Mostrando 161 - 180 Resultados de 392 Para Buscar 'defensive end', tiempo de consulta: 0.08s Limitar resultados
  1. 161
    Publicado 2023
    “…Send files and messages with end-to-end encryption. Secure your home network and keep your smart devices from spying on you. …”
    Libro electrónico
  2. 162
    Publicado 2020
    “…In addition to this, you'll be equipped with the tools you need to ensure compliance and continuous monitoring through security operations. By the end of this book, you'll have developed a full understanding of the processes and tools involved in securing and hardening your Windows environment. …”
    Libro electrónico
  3. 163
    Publicado 2024
    “…The curriculum is thoughtfully structured and covers a wide range of topics, making it accessible and engaging for learners at various levels. By the end of this course, you'll possess a comprehensive understanding of network security and defense, preparing you to tackle real-world challenges in the field…”
    Video
  4. 164
    por Rothman, Maarten
    Publicado 2024
    “…Finally, the fifth section deals with the way armed forces can transform their organizations and learn from this war, and concludes with questions on how and when the Russia-Ukriane war might end…”
    Libro electrónico
  5. 165
    Publicado 2011
    Libro electrónico
  6. 166
    Publicado 2017
    Libro electrónico
  7. 167
    Publicado 2015
    Libro electrónico
  8. 168
    por Camporeale, Salvatore I.
    Publicado 2013
    Tabla de Contenidos: “…Thomas Aquinas in the Dominican Tradition; 1.2 The History of Thomism and the Centrality of the Summa Theologiae in the Fifteenth and Sixteenth Centuries; 1.3 Valla's Encomium: Its Place in History and Cultural Significance; 1.4 The Cappellone degli Spagnoli in Florence (Second Half of the Fourteenth Century) and the Cappella Carafa in Rome (End of the Fifteenth Century); 2.1 Exordium and Divine Invocation…”
    Click para texto completo desde fuera UPSA
    Click para texto completo desde UPSA
    Libro electrónico
  9. 169
    por Landy, Gene K.
    Publicado 2008
    Tabla de Contenidos: “…; Organization of this Book; Approach of this Book; Understanding and Using Intellectual Property; Doing Deals; Understanding and Dealing with Legal Risk Factors; Global Perspective; Focusing on Your End Game from the Beginning; How to Use this Book…”
    Libro electrónico
  10. 170
    Publicado 2014
    Tabla de Contenidos: “…Protecting Mission-Critical Systems; Information Assurance; Information Risk Management; Administrative, Technical, and Physical Controls; Risk Analysis; Defense in Depth…”
    Libro electrónico
  11. 171
    por Gaughan, Patrick A.
    Publicado 2013
    Tabla de Contenidos: “…Empirical Evidence on the Acquisition Programs of the 1960's How Likely Is It That Diversifying Acquisitions Will End Up Being Sold Off?; Is There a Diversification Discount?…”
    Libro electrónico
  12. 172
    Publicado 2012
    Tabla de Contenidos: “…Declarative Languages; SQL Basics; Statements; Databases; Transaction Logs; Schemas; Tables; Views; Indexes; Stored Procedures; User-Defined Functions; SQL CLR Assemblies; Elements of Style; Whitespace; Naming Conventions; One Entry, One Exit; Defensive Coding…”
    Libro electrónico
  13. 173
    por Ebenstein, Donny
    Publicado 2013
    Tabla de Contenidos: “…What Comes Next: Making Change Happen and Identifying Dead EndsPossibility 1: The Situation Gets Better and the Relationship Improves; Possibility 2: Making Peace with the Status Quo; Possibility 3: Walking Away; Have you Really Tried?…”
    Libro electrónico
  14. 174
    Publicado 2013
    Tabla de Contenidos: “…Federal Supply Schedules/GSA SchedulesFederal Register; Federal Agency Acquisition Forecasts; Tech-Net; Federal Procurement Data System; Year-End Procurements; Chapter 9: Support Programs and Services for Contractors; Small Business Administration; Procurement Technical Assistance Centers; DoD Office of Small Business Programs; General Services Administration; National Contract Management Association; PART IV: HOW THE GOVERNMENT ISSUES PROCUREMENT OPPORTUNITIES; Chapter 10: Simplified Acquisition or Small Purchase Procedures; Micropurchases; Simplified Acquisition Methods…”
    Libro electrónico
  15. 175
    por McDonough, Bart R.
    Publicado 2023
    Tabla de Contenidos: “…Best Practices for Managing Third-Party Cyber Risk -- Legal and Regulatory Considerations in Third-Party Risk Management -- Sample Questions to ask Third-Party Vendors -- Chapter 7 Summary -- Chapter 8: Cybersecurity Training and Awareness -- Importance of Cybersecurity Awareness for All Employees -- Strategies for Providing Effective Training and Awareness Programs -- More Detail on Effective Training Strategies -- Chapter 8 Summary -- Chapter 9: Cyber Insurance -- Understanding Cyber Insurance -- Key Components of Cyber Insurance -- Evaluating and Purchasing Cyber Insurance -- Managing and Reviewing the Cyber Insurance Policy -- Chapter 9 Summary -- Chapter 10: Conclusion: Moving Forward with Cybersecurity Governance -- The Board's Role in Cybersecurity Governance -- Key Takeaways and Action Items for Board Members -- Chapter 10 Summary -- Appendix A: Checklist of Key Considerations for Board Members -- Appendix B: Sample Questions -- Appendix C: Sample Board Meeting Agenda -- Appendix D: List of Key Vendors -- Appendix E: Cybersecurity Resources -- Appendix F: Cybersecurity Books -- Appendix G: Cybersecurity Podcasts -- Appendix H: Cybersecurity Websites and Blogs -- Appendix I: Tabletop Exercise: Cybersecurity Incident Response -- Appendix J: Articles -- About the Author -- Acknowledgments -- Index -- Copyright -- Dedication -- End User License Agreement…”
    Libro electrónico
  16. 176
    Publicado 2015
    Tabla de Contenidos: “…Move to Near Pervasive End‐User Virtualization -- 5. Use Software‐Defined Networking to Compartmentalize the Network -- 6. …”
    Libro electrónico
  17. 177
    Publicado 2019
    Tabla de Contenidos: “…Summary -- 6. Testing Front-End Applications -- 6.1. Functional Testing of Front-End Applications -- 6.2. …”
    Libro electrónico
  18. 178
    Publicado 2014
    Libro electrónico
  19. 179
    Publicado 2014
    “…Build your portal into the Nether, defend your Fortress, and bring back the rewards you've earned... Prepare for the End, defeat the Ender Dragon, and capture its egg... create and defeat the Wither... transform Redstone ore into incredible devices, transport systems, defenses, and more! …”
    Video
  20. 180
    Publicado 2015
    “…What happens if we bet too heavily on unmanned systems, cyber warfare, and special operations in our defense?In today's U.S. defense policy debates, big land wars are out. …”
    Libro electrónico