Mostrando 21,021 - 21,040 Resultados de 21,396 Para Buscar '"Architecture"', tiempo de consulta: 0.12s Limitar resultados
  1. 21021
    Publicado 2003
    “…Taking a practical, applied approach to building security into networks, the book shows you how to build secure network architectures from the ground up. Security aspects of routing protocols, Layer 2 threats, and switch security features are all analyzed. …”
    Libro electrónico
  2. 21022
    Publicado 2012
    “…Along the way, you'll explore practical matters like architecture, unit testing, and set-up as you build a scalable web application that includes custom DSLs, Hadoop, HBase, and RabbitMQ. …”
    Libro electrónico
  3. 21023
    por Gress, Mark L., Johnson, Lee, 1972-
    Publicado 2010
    “…Efficiently install, configure, and troubleshoot Cisco Wireless LAN Controllers Move autonomous wireless network solutions to LWAPP/CAPWAP Integrate LWAPP/CAPWAP solutions into existing wired networks Understand the next-generation WLC architecture Use Hybrid REAP and Home AP solutions to centrally configure and control branch/remote access points without deploying controllers in every location Use Mobility Groups to provide system-wide mobility easily and cost-effectively Use Cisco WLC troubleshooting tools, and resolve client-related problems Maximize quality in wireless voice applications Build efficient wireless mesh networks Use RRM to manage RF in real-time, optimizing efficiency and performance Reference the comprehensive WLC and AP debugging guide Part of the CCIE Professional Development Series, this is the first book to offer authoritative training for the new CCIE Wireless Exam. …”
    Libro electrónico
  4. 21024
    Publicado 2017
    “…Style and approach This clear, practical guide illustrates the advanced functionalities of Ansible, its system architecture, and design aspects that will help you to master Ansible with ease. …”
    Libro electrónico
  5. 21025
    Publicado 2017
    “…By the end of this book, you will have an in-depth knowledge of the implementation of the Elasticsearch architecture and will be able to manage data efficiently and effectively with Elasticsearch. …”
    Libro electrónico
  6. 21026
    Publicado 2017
    “…You will then dive deep into the latest design patterns, network architecture, and topologies. We will show you how you can integrate NAV with the Microsoft platform, and secure your deployment by managing roles and permissions. …”
    Libro electrónico
  7. 21027
    por Sullivan, Dan, 1962-
    Publicado 2003
    “…In this book the author shares proven strategies for: Organizing information in an intuitive, coherent manner Creating a modular, adaptable framework for application integration Developing a robust, scalable architecture I..…”
    Libro electrónico
  8. 21028
    Publicado 2022
    “…You will learn different concepts of Spring Framework and RESTful webservices, different design patterns like Singleton, Prototype, Factory, MVC, Adapter, and so on, and create a production-ready application in a layered architecture. You will also look at ORM and Spring data JPA (Java Persistence API), Entity Relationship in Spring Data JPA, and implement Swagger API documentation. …”
    Video
  9. 21029
    por Alexandre Bidon, Danièle
    Publicado 2021
    “…Excavation work undertaken in 1993-1994 prior to the construction of a shopping centre in the Velotte quarter of the Saint-Martin district has enabled archeologists to define seven build periods of architectural development covering both buildings and the urban defense system. …”
    Electrónico
  10. 21030
    Publicado 2019
    “…Skill Level Beginner to intermediate data analytics/machine learning knowledge Learn How To * Understand how static and real-time streaming data is collected, analyzed, and used * Understand the key tools and methods that enable machines to learn and mimic human thinking * Bring together unstructured data in preparation for analysis and visualization * Compare and contrast the various big data architectures * Apply supervised learning/linear regression, data fitting, and reinforcement learning to machines to yield the information results you’re looking for * Apply classification techniques to machine learning to better analyze your data * Exploit the benefits of unsupervised learning to glean data you didn’t even know you were looking for * Understand how artificial neural networks (ANNs) perform deep learning with surprising (and useful) results * Apply principal components analysis (PCA) to improve the management of data analysis * Understand the key approaches to implementing machine learning on real systems and the considerations you must make when undertaking a machine learning project Who Should Take This Course * Anyone who wants to learn about machine learni..…”
    Video
  11. 21031
    Publicado 2020
    “…Skill Level Intermediate Learn How To Build deep learning models in all the major libraries: TensorFlow, Keras, and PyTorch Understand the language and theory of artificial neural networks Excel across a broad range of computational problems including machine vision, natural language processing, and reinforcement learning Create algorithms with state-of-the-art performance by fine-tuning model architectures Self-direct and complete your own Deep Learning projects Who Should Take This Course Software engineers, data scientists, analysts, and statisticians with an interest in deep learning. …”
    Video
  12. 21032
    Publicado 2024
    “…What You Will Learn Understand the five security principles and how to use them to drive the development of modern security architectures in Google Cloud Secure identities with Cloud Identity and Identity & Access Management (IAM) Secure the network with segmentation and private connectivity Protect sensitive data with the Data Loss Prevention (DLP) API and encryption Monitor, log, audit, and troubleshoot security incidents with the Google Cloud Operations Suite Ensure compliance and address regulatory concerns…”
    Libro electrónico
  13. 21033
    por Teare, Diane
    Publicado 2005
    “…For enterprises to take advantage of cost-saving, productivity-enhancing solutions, such as IP telephony and content networking, their core infrastructures must include the key enabling technologies required by these solutions and provide a resilient, secure foundation that can scale to business needs. As with any architecture, designing a solid foundation is the first step. …”
    Libro electrónico
  14. 21034
    Publicado 2004
    “…Frame Relay users have found that it provides a number of benefits over alternative technologies: Lower cost of ownership Well-established and widely adopted standards that allow open architecture and plug-and-play service implementation Low overhead combined with high reliability Network scalability, flexibility, and disaster recovery Interworking with other new services and applications, such as ATM Along with these benefits and the growing popularity of Frame Relay comes the need for information and solutions to design issues, implementation, quality of service, and high availability. …”
    Libro electrónico
  15. 21035
    por Hucaby, Dave
    Publicado 2004
    “…Firewalls have emerged as the essential foundation component in any network security architecture. Cisco ASA and PIX Firewall Handbook is a guide for the most commonly implemented features of the popular Cisco Systems® firewall security solutions. …”
    Libro electrónico
  16. 21036
    por Inmon, William H.
    Publicado 2008
    “…Coverage includes What unstructured data is, and how it differs from structured data First generation technology for handling unstructured data, from search engines to ECM--and its limitations Integrating text so it can be analyzed with a common, colloquial vocabulary: integration engines, ontologies, glossaries, and taxonomies Processing semistructured data: uncovering patterns, words, identifiers, and conflicts Novel processing opportunities that arise when text is freed from context Architecture and unstructured data: Data Warehousing 2.0 Building unstructured relational databases and linking them to structured data Visualizations and Self-Organizing Map..…”
    Libro electrónico
  17. 21037
    por Dowd, Mark
    Publicado 2007
    “…Coverage includes • Code auditing: theory, practice, proven methodologies, and secrets of the trade • Bridging the gap between secure software design and post-implementation review • Performing architectural assessment: design review, threat modeling, and operational review • Identifying vulnerabilities related to memory management, data types, and malformed data • UNIX/Linux assessment: privileges, files, and processes • Windows-specific issues, including objects and the filesystem • Auditing interprocess communication, synchronization, and state • Evaluating network software: IP stacks, firewalls, and common application protocols • Auditing Web applications and technologies This book is an unprecedented resource for everyone who must deliver secure software or assure the safety of existing software: consultants, security specialists, developers, QA staff, testers, and administrators alike. …”
    Libro electrónico
  18. 21038
    por Gupta, Ajay
    Publicado 2004
    “…Inside, you'll find in-depth case studies in a variety of categories: Basic Hacking: Blackhat bootcamp, including mapping a network, exploiting vulnerable architecture, and launching denial-of-service attacks Current Methods: The latest in malicious deeds, including attacks on wireless networks, viruses and worms, and compromised Web servers Additional Items on the Plate: Often overlooked security measures such as developing a security policy, intrusio..…”
    Libro electrónico
  19. 21039
    Publicado 2007
    “…Introduces you to WCF and then takes you deep inside the technology Gives you nearly 100 best practices for programming with WCF Provides detailed coverage on how to version services that you will not find anywhere else Delves into using WCF together with Windows Workflow Foundation and Windows CardSpace Provides detailed coverage of the new high-performance data contract serializer for .NET Walks you through how to do secure, reliable, transacted messaging, and how to understand the options available Introduces you to federated, claims-based security, and shows you how to incorporate SAML and WS-Trust security token services into your architecture Provides step-by-step instructions for how to customize every aspect of WCF Shows you how to add your own behaviors, communication channels, message encoders, and transports Gives you options for implementing publish/subscribe solutions Walks you through how to do peer-to-peer communications with WCF As evangelists at Microsoft for WCF, Craig McMurtry, Marc Mercuri, Nigel Watl..…”
    Libro electrónico
  20. 21040
    Publicado 2002
    “…Contents include: An introduction to RAID and Linux Planning and architecture of your RAID system Building a software RAID Software RAID tools and references Building a hardware RAID Performance and tuning of your RAID system RAID has become the low-cost solution of choice to deal with the ever-increasing demand for data storage space. …”
    Libro electrónico