LEADER 01425nam 2200253la 450 001 9910482301803321 005 20221108040358.0 035 $a(UK-CbPIL)2090362158 035 $a(CKB)5500000000090154 035 $a(EXLCZ)995500000000090154 100 $a20210618d1622 uy | 101 0 $adut 135 $aurcn||||a|bb| 200 10$aBeschryvinghe van Albrecht Dvrer, van de menschelijcke proportion begrepen in vier onderscheyden boecken, zeer nut ende profijtelijck voor alle liefhebbers deser konste in 't Lat?n ende Hooghduytsch, tot Nurenbergh ghedruckt, tot koste van syne nae-ghelaten weduvve, in 't iaer ons Heeren 1527 ende nu in onse Nederlandsche sprake over-gheset ..$b[electronic resource] 210 $aArnhem $cJan Jansz$d1622 215 $aOnline resource (2°) 300 $aReproduction of original in Koninklijke Bibliotheek, Nationale bibliotheek van Nederland. 700 $aDürer$b Albrecht$f1471-1528.$0399465 801 0$bUk-CbPIL 801 1$bUk-CbPIL 906 $aBOOK 912 $a9910482301803321 996 $aBeschryvinghe van Albrecht Dvrer, van de menschelijcke proportion begrepen in vier onderscheyden boecken, zeer nut ende profijtelijck voor alle liefhebbers deser konste in 't Lat?n ende Hooghduytsch, tot Nurenbergh ghedruckt, tot koste van syne nae-ghelaten weduvve, in 't iaer ons Heeren 1527 ende nu in onse Nederlandsche sprake over-gheset .$91979118 997 $aUNINA LEADER 04693nam 2200421 450 001 9910677930303321 005 20230629222925.0 010 $a1-119-28747-2 010 $a1-119-28748-0 010 $a1-119-28749-9 035 $a(CKB)4330000000009978 035 $a(MiAaPQ)EBC6466104 035 $a(OCoLC)1150807269 035 $a(EXLCZ)994330000000009978 100 $a20210316d2021 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aApplied risk analysis for guiding homeland security policy and decisions /$fedited by Samrat Chatterjee, Robert T. Brigantic, Angela M. Waterworth 210 1$aHoboken, New Jersey :$cWiley,$d[2021] 210 4$dİ2021 215 $a1 online resource (xxxvi, 492 pages) $cillustrations, maps 311 $a1-119-28746-4 327 $aOn the "influence of scenarios to priorities" in risk and security programs / Heimir Thorisson, James H. Lambert -- Survey of risk analytic guidelines across the government / Isaac Maya, Lily Doyle, Amelia Liu, Francine Tran, Robert Creighton, Charles Woo -- An overview of risk modeling methods and approaches for national security / Samrat Chatterjee, Robert T. Brigantic, Angela M. Waterworth -- Comparative risk rankings in support of homeland security strategic plans / Russell Lundberg -- A data science workflow for discovering spatial patterns among terrorist attacks and infrastructure / Daniel Fortin, Thomas Johansen, Samrat Chatterjee, George Muller, Christine Noonan -- Effects of credibility of retaliation threats in deterring smuggling of nuclear weapons / Xiaojun Shan, Jun Zhuang -- Disutility of mass relocation after a severe nuclear accident / Vicki M. Bier, Shuji Liu -- Scheduling federal air marshals under uncertainty / Keith W. DeGregory, Rajesh Ganesan -- Decision theory for network security : active sensing for detection and prevention of data exfiltration / Sara M. McCarthy, Arunesh Sinha, Milind Tambe, Pratyusa Manadhatha -- Measurement of cyber resilience from an economic perspective / Adam Z. Rose, Noah Miller -- Responses to cyber near-misses : a scale to measure individual differences / Jinshu Cui, Heather Rosoff, Richard S. John -- An interactive web-based decision support system for mass dispensing, emergency preparedness, and biosurveillance / Eva K. Lee, Ferdinand H. Pietz, Chien-Hung Chen, Yifan Liu -- Critical infrastructure risk assessments : measuring critical infrastructure protection and resilience in an all-hazards environment / Julia Phillips, Fre?de?ric Petit -- Risk analysis methods in resilience modeling : an overview of critical infrastructure applications / Hiba Baroud -- Optimal resource allocation model to prevent, prepare, and respond to multiple disruptions, with application to the Deepwater Horizon oil spill and Hurricane Katrina / Cameron A. MacKenzie, Amro Al-Kazimi -- Inoperability input-output modeling of electric power disruptions / Joost R. Santos, Sheree Ann Pagsuyoin, Christian Yip -- Quantitative assessment of transportation network vulnerability with dynamic traffic simulation methods / Venkateswaran Shekar, Lance Fiondella -- Infrastructure monitoring for health and security / Prodyot K. Basu -- Exploring metaheuristic approaches for solving the traveling salesman problem applied to emergency planning and response / Ramakrishna Tipireddy, Javier Rubio-Herrero, Samrat Chatterjee, Satish Chikkagoudar, George Muller. 330 $a"Risk analysis is the process of defining and analyzing various dangers to individuals, businesses, and government agencies posed by potential adverse events. Risk analysis is often divided into two parts: risk assessment, which includes identifying, evaluating, and measuring the probability and severity of risks; and risk management, which involves deciding what to do about the risks. In the context of government agencies, defending a country against threats raises new challenges and opportunities for risk analysis. It is both vital and challenging to effectively assess and manage risks to national security, and as such, government agencies require cutting-edge risk analytic techniques to inform a range of prioritization, strategy, and policy decisions"--$cProvided by publisher. 676 $a363.345610973 702 $aChatterjee$b Samrat$f1980- 702 $aBrigantic$b Robert T. 702 $aWaterworth$b Angela M. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910677930303321 996 $aApplied risk analysis for guiding homeland security policy and decisions$93063685 997 $aUNINA LEADER 03366nam 22005535 450 001 9910338004803321 005 20230804142014.0 010 $a9781484245040 010 $a1484245040 024 7 $a10.1007/978-1-4842-4504-0 035 $a(CKB)4930000000042200 035 $a(MiAaPQ)EBC5742868 035 $a(DE-He213)978-1-4842-4504-0 035 $a(CaSebORM)9781484245040 035 $a(PPN)235234982 035 $a(OCoLC)1179144117 035 $a(OCoLC)on1179144117 035 $a(EXLCZ)994930000000042200 100 $a20190330d2019 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPowerShell and Python Together $eTargeting Digital Investigations /$fby Chet Hosmer 205 $a1st ed. 2019. 210 1$aBerkeley, CA :$cApress :$cImprint: Apress,$d2019. 215 $a1 online resource (223 pages) 311 08$a9781484245033 311 08$a1484245032 320 $aIncludes bibliographical references. 327 $aChapter 1: An Introduction to PowerShell for Investigators -- Chapter 2: PowerShell Pipelining -- Chapter 3: PowerShell Scripting Targeting Investigation -- Chapter 4: Python and Live Investigation/Acquisition -- Chapter 5: PowerShell / Python Investigation Example -- Chapter 6: Launching Python from PowerShell -- Chapter 7: Loose Ends and Future Considerations -- Appendix: Challenge Problem Solutions -- . 330 $aBring together the Python programming language and Microsoft?s PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators. You will learn how to join PowerShell's robust set of commands and access to the internals of both the MS Windows desktop and enterprise devices and Python's rich scripting environment allowing for the rapid development of new tools for investigation, automation, and deep analysis. PowerShell and Python Together takes a practical approach that provides an entry point and level playing field for a wide range of individuals, small companies, researchers, academics, students, and hobbyists to participate. What You?ll Learn: Leverage the internals of PowerShell for: digital investigation, incident response, and forensics Leverage Python to exploit already existing PowerShell CmdLets and aliases to build new automation and analysis capabilities Create combined PowerShell and Python applications that provide: rapid response capabilities to cybersecurity events, assistance in the precipitous collection of critical evidence (from the desktop and enterprise), and the ability to analyze, reason about, and respond to events and evidence collected across the enterprise. 606 $aData protection 606 $aPython (Computer program language) 606 $aData and Information Security 606 $aPython 615 0$aData protection. 615 0$aPython (Computer program language) 615 14$aData and Information Security. 615 24$aPython. 676 $a005.282 700 $aHosmer$b Chet$4aut$4http://id.loc.gov/vocabulary/relators/aut$0865893 801 0$bUMI 801 1$bUMI 906 $aBOOK 912 $a9910338004803321 996 $aPowerShell and Python Together$92514891 997 $aUNINA