Mostrando 321 - 340 Resultados de 392 Para Buscar 'defensive end', tiempo de consulta: 0.11s Limitar resultados
  1. 321
    Publicado 2018
    Libro electrónico
  2. 322
    Publicado 2018
    “…With real-life case studies, we take you on a journey through client-side attacks using Metasploit and various scripts built on the Metasploit framework. By the end of the book, you will be trained specifically on time-saving techniques using Metasploit. …”
    Libro electrónico
  3. 323
    por Tripathi, Padmesh
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 Elevating Surveillance Integrity-Mathematical Insights into Background Subtraction in Image Processing -- 1.1 Introduction -- 1.2 Background Subtraction -- 1.3 Mathematics Behind Background Subtraction -- 1.4 Gaussian Mixture Model -- 1.4.1 Gaussian Mixture Model (GMM) Algorithm for Background Subtraction -- 1.4.2 Gaussian Mixture Model (GMM) Algorithm - A Simple Example -- 1.5 Principal Component Analysis -- 1.6 Applications -- 1.6.1 Military Surveillance -- 1.6.2 Visual Observation of Animals in Forests -- 1.6.3 Marine Surveillance -- 1.6.4 Defense Surveillance Systems -- 1.7 Conclusion -- References -- Chapter 2 Machine Learning and Artificial Intelligence in the Detection of Moving Objects Using Image Processing -- 2.1 Introduction -- 2.2 Moving Object Detection -- 2.3 Envisaging the Object Detection -- 2.3.1 Filtering Algorithm -- 2.3.2 Identification of Object Detection in Bad Weather Circumstance -- 2.3.3 Color Clustering -- 2.3.4 Dangerous Animal Detection -- 2.3.5 UAV Video End-of-Line Detection and Tracking in Live Traffic -- 2.3.5.1 Contextual Detection -- 2.3.5.2 Calculation of Location of a Car -- 2.3.6 Estimation of Crowd -- 2.3.7 Parking Lot Management -- 2.3.8 Public Automatic Anomaly Detection Systems -- 2.3.9 Modification of Robust Principal Component Analysis -- 2.3.10 Logistics Automation -- 2.3.11 Detection of Criminal Behavior in Humans -- 2.3.12 UAV Collision Avoidance and Control System -- 2.3.13 An Overview of Potato Growth Stages -- 2.4 Conclusion -- References -- Chapter 3 Machine Learning and Imaging-Based Vehicle Classification for Traffic Monitoring Systems -- 3.1 Introduction -- 3.2 Methods -- 3.2.1 Data Preparation -- 3.2.2 Model Training -- 3.2.3 Hardware and Software Configuration -- 3.3 Result -- 3.4 Conclusion…”
    Libro electrónico
  4. 324
    Publicado 2018
    Libro electrónico
  5. 325
    Publicado 2021
    Libro electrónico
  6. 326
    por Leonard, Anghel
    Publicado 2024
    Libro electrónico
  7. 327
    Publicado 2024
    Libro electrónico
  8. 328
    por Arquilla, John
    Publicado 1999
    Libro electrónico
  9. 329
    por Finocchiaro, Maurice A.
    Publicado 2010
    “…And an essential thread of the subsequent controversy has been the emergence of many arguments claiming that his condemnation was right, as well as defenses of Galileo from such criticisms. The book’s particular yet overarching thesis is that today the proper defense of Galileo can and should have the reasoned, critical, and fair-minded character which his own defense of Copernicus had…”
    Libro electrónico
  10. 330
    Publicado 2023
    “…By the end of this book, you will have a deep understanding of Microsoft 365 Defender, and how to protect and respond to security threats. …”
    Libro electrónico
  11. 331
    Publicado 2017
    “…New York Times bestselling author Mark Murphy returns, with the latest science and techniques for delivering tough messages without causing anger or defensiveness. The greatest workplaces have one thing in common; they speak the truth! …”
    Grabación no musical
  12. 332
    por Foltz, Kevin
    Publicado 2020
    “…This is a unique approach to end-to-end security and fills a niche in the market. …”
    Libro electrónico
  13. 333
    por Alexandre Bidon, Danièle
    Publicado 2021
    “…The city developed as a result of contact with both Burgundian and Germanic culture and by the end of the 14th century had become a commercial and religious centre. …”
    Electrónico
  14. 334
    Publicado 2024
    “…By the end of this book, you'll be equipped with the knowledge and skills necessary to build, manage, and improve a resilient cybersecurity program, ensuring your organization remains protected against evolving threats. …”
    Libro electrónico
  15. 335
    por Liska, Allan
    Publicado 2003
    “…He systematically identifies today's most widespread security mistakes and vulnerabilities--and offers realistic solutions you can begin implementing right away.Coverage Includes: Quantifying security risks and "selling" security throughout the organization Defining security models that reflect your company's philosophy Translating your security model into effective, enforceable policies Making your routers and switches your first lines of network defense Controlling access via authentication, authorization, and accounting Configuring secure VPNs and remote access Securing wireless LANs and WANs Establishing a DMZ between your network and the public Internet Securing Web/application servers, DNS servers, email servers, and file/print servers Implementing effective day-to-day network security administration, monitoring, and logging Responding to attacks: detect, isolate, halt, report, and prosecute Liska integrates these techniques in an end-to-end case study, showing you how to redesign an insecure enterprise network for maximum security--one step at a time…”
    Libro electrónico
  16. 336
    Publicado 2014
    “…This report proposes a more enterprise-oriented approach to measuring ACS manpower requirements by synthesizing combatant commander operational plans, Defense Planning Scenarios, functional area deployment rules, and subject-matter expert input. …”
    Libro electrónico
  17. 337
    por Barraud, Dany
    Publicado 2021
    “…However, in their general conception, the construction methods of the rampart, the details of organisation of defensive structures (positioning of towers, small number of gates, absence of ditches, abundance or rarety of reused building materials), these fortified towns do not represent individual cases but take their place within a system of defence created at different dates between the gallic empire and the end of roman domination in south-west Gaul…”
    Electrónico
  18. 338
    por Gregg, Michael
    Publicado 2014
    “…Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. …”
    Libro electrónico
  19. 339
    Publicado 2015
    “…The requirement that NATO may now have to build a much more robust deterrence and defense posture in Eastern Europe would require the Army and the Air Force to revisit their planning assumptions that have minimized U.S. military commitments to the region since the end of the Cold War…”
    Libro electrónico
  20. 340
    Publicado 2023
    “…Whether you work in a large enterprise, a government agency, or a small business, the principles and strategies presented in this book are adaptable and scalable to suit your specific needs. By the end of this book, you’ll have all the tools and guidance needed to fortify your organization’s defenses and expand your capabilities as an information security practitioner…”
    Libro electrónico