Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 92
- Computer security 80
- Computer networks 63
- Cloud computing 20
- Penetration testing (Computer security) 18
- Examinations 16
- History 16
- Management 16
- Certification 14
- Politics and government 14
- Data protection 13
- United States 13
- Artificial intelligence 12
- Engineering & Applied Sciences 12
- Application software 11
- Development 11
- Information technology 11
- National security 11
- Electronic data processing personnel 10
- Foreign relations 10
- Prevention 10
- Business enterprises 9
- Computer crimes 9
- Python (Computer program language) 9
- Access control 8
- Armed Forces 8
- Computers 8
- Electrical & Computer Engineering 7
- Military policy 7
- Operating systems (Computers) 7
-
101por Landale, AnthonyTabla de Contenidos: “…2.8 Working with Scapegoating2.9 Negotiation Skills; 2.10 Facilitator Support; PART THREE Creative Facilitation; 3.1 One-to-One Facilitation; 3.2 Powering Up Self-Confidence; 3.3 Facilitating without Words; 3.4 Defense Patterns; 3.5 Consultancy Skills; 3.6 Working in the Here and Now; 3.7 Creative Facilitation; 3.8 Imaginal Work; 3.9 Using Stories to Facilitate Learning; 3.10 Endings…”
Publicado 2008
Libro electrónico -
102Practical cyber intelligence how action-based intelligence can be an effective response to incidentsPublicado 2018Tabla de Contenidos: “…Security Configuration Management - Discovery and Detection -- Security Configuration Management - Risk Mitigation -- Security Configuration Management - Security State Analysis -- Security Configuration Management - Data Exposure and Sharing -- Prelude - integrating like services -- Integrating cyber intel from different services -- Overview - red team methodology -- Red team - testing methods -- White box -- Gray box -- Black box -- Red team constraints -- Red team - graphical representation -- Data integration challenges -- The end user perspective -- The service level perspective - cyber intelligence - Data Exposure and Sharing -- The SOC perspective -- Capability Maturity Model - InfoSec and cyber intel -- Capability Maturity Model - InfoSec and cyber intel - initial phase -- Capability Maturity Model - InfoSec and cyber intel - Phase A -- Capability Maturity Model - InfoSec and cyber intel - Phase B -- Capability Maturity Model - InfoSec and cyber intel - Phase C -- Collaboration + Capability = Active Defense -- Summary -- Chapter 9: Driving Cyber Intel -- The gap -- Another set of eyes -- The logic -- Event -- Incident -- Mapping events and incidents to InfoSec capabilities -- Capability Maturity Model - security awareness -- Capability Maturity Model - security awareness Phase - Initial -- Capability Maturity Model - security awareness - Phase A -- Capability Maturity Model - security awareness - Phase B -- Capability Maturity Model - security awareness - Phase C -- Capability Maturity Model - security awareness - Phase C + -- Just another day part 1 -- Summary -- Chapter 10: Baselines and Anomalies -- Setting up camp -- Baselines and anomalies -- Continuous monitoring - the challenge -- Part 1 -- Part 2 -- Part 3 -- Capability Maturity Model - continuous monitoring overview -- Level 1 - phase A -- Level 1 - phase B -- Level 1 - phase C.…”
Libro electrónico -
103Publicado 2019Tabla de Contenidos: “…Visas Help from Eleanor Roosevelt and Other Americans Three Crucial Meetings on December 27,1940 1940 Correspondence Eva's Other Activities before the End of 1940 Further Pleas to Help Otto and Other Refugees Otto's Wait for Visa in Southern France Otto's Escape to America Eva's Defense of Her Decision to Marry Otto Part VI. …”
Libro electrónico -
104Publicado 2018Tabla de Contenidos: “…From the 'Unidimensional Identity' to the 'Diversity of Identities' -- Sustainable Intergenerational Justice and its Ends -- Global Responsibility in a Historical Context -- 3. …”
Libro electrónico -
105por Singh, RobertTabla de Contenidos: “…Chinese Military Developments: Enter the DragonTaiwan; Conclusion: the Limits of Strategic Engagement with China; 8 Russia; Introduction; Resetting Russian-American Relations; Missile Defense, New START, and Afghanistan; Missile Defense; New START; Afghanistan, Central Asia and the ""Post-Soviet Space""; Resetting the Reset?…”
Publicado 2012
Libro electrónico -
106
-
107por Rhonheimer, Martin, 1950-Tabla de Contenidos: “…Summa theologiae II-II, q.64, a.7 : killing in self-defense according to Thomas Aquinas ; c. Critique and the development of the discussion ; d. …”
Publicado 2009
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
108Publicado 2014Tabla de Contenidos: “…Chapter 12: A Classic Innate Behavior, Sodium Appetite, Is Driven by Hypothalamic Gene-Regulatory Programs Previously Linked to Addiction and RewardChapter 13: Development of Local RAS in Cardiovascular/Body Fluid Regulatory Systems and Hypertension in Fetal Origins; Chapter 14: Sodium Appetite Sensitization; Chapter 15: Homeostasis and Body Fluid Regulation: An End Note; Back Cover…”
Libro electrónico -
109
-
110Publicado 2018Libro electrónico
-
111Publicado 2024Tabla de Contenidos: “…6.3 Strong assumptions made by SOTA attacks -- 6.3.1 The state-of-the-art attacks -- 6.3.2 Strong assumptions -- Assumption 1: Knowledge of BatchNorm statistics -- Assumption 2: Knowing or being able to infer private labels -- 6.3.3 Re-evaluation under relaxed assumptions -- Relaxation 1: Not knowing BatchNorm statistics -- Relaxation 2: Not knowing private labels -- 6.4 Defenses against the gradient inversion attack -- 6.4.1 Encrypt gradients -- 6.4.2 Perturbing gradients -- 6.4.3 Weak encryption of inputs (encoding inputs) -- 6.5 Evaluation -- 6.5.1 Experimental setup -- 6.5.2 Performance of defense methods -- 6.5.3 Performance of combined defenses -- 6.5.4 Time estimate for end-to-end recovery of a single image -- 6.6 Conclusion -- 6.7 Future directions -- 6.7.1 Gradient inversion attacks for text data -- 6.7.2 Gradient inversion attacks in variants of federated learning -- 6.7.3 Defenses with provable guarantee -- References -- 2 Emerging topics -- 7 Personalized federated learning: theory and open problems -- 7.1 Introduction -- 7.2 Problem formulation of pFL -- 7.3 Review of personalized FL approaches -- 7.3.1 Mixing models -- 7.3.2 Model-based approaches: meta-learning -- 7.3.3 Multi-task learning -- 7.3.4 Weight sharing -- 7.3.5 Clients clustering -- 7.4 Personalized FL algorithms -- 7.4.1 pFedMe -- 7.4.2 FedU -- 7.5 Experiments -- 7.5.1 Experimental settings -- 7.5.2 Comparison -- 7.6 Open problems -- 7.6.1 Transfer learning -- 7.6.2 Knowledge distillation -- 7.7 Conclusion -- References -- 8 Fairness in federated learning -- 8.1 Introduction -- 8.2 Notions of fairness -- 8.2.1 Equitable fairness -- 8.2.2 Collaborative fairness -- 8.2.3 Algorithmic fairness -- 8.3 Algorithms to achieve fairness in FL -- 8.3.1 Algorithms to achieve equitable fairness -- 8.3.2 Algorithms to achieve collaborative fairness…”
Libro electrónico -
112
-
113Publicado 2023Libro electrónico
-
114Publicado 2010Tabla de Contenidos: “…-- What an Omnichannel Experience Looks Like: H& -- R Block -- The Elements of an Omnichannel Experience -- How a CDP Works -- Subaru: Combining the Front End and Back End for an Omnichannel Experience -- Managerial Considerations When Leading an Omnichannel Transformation Implementation -- Conclusion -- Author Biography -- Chapter 19 Sales as Storytelling -- Sales and Marketing -- Why Story? …”
Libro electrónico -
115Publicado 2011Tabla de Contenidos: “…21 Behavioral Effects in M&A's PART V Recapitalization and Restructuring; 22 Financial Restructuring; 23 Going Private and Leveraged Buyouts; 24 International Takeovers and Restructuring; PART VI Special Topics; 25 Joint Ventures and Strategic Alliances: Alternatives to M&A's; 26 Fairness Opinions in M&As; 27 How Initial Public Offerings Affect M&A Markets: The Dual Tracking Phenomenon; 28 The Diversification Discount; 29 Partial Acquisitions:Motivation and Consequences on Firm Performance; Answers to End-of-Chapter Discussion Questions; Index…”
Libro electrónico -
116
-
117por United States Public Health Service Office of the Surgeon GeneralTabla de Contenidos: “…Recommendations for future research ; Appendix 9-2. Ending the tobacco problem : a blueprint for the nation ; Appendix 9-3. …”
Publicado 2010
Libro electrónico -
118por Harrington, Jan L.Tabla de Contenidos: “…Security Threats to Home and Small OfficesBasic Defenses; Advanced Defenses; Security Resources; Chapter 11. …”
Publicado 2007
Libro electrónico -
119Publicado 2018Tabla de Contenidos: “…Asynchronous API -- Micro-frontend -- Trilateral API per container -- Summary -- Chapter 7: Testing -- Shifting testing to the left -- Test engineering -- Isolated testing -- Unit testing -- Component testing -- Transitive testing -- Integration testing -- Contract testing -- End-to-end testing -- Manual testing -- Example - end-to-end relay -- Submit order leg -- Order submitted leg -- Summary -- Chapter 8: Monitoring -- Shifting testing to the right -- Key performance indicators -- Real and synthetic traffic -- Real-user monitoring -- Synthetic transaction monitoring -- Observability -- Measurements -- Work metrics -- Resource metrics -- Events -- Telemetry -- Alerting -- Focus on recovery -- Performance -- Summary -- Chapter 9: Security -- Shared responsibility model -- Security by design -- Accounts as code -- Defense in depth -- Edge layer -- Component layer -- Data layer -- Encryption -- Data in transit -- Data at rest -- Envelope encryption -- Tokenization -- Domain events -- Disaster recovery -- Application security -- Federated identity management -- API gateway -- JWT assertion and filter patterns -- Regulatory compliance -- Summary -- Chapter 10: Value Focused Migration -- Risk mitigation -- Anti-pattern - Lift and Shift -- Anti-pattern - synchronous anti-corruption layer -- Strangler pattern -- Bi-directional synchronization and latching -- Legacy change data capture -- Empower self-sufficient, full-stack teams -- Evolutionary architecture -- Welcome polyglot cloud -- Summary -- Other Books You May Enjoy -- Index…”
Libro electrónico -
120