1
by Calderon, Paulino
Published 2021
Packt Publishing
Table of Contents: ... Pipelining, and Web Crawling Configuration Options Appendix B - Brute Force Password Auditing Options...

2
by Boorshtein, Marc
Published 2020
Packt Publishing
... for testing applications and Kubernetes components, and be able to secure and audit a cluster by implementing...

3
by David, A. P.
Published 2021
Packt Publishing

4
by Abraham, Tim
Published 2020
Packt Publishing

5
by Kavis, Michael
Published 2020
O'Reilly Media, Inc.
Table of Contents: ... -- Chapter 3. People -- T-Shaped Teams -- Cloud Is Bigger than Just IT -- Auditing and Finance -- Procurement...

6
by Dreyfus-Schmidt, Léo
Published 2020
O'Reilly Media, Inc.
Table of Contents: ... and Auditability -- Machine Learning Security -- Adversarial Attacks -- Other Vulnerabilities -- Model Risk...

7
by Ramamurthy, Bina
Published 2020
Manning Publications
Table of Contents: ... -- 1.4.4 Auditable actions for provenance -- 1.4.5 Guidance for governance -- 1.4.6 Attribution of actions...

8 Table of Contents: ...Vulnerability Testing -- Auditing -- Vulnerabilities -- Chapter 16 Review -- Chapter 17 Web...

9
by Hsu, Vincent
Published 2021
IBM Redbooks
... with support and services teams when required. There also is a need to audit critical resource access...

10
by Lorenz, Simon
Published 2020
IBM Redbooks
... audits. This paper also describes IBM Spectrum® LSF® as a workload manager and IBM Spectrum Discover as a...