Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 92
- Computer security 80
- Computer networks 63
- Cloud computing 20
- Penetration testing (Computer security) 18
- Examinations 16
- History 16
- Management 16
- Certification 14
- Politics and government 14
- Data protection 13
- United States 13
- Artificial intelligence 12
- Engineering & Applied Sciences 12
- Application software 11
- Development 11
- Information technology 11
- National security 11
- Electronic data processing personnel 10
- Foreign relations 10
- Prevention 10
- Business enterprises 9
- Computer crimes 9
- Python (Computer program language) 9
- Access control 8
- Armed Forces 8
- Computers 8
- Electrical & Computer Engineering 7
- Military policy 7
- Operating systems (Computers) 7
-
321
-
322Publicado 2018“…With real-life case studies, we take you on a journey through client-side attacks using Metasploit and various scripts built on the Metasploit framework. By the end of the book, you will be trained specifically on time-saving techniques using Metasploit. …”
Libro electrónico -
323por Tripathi, PadmeshTabla de Contenidos: “…Cover -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 Elevating Surveillance Integrity-Mathematical Insights into Background Subtraction in Image Processing -- 1.1 Introduction -- 1.2 Background Subtraction -- 1.3 Mathematics Behind Background Subtraction -- 1.4 Gaussian Mixture Model -- 1.4.1 Gaussian Mixture Model (GMM) Algorithm for Background Subtraction -- 1.4.2 Gaussian Mixture Model (GMM) Algorithm - A Simple Example -- 1.5 Principal Component Analysis -- 1.6 Applications -- 1.6.1 Military Surveillance -- 1.6.2 Visual Observation of Animals in Forests -- 1.6.3 Marine Surveillance -- 1.6.4 Defense Surveillance Systems -- 1.7 Conclusion -- References -- Chapter 2 Machine Learning and Artificial Intelligence in the Detection of Moving Objects Using Image Processing -- 2.1 Introduction -- 2.2 Moving Object Detection -- 2.3 Envisaging the Object Detection -- 2.3.1 Filtering Algorithm -- 2.3.2 Identification of Object Detection in Bad Weather Circumstance -- 2.3.3 Color Clustering -- 2.3.4 Dangerous Animal Detection -- 2.3.5 UAV Video End-of-Line Detection and Tracking in Live Traffic -- 2.3.5.1 Contextual Detection -- 2.3.5.2 Calculation of Location of a Car -- 2.3.6 Estimation of Crowd -- 2.3.7 Parking Lot Management -- 2.3.8 Public Automatic Anomaly Detection Systems -- 2.3.9 Modification of Robust Principal Component Analysis -- 2.3.10 Logistics Automation -- 2.3.11 Detection of Criminal Behavior in Humans -- 2.3.12 UAV Collision Avoidance and Control System -- 2.3.13 An Overview of Potato Growth Stages -- 2.4 Conclusion -- References -- Chapter 3 Machine Learning and Imaging-Based Vehicle Classification for Traffic Monitoring Systems -- 3.1 Introduction -- 3.2 Methods -- 3.2.1 Data Preparation -- 3.2.2 Model Training -- 3.2.3 Hardware and Software Configuration -- 3.3 Result -- 3.4 Conclusion…”
Publicado 2024
Libro electrónico -
324Publicado 2018Libro electrónico
-
325
-
326
-
327Publicado 2024Libro electrónico
-
328
-
329por Finocchiaro, Maurice A.“…And an essential thread of the subsequent controversy has been the emergence of many arguments claiming that his condemnation was right, as well as defenses of Galileo from such criticisms. The book’s particular yet overarching thesis is that today the proper defense of Galileo can and should have the reasoned, critical, and fair-minded character which his own defense of Copernicus had…”
Publicado 2010
Libro electrónico -
330Publicado 2023“…By the end of this book, you will have a deep understanding of Microsoft 365 Defender, and how to protect and respond to security threats. …”
Libro electrónico -
331Publicado 2017“…New York Times bestselling author Mark Murphy returns, with the latest science and techniques for delivering tough messages without causing anger or defensiveness. The greatest workplaces have one thing in common; they speak the truth! …”
Grabación no musical -
332por Foltz, Kevin“…This is a unique approach to end-to-end security and fills a niche in the market. …”
Publicado 2020
Libro electrónico -
333por Alexandre Bidon, Danièle“…The city developed as a result of contact with both Burgundian and Germanic culture and by the end of the 14th century had become a commercial and religious centre. …”
Publicado 2021
Electrónico -
334A CISO Guide to Cyber Resilience A How-To Guide for Every CISO to Build a Resilient Security ProgramPublicado 2024“…By the end of this book, you'll be equipped with the knowledge and skills necessary to build, manage, and improve a resilient cybersecurity program, ensuring your organization remains protected against evolving threats. …”
Libro electrónico -
335por Liska, Allan“…He systematically identifies today's most widespread security mistakes and vulnerabilities--and offers realistic solutions you can begin implementing right away.Coverage Includes: Quantifying security risks and "selling" security throughout the organization Defining security models that reflect your company's philosophy Translating your security model into effective, enforceable policies Making your routers and switches your first lines of network defense Controlling access via authentication, authorization, and accounting Configuring secure VPNs and remote access Securing wireless LANs and WANs Establishing a DMZ between your network and the public Internet Securing Web/application servers, DNS servers, email servers, and file/print servers Implementing effective day-to-day network security administration, monitoring, and logging Responding to attacks: detect, isolate, halt, report, and prosecute Liska integrates these techniques in an end-to-end case study, showing you how to redesign an insecure enterprise network for maximum security--one step at a time…”
Publicado 2003
Libro electrónico -
336Publicado 2014“…This report proposes a more enterprise-oriented approach to measuring ACS manpower requirements by synthesizing combatant commander operational plans, Defense Planning Scenarios, functional area deployment rules, and subject-matter expert input. …”
Libro electrónico -
337por Barraud, Dany“…However, in their general conception, the construction methods of the rampart, the details of organisation of defensive structures (positioning of towers, small number of gates, absence of ditches, abundance or rarety of reused building materials), these fortified towns do not represent individual cases but take their place within a system of defence created at different dates between the gallic empire and the end of roman domination in south-west Gaul…”
Publicado 2021
Electrónico -
338por Gregg, Michael“…Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. …”
Publicado 2014
Libro electrónico -
339Publicado 2015“…The requirement that NATO may now have to build a much more robust deterrence and defense posture in Eastern Europe would require the Army and the Air Force to revisit their planning assumptions that have minimized U.S. military commitments to the region since the end of the Cold War…”
Libro electrónico -
340Publicado 2023“…Whether you work in a large enterprise, a government agency, or a small business, the principles and strategies presented in this book are adaptable and scalable to suit your specific needs. By the end of this book, you’ll have all the tools and guidance needed to fortify your organization’s defenses and expand your capabilities as an information security practitioner…”
Libro electrónico