electrónico -
303
-
304Publicado 2019Tabla de Contenidos: “…-- 12.5 Worked Example - HALE UAV -- 12.6 Cells, Batteries, and Real Life -- 12.6.1 Cycle Life, Charge, and Discharge Rates -- 12.6.2 Payload -- 12.6.3 Avionics -- 12.6.4 Temperature -- 12.6.5 End‐of‐Life Performance -- 12.6.6 Protection -- 12.6.7 Balancing - Useful Capacity -- 12.6.8 Summary of Real‐World Issues -- 12.7 A Quick Aside on Regenerative Fuel Cells -- 12.8 So What Do We Need from Our Battery Suppliers? …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
305Publicado 2024Libro electrónico
-
306Publicado 2018Tabla de Contenidos: “…-- Debugging Tips -- JSL Debugger -- Defensive Programming Strategies -- Chapter 6: The Dashboard and Application Builders -- Overview -- Combine Windows, the Dashboard Builder, and the Application Builder -- Summary -- Chapter 7: Advanced Topics -- Overview -- Building Custom Dialogs -- Navigating Reports Programmatically -- Expression Handling -- Summary -- Section 2 -- Chapter 8: Rows, Columns, and Tables -- Question 8.1: I can manipulate a data table interactively, such as by -- Question 8.2: How can I select rows where more than one condition is true? …”
Libro electrónico -
307Publicado 2024Tabla de Contenidos: “…-- Lessons Learned: How to Evaluate Digital Transformation -- The Path Forward -- Acknowledgments -- References -- Biographical Sketches -- Part III Tradespace Analysis in a Digital Engineering Ecosystem - Context and Implications -- Chapter 13 A Landscape of Trades: The Importance of Process, Ilities, and Practice -- Levels of Trades -- Defense Enterprise Levels of Concern -- System Design and Development Analytics -- Mission and Operational Effectiveness -- Common Challenges -- System Qualities: The Nonfunctional Requirements…”
Libro electrónico -
308
-
309Publicado 2024“…Real-world case studies will illustrate the role of OSINT in anticipating, preventing, and responding to cyber threats. By the end of this book, you'll be equipped with the knowledge and tools to confidently navigate the digital landscape and unlock the power of information using OSINT. …”
Libro electrónico -
310por Chow, Dennis“…Finally, you'll be able to customize a Detection as Code program that fits your organization's needs. By the end of the book, you'll have gained the expertise to automate nearly the entire use case development lifecycle for any enterprise. …”
Publicado 2024
Libro electrónico -
311Publicado 2010Tabla de Contenidos: “…E.5.3 DoDAF and Views and Beyond -- E.5.4 A Strategy to Use DoDAF to Document Software Architecture -- E.6 Where Architecture Documentation Ends -- E.7 A Final Word -- E.8 For Further Reading -- Appendix A: UML-Unified Modeling Language -- A.1 Introduction -- A.2 Documenting a Module View -- A.2.1 Decomposition Style -- A.2.2 Uses Style -- A.2.3 Generalization Style -- A.2.4 Layered Style -- A.2.5 Aspects Style -- A.2.6 Data Model Style -- Perspectives: UML Class Diagrams: Too Much, Too Little -- A.3 Documenting a Component-and-Connector View -- A.4 Documenting an Allocation View -- A.4.1 Deployment Style -- A.4.2 Install and Implementation Styles -- A.4.3 Work Assignment Style -- A.5 Documenting Behavior -- A.5.1 Activity Diagram -- A.5.2 Sequence Diagram -- A.5.3 Communication Diagram -- A.5.4 Timing Diagram -- A.5.5 Interaction Overview Diagram -- A.5.6 State Machine Diagram -- A.5.7 Use Case Diagram -- A.6 Documenting Interfaces -- Perspectives: UML Tools -- Appendix B: SysML-Systems Modeling Language -- B.1 Architecture Documentation -- B.2 Requirements -- B.3 Documenting a Module View -- B.4 Documenting a Component-and-Connector View -- B.5 Documenting an Allocation View -- B.6 Documenting Behavior -- B.7 Documenting Interfaces -- B.8 Summary -- Appendix C: AADL-The SAE Architecture Analysis and Design Language -- C.1 Introduction -- C.2 Documenting a Module Style -- C.3 Documenting a Component-and-Connector View -- C.4 Documenting a Deployment View -- C.5 Documenting Behavior -- C.6 Documenting Interfaces -- C.7 Summary -- Acronyms -- Glossary…”
Libro electrónico -
312Publicado 2024“…The examples in this book enable network administrators to understand the real-world application of Snort, while familiarizing them with the functionality and configuration aspects. By the end of this book, you'll be well-equipped to leverage Snort to improve the security posture of even the largest and most complex networks. …”
Libro electrónico -
313
-
314Publicado 2024“…Dedicated chapters on understanding vulnerabilities familiarize you with the threat landscape so that you can manage your server effectively, keeping bad actors at bay and configuring Moodle for optimal user and data protection. By the end of the book, you'll have gained a comprehensive understanding of Moodle's security issues and how to address them. …”
Libro electrónico -
315Publicado 2019Tabla de Contenidos: “…Chapter 16 Hiring and Staffing the Right People -- 16.1 Staffing for Reliability -- 16.1.1 A Reliability Engineering Background -- 16.1.2 HALT/HASS and ESS -- 16.1.3 Shock and Vibration Testing -- 16.1.4 Statistical Analysis -- 16.1.5 Failure Budgeting/Estimating -- 16.1.6 Failure Analysis -- 16.1.7 Conducting Reliability Training -- 16.1.8 Persuasive in Implementing New Concepts -- 16.1.9 A Degree in Engineering and/or Physics -- 16.2 Staffing for Software Engineers -- 16.3 Choosing the Wrong People for the Job -- Chapter 17 Implementing the Reliability Process -- 17.1 Reliability Is Everyone's Job -- 17.2 Formalizing the Reliability Process -- 17.3 Implementing the Reliability Process -- 17.4 Rolling Out the Reliability Process -- 17.5 Developing a Reliability Culture -- 17.6 Setting Reliability Goals -- 17.7 Training -- 17.8 Product Life Cycle Defined -- 17.8.1 Concept Phase -- 17.8.2 Design Phase -- 17.8.3 Production Phase -- 17.8.4 End‐of‐Life and Obsolescence Phase -- 17.9 Proactive and Reactive Reliability Activities -- Further Reading -- Reliability Process -- Part IV Reliability and Quality Process for Product Development -- Chapter 18 Product Concept Phase -- 18.1 Reliability Activities in the Product Concept Phase -- 18.2 Establish the Reliability Organization -- 18.3 Define the Reliability Process -- 18.4 Define the Product Reliability Requirements -- 18.5 Capture and Apply Lessons Learned -- 18.6 Mitigate Risk -- 18.6.1 Filling Out the Risk Mitigation Form -- 18.6.1.1 Identify and Analyze Risk -- 18.6.1.2 Risk Severity -- 18.6.1.3 Date Risk Is Identified -- 18.6.1.4 Risk Accepted -- 18.6.1.5 High‐Level Mitigation Plan -- 18.6.1.6 Resources Required -- 18.6.1.7 Completion Date -- 18.6.1.8 Success Metric -- 18.6.1.9 Investigate Alternative Solutions -- 18.6.2 Risk Mitigation Meeting -- Chapter 19 Design Concept Phase…”
Libro electrónico -
316
-
317
-
318por Mascarenhas, Oswald A. J.Tabla de Contenidos: “…Virtue as the Theory of Ends…”
Publicado 2019
Electrónico -
319Publicado 2023Libro electrónico
-
320Publicado 2018Libro electrónico