Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,058
- Application software 975
- Java (Computer program language) 452
- Cloud computing 327
- Application program interfaces (Computer software) 301
- Engineering & Applied Sciences 299
- Web site development 286
- Python (Computer program language) 271
- Computer Science 250
- Computer programming 242
- JavaScript (Computer program language) 231
- Web applications 220
- Programming 191
- Computer programs 190
- Microsoft .NET Framework 179
- Computer software 175
- Design 167
- Web sites 162
- Internet programming 153
- Machine learning 145
- Artificial intelligence 140
- Mobile computing 126
- Open source software 123
- Programming languages (Electronic computers) 121
- Computer networks 120
- Android (Electronic resource) 119
- Management 114
- Data mining 109
- Software engineering 107
- Web services 101
-
2101Publicado 2020Tabla de Contenidos: “…5.2.5 Populating a blockchain wallet -- 5.2.6 Deploying and transacting on Ropsten -- 5.3 Hashing basics -- 5.3.1 Digital signing of documents -- 5.3.2 Hashed data on distributed ledger -- 5.3.3 Hashes in Ethereum block header -- 5.3.4 Solidity hashing functions -- 5.4 Application of hashing -- 5.4.1 Blind auction design -- 5.4.2 Blind auction smart contract -- 5.4.3 Privacy and security aspects -- 5.4.4 Testing the BlindAuction contract -- 5.4.5 Test plan -- 5.5 Retrospective -- 5.6 Best practices -- 5.7 Summary -- 6 On-chain and off-chain data -- 6.1 On-chain data -- 6.2 Blind auction use case -- 6.2.1 On-chain event data -- 6.2.2 Blind auction with events -- 6.2.3 Testing with the web UI -- 6.2.4 Accessing on-chain data using the web3 API -- 6.3 Off-chain data: External data sources -- 6.4 ASK airline system -- 6.4.1 ASK concept -- 6.4.2 Airlines smart contract -- 6.4.3 ASK on-chain data -- 6.4.4 ASK off-chain data -- 6.4.5 ASK Dapp development process -- 6.4.6 ASK web user interface -- 6.4.7 Putting it all together -- 6.4.8 Interacting with ASK Dapp -- 6.5 Retrospective -- 6.6 Best practices -- 6.7 Summary -- 7 Web3 and a channel Dapp -- 7.1 Web3 API -- 7.1.1 Web3 in Dapp stack -- 7.1.2 Web3 packages -- 7.2 The channel concept -- 7.3 Micropayment channel -- 7.4 Micropayment channel use case -- 7.4.1 Traditional banking solution -- 7.4.2 Users and roles -- 7.4.3 On-chain and off-chain operations -- 7.4.4 MPC smart contract (MPC-contract) -- 7.4.5 MPC application development (MPC-app) -- 7.4.6 MPC sequence diagram -- 7.4.7 Demonstration of MPC execution -- 7.4.8 Accessing the web3 provider -- 7.4.9 Extensions of MPC -- 7.4.10 The relevance of the micropayment channel -- 7.4.11 Other web3 packages of interest -- 7.5 Retrospective -- 7.6 Best practices -- 7.7 Summary -- 8 Going public with Infura -- 8.1 Nodes and networks…”
Libro electrónico -
2102por Allison, SteveTabla de Contenidos: “…WebSphere Application Server application security -- 4.1 Programmatic security -- 4.1.1 J2EE APIs -- 4.1.2 Programmatic authentication to resources -- 4.2 JAAS for application security -- 4.2.1 JAAS login verification using SWIPE -- 4.2.2 Your own JAAS application login configuration -- Chapter 5. …”
Publicado 2005
Libro electrónico -
2103por Cook, JimTabla de Contenidos: “…Setting up an iSeries server as the Backup Recovery and Media Services Application Client -- 9.1 Setting up the IBM Tivoli Storage Manager server for BRMS to use IBM Tivoli Storage Manager APIs -- 9.2 Setting up the BRMS environment for backup and restore to an IBM Tivoli Storage Manager server -- 9.2.1 First steps -- 9.2.2 Follow on steps using the 5250 interface -- 9.2.3 Follow-on steps using iSeries Navigator…”
Publicado 2003
Libro electrónico -
2104Publicado 2018Tabla de Contenidos: “…Operator 242 -- 5.9.7 Logical Operators Example 243 -- 5.10 Structured-Programming Summary 245 -- 5.11 (Optional) GUI and Graphics Case Study: Drawing Rectangles and Ovals 250 -- 5.12 Wrap-Up 253 -- 6 Methods: A Deeper Look 264 -- 6.1 Introduction 265 -- 6.2 Program Units in Java 265 -- 6.3 static Methods, static Fields and Class Math 267 -- 6.4 Methods with Multiple Parameters 269 -- 6.5 Notes on Declaring and Using Methods 273 -- 6.6 Method-Call Stack and Activation Records 274 -- 6.6.1 Method-Call Stack 274 -- 6.6.2 Stack Frames 274 -- 6.6.3 Local Variables and Stack Frames 274 -- 6.6.4 Stack Overflow 275 -- 6.7 Argument Promotion and Casting 275 -- 6.8 Java API Packages 276 -- 6.9 Case Study: Secure Random-Number Generation 278 -- 6.10 Case Study: A Game of Chance -- Introducing enum Types 283 -- 6.11 Scope of Declarations 288 -- 6.12 Method Overloading 290 -- 6.12.1 Declaring Overloaded Methods 290 -- 6.12.2 Distinguishing Between Overloaded Methods 291 -- 6.12.3 Return Types of Overloaded Methods 292 -- 6.13 (Optional) GUI and Graphics Case Study: Colors and Filled Shapes 292.…”
Libro electrónico -
2105Publicado 2021Tabla de Contenidos: “…-- ¿CÓMO COMPROBAR QUE ESTÁ BIEN INSTALADO? -- LA API DE CONVERSIONES -- EVENTOS AGREGADOS…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
2106Publicado 2018Tabla de Contenidos: “…Implementing basic RNNs in TensorFlow -- RNN and the long-term dependency problem -- Bi-directional RNNs -- RNN and the gradient vanishing-exploding problem -- LSTM networks -- GRU cell -- Implementing an RNN for spam prediction -- Data description and preprocessing -- Developing a predictive model for time series data -- Description of the dataset -- Pre-processing and exploratory analysis -- LSTM predictive model -- Model evaluation -- An LSTM predictive model for sentiment analysis -- Network design -- LSTM model training -- Visualizing through TensorBoard -- LSTM model evaluation -- Human activity recognition using LSTM model -- Dataset description -- Workflow of the LSTM model for HAR -- Implementing an LSTM model for HAR -- Summary -- Chapter 7: Heterogeneous and Distributed Computing -- GPGPU computing -- The GPGPU history -- The CUDA architecture -- The GPU programming model -- The TensorFlow GPU setup -- Update TensorFlow -- GPU representation -- Using a GPU -- GPU memory management -- Assigning a single GPU on a multi-GPU system -- The source code for GPU with soft placement -- Using multiple GPUs -- Distributed computing -- Model parallelism -- Data parallelism -- The distributed TensorFlow setup -- Summary -- Chapter 8: Advanced TensorFlow Programming -- tf.estimator -- Estimators -- Graph actions -- Parsing resources -- Flower predictions -- TFLearn -- Installation -- Titanic survival predictor -- PrettyTensor -- Chaining layers -- Normal mode -- Sequential mode -- Branch and join -- Digit classifier -- Keras -- Keras programming models -- Sequential model -- Functional API -- Summary -- Chapter 9: Recommendation Systems Using Factorization Machines -- Recommendation systems -- Collaborative filtering approaches -- Content-based filtering approaches -- Hybrid recommender systems -- Model-based collaborative filtering…”
Libro electrónico -
2107Publicado 2018Tabla de Contenidos: “…Index out of the range -- Image not found in the provided timeout -- Click Generic error - cannot use UI CONTROL API on this UI node please use UI Hardware ELEMENTS method -- Logging and taking screenshots -- Client logging -- Server logging -- Debugging techniques -- Setting breakpoints -- Slow step -- Highlighting -- Break -- Collecting crash dumps -- Enabling crash dumps -- Disabling crash dumps -- Error reporting -- Enterprise Edition customers -- Community Edition users -- Summary -- Managing and Maintaining the Code -- Project organization -- Picking an appropriate layout for each workflow -- Blank -- Simple process -- Agent process improvement -- Transactional business process -- Breaking the process into smaller parts -- Using exception handling -- Making your workflow readable -- Keeping it clean…”
Libro electrónico -
2108Publicado 2018Tabla de Contenidos: “…. -- See also -- Making requests to APIs -- How to do it... -- How it works... -- There's more... -- See also -- Chapter 10: Using Experimental Nightly Features -- Introduction -- Iterating over an inclusive range -- How to do it... -- How it works... -- See also -- Returning abstract types -- How to do it... -- How it works... -- There's more... -- See also -- Composing functions -- How to do it... -- How it works... -- See also -- Filtering strings efficiently -- How to do it... -- How it works... -- See also -- Stepping through an iterator in regular intervals -- How to do it... -- How it works... -- See also -- Benchmarking your code -- How to do it... -- How it works... -- There's more... -- See also -- Using generators -- How to do it... -- How it works... -- See also -- Other Books You May Enjoy -- Index…”
Libro electrónico -
2109Publicado 2016Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewer -- www.PacktPub.com -- Table of Contents -- Preface -- Chapter 1: Spark for Machine Learning -- Spark overview and Spark advantages -- Spark overview -- Spark advantages -- Spark computing for machine learning -- Machine learning algorithms -- MLlib -- Other ML libraries -- Spark RDD and dataframes -- Spark RDD -- Spark dataframes -- Dataframes API for R -- ML frameworks, RM4Es and Spark computing -- ML frameworks -- RM4Es -- The Spark computing framework -- ML workflows and Spark pipelines -- ML as a step-by-step workflow -- ML workflow examples -- Spark notebooks -- Notebook approach for ML -- Step 1: Getting the software ready -- Step 2: Installing the Knitr package -- Step 3: Creating a simple report -- Spark notebooks -- Summary -- Chapter 2: Data Preparation for Spark ML -- Accessing and loading datasets -- Accessing publicly available datasets -- Loading datasets into Spark -- Exploring and visualizing datasets -- Data cleaning -- Dealing with data incompleteness -- Data cleaning in Spark -- Data cleaning made easy -- Identity matching -- Identity issues -- Identity matching on Spark -- Entity resolution -- Short string comparison -- Long string comparison -- Record deduplication -- Identity matching made better -- Crowdsourced deduplication -- Configuring the crowd -- Using the crowd -- Dataset reorganizing -- Dataset reorganizing tasks -- Dataset reorganizing with Spark SQL -- Dataset reorganizing with R on Spark -- Dataset joining -- Dataset joining and its tool - the Spark SQL -- Dataset joining in Spark -- Dataset joining with the R data table package -- Feature extraction -- Feature development challenges -- Feature development with Spark MLlib -- Feature development with R -- Repeatability and automation -- Dataset preprocessing workflows…”
Libro electrónico -
2110Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Getting Started with Robot Operating System -- Technical requirements -- Introduction to ROS -- ROS concepts -- The ROS filesystem -- The ROS Computation Graph -- The ROS community level -- Installing ROS on Ubuntu -- Introducing catkin -- Creating a ROS package -- Hello_world_publisher.py -- Hello_world_subscriber.py -- Introducing Gazebo -- Installing Gazebo -- Testing Gazebo with the ROS interface -- Summary -- Questions -- Chapter 2: Understanding the Basics of Differential Robots -- Mathematical modeling of the robot -- Introduction to the differential drive system and robot kinematics -- Forward kinematics of a differential robot -- Explanations of the forward kinematics equation -- Inverse kinematics -- Summary -- Questions -- Further information -- Chapter 3 : Modeling the Differential Drive Robot -- Technical requirements -- Requirements of a service robot -- Robot drive mechanism -- Selection of motors and wheels -- Calculation of RPM of motors -- Calculation of motor torque -- The design summary -- The robot chassis design -- Installing LibreCAD, Blender, and MeshLab -- Installing LibreCAD -- Installing Blender -- Installing MeshLab -- Creating 2D CAD drawing of a robot using LibreCAD -- The base plate designs -- Base plate pole design -- Wheel, motor, and motor clamp design -- Caster wheel design -- Middle plate design -- Top plate design -- Working with a 3D model of the robot using Blender -- Python scripting in Blender -- Introduction to Blender Python APIs -- Python script of the robot model -- Creating a URDF model of the robot -- Creating a Chefbot description ROS package -- Summary -- Questions -- Further reading -- Chapter 4: Simulating a Differential Drive Robot Using ROS…”
Libro electrónico -
2111Publicado 2024Tabla de Contenidos: “…Penetration testing -- Summary -- References -- Chapter 8: Securing the Software Supply Chain -- Software supply chain and distributed development -- Overview of the software supply chain -- RASIC, vendor security assessments, and CIADs -- RASIC -- Vendor security assessments -- CIADs -- Managing risks with OSS -- Security vulnerabilities -- License compliance -- Operational risk -- SBOM -- SBOM formats -- Executive Order 14028 -- NTIA -- OpenChain -- Secure software supply chain risk management -- Identifying the risks -- Assessing the risks -- Mitigating the risks -- Summary -- References -- Part 4: Automotive IoT Application Life Cycle -- Chapter 9: System Design of an Automotive IoT Application -- System design process overview -- UXDD -- Use case - remote diagnostics -- System components -- Vehicle telematics gateway -- Vehicle cloud platform -- End-user mobile device -- Gateway design considerations -- GNSS receivers -- Wireless communication -- Wired communication -- CAN -- Sensors -- SIM/eSIM -- Gateway hardware -- Cloud design considerations -- Device management -- Connectivity management -- Remote diagnostics applications -- Classic vehicle ECU diagnostics -- Service-oriented vehicle diagnostics -- Regulatory compliance -- Build versus buy -- Summary -- References -- Chapter 10: Developing an Automotive IoT Application -- Cloud backend deployment and service models -- Deployment models -- Service models -- Server-based and serverless computing -- IoT application architecture -- Cloud device gateway -- Edge computing -- Stream processing -- Device management -- OTA solutions -- Telemetry datastore -- Rule engine -- Application Programming Interface (API) gateway -- Connectivity management -- IAM -- Vehicle telematics gateway -- Remote diagnostics application -- Predictive maintenance -- Development process -- Summary -- References…”
Libro electrónico -
2112Publicado 2018Tabla de Contenidos: “…-- Learning - supervised, unsupervised, and reinforcement -- RL formalisms and relations -- Reward -- The agent -- The environment -- Actions -- Observations -- Markov decision processes -- Markov process -- Markov reward process -- Markov decision process -- Summary -- Chapter 2 - OpenAI Gym -- The anatomy of the agent -- Hardware and software requirements -- OpenAI Gym API -- Action space -- Observation space -- The environment -- Creation of the environment -- The CartPole session -- The random CartPole agent -- The extra Gym functionality - wrappers and monitors -- Wrappers -- Monitor -- Summary -- Chapter 3 - Deep Learning with PyTorch -- Tensors -- Creation of tensors -- Scalar tensors -- Tensor operations -- GPU tensors -- Gradients -- Tensors and gradients -- NN building blocks -- Custom layers -- Final glue - loss functions and optimizers -- Loss functions -- Optimizers -- Monitoring with TensorBoard -- TensorBoard 101 -- Plotting stuff -- Example - GAN on Atari images -- Summary -- Chapter 4 - The Cross-Entropy Method -- Taxonomy of RL methods -- Practical cross-entropy -- Cross-entropy on CartPole -- Cross-entropy on FrozenLake -- Theoretical background of the cross-entropy method -- Summary -- Chapter 5 - Tabular Learning and the Bellman Equation -- Value, state, and optimality -- The Bellman equation of optimality -- Value of action -- The value iteration method -- Value iteration in practice -- Q-learning for FrozenLake -- Summary -- Chapter 6 - Deep Q-Networks -- Real-life value iteration -- Tabular Q-learning -- Deep Q-learning -- Interaction with the environment -- SGD optimisation -- Correlation between steps -- The Markov property -- The final form of DQN training -- DQN on Pong -- Wrappers…”
Libro electrónico -
2113Publicado 2021Tabla de Contenidos: “…Cover -- Copyright -- Contributors -- Table of Contents -- Preface -- Chapter 1: Getting to Know Your Environment -- Technical requirements -- Getting started with Unity 2021 -- Using macOS -- Creating a new project -- Navigating the editor -- Using C# with Unity -- Working with C# scripts -- Introducing the Visual Studio editor -- Opening a C# file -- Beware of naming mismatches -- Syncing C# files -- Exploring the documentation -- Accessing Unity's documentation -- Locating C# resources -- Summary -- Pop quiz - dealing with scripts -- Chapter 2: The Building Blocks of Programming -- Defining variables -- Names are important -- Variables act as placeholders -- Understanding methods -- Methods drive actions -- Methods are placeholders too -- Introducing classes -- A common Unity class -- Classes are blueprints -- Communication among classes -- Working with comments -- Single-line comments -- Multi-line comments -- Adding comments -- Putting the building blocks together -- Scripts become components -- A helping hand from MonoBehaviour -- Hero's trial - MonoBehaviour in the Scripting API -- Summary -- Pop quiz - C# building blocks -- Chapter 3: Diving into Variables, Types, and Methods -- Writing proper C# -- Debugging your code -- Understanding variables -- Declaring variables -- Type and value declarations -- Type-only declarations -- Using access modifiers -- Working with types -- Common built-in types -- Type conversions -- Inferred declarations -- Custom types -- Naming variables -- Understanding variable scope -- Introducing operators -- Arithmetic and assignments -- Defining methods -- Declaring methods -- Naming conventions -- Methods as logic detours -- Specifying parameters -- Specifying return values -- Using return values -- Hero's trial - methods as arguments -- Dissecting common Unity methods -- The Start method -- The Update method…”
Libro electrónico -
2114Publicado 2023Tabla de Contenidos: “…VDR -- Moving Forward -- Using SBOM with Other Attestations -- Source Authenticity -- Build Attestations -- Dependency Management and Verification -- Sigstore -- Adoption -- Sigstore Components -- Commit Signing -- SBOM Critiques and Concerns -- Visibility for the Attacker -- Intellectual Property -- Tooling and Operationalization -- Summary -- Chapter 5 Challenges in Software Transparency -- Firmware and Embedded Software -- Linux Firmware -- Real-Time Operating System Firmware -- Embedded Systems -- Device-Specific SBOM -- Open Source Software and Proprietary Code -- User Software -- Legacy Software -- Secure Transport -- Summary -- Chapter 6 Cloud and Containerization -- Shared Responsibility Model -- Breakdown of the Shared Responsibility Model -- Duties of the Shared Responsibility Model -- The 4 Cs of Cloud Native Security -- Containers -- Kubernetes -- Serverless Model -- SaaSBOM and the Complexity of APIs -- CycloneDX SaaSBOM -- Tooling and Emerging Discussions -- Usage in DevOps and DevSecOps -- Summary -- Chapter 7 Existing and Emerging Commercial Guidance -- Supply Chain Levels for Software Artifacts -- Google Graph for Understanding Artifact Composition -- CIS Software Supply Chain Security Guide -- Source Code -- Build Pipelines -- Dependencies -- Artifacts -- Deployment -- CNCF's Software Supply Chain Best Practices -- Securing the Source Code -- Securing Materials -- Securing Build Pipelines -- Securing Artifacts -- Securing Deployments…”
Libro electrónico -
2115Publicado 2009Tabla de Contenidos: “…-- 1.2 The JavaFX Bundle -- JavaFX SDK -- NetBeans IDE -- JavaFX Production Suite -- 1.3 Where to Get JavaFX -- Create a NetBeans Project -- Edit JavaFX Source Code -- Compile and Run -- Execution Models -- Chapter 2 A Taste of JavaFX -- What You Will Learn -- 2.1 Introducing JavaFX -- 2.2 Project GuitarTuner -- The Scene Graph Metaphor -- Hierarchical Scene Graph -- 2.3 JavaFX Program Structure -- Stage and Scene -- Object Literals -- 2.4 Key JavaFX Features -- Type Inference -- Strings -- Shapes -- Sequences -- Calling Java APIs -- Extending CustomNode -- Geometry System -- Layout/Groups -- JavaFX Script Artifacts -- 2.5 Making Things Look Good -- Gradients -- Color -- Rectangles with Arcs -- DropShadows -- 2.6 Doing Things -- Binding -- Mouse Events -- Animations -- 2.7 Source Code for Project GuitarTuner -- Chapter 3 JavaFX Language -- What You Will Learn -- 3.1 Variables and Types -- JavaFX Types -- Printing Variables -- Pseudo Variables -- 3.2 Operators -- Arithmetic Operators -- Assignment Operators -- Unary Operators -- Relational Operators -- Logical Operators -- Instanceof Operator -- 3.3 Expressions -- Block Expressions -- If Expressions -- For Expressions -- While Expressions -- Break and Continue -- Binding Expressions -- Bidirectional Binding -- 3.4 Sequences -- Sequence Literals -- Printing Sequences -- Creating Sequences with for -- Accessing Sequence Items -- Inserting Items into Sequences -- Deleting Items from Sequences -- Comparing Sequences -- Sequence Slices -- Predicates -- Binding Sequences -- 3.5 Functions -- Defining Functions -- Passing Arguments to Functions -- Returning Values from Functions -- Binding Function Calls -- Bound Functions -- Program Arguments -- Function Types…”
Libro electrónico -
2116Publicado 2010Tabla de Contenidos: “…Creating the MediaPlayer Application -- Playing System Sounds -- Playing Audio Files -- Playing Movie Files -- Background Processes -- Other forms of background execution -- Low-level APIs -- Challenge: Audio Recording -- 21. Web Services -- Creating the TopSongs Application -- Setting up the interface -- Fetching Data From a URL -- Working with NSURLConnection -- Parsing XML -- For the More Curious: The Request Body -- Challenge: More Data -- For the More Curious: Credentials -- 22. …”
Libro electrónico -
2117Publicado 2011Tabla de Contenidos: “…-- Isolated Storage -- Saving and Loading Data -- The IsolatedStorageFile Object -- XNA Game Studio Storage -- Recreating the Project on Xbox -- Devices and Containers -- Getting a Device -- Looking at the API -- Loading Loose Files from Your Project -- Summary -- 15 Gamer Services -- GamerServicesComponent -- Guide Class -- Trial Mode -- Now the Bad News -- Platform-Specific Guide Functionality -- Gamers and Profiles -- GameDefaults -- Presence -- Privileges…”
Libro electrónico -
2118Publicado 2016Tabla de Contenidos: “…VII -- About the Guest Editors.XI -- Preface to "Ecological Monitoring, Assessment, and Management in Freshwater Systems" .XIII -- Young-Seuk Park and Soon-Jin Hwang Ecological Monitoring, Assessment, and Management in Freshwater Systems Reprinted from: Water 2016, 8(8), 324 http://www.mdpi.com/2073-4441/8/8/3241 -- Jens Arle, Volker Mohaupt and Ingo Kirst Monitoring of Surface Waters in Germany under the Water Framework Directive-A Review of Approaches, Methods and Results Reprinted from: Water 2016, 8(6), 217 http://www.mdpi.com/2073-4441/8/6/2178 -- Meilan Jiang, Karpjoo Jeong, Jung-Hwan Park, Nan-Young Kim, Soon-Jin Hwang and Sang-Hun Kim Open, Sharable, and Extensible Data Management for the Korea National Aquatic Ecological Monitoring and Assessment Program: A RESTful API-Based Approach Reprinted from: Water 2016, 8(5), 201 http://www.mdpi.com/2073-4441/8/5/20139 -- Byungwoong Choi, Sung-Uk Choi and Hojeong Kang Transferability of Monitoring Data from Neighboring Streams in a Physical Habitat Simulation Reprinted from: Water 2015, 7(8), 4537-4551 http://www.mdpi.com/2073-4441/7/8/453774 -- Bin Li, Kozo Watanabe, Dong-Hwan Kim, Sang-Bin Lee, Muyoung Heo, Heui-Soo Kim and Tae-Soo Chon Identification of Outlier Loci Responding to Anthropogenic and Natural Selection Pressure in Stream Insects Based on a Self-Organizing Map Reprinted from: Water 2016, 8(5), 188 http://www.mdpi.com/2073-4441/8/5/18890 -- Yung-Chul Jun, Nan-Young Kim, Sang-Hun Kim, Young-Seuk Park, Dong-Soo Kong and Soon-Jin Hwang Spatial Distribution of Benthic Macroinvertebrate Assemblages in Relation to Environmental Variables in Korean Nationwide Streams Reprinted from: Water 2016, 8(1), 27 http://www.mdpi.com/2073-4441/8/1/27120 -- Mateusz Grygoruk, Magdalena Frąk and Aron Chmielewski Agricultural Rivers at Risk: Dredging Results in a Loss of Macroinvertebrates. …”
Libro electrónico -
2119Publicado 2024Tabla de Contenidos: “…-- Microsoft Defender Vulnerability Management -- Microsoft Defender for Cloud -- Microsoft Sentinel -- Microsoft Copilot for Security -- Integration with other tools -- ServiceNow integration -- Intune/MDE remediation (native integration capability) -- API integrations and automation -- Case study analysis -- Summary -- Further reading -- Chapter 7: Understanding Microsoft Secure Score -- What is Microsoft Secure Score? …”
Libro electrónico -
2120Publicado 2024Tabla de Contenidos: “…Microsoft 365's Security and Compliance Center (Microsoft Purview) -- Google Workspace Admin console and security features -- Summary -- Further reading -- Part 3: Cloud Forensic Analysis - Responding to an Incident in the Cloud -- Chapter 8: The Digital Forensics and Incident Response Process -- The basics of the incident response process -- Tools and techniques for digital forensic investigations -- Prerequisites -- Cloud host forensics -- Memory forensics -- Live forensic analysis and threat hunting -- EDR-based threat hunting -- Hunting for malware -- Common persistence mechanisms -- Network forensics -- Basic networking concepts -- Cloud network forensics - log sources and tools -- Network investigation tools -- Malware investigations -- Setting up your malware analysis lab -- Working with packed malware -- Binary comparison -- Traditional forensics versus cloud forensics -- Summary -- Further reading -- Chapter 9: Common Attack Vectors and TTPs -- MITRE ATT& -- CK framework -- Forensic triage collections -- Host-based forensics -- Evidence of intrusion -- Prefetch analysis -- AmCache analysis -- ShimCache analysis -- Windows Event Logs -- Analyzing memory dumps -- Misconfigured virtual machine instances -- Unnecessary ports left open -- Default credentials left unchanged -- Outdated or unpatched software -- Publicly exposed sensitive data (or metadata) -- Misconfigured storage buckets -- Public permissions -- Exposed API keys or credentials -- Improper use of IAM policies -- Cloud administrator portal breach -- Summary -- Further reading -- Chapter 10: Cloud Evidence Acquisition -- Forensic acquisition of AWS instance -- Step 1 - creating EC2 volume snapshots -- Step 2 - acquiring OS memory images -- Step 3 - creating a forensic collector instance -- Step 4 - creating and attaching infected volume from snapshots…”
Libro electrónico