Mostrando 141 - 160 Resultados de 392 Para Buscar 'defensive end', tiempo de consulta: 0.09s Limitar resultados
  1. 141
    Publicado 2022
    “…Build and mature a threat hunting team capable of repeatably stalking and trapping advanced adversaries in the darkest parts of an enterprise Key Features Learn foundational concepts for effective threat hunting teams in pursuit of cyber adversaries Recognize processes and requirements for executing and conducting a hunt Customize a defensive cyber framework needed to grow and mature a hunt team Book Description Threat hunting is a concept that takes traditional cyber defense and spins it onto its head. …”
    Libro electrónico
  2. 142
    Publicado 2024
    Libro electrónico
  3. 143
    Publicado 2023
    “…What's more, there are chapter-end self-assessment questions for you to test all that you've learned, as well as two book-end practice quizzes to really give you a leg up. …”
    Libro electrónico
  4. 144
    Publicado 2014
    Libro electrónico
  5. 145
    por Jonas, Gilbert
    Publicado 2005
    Tabla de Contenidos: “…Negro determination : the NAACP's assault on Jim Crow places it in mortal combat with the Ku Klux Klan and the White Citizens Councils -- Leading the quest for political power : James Weldon Johnson leads the fight against lynching, then Walter White defeats President Hoover's Supreme Court nominee -- Comes the revolution : the struggle between the NAACP and the Communist Party USA : White and Wilkins thwart the communist attempts to win the loyalty of American Negroes -- World Wwar II and its consequences for race : the NAACP presses FDR to utilize Negro troops and open up defense industry jobs to Negroes with Mrs. Roosevelt's help --…”
    Enlace del recurso
    Libro electrónico
  6. 146
    Publicado 2010
    Tabla de Contenidos: “…Thinking beyond means-ends analysis: the role of impulse-driven human creativity in the design of artificially intelligent systems Dongming Xu Yonggui Wang Sukanto Bhattacharya University of Queensland 11. …”
    Libro electrónico
  7. 147
    Publicado 2017
    “…The book's final two chapters greatly draw on Lua and TShark, the command-line interface of Wireshark. By the end of the book you will gain the following: -Master the basics of Wireshark -Explore the virtual w4sp-lab environment that mimics a real-world network -Gain experience using the Debian-based Kali OS among other systems -Understand the technical details behind network attacks -Execute exploitation and grasp offensive and defensive activities, exploring them through Wireshark -Employ Lua to extend Wireshark features and create useful scripts To sum up, the book content, labs and online material, coupled with many referenced sources of PCAP traces, together present a dynamic and robust manual for information security professionals seeking to leverage Wireshark…”
    Libro electrónico
  8. 148
    por Lawson, Brook Stearns
    Publicado 2010
    Libro electrónico
  9. 149
    Publicado 2008
    Libro electrónico
  10. 150
    Publicado 2023
    “…Use this practical guide to understand the concepts behind Intelligent Multimode Security Systems (IMSS) and how to implement security within an IMSS system to improve the robustness of the devices and of the end-to-end solution. There are nearly half a billion active IMSS cameras globally, with over 100 million added annually. …”
    Libro electrónico
  11. 151
    por Larrabee, F. Stephen
    Publicado 2002
    Libro electrónico
  12. 152
    Publicado 2024
    Tabla de Contenidos: “…-- 4.2 Die Natural Law Defense -- 4.3 Kritische Reflexion -- Kapitel 5 Möglichkeiten und Grenzen der theoretischen Theodizee: Eine Zwischenreflexion im Anschluss an Immanuel Kant -- 5.1 Das Ende philosophischer Theodizee? …”
    Libro electrónico
  13. 153
    por Cayirci, E.
    Publicado 2009
    Libro electrónico
  14. 154
    Publicado 2020
    Tabla de Contenidos: “…Gavin -- Part I: Applied History and Future Scenarios -- Ends of Epidemics / Jeremy A. Greene and Dora Vargha -- The World after COVID: A Perspective from History / Margaret MacMillan -- Future Scenarios: "We are all failed states, now" / Philip Bobbitt -- Part II: Global Public Health and Mitigation Strategies -- Make Pandemics Lose Their Power / Tom Inglesby -- Origins of the COVID-19 Pandemic and the Path Forward: A Global Public Health Policy Perspective / Lainie Rutkow -- Bioethics in a Post- COVID World: Time for Future- Facing Global Health Ethics / Jeffrey P. …”
    Libro electrónico
  15. 155
    por Fritsch, Winston
    Publicado 1992
    Tabla de Contenidos: “…s Role in World Affairs: The Old Perception and the End of the Dream""; ""Brazilâ€?s Emerging Regional Role in the Hemisphere""; ""The U.S. …”
    Capítulo de libro electrónico
  16. 156
    Tabla de Contenidos: “…Declarative Languages""; ""SQL Basics""; ""Statements""; ""Databases""; ""Transaction Logs""; ""Schemas""; ""Tables""; ""Views""; ""Indexes""; ""Stored Procedures""; ""User-Defined Functions""; ""SQL CLR Assemblies""; ""Elements of Style""; ""Whitespace""; ""Naming Conventions""; ""One Entry, One Exit""; ""Defensive Coding""; ""The SELECT * Statement""…”
    Libro electrónico
  17. 157
    Publicado 2015
    Tabla de Contenidos: “…The early thinking of Karl PolanyiContemporary criticisms of neoliberalism; Neoliberalism as Exception; Neoliberalism: The Case of Israel; The End of History; The Death of Neoliberalism?; Neo-Marxian Theoretical Alternatives to Neoliberalism; Transnational capitalism; Empire; Chapter Summary; Discussion Questions; Additional Readings; Notes; Chapter 5 Global Political Structures and Processes; On Political Processes and Flows; The Nation-State; Threats to the nation-state; In Defense of the Nation-State; "Imagined Community"; Changes in Global Nation-State Relations…”
    Libro electrónico
  18. 158
    Publicado 2006
    Tabla de Contenidos: “…E-MAIL ABUSE AND POLICY-BASED SOLUTIONSCONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; E-Commerce Vulnerabilities; INTRODUCTION; E-SHOPLIFTING; CREDIT CARD PAYMENTS; PROTECTING CREDIT CARD PAYMENTS; ONLINE AUCTIONS; NONREPUDIATION; TRUST AND REPUTATION; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; Hacking Techniques in Wired Networks Hacking; INTRODUCTION; PRINCIPLES OF HACKING; ATTACKS AGAINST THE INTERNET INFRASTRUCTURE; ATTACKS AGAINST END SYSTEMS OF THE INTERNET; ATTACKS AGAINST ENTERPRISE NETWORK SYSTEMS; CONCLUSION; ACKNOWLEDGEMENTS; GLOSSARY…”
    Libro electrónico
  19. 159
    Publicado 2022
    Libro electrónico
  20. 160
    Publicado 2023
    “…By the end of this social engineering book, you'll be proficient in identifying cyberattacks and safeguarding against the ever-growing threat of social engineering with your defensive arsenal. …”
    Libro electrónico