Search alternatives:
"actor" » "factor", "actors", "autor"

221
Published 2010
Springer Berlin Heidelberg
... of electronics into the environment, enabling the actors, i.e., people and objects, to interact...

222
by Ryan, Matthew
Published 2021
Springer International Publishing
... the ease of public access to advanced encryption techniques has allowed malicious actors to continue...

223
by F. C.
Published 2023
John Wiley & Sons
... actors Detailed photos, maps, and drawings to bring to life the unbelievable true stories contained...

224
Published 2004
Springer Berlin Heidelberg
... applications today. They convincingly take the roles of virtual presenters, synthetic actors and sales personas...

225
by Rains, Tim
Published 2023
Packt Publishing Ltd.
..., including their role as threat actors, and how to mitigate government access to data. The book concludes...

226
by Montasari, Reza
Published 2023
Springer International Publishing
... use of AI and associated technologies by state and non-state actors. Along with this analysis...

227
by Winterfeld, Steve
Published 2012
Syngress
... to defend against: . Espionage . Hactivism . Insider threats . State-sponsored attacks . Non-state actors...

228
by Borges, Dan
Published 2021
Packt
... they can detect. You will further understand how to blend in, uncover other actors' motivations and means...

229
by Suereth, Joshua D.
Published 2012
Manning Publications
... projects Scala's 2.8.0 collections API How to use actors for concurrent programming Mastering the Scala...

230
by Boy, Guy André
Published 2021
Springer International Publishing
... into account the well-being, safety, sustainability and efficiency of the actors of future sociotechnical...

231
by Lowrie, Daniel
Published 2024
Packt Publishing
... deep dive into the world of threat actors and their motives. As the curriculum unfolds, you'll explore...

232
by Vigo, Jr., Jesus
Published 2023
Apress
... Your Macs is the perfect roadmap to stopping malicious attacks and bad actors from spying on users...

233
by Ayala, Luis
Published 2016
Apress
... of standard definitions and a general misunderstanding about how bad actors can actually employ cyber...

234
by Tevault, Donald A.
Published 2023
Packt Publishing Ltd.
... to set up a Linux server that will be secure and harder for malicious actors to compromise...

235
by Libicki, Martin C., Ablon, Lillian, Webb, Tim
Published 2015
RAND
... actors (threats), protection needs (vulnerabilities), and assets (impact). Policy recommendations include...

236
by Okereafor, Kenneth
Published 2021
CRC Press
... to illustrate how threat actors perpetrated computer fraud against valuable information assets particularly...

237
by Schneider, Geri
Published 2001
Addison-Wesley
... and testing, and documentation. Key topics include: Identifying use cases and describing actors Writing...

238
Published 2004
Springer Berlin Heidelberg
...-su?cient and increasingly dependent on business partners and other actors. These trends call...

239
by Hickey, Matthew, Arcuri, Jennifer
Published 2020
Wiley
...--including tools developed by real-world government financed state-actors. We cover topics of breaching a...

240
by Diogenes, Yuri, Shinder, Thomas W.
Published 2018
Microsoft Press
... threat intelligence to identify known bad actors...