Mostrando 21 - 40 Resultados de 392 Para Buscar 'defensive end', tiempo de consulta: 0.08s Limitar resultados
  1. 21
    Publicado 2003
    “…The collapse of the Soviet Union and the end of the Cold WarÑand then the terrorist attacks of September 11, 2001Ñtransformed the task of American foreign and defense policymaking. …”
    Libro electrónico
  2. 22
    Publicado 2024
    “…Next, a dedicated section introduces a secure-by-design AI strategy with threat modeling to demonstrate risk-based defenses and strategies, focusing on integrating MLSecOps and LLMOps into security systems. …”
    Libro electrónico
  3. 23
    Publicado 2014
    Acceso restringido usuarios UPSA
    Libro electrónico
  4. 24
    Publicado 2014
    Libro electrónico
  5. 25
    Publicado 2016
    Libro electrónico
  6. 26
    Publicado 2022
    “…Critical Essays on Arthur Morrison and the East End throws fresh new light on this innovative novelist of poverty and urban life"--…”
    Libro electrónico
  7. 27
    por Institute of Medicine (U.S.).
    Publicado 2012
    “…During the transition, the Department of Defense asked the IOM to provide advice on operating the biorepository, managing its collection, and determining appropriate future use of specimens for consultation, education, and research. …”
    Libro electrónico
  8. 28
    Publicado 2013
    “…Appendixes A and B (found towards the end of the book) talk about the severity ratings of--…”
    Libro electrónico
  9. 29
    Publicado 2018
    Video
  10. 30
  11. 31
    Publicado 2020
    Video
  12. 32
    Publicado 2024
    Libro
  13. 33
    Publicado 2002
    “…Since the end of the Cold War, a dramatic decline in overall defense authorizations has led both the U.S. aerospace industry and that of Europe to undergo extensive consolidation -- a trend that has led in turn to a significant growth in cross-border business relationships. …”
    Libro electrónico
  14. 34
    Publicado 2022
    “…As you progress through the chapters, you'll be able to improve your understanding of some of the key concepts of security, align operations with the rest of the business, streamline your operations, learn how to report to senior levels in the organization, and acquire funding. By the end of this Agile book, you'll be ready to start implementing agile security operations, using the book as a handy reference. …”
    Libro electrónico
  15. 35
    Publicado 2017
    Tabla de Contenidos: “…Front Cover -- Data Hiding Techniques in Windows OS -- Data Hiding Techniques in Windows OS: A Practical Approach to Investigation and Defense -- Copyright -- Dedication -- Contents -- Biography -- Preface -- ABOUT THIS BOOK -- TARGET AUDIENCE -- SUMMARY OF CONTENTS -- COMMENTS AND QUESTIONS -- Acknowledgments -- 1 - Introduction and Historical Background -- INTRODUCTION -- CLASSICAL CIPHER TYPES -- Substitution Cipher -- Monoalphabetic Ciphers -- Caesar Shift -- Atbash Cipher -- Keyword Cipher -- Polyalphabetic Ciphers -- Vigenère Cipher -- AutoKey Cipher -- Polygraphic Ciphers -- Playfair Cipher -- Mechanical Substitution Ciphers -- The Enigma Machine -- Transposition Cipher -- Rail Fence -- Columnar Transposition -- Double Transposition -- Other Ciphers and Codes -- The One-Time Pad -- Morse Code -- Book Cipher -- Difference Between Substitution and Transposition Cipher -- Practicing Old Ciphers Using Modern Computing -- MODERN CRYPTOGRAPHY SYSTEMS -- Secret Key Cryptography -- Public Key Cryptography -- Digital Signature -- Cryptographic Hash Function -- STEGANOGRAPHY -- What Is Steganography? …”
    Libro electrónico
  16. 36
    por Heuermann, Lewis
    Publicado 2024
    “…Complete with insightful guidance on building a successful career in IT auditing, by the end of this book, you'll be equipped with the tools to navigate the complex landscape of cybersecurity and compliance, bridging the gap between technical expertise and practical application. …”
    Libro electrónico
  17. 37
    Publicado 2022
    “…Finally, you will learn how to gain an advantage through advanced research and thoughtfully concluding an operation. By the end of this audiobook, you will have achieved a solid understanding of cyberattacks from both an attacker's and a defender's perspective. …”
    Grabación no musical
  18. 38
    Publicado 2024
    “…Detect and mitigate diverse cyber threats with actionable insights into attacker types, techniques, and efficient cyber threat hunting Key Features Explore essential tools and techniques to ethically penetrate and safeguard digital environments Set up a malware lab and learn how to detect malicious code running on the network Understand different attacker types, their profiles, and mindset, to enhance your cyber defense plan Purchase of the print or Kindle book includes a free PDF eBook Book Description If you're an ethical hacker looking to boost your digital defenses and stay up to date with the evolving cybersecurity landscape, then this book is for you. …”
    Libro electrónico
  19. 39
    por Boyraz, Guven
    Publicado 2024
    “…By the end of this book, you'll have honed the skills needed to construct a resilient cybersecurity defense for yourself and your organization. …”
    Libro electrónico
  20. 40
    Publicado 2023
    “…Explore PowerShell's offensive and defensive capabilities to strengthen your organization's security Purchase of the print or Kindle book includes a free PDF eBook Key Features Master PowerShell for security by configuring, auditing, monitoring, exploiting, and bypassing defenses Research and develop methods to bypass security features and use stealthy tradecraft Explore essential security features in PowerShell and protect your environment against exploits and bypasses Book Description Take your cybersecurity skills to the next level with this comprehensive guide to PowerShell security! …”
    Libro electrónico