Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 92
- Computer security 80
- Computer networks 63
- Cloud computing 20
- Penetration testing (Computer security) 18
- Examinations 16
- History 16
- Management 16
- Certification 14
- Politics and government 14
- Data protection 13
- United States 13
- Artificial intelligence 12
- Engineering & Applied Sciences 12
- Application software 11
- Development 11
- Information technology 11
- National security 11
- Electronic data processing personnel 10
- Foreign relations 10
- Prevention 10
- Business enterprises 9
- Computer crimes 9
- Python (Computer program language) 9
- Access control 8
- Armed Forces 8
- Computers 8
- Electrical & Computer Engineering 7
- Military policy 7
- Operating systems (Computers) 7
-
161Publicado 2023“…Send files and messages with end-to-end encryption. Secure your home network and keep your smart devices from spying on you. …”
Libro electrónico -
162Publicado 2020“…In addition to this, you'll be equipped with the tools you need to ensure compliance and continuous monitoring through security operations. By the end of this book, you'll have developed a full understanding of the processes and tools involved in securing and hardening your Windows environment. …”
Libro electrónico -
163Publicado 2024“…The curriculum is thoughtfully structured and covers a wide range of topics, making it accessible and engaging for learners at various levels. By the end of this course, you'll possess a comprehensive understanding of network security and defense, preparing you to tackle real-world challenges in the field…”
Video -
164por Rothman, Maarten“…Finally, the fifth section deals with the way armed forces can transform their organizations and learn from this war, and concludes with questions on how and when the Russia-Ukriane war might end…”
Publicado 2024
Libro electrónico -
165
-
166Publicado 2017Libro electrónico
-
167
-
168por Camporeale, Salvatore I.Tabla de Contenidos: “…Thomas Aquinas in the Dominican Tradition; 1.2 The History of Thomism and the Centrality of the Summa Theologiae in the Fifteenth and Sixteenth Centuries; 1.3 Valla's Encomium: Its Place in History and Cultural Significance; 1.4 The Cappellone degli Spagnoli in Florence (Second Half of the Fourteenth Century) and the Cappella Carafa in Rome (End of the Fifteenth Century); 2.1 Exordium and Divine Invocation…”
Publicado 2013
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
169por Landy, Gene K.Tabla de Contenidos: “…; Organization of this Book; Approach of this Book; Understanding and Using Intellectual Property; Doing Deals; Understanding and Dealing with Legal Risk Factors; Global Perspective; Focusing on Your End Game from the Beginning; How to Use this Book…”
Publicado 2008
Libro electrónico -
170Publicado 2014Tabla de Contenidos: “…Protecting Mission-Critical Systems; Information Assurance; Information Risk Management; Administrative, Technical, and Physical Controls; Risk Analysis; Defense in Depth…”
Libro electrónico -
171por Gaughan, Patrick A.Tabla de Contenidos: “…Empirical Evidence on the Acquisition Programs of the 1960's How Likely Is It That Diversifying Acquisitions Will End Up Being Sold Off?; Is There a Diversification Discount?…”
Publicado 2013
Libro electrónico -
172Publicado 2012Tabla de Contenidos: “…Declarative Languages; SQL Basics; Statements; Databases; Transaction Logs; Schemas; Tables; Views; Indexes; Stored Procedures; User-Defined Functions; SQL CLR Assemblies; Elements of Style; Whitespace; Naming Conventions; One Entry, One Exit; Defensive Coding…”
Libro electrónico -
173por Ebenstein, DonnyTabla de Contenidos: “…What Comes Next: Making Change Happen and Identifying Dead EndsPossibility 1: The Situation Gets Better and the Relationship Improves; Possibility 2: Making Peace with the Status Quo; Possibility 3: Walking Away; Have you Really Tried?…”
Publicado 2013
Libro electrónico -
174Publicado 2013Tabla de Contenidos: “…Federal Supply Schedules/GSA SchedulesFederal Register; Federal Agency Acquisition Forecasts; Tech-Net; Federal Procurement Data System; Year-End Procurements; Chapter 9: Support Programs and Services for Contractors; Small Business Administration; Procurement Technical Assistance Centers; DoD Office of Small Business Programs; General Services Administration; National Contract Management Association; PART IV: HOW THE GOVERNMENT ISSUES PROCUREMENT OPPORTUNITIES; Chapter 10: Simplified Acquisition or Small Purchase Procedures; Micropurchases; Simplified Acquisition Methods…”
Libro electrónico -
175por McDonough, Bart R.Tabla de Contenidos: “…Best Practices for Managing Third-Party Cyber Risk -- Legal and Regulatory Considerations in Third-Party Risk Management -- Sample Questions to ask Third-Party Vendors -- Chapter 7 Summary -- Chapter 8: Cybersecurity Training and Awareness -- Importance of Cybersecurity Awareness for All Employees -- Strategies for Providing Effective Training and Awareness Programs -- More Detail on Effective Training Strategies -- Chapter 8 Summary -- Chapter 9: Cyber Insurance -- Understanding Cyber Insurance -- Key Components of Cyber Insurance -- Evaluating and Purchasing Cyber Insurance -- Managing and Reviewing the Cyber Insurance Policy -- Chapter 9 Summary -- Chapter 10: Conclusion: Moving Forward with Cybersecurity Governance -- The Board's Role in Cybersecurity Governance -- Key Takeaways and Action Items for Board Members -- Chapter 10 Summary -- Appendix A: Checklist of Key Considerations for Board Members -- Appendix B: Sample Questions -- Appendix C: Sample Board Meeting Agenda -- Appendix D: List of Key Vendors -- Appendix E: Cybersecurity Resources -- Appendix F: Cybersecurity Books -- Appendix G: Cybersecurity Podcasts -- Appendix H: Cybersecurity Websites and Blogs -- Appendix I: Tabletop Exercise: Cybersecurity Incident Response -- Appendix J: Articles -- About the Author -- Acknowledgments -- Index -- Copyright -- Dedication -- End User License Agreement…”
Publicado 2023
Libro electrónico -
176Publicado 2015Tabla de Contenidos: “…Move to Near Pervasive End‐User Virtualization -- 5. Use Software‐Defined Networking to Compartmentalize the Network -- 6. …”
Libro electrónico -
177Publicado 2019Tabla de Contenidos: “…Summary -- 6. Testing Front-End Applications -- 6.1. Functional Testing of Front-End Applications -- 6.2. …”
Libro electrónico -
178Publicado 2014Libro electrónico
-
179Publicado 2014“…Build your portal into the Nether, defend your Fortress, and bring back the rewards you've earned... Prepare for the End, defeat the Ender Dragon, and capture its egg... create and defeat the Wither... transform Redstone ore into incredible devices, transport systems, defenses, and more! …”
-
180Publicado 2015“…What happens if we bet too heavily on unmanned systems, cyber warfare, and special operations in our defense?In today's U.S. defense policy debates, big land wars are out. …”
Libro electrónico