Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 92
- Computer security 80
- Computer networks 63
- Cloud computing 20
- Penetration testing (Computer security) 18
- Examinations 16
- History 16
- Management 16
- Certification 14
- Politics and government 14
- Data protection 13
- United States 13
- Artificial intelligence 12
- Engineering & Applied Sciences 12
- Application software 11
- Development 11
- Information technology 11
- National security 11
- Electronic data processing personnel 10
- Foreign relations 10
- Prevention 10
- Business enterprises 9
- Computer crimes 9
- Python (Computer program language) 9
- Access control 8
- Armed Forces 8
- Computers 8
- Electrical & Computer Engineering 7
- Military policy 7
- Operating systems (Computers) 7
-
21Publicado 2003“…The collapse of the Soviet Union and the end of the Cold WarÑand then the terrorist attacks of September 11, 2001Ñtransformed the task of American foreign and defense policymaking. …”
Libro electrónico -
22Publicado 2024“…Next, a dedicated section introduces a secure-by-design AI strategy with threat modeling to demonstrate risk-based defenses and strategies, focusing on integrating MLSecOps and LLMOps into security systems. …”
Libro electrónico -
23
-
24
-
25Publicado 2016Libro electrónico
-
26Publicado 2022“…Critical Essays on Arthur Morrison and the East End throws fresh new light on this innovative novelist of poverty and urban life"--…”
Libro electrónico -
27por Institute of Medicine (U.S.).“…During the transition, the Department of Defense asked the IOM to provide advice on operating the biorepository, managing its collection, and determining appropriate future use of specimens for consultation, education, and research. …”
Publicado 2012
Libro electrónico -
28Publicado 2013“…Appendixes A and B (found towards the end of the book) talk about the severity ratings of--…”
Libro electrónico -
29
-
30
-
31
-
32
-
33Publicado 2002“…Since the end of the Cold War, a dramatic decline in overall defense authorizations has led both the U.S. aerospace industry and that of Europe to undergo extensive consolidation -- a trend that has led in turn to a significant growth in cross-border business relationships. …”
Libro electrónico -
34Publicado 2022“…As you progress through the chapters, you'll be able to improve your understanding of some of the key concepts of security, align operations with the rest of the business, streamline your operations, learn how to report to senior levels in the organization, and acquire funding. By the end of this Agile book, you'll be ready to start implementing agile security operations, using the book as a handy reference. …”
Libro electrónico -
35Publicado 2017Tabla de Contenidos: “…Front Cover -- Data Hiding Techniques in Windows OS -- Data Hiding Techniques in Windows OS: A Practical Approach to Investigation and Defense -- Copyright -- Dedication -- Contents -- Biography -- Preface -- ABOUT THIS BOOK -- TARGET AUDIENCE -- SUMMARY OF CONTENTS -- COMMENTS AND QUESTIONS -- Acknowledgments -- 1 - Introduction and Historical Background -- INTRODUCTION -- CLASSICAL CIPHER TYPES -- Substitution Cipher -- Monoalphabetic Ciphers -- Caesar Shift -- Atbash Cipher -- Keyword Cipher -- Polyalphabetic Ciphers -- Vigenère Cipher -- AutoKey Cipher -- Polygraphic Ciphers -- Playfair Cipher -- Mechanical Substitution Ciphers -- The Enigma Machine -- Transposition Cipher -- Rail Fence -- Columnar Transposition -- Double Transposition -- Other Ciphers and Codes -- The One-Time Pad -- Morse Code -- Book Cipher -- Difference Between Substitution and Transposition Cipher -- Practicing Old Ciphers Using Modern Computing -- MODERN CRYPTOGRAPHY SYSTEMS -- Secret Key Cryptography -- Public Key Cryptography -- Digital Signature -- Cryptographic Hash Function -- STEGANOGRAPHY -- What Is Steganography? …”
Libro electrónico -
36por Heuermann, Lewis“…Complete with insightful guidance on building a successful career in IT auditing, by the end of this book, you'll be equipped with the tools to navigate the complex landscape of cybersecurity and compliance, bridging the gap between technical expertise and practical application. …”
Publicado 2024
Libro electrónico -
37Publicado 2022“…Finally, you will learn how to gain an advantage through advanced research and thoughtfully concluding an operation. By the end of this audiobook, you will have achieved a solid understanding of cyberattacks from both an attacker's and a defender's perspective. …”
Grabación no musical -
38Publicado 2024“…Detect and mitigate diverse cyber threats with actionable insights into attacker types, techniques, and efficient cyber threat hunting Key Features Explore essential tools and techniques to ethically penetrate and safeguard digital environments Set up a malware lab and learn how to detect malicious code running on the network Understand different attacker types, their profiles, and mindset, to enhance your cyber defense plan Purchase of the print or Kindle book includes a free PDF eBook Book Description If you're an ethical hacker looking to boost your digital defenses and stay up to date with the evolving cybersecurity landscape, then this book is for you. …”
Libro electrónico -
39por Boyraz, Guven“…By the end of this book, you'll have honed the skills needed to construct a resilient cybersecurity defense for yourself and your organization. …”
Publicado 2024
Libro electrónico -
40Publicado 2023“…Explore PowerShell's offensive and defensive capabilities to strengthen your organization's security Purchase of the print or Kindle book includes a free PDF eBook Key Features Master PowerShell for security by configuring, auditing, monitoring, exploiting, and bypassing defenses Research and develop methods to bypass security features and use stealthy tradecraft Explore essential security features in PowerShell and protect your environment against exploits and bypasses Book Description Take your cybersecurity skills to the next level with this comprehensive guide to PowerShell security! …”
Libro electrónico