Home » Tag cloud » Threats
Category: E-Book
Building Communication Capacity to Counter Infectious Disease Threats: Proceedings of a Workshop

Building Communication Capacity to Counter Infectious Disease Threats: Proceedings of a Workshop
by Engineering, and Medicine National Academies of Sciences, Health and Medicine Division, Board on Global Health, Forum on Microbial Threats
English | July 3, 2017 | ASIN: B073PB15SQ | 139 Pages | PDF | 3 MB
Building communication capacity is a critical piece of preparing for, detecting, and responding to infectious disease threats. The International Health Regulations (IHR) establish risk communication-the real-time exchange of information, advice, and opinions between experts or officials and people who face a threat to their survival, health, and economic or social well-being-as a core capacity that World Health Organization member states must fulfill to strengthen the fight against these threats.
Download Now
Read More
Category: Tutorial
Cybersecurity Threats Insider Threats
Cybersecurity Threats: Insider Threats
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2 Hours | 224 MB
Genre: eLearning | Language: English
Do you have an insider threat program in your organization? Insider threats are one of the top ten threats facing organizations today. Learn how to detect insider threats and how to deploy countermeasures to protect against them.


Download Now
Read More
Category: Tutorial
Play by Play: Emerging Threats in IoT
Play by Play: Emerging Threats in IoT
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hour | 441 MB
Genre: eLearning | Language: English

n this course, you'll learn why devices are being connected, the types of security flaws that are being introduced into them, and - most importantly - how we can better protect them from future malicious attacks.
Download Now
Category: E-Book

A Civil-Military Response to Hybrid Threats

A Civil-Military Response to Hybrid Threats By Eugenio Cusumano, Marian Corbe
English | PDF | 2017 (2018 Edition) | 338 Pages | ISBN : 3319607979 | 3.99 MB
This edited volume provides scholars and practitioners with an in-depth examination of the role of civil-military cooperation in addressing hybrid threats. As they combine the simultaneous employment of conventional and non-conventional tools and target not only military objectives but governments and societies at large, hybrid threats cannot be countered solely by military means, but require an equally inclusive response encompassing a wide range of military and civilian actors.

Download Now
Read More
Category: Tutorial
Advanced Persistent Threats: The Big Picture
Advanced Persistent Threats: The Big Picture
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hours 49M | 190 MB
Genre: eLearning | Language: English

Download Now
Read More
Category: Tutorial
Security+ Certification - Threats and Vulnerabilities Domain
Security+ Certification - Threats and Vulnerabilities Domain
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 3 Hours | Lec: 20 | 927 MB
Genre: eLearning | Language: English

Download Now
Read More
Category: E-Book

Brian Minick - Facing Cyber Threats Head On Protecting Yourself and Your Business

Facing Cyber Threats Head On: Protecting Yourself and Your Business [Audiobook] by Brian Minick
English | January 16, 2017 | ASIN: B01MT6IB6O, ISBN: 1536649279, 1536649260

Download Now
Read More
Category: Tutorial
Security Threats, Principles, and Fundamentals
Security Threats, Principles, and Fundamentals
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 40M | 136 MB
Genre: eLearning | Language: English
Download Now
Category: E-Book
The Future of Drone Use Opportunities and Threats From Ethical and Legal Perspectives


The Future of Drone Use: Opportunities and Threats From Ethical and Legal Perspectives by Bart Custers
English | PDF | 394 Pages | 2016 | ISBN : 9462651310 | 3.40 MB
Given the popularity of drones and the fact that they are easy and cheap to buy, it is generally expected that the ubiquity of drones will significantly increase within the next few years. This raises questions as to what is technologically feasible (now and in the future), what is acceptable from an ethical point of view and what is allowed from a legal point of view. Drone technology is to some extent already available and to some extent still in development. The aim and scope of this book is to map the opportunities and threats associated with the use of drones and to discuss the ethical and legal issues of the use of drones.


Download Now
Read More
Category: E-Book
Privacy in the Age of Big Data Recognizing Threats, Defending Your Rights, and Protecting Your Family (EPUB)

Privacy in the Age of Big data: Recognizing Threats, Defending Your Rights, and Protecting Your Family (EPUB)
ISBN: 1442225459 | 2014 | EPUB | 276 pages | 2 MB



Download Now
Read More