Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 92
- Computer security 80
- Computer networks 63
- Cloud computing 20
- Penetration testing (Computer security) 18
- Examinations 16
- History 16
- Management 16
- Certification 14
- Politics and government 14
- Data protection 13
- United States 13
- Artificial intelligence 12
- Engineering & Applied Sciences 12
- Application software 11
- Development 11
- Information technology 11
- National security 11
- Electronic data processing personnel 10
- Foreign relations 10
- Prevention 10
- Business enterprises 9
- Computer crimes 9
- Python (Computer program language) 9
- Access control 8
- Armed Forces 8
- Computers 8
- Electrical & Computer Engineering 7
- Military policy 7
- Operating systems (Computers) 7
-
141Publicado 2022“…Build and mature a threat hunting team capable of repeatably stalking and trapping advanced adversaries in the darkest parts of an enterprise Key Features Learn foundational concepts for effective threat hunting teams in pursuit of cyber adversaries Recognize processes and requirements for executing and conducting a hunt Customize a defensive cyber framework needed to grow and mature a hunt team Book Description Threat hunting is a concept that takes traditional cyber defense and spins it onto its head. …”
Libro electrónico -
142Publicado 2024Libro electrónico
-
143Publicado 2023“…What's more, there are chapter-end self-assessment questions for you to test all that you've learned, as well as two book-end practice quizzes to really give you a leg up. …”
Libro electrónico -
144
-
145por Jonas, GilbertTabla de Contenidos: “…Negro determination : the NAACP's assault on Jim Crow places it in mortal combat with the Ku Klux Klan and the White Citizens Councils -- Leading the quest for political power : James Weldon Johnson leads the fight against lynching, then Walter White defeats President Hoover's Supreme Court nominee -- Comes the revolution : the struggle between the NAACP and the Communist Party USA : White and Wilkins thwart the communist attempts to win the loyalty of American Negroes -- World Wwar II and its consequences for race : the NAACP presses FDR to utilize Negro troops and open up defense industry jobs to Negroes with Mrs. Roosevelt's help --…”
Publicado 2005
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
146Publicado 2010Tabla de Contenidos: “…Thinking beyond means-ends analysis: the role of impulse-driven human creativity in the design of artificially intelligent systems Dongming Xu Yonggui Wang Sukanto Bhattacharya University of Queensland 11. …”
Libro electrónico -
147Publicado 2017“…The book's final two chapters greatly draw on Lua and TShark, the command-line interface of Wireshark. By the end of the book you will gain the following: -Master the basics of Wireshark -Explore the virtual w4sp-lab environment that mimics a real-world network -Gain experience using the Debian-based Kali OS among other systems -Understand the technical details behind network attacks -Execute exploitation and grasp offensive and defensive activities, exploring them through Wireshark -Employ Lua to extend Wireshark features and create useful scripts To sum up, the book content, labs and online material, coupled with many referenced sources of PCAP traces, together present a dynamic and robust manual for information security professionals seeking to leverage Wireshark…”
Libro electrónico -
148
-
149
-
150Publicado 2023“…Use this practical guide to understand the concepts behind Intelligent Multimode Security Systems (IMSS) and how to implement security within an IMSS system to improve the robustness of the devices and of the end-to-end solution. There are nearly half a billion active IMSS cameras globally, with over 100 million added annually. …”
Libro electrónico -
151
-
152Publicado 2024Tabla de Contenidos: “…-- 4.2 Die Natural Law Defense -- 4.3 Kritische Reflexion -- Kapitel 5 Möglichkeiten und Grenzen der theoretischen Theodizee: Eine Zwischenreflexion im Anschluss an Immanuel Kant -- 5.1 Das Ende philosophischer Theodizee? …”
Libro electrónico -
153
-
154Publicado 2020Tabla de Contenidos: “…Gavin -- Part I: Applied History and Future Scenarios -- Ends of Epidemics / Jeremy A. Greene and Dora Vargha -- The World after COVID: A Perspective from History / Margaret MacMillan -- Future Scenarios: "We are all failed states, now" / Philip Bobbitt -- Part II: Global Public Health and Mitigation Strategies -- Make Pandemics Lose Their Power / Tom Inglesby -- Origins of the COVID-19 Pandemic and the Path Forward: A Global Public Health Policy Perspective / Lainie Rutkow -- Bioethics in a Post- COVID World: Time for Future- Facing Global Health Ethics / Jeffrey P. …”
Libro electrónico -
155por Fritsch, WinstonTabla de Contenidos: “…s Role in World Affairs: The Old Perception and the End of the Dream""; ""Brazilâ€?s Emerging Regional Role in the Hemisphere""; ""The U.S. …”
Publicado 1992
Capítulo de libro electrónico -
156por Natarajan, Jay. author, Bruchez, Rudi. author, Coles, Michael. author, Shaw, Scott. author, Cebollero, Miguel. authorTabla de Contenidos: “…Declarative Languages""; ""SQL Basics""; ""Statements""; ""Databases""; ""Transaction Logs""; ""Schemas""; ""Tables""; ""Views""; ""Indexes""; ""Stored Procedures""; ""User-Defined Functions""; ""SQL CLR Assemblies""; ""Elements of Style""; ""Whitespace""; ""Naming Conventions""; ""One Entry, One Exit""; ""Defensive Coding""; ""The SELECT * Statement""…”
Publicado 2015
Libro electrónico -
157Publicado 2015Tabla de Contenidos: “…The early thinking of Karl PolanyiContemporary criticisms of neoliberalism; Neoliberalism as Exception; Neoliberalism: The Case of Israel; The End of History; The Death of Neoliberalism?; Neo-Marxian Theoretical Alternatives to Neoliberalism; Transnational capitalism; Empire; Chapter Summary; Discussion Questions; Additional Readings; Notes; Chapter 5 Global Political Structures and Processes; On Political Processes and Flows; The Nation-State; Threats to the nation-state; In Defense of the Nation-State; "Imagined Community"; Changes in Global Nation-State Relations…”
Libro electrónico -
158Publicado 2006Tabla de Contenidos: “…E-MAIL ABUSE AND POLICY-BASED SOLUTIONSCONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; E-Commerce Vulnerabilities; INTRODUCTION; E-SHOPLIFTING; CREDIT CARD PAYMENTS; PROTECTING CREDIT CARD PAYMENTS; ONLINE AUCTIONS; NONREPUDIATION; TRUST AND REPUTATION; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; Hacking Techniques in Wired Networks Hacking; INTRODUCTION; PRINCIPLES OF HACKING; ATTACKS AGAINST THE INTERNET INFRASTRUCTURE; ATTACKS AGAINST END SYSTEMS OF THE INTERNET; ATTACKS AGAINST ENTERPRISE NETWORK SYSTEMS; CONCLUSION; ACKNOWLEDGEMENTS; GLOSSARY…”
Libro electrónico -
159
-
160Publicado 2023“…By the end of this social engineering book, you'll be proficient in identifying cyberattacks and safeguarding against the ever-growing threat of social engineering with your defensive arsenal. …”
Libro electrónico