Zobrazeno 1 - 10
of 358
pro vyhledávání: '"J, Stieber"'
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Therese E. Johnston, Rachael V Koppel, Donald J Stieber, Samuel A Oliver, Tiara A Baskins, Lisa T. Hoglund
Background The knee is susceptible to injury during cycling due to the repetitive nature of the activity while generating torque on the pedal. Knee pain is the most common overuse related injury reported by cyclists, and intrinsic and extrinsic facto
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::71de7e39e22da1887a55335c14127ea3
https://europepmc.org/articles/PMC5717478/
https://europepmc.org/articles/PMC5717478/
Whether you want to break into information security, move from one job to another, or transition into management, Breaking into Information Security will help. No other book surveys all the different jobs available in the industry, frankly discusses
A Trainer-Educator is not an information security-specific role, but is particularly important in information security. Basic information technology skills are now so widespread and expected that most organizations do not bother teaching these skills
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::54507bc3e08bfc66a4b08b8eef2da2b5
https://doi.org/10.1016/b978-0-12-800783-9.00015-x
https://doi.org/10.1016/b978-0-12-800783-9.00015-x
Patch management is a component of configuration management where you are responsible for ensuring that patches are applied to computers, as directed by a company’s policies and procedures. You will have difficulty getting out of this role if you s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6fb4ba16049f35d9cf5112e8c91d374c
https://doi.org/10.1016/b978-0-12-800783-9.00006-9
https://doi.org/10.1016/b978-0-12-800783-9.00006-9
As a security facilitator, one is responsible for ensuring that their part of a project is implemented. Though their primary role is as an organizer, there may be the need to help with the tasks. Their job is to make sure it gets done, by making sure
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::81fcb1d2fc133043f339f4f28c13d1a2
https://doi.org/10.1016/b978-0-12-800783-9.00030-6
https://doi.org/10.1016/b978-0-12-800783-9.00030-6
The career path of penetration tester is what comes to mind for many when they think about careers in information security. There are many challenges associated with this career, and there are many technical skills required in order to do the job wel
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5a4b5fd28d90a26c0ea92b166fb2208a
https://doi.org/10.1016/b978-0-12-800783-9.00020-3
https://doi.org/10.1016/b978-0-12-800783-9.00020-3
Tiger Teams, also known as Red Teams, are well staffed and well funded groups activated during particularly nasty incidents and will often be sent into the line of fire. On the positive side, you will be working with the best people in the world as y
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1ce5a559628a3f3b3f1ff22ff9e49a77
https://doi.org/10.1016/b978-0-12-800783-9.00052-5
https://doi.org/10.1016/b978-0-12-800783-9.00052-5
As a developer in an open-source project you will be able to expand a wide range of skills. Not only does the improvement of these skills help your employability, the ability to show accomplishments in these areas provides items that you can referenc
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::93cdc5811e459d7cb8e6795695e4d471
https://doi.org/10.1016/b978-0-12-800783-9.00063-x
https://doi.org/10.1016/b978-0-12-800783-9.00063-x