Mostrando 2,261 - 2,280 Resultados de 4,542 Para Buscar '"Apiés"', tiempo de consulta: 0.09s Limitar resultados
  1. 2261
    Publicado 2022
    “…Learn to build greedy algorithms, then convert them to microservices and finally containerized them and deploy to AWS with App Runner. 00:00 Intro 00:38 Github Code Repo of Traveling Salesman Problem 02:00 Overview of Cities in Problem 04:50 Launching Github Codespaces to work on problem 06:30 Cleaning up the code and fixing Makefile and Lint 09:30 Running simulations and minimizing the cost 14:00 Pinning version numbers in requirements.txt 16:00 Setup Github Actions 19:00 Fixing Python Black error 21:32 Create Github Actions Status Badge 25:00 Creating FastAPI Microservice 28:00 Building Greedy Coin Change Microservice 36:00 Deploying Python FastAPI Microservice to AWS with App Runner 46:00 Theory of logic to containerization 51:00 Building Containerized C# Service in AWS Cloud9 and App Runner 01:03:44 Testing via Curl in AWS CloudShell 01:06:00 Building Containerized FastAPI Service in AWS Cloud9 and App Runner 01:11:03 Pushing to Amazon ECR 01:14:00 Testing via FastAPI App Runner API with Swagger UI…”
    Video
  2. 2262
    por Ardizzone, P.
    Publicado 1947
    Libro
  3. 2263
    por SCAVIA, Juan
    Publicado 1946
    Otros
  4. 2264
    Publicado 1989
    Libro
  5. 2265
    por Berg, R.
    Capítulo
  6. 2266
    Capítulo
  7. 2267
    Capítulo
  8. 2268
    Publicado 1989
    991007409529706719
  9. 2269
    Publicado 1983
    Revista
  10. 2270
    Publicado 2024
    Tabla de Contenidos: “…Implementing CRUD operations -- CRUD operations of items -- Adding a new item -- Editing or deleting an item -- CRUD operations of fields -- Refactoring Razor components -- Creating the Navbar component -- Creating a Dropdown component for the context menu -- Using templated components -- Creating a ListView component -- Using the ListView component -- Accessing a native API from Blazor Hybrid apps -- Summary -- Part 3: Testing and Deployment -- Chapter 11: Developing Unit Tests -- Technical requirements -- Unit testing in .NET -- Setting up the unit test project -- Developing test cases for the model -- Sharing context between tests -- Sharing using a constructor -- Sharing using class fixtures -- Sharing using collection fixtures -- Mock .NET MAUI components -- Razor component testing using bUnit -- Changing the project configuration for bUnit -- Creating a bUnit test case -- Creating test cases in Razor files -- Using the RenderFragment delegate -- Testing Razor pages -- Summary -- Further reading -- Chapter 12: Deploying and Publishing in App Stores -- Technical requirements -- Preparing application packages for publishing -- Preparing for publishing -- Publishing to Microsoft Store -- Publishing to Google Play Store -- Publishing to Apple's App Store -- GitHub Actions -- Understanding GitHub Actions -- Workflows -- Events -- Jobs -- Runners -- Steps -- Summary -- Further reading -- Other Books You May Enjoy -- Index…”
    Libro electrónico
  11. 2271
    Publicado 2018
    Tabla de Contenidos: “…. -- See also -- Running your first Security API code -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Running your first MVC 1.0 code -- Getting ready -- How to do it... -- How it works... -- See also -- Chapter 2: Server-Side Development -- Using CDI to inject context and dependency -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Using Bean Validation for data validation -- Getting ready -- How to do it... -- How it works... -- See also -- Using servlet for request and response management -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Using Server Push to make objects available beforehand -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Using EJB and JTA for transaction management -- Getting ready -- How to do it... -- How it works... -- There's more…”
    Libro electrónico
  12. 2272
    Publicado 2018
    Tabla de Contenidos: “…. -- Loading framework plugins -- How to do it... -- Meterpreter API and mixins -- Getting ready -- How to do it... -- How it works... -- Railgun-converting Ruby into a weapon -- Getting ready -- How to do it... -- How it works... -- There's more... -- Adding DLL and function definitions to Railgun -- How to do it... -- How it works... -- Injecting the VNC server remotely -- Getting ready -- How to do it... -- Enabling Remote Desktop -- How to do it... -- How it works... -- Chapter 5: Post-Exploitation -- Introduction -- Post-exploitation modules -- Getting ready -- How to do it... -- How it works... -- How to do it... -- How it works... -- Bypassing UAC -- Getting ready -- How to do it... -- Dumping the contents of the SAM database -- Getting ready -- How to do it... -- Passing the hash -- How to do it... -- Incognito attacks with Meterpreter -- How to do it... -- Using Mimikatz -- Getting ready -- How to do it... -- There's more... -- Setting up a persistence with backdoors -- Getting ready -- How to do it... -- Becoming TrustedInstaller -- How to do it... -- Backdooring Windows binaries -- How to do it... -- Pivoting with Meterpreter -- Getting ready -- How to do it... -- How it works…”
    Libro electrónico
  13. 2273
    Publicado 2018
    Tabla de Contenidos: “…-- Developing a churn analytics pipeline -- Description of the dataset -- Exploratory analysis and feature engineering -- LR for churn prediction -- SVM for churn prediction -- DTs for churn prediction -- Random Forest for churn prediction -- Selecting the best model for deployment -- Summary -- Chapter 3: High Frequency Bitcoin Price Prediction from Historical and Live Data -- Bitcoin, cryptocurrency, and online trading -- State-of-the-art automated trading of Bitcoin -- Training -- Prediction -- High-level data pipeline of the prototype -- Historical and live-price data collection -- Historical data collection -- Transformation of historical data into a time series -- Assumptions and design choices -- Data preprocessing -- Real-time data through the Cryptocompare API -- Model training for prediction -- Scala Play web service -- Concurrency through Akka actors -- Web service workflow -- JobModule -- Scheduler…”
    Libro electrónico
  14. 2274
    Publicado 2018
    Tabla de Contenidos: “…. -- Chapter 6: Basic Server-Side Development -- Introduction -- Defining model methods and using the API decorators -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Reporting errors to the user -- Getting ready -- How to do it... -- How it works... -- There's more... -- Obtaining an empty recordset for a different model -- Getting ready -- How to do it... -- How it works... -- See also -- Creating new records -- Getting ready…”
    Libro electrónico
  15. 2275
    por Vanderburg, Eric A.
    Publicado 2021
    Tabla de Contenidos: “…Maintenance Automation -- Monitoring Techniques -- Collector Protocols and Methods -- Tagging -- Log Analysis -- Baselines -- Thresholds -- Trending -- Automated Event Responses -- Log Scrubbing -- Verification of Continuous Monitoring Activities -- Management Tools -- Chapter Review -- Questions -- Answers -- Chapter 11 Security in the Cloud -- Data Security -- Encryption -- Public Key Infrastructure -- Encryption Protocols -- Tunneling Protocols -- Ciphers -- Storage Security -- Protected Backups -- Network Security -- Segmentation -- Firewall -- DDoS Protection -- Packet Capture -- Network Flow -- IDS/IPS -- Packet Broker -- APIs -- Effects of Cloud Service Models on Security Implementation -- Endpoint Protection -- Host-Based Firewall -- Antivirus/Antimalware -- Endpoint Detection and Response -- Data Loss Prevention -- Exercise 11-1: Creating a DLP Policy for Office 365 -- NAC -- Hardening -- Application Whitelisting -- Impact of Security Tools to Systems and Services -- Access Control -- Identification -- Authentication -- Authorization -- Single Sign-On -- Federation -- Access Control Protocols -- Access Control Methodologies -- Multifactor Authentication -- Chapter Review -- Questions -- Answers -- Chapter 12 Security Best Practices -- Cloud Security Engineering -- Implementing Layered Security -- Protecting Against Availability Attacks -- Least Privilege -- Separation of Duties -- Security Automation -- Security Governance and Strategy -- Developing Company Security Policies -- Account Management Policies -- Documenting Security Procedures -- Assessment and Auditing -- Leveraging Established Industry Standards and Regulations -- Applying Platform-Specific Security Standards -- Data Classification -- Legal Holds -- Exercise 12-1: Creating a Legal Hold for a Mailbox in Office 365 -- Keeping Employees and Tools Up to Date…”
    Libro electrónico
  16. 2276
    Publicado 2018
    Tabla de Contenidos: “…Retrieving JSON data outside of test methods -- Supporting multibranded applications -- Multilocators -- Conditional code -- Runtime flags -- Multiple driver support -- Dual WebDriver testing -- Dual WebDriver and AppiumDriver testing -- Parallel testing -- Suite XML file -- Parallel properties method -- Common setup -- Summary -- Chapter 8: Designing a Selenium Grid -- Introduction -- Virtual grids -- Grid structure -- Single browser nodes -- Multibrowser nodes -- Single mobile device nodes -- Multimobile/browser nodes -- Selenium driver class - WebDriver versus RemoteWebDriver -- The setDriver method for browser -- The setDriver method for mobile -- Overloaded setDriver method for browser -- Switching from local to remote driver -- Suite parameters -- JVM argument -- Default global variables -- Processing runtime parameters -- Selenium standalone server and client drivers -- Local use of drivers -- Remote use of drivers -- Selenium standalone server and browser driver command-line options -- Selenium hub -- Selenium hub JSON configuration file -- Selenium nodes -- Selenium node JSON configuration file -- Appium server and mobile simulator/emulator command-line options -- Appium nodes -- Appium node JSON configuration file -- Selenium Grid console -- Directing traffic to Selenium nodes -- Multiple nodes of the same platform and version -- Directing traffic using desired capabilities -- Maintenance of the Selenium Grid -- Summary -- Chapter 9: Third-Party Tools and Plugins -- Introduction -- IntelliJ IDEA Selenium plugin -- Sample project files -- Generating element locators -- Wrap-up on Selenium Plugin -- TestNG results in IntelliJ and Jenkins -- IntelliJ TestNG results -- Jenkins TestNG results -- HTML Publisher Plugin -- Installation -- BrowserMob Proxy Plugin -- Getting started -- ExtentReports Reporter API class -- ExtentHTMLReporter…”
    Libro electrónico
  17. 2277
    Publicado 2021
    Tabla de Contenidos: “…Command Injection Attacks -- LDAP Injection Attacks -- Exploiting Authentication Vulnerabilities -- Password Authentication -- Session Attacks -- Kerberos Exploits -- Exploiting Authorization Vulnerabilities -- Insecure Direct Object References -- Directory Traversal -- File Inclusion -- Privilege Escalation -- Exploiting Web Application Vulnerabilities -- Cross-Site Scripting (XSS) -- Request Forgery -- Clickjacking -- Unsecure Coding Practices -- Source Code Comments -- Error Handling -- Hard-Coded Credentials -- Race Conditions -- Unprotected APIs -- Unsigned Code -- Steganography -- Application Testing Tools -- Static Application Security Testing (SAST) -- Dynamic Application Security Testing (DAST) -- Mobile Tools -- Summary -- Exam Essentials -- Lab Exercises -- Activity 9.1: Application Security Testing Techniques -- Activity 9.2: Using the ZAP Proxy -- Activity 9.3: Creating a Cross-Site Scripting Vulnerability -- Review Questions -- Chapter 10 Attacking Hosts, Cloud Technologies, and Specialized Systems -- Attacking Hosts -- Linux -- Windows -- Cross-Platform Exploits -- Credential Attacks and Testing Tools -- Credential Acquisition -- Offline Password Cracking -- Credential Testing and Brute-Forcing Tools -- Wordlists and Dictionaries -- Remote Access -- SSH -- NETCAT and Ncat -- Metasploit and Remote Access -- Proxies and Proxychains -- Attacking Virtual Machines and Containers -- Virtual Machine Attacks -- Containerization Attacks -- Attacking Cloud Technologies -- Attacking Cloud Accounts -- Attacking and Using Misconfigured Cloud Assets -- Other Cloud Attacks -- Tools for Cloud Technology Attacks -- Attacking Mobile Devices -- Attacking IoT, ICS, Embedded Systems, and SCADA Devices -- Attacking Data Storage -- Summary -- Exam Essentials -- Lab Exercises -- Activity 10.1: Dumping and Cracking the Windows SAM and Other Credentials…”
    Libro electrónico
  18. 2278
    Publicado 2022
    Tabla de Contenidos: “…Where the Symmetric Key Is Just Protected by a Password -- Working with and Indexing Encrypted Columns -- Migrating or Restoring a Database with Column Encryption -- Temporary Keys -- Encryption by Passphrase -- Protection of Key Passwords Being Sent to SQL Server -- Summary -- Appendix A: Glossary of Terms -- A -- Advanced Encryption Standard -- AES -- Always Encrypted -- Always Encrypted Wizard -- Asymmetric Encryption -- Asymmetric Key -- At-Rest Data -- Attestation -- Authenticator -- Automated Key Management -- Azure Key Vault -- B -- Backup Encryption -- C -- CA -- CEK -- Certificate -- Certification Authority -- Certificate Store -- CMK -- Code Integrity Policy -- Column Encryption Key -- Column Master Key -- D -- Data Encryption Standard -- Database Encryption Key -- Database Master Key -- DEK -- DES -- Deterministic Encryption -- Diffie Hellman -- DMA Protection -- DMK -- DPAPI -- E -- EKM -- Enclave -- Encryption Scan -- Extensible Key Management -- H -- Hardware Security Module -- Hash -- HGS -- Host Guardian Service -- Host Health Certificate -- Host Key -- HSM -- I -- In-Transit Encryption -- K -- Key Rotation -- P -- Parameterization for Always Encrypted -- Private Key -- Public Key -- R -- Randomized Encryption -- S -- Salt -- Secure Boot -- Secure Hashing Algorithm -- Service Master Key -- SHA -- SMK -- Symmetric Encryption -- Symmetric Key -- T -- TDE -- TDS -- Temporary Key -- Thumbprint -- TLS -- TPM -- TPM Baseline -- TPM Endorsement Key -- Transport Layer Security -- Transparent Data Encryption -- Trusted Platform Module -- V -- VBS -- Virtualization Based Security -- W -- Windows Data Protection API -- Appendix B: Encryption in the Cloud -- Azure VM -- Azure SQL Database or Managed Instance -- TDE -- Backup Encryption -- Always Encrypted with Secure Enclaves -- TLS -- AWS VM (EC2) -- EKM -- Always Encrypted with Secure Enclaves…”
    Libro electrónico
  19. 2279
    Publicado 2017
    Tabla de Contenidos: “…. -- Customizing the dictionary -- Adjusting the number of threads -- Specifying a DNS server -- Using the NSE library target -- Obtaining profile information from Google's People API -- Getting ready -- How to do it... -- How it works... -- There's more... -- Matching services with public vulnerability advisories -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 4: Scanning Web Servers -- Introduction -- Listing supported HTTP methods -- How to do it... -- How it works... -- There's more... -- Interesting HTTP methods -- Checking whether a web server is an open proxy -- How to do it... -- How it works... -- There's more... -- Discovering interesting files and folders in web servers -- How to do it... -- How it works... -- There's more... -- Using a Nikto database -- Abusing mod_userdir to enumerate user accounts -- How to do it... -- How it works... -- There's more... -- Brute forcing HTTP authentication -- How to do it... -- How it works... -- There's more... -- Brute modes -- Brute forcing web applications -- How to do it... -- How it works... -- There's more... -- Brute forcing WordPress installations -- Brute forcing WordPress installations -- Detecting web application firewalls -- How to do it... -- How it works... -- There's more... -- Detecting possible XST vulnerabilities -- How to do it... -- How it works…”
    Libro electrónico
  20. 2280
    Publicado 2017
    Tabla de Contenidos: “…. -- Different server types -- Eclipse templates for JSP pages -- Remotely triggering jobs through the Jenkins API -- Getting ready -- How to do it... -- How it works... -- There's more... -- Running jobs from within Maven -- Remotely generating jobs -- See also -- Chapter 6: Continuous Delivery -- Introduction -- Archiving artifacts -- Getting ready -- How to do it... -- See also…”
    Libro electrónico