Mostrando 101 - 120 Resultados de 392 Para Buscar 'defensive end', tiempo de consulta: 0.08s Limitar resultados
  1. 101
    por Landale, Anthony
    Publicado 2008
    Tabla de Contenidos: “…2.8 Working with Scapegoating2.9 Negotiation Skills; 2.10 Facilitator Support; PART THREE Creative Facilitation; 3.1 One-to-One Facilitation; 3.2 Powering Up Self-Confidence; 3.3 Facilitating without Words; 3.4 Defense Patterns; 3.5 Consultancy Skills; 3.6 Working in the Here and Now; 3.7 Creative Facilitation; 3.8 Imaginal Work; 3.9 Using Stories to Facilitate Learning; 3.10 Endings…”
    Libro electrónico
  2. 102
    Publicado 2018
    Tabla de Contenidos: “…Security Configuration Management - Discovery and Detection -- Security Configuration Management - Risk Mitigation -- Security Configuration Management - Security State Analysis -- Security Configuration Management - Data Exposure and Sharing -- Prelude - integrating like services -- Integrating cyber intel from different services -- Overview - red team methodology -- Red team - testing methods -- White box -- Gray box -- Black box -- Red team constraints -- Red team - graphical representation -- Data integration challenges -- The end user perspective -- The service level perspective - cyber intelligence - Data Exposure and Sharing -- The SOC perspective -- Capability Maturity Model - InfoSec and cyber intel -- Capability Maturity Model - InfoSec and cyber intel - initial phase -- Capability Maturity Model - InfoSec and cyber intel - Phase A -- Capability Maturity Model - InfoSec and cyber intel - Phase B -- Capability Maturity Model - InfoSec and cyber intel - Phase C -- Collaboration + Capability = Active Defense -- Summary -- Chapter 9: Driving Cyber Intel -- The gap -- Another set of eyes -- The logic -- Event -- Incident -- Mapping events and incidents to InfoSec capabilities -- Capability Maturity Model - security awareness -- Capability Maturity Model - security awareness Phase - Initial -- Capability Maturity Model - security awareness - Phase A -- Capability Maturity Model - security awareness - Phase B -- Capability Maturity Model - security awareness - Phase C -- Capability Maturity Model - security awareness - Phase C + -- Just another day part 1 -- Summary -- Chapter 10: Baselines and Anomalies -- Setting up camp -- Baselines and anomalies -- Continuous monitoring - the challenge -- Part 1 -- Part 2 -- Part 3 -- Capability Maturity Model - continuous monitoring overview -- Level 1 - phase A -- Level 1 - phase B -- Level 1 - phase C.…”
    Libro electrónico
  3. 103
    Publicado 2019
    Tabla de Contenidos: “…Visas Help from Eleanor Roosevelt and Other Americans Three Crucial Meetings on December 27,1940 1940 Correspondence Eva's Other Activities before the End of 1940 Further Pleas to Help Otto and Other Refugees Otto's Wait for Visa in Southern France Otto's Escape to America Eva's Defense of Her Decision to Marry Otto Part VI. …”
    Libro electrónico
  4. 104
    Publicado 2018
    Tabla de Contenidos: “…From the 'Unidimensional Identity' to the 'Diversity of Identities' -- Sustainable Intergenerational Justice and its Ends -- Global Responsibility in a Historical Context -- 3. …”
    Libro electrónico
  5. 105
    por Singh, Robert
    Publicado 2012
    Tabla de Contenidos: “…Chinese Military Developments: Enter the DragonTaiwan; Conclusion: the Limits of Strategic Engagement with China; 8 Russia; Introduction; Resetting Russian-American Relations; Missile Defense, New START, and Afghanistan; Missile Defense; New START; Afghanistan, Central Asia and the ""Post-Soviet Space""; Resetting the Reset?…”
    Libro electrónico
  6. 106
    por Hardman, Casey. author
    Publicado 2020
    Libro electrónico
  7. 107
    por Rhonheimer, Martin, 1950-
    Publicado 2009
    Tabla de Contenidos: “…Summa theologiae II-II, q.64, a.7 : killing in self-defense according to Thomas Aquinas ; c. Critique and the development of the discussion ; d. …”
    Click para texto completo desde fuera UPSA
    Click para texto completo desde UPSA
    Libro electrónico
  8. 108
    Publicado 2014
    Tabla de Contenidos: “…Chapter 12: A Classic Innate Behavior, Sodium Appetite, Is Driven by Hypothalamic Gene-Regulatory Programs Previously Linked to Addiction and RewardChapter 13: Development of Local RAS in Cardiovascular/Body Fluid Regulatory Systems and Hypertension in Fetal Origins; Chapter 14: Sodium Appetite Sensitization; Chapter 15: Homeostasis and Body Fluid Regulation: An End Note; Back Cover…”
    Libro electrónico
  9. 109
    Publicado 2010
    Libro electrónico
  10. 110
    Publicado 2018
    Libro electrónico
  11. 111
    Publicado 2024
    Tabla de Contenidos: “…6.3 Strong assumptions made by SOTA attacks -- 6.3.1 The state-of-the-art attacks -- 6.3.2 Strong assumptions -- Assumption 1: Knowledge of BatchNorm statistics -- Assumption 2: Knowing or being able to infer private labels -- 6.3.3 Re-evaluation under relaxed assumptions -- Relaxation 1: Not knowing BatchNorm statistics -- Relaxation 2: Not knowing private labels -- 6.4 Defenses against the gradient inversion attack -- 6.4.1 Encrypt gradients -- 6.4.2 Perturbing gradients -- 6.4.3 Weak encryption of inputs (encoding inputs) -- 6.5 Evaluation -- 6.5.1 Experimental setup -- 6.5.2 Performance of defense methods -- 6.5.3 Performance of combined defenses -- 6.5.4 Time estimate for end-to-end recovery of a single image -- 6.6 Conclusion -- 6.7 Future directions -- 6.7.1 Gradient inversion attacks for text data -- 6.7.2 Gradient inversion attacks in variants of federated learning -- 6.7.3 Defenses with provable guarantee -- References -- 2 Emerging topics -- 7 Personalized federated learning: theory and open problems -- 7.1 Introduction -- 7.2 Problem formulation of pFL -- 7.3 Review of personalized FL approaches -- 7.3.1 Mixing models -- 7.3.2 Model-based approaches: meta-learning -- 7.3.3 Multi-task learning -- 7.3.4 Weight sharing -- 7.3.5 Clients clustering -- 7.4 Personalized FL algorithms -- 7.4.1 pFedMe -- 7.4.2 FedU -- 7.5 Experiments -- 7.5.1 Experimental settings -- 7.5.2 Comparison -- 7.6 Open problems -- 7.6.1 Transfer learning -- 7.6.2 Knowledge distillation -- 7.7 Conclusion -- References -- 8 Fairness in federated learning -- 8.1 Introduction -- 8.2 Notions of fairness -- 8.2.1 Equitable fairness -- 8.2.2 Collaborative fairness -- 8.2.3 Algorithmic fairness -- 8.3 Algorithms to achieve fairness in FL -- 8.3.1 Algorithms to achieve equitable fairness -- 8.3.2 Algorithms to achieve collaborative fairness…”
    Libro electrónico
  12. 112
  13. 113
    Publicado 2023
    Libro electrónico
  14. 114
    Publicado 2010
    Tabla de Contenidos: “…-- What an Omnichannel Experience Looks Like: H&amp -- R Block -- The Elements of an Omnichannel Experience -- How a CDP Works -- Subaru: Combining the Front End and Back End for an Omnichannel Experience -- Managerial Considerations When Leading an Omnichannel Transformation Implementation -- Conclusion -- Author Biography -- Chapter 19 Sales as Storytelling -- Sales and Marketing -- Why Story? …”
    Libro electrónico
  15. 115
    Publicado 2011
    Tabla de Contenidos: “…21 Behavioral Effects in M&A's PART V Recapitalization and Restructuring; 22 Financial Restructuring; 23 Going Private and Leveraged Buyouts; 24 International Takeovers and Restructuring; PART VI Special Topics; 25 Joint Ventures and Strategic Alliances: Alternatives to M&A's; 26 Fairness Opinions in M&As; 27 How Initial Public Offerings Affect M&A Markets: The Dual Tracking Phenomenon; 28 The Diversification Discount; 29 Partial Acquisitions:Motivation and Consequences on Firm Performance; Answers to End-of-Chapter Discussion Questions; Index…”
    Libro electrónico
  16. 116
    Publicado 2017
    Libro electrónico
  17. 117
    Tabla de Contenidos: “…Recommendations for future research ; Appendix 9-2. Ending the tobacco problem : a blueprint for the nation ; Appendix 9-3. …”
    Libro electrónico
  18. 118
    por Harrington, Jan L.
    Publicado 2007
    Tabla de Contenidos: “…Security Threats to Home and Small OfficesBasic Defenses; Advanced Defenses; Security Resources; Chapter 11. …”
    Libro electrónico
  19. 119
    Publicado 2018
    Tabla de Contenidos: “…Asynchronous API -- Micro-frontend -- Trilateral API per container -- Summary -- Chapter 7: Testing -- Shifting testing to the left -- Test engineering -- Isolated testing -- Unit testing -- Component testing -- Transitive testing -- Integration testing -- Contract testing -- End-to-end testing -- Manual testing -- Example - end-to-end relay -- Submit order leg -- Order submitted leg -- Summary -- Chapter 8: Monitoring -- Shifting testing to the right -- Key performance indicators -- Real and synthetic traffic -- Real-user monitoring -- Synthetic transaction monitoring -- Observability -- Measurements -- Work metrics -- Resource metrics -- Events -- Telemetry -- Alerting -- Focus on recovery -- Performance -- Summary -- Chapter 9: Security -- Shared responsibility model -- Security by design -- Accounts as code -- Defense in depth -- Edge layer -- Component layer -- Data layer -- Encryption -- Data in transit -- Data at rest -- Envelope encryption -- Tokenization -- Domain events -- Disaster recovery -- Application security -- Federated identity management -- API gateway -- JWT assertion and filter patterns -- Regulatory compliance -- Summary -- Chapter 10: Value Focused Migration -- Risk mitigation -- Anti-pattern - Lift and Shift -- Anti-pattern - synchronous anti-corruption layer -- Strangler pattern -- Bi-directional synchronization and latching -- Legacy change data capture -- Empower self-sufficient, full-stack teams -- Evolutionary architecture -- Welcome polyglot cloud -- Summary -- Other Books You May Enjoy -- Index…”
    Libro electrónico
  20. 120