Mostrando 15,581 - 15,600 Resultados de 20,309 Para Buscar '"Community"', tiempo de consulta: 0.14s Limitar resultados
  1. 15581
    por Comissió Europea.
    Publicado 2002
    Libro
  2. 15582
    por Comissió Europea.
    Publicado 2003
    Libro
  3. 15583
    por Comissió Europea.
    Publicado 2003
    Libro
  4. 15584
    por Eurostat.
    Publicado 2004
    Libro
  5. 15585
    por Paton, Rob
    Publicado 1987
    Libro
  6. 15586
  7. 15587
    por Eurostat.
    Publicado 2000
    Libro
  8. 15588
    Publicado 2024
    Tabla de Contenidos: “…Windows -- Android -- iOS and macOS -- Building and testing the iOS target -- Building and testing the macOS target -- Migrating from Xamarin -- Migrating and reusing the Shell template from Xamarin.Forms -- Visual Studio project template -- Summary -- Chapter 3: User Interface Design with XAML -- Technical requirements -- Creating a XAML page -- XAML syntax -- XML declaration -- Element -- Attribute -- XML and XAML namespaces -- Creating a new page using XAML -- Creating the same new page using C# -- XAML markup extensions -- Building a user interface -- Layouts -- StackLayout -- Grid -- FlexLayout -- AbsoluteLayout -- Views -- Label -- Image -- Editor -- Entry -- ListView -- Master-detail UI design -- Side-by-side -- Stacked -- Navigation in the master-detail UI design -- ItemDetailPage -- ItemsPage -- Supporting multiple languages - localization -- Creating a .resx file -- Localizing text -- Summary -- Further reading -- Chapter 4: Exploring MVVM and Data Binding -- Technical requirements -- Understanding MVVM and MVC -- MVVM in PassXYZ.Vault -- Data binding -- Binding object -- Binding target -- Binding source -- Properties of a Binding object -- Source -- Binding mode -- Changing notifications in ViewModels -- .NET Community Toolkit -- How to use the MVVM Toolkit -- Improving the data model and service -- KPCLib -- Abstraction of PwGroup and PwEntry -- PassXYZLib -- Updating the model -- Updating the service -- Binding to collections -- Using custom views -- Summary -- Further reading -- Chapter 5: Navigation Using .NET MAUI Shell and NavigationPage -- Technical requirements -- Implementing navigation -- INavigation interface and NavigationPage -- Using the navigation stack -- Manipulating the navigation stack -- Inserting a page -- Removing a page -- Using Shell -- Flyout -- Flyout items -- Menu items -- Tabs -- Shell navigation…”
    Libro electrónico
  9. 15589
    Cryptocurrency All-in-One For Dummies
    Cryptocurrency All–in–One For Dummies
    Publicado 2022
    Tabla de Contenidos: “…-- Beginning with the Basics of Cryptocurrencies -- The definition of money -- Some cryptocurrency history -- Key crypto benefits -- Common crypto and blockchain myths -- Risks -- Gearing Up to Make Transactions -- Wallets -- Exchanges -- Communities -- Making a Plan Before You Jump In -- Chapter 2 How Cryptocurrencies Work -- Explaining Basic Terms in the Cryptocurrency Process -- Cryptography -- Nodes -- Mining -- Proof of work -- Proof of stake -- Proof of importance -- Transactions: Putting it all together -- Cruising through Other Important Crypto Concepts -- Adaptive scaling -- Decentralization -- Harvesting -- Open source -- Public ledger -- Smart contracts -- Stick a Fork in It: Digging into Cryptocurrency Forks -- What is a fork, and why do forks happen? …”
    Libro electrónico
  10. 15590
    Publicado 2021
    Tabla de Contenidos: “…-- Tactics -- Techniques -- Threat Hunting Using Five Common Tactics -- Privilege Escalation -- Case Study -- Credential Access -- Case Study -- Lateral Movement -- Case Study -- Command and Control -- Case Study -- Exfiltration -- Case Study -- Other Methodologies and Key Threat-Hunting Tools to Combat Attack Vectors -- Zero Trust -- Threat Intelligence and Zero Trust -- Build Cloud-Based Defense-in-Depth -- Analysis Tools -- Microsoft Tools -- Connect To All Your Data -- Workbooks -- Analytics -- Security Automation and Orchestration -- Investigation -- Hunting -- Community -- AWS Tools -- Analyzing Logs Directly -- SIEMs in the Cloud -- Summary -- Resources -- Part II Hunting in Microsoft Azure -- Chapter 4 Microsoft Azure Cloud Threat Prevention Framework -- Introduction to Microsoft Security -- Understanding the Shared Responsibility Model -- Microsoft Services for Cloud Security Posture Management and Logging/Monitoring -- Overview of Azure Security Center and Azure Defender -- Overview of Microsoft Azure Sentinel -- Using Microsoft Secure and Protect Features -- Identity &amp -- Access Management -- Infrastructure &amp -- Network -- Data &amp -- Application -- Customer Access…”
    Libro electrónico
  11. 15591
    Publicado 2017
    Tabla de Contenidos: “…-- Conventions are good -- Test frameworks and commercial choices are increasing -- Offsetting work to Jenkins nodes -- Starving QA/integration servers -- Reading the change log of Jenkins -- Avoiding human bottlenecks -- Avoiding groupthink -- Training and community -- Visibly rewarding successful developers -- Stability and code maintenance -- Resources on quality assurance -- And there's always more -- Final comments -- Index…”
    Libro electrónico
  12. 15592
    Tabla de Contenidos: “…DAC members' bilateral development finance institutions -- Notes -- 9 In my view: Reinventing official development assistance: From an Arlequin tapestry to a more inspiring Kandinsky-Kasse moment -- References -- Notes -- 10 In focus: Aid effectiveness in Afghanistan, Mali and South Sudan -- Key messages -- Aid did not make extremely fragile contexts more stable, capable or better governed -- Donors overestimate capacity and underestimate resistance by entrenched elites -- Development co-operation providers must mind the opportunity costs -- Rethink, reset and be realistic about what aid can truly achieve in fragile settings -- Note -- 11 In my view: Funding more proximately is not risky but not doing so is -- In ignoring local resources, the aid system disempowers the very communities it targets -- References -- Notes -- 12 In focus: Enablers of locally led development -- Key messages -- Stronger evidence on the benefits and challenges of locally led development is needed -- Long-term core funding is more likely to foster sustainable outcomes and local ownership -- Localisation also calls for support for diverse partnerships tailored to local conditions -- Providers need to reframe risks, shift institutional culture and build internal capacities -- Some providers are starting to progressively redress power imbalances -- Anticipating how localisation may shift local political and economic dynamics can help avoid common pitfalls…”
    Libro electrónico
  13. 15593
    Publicado 2023
    Tabla de Contenidos: “…-- You're overconfident (jumbo ego) -- Clearing Away the Obstacles -- Going back to familiar territory -- Tapping your personal network -- Designing an Environment that Inspires Creativity and Innovation -- Making time to be creative -- Find a favorite thinking space -- Play with toys, games, and kids -- Finding the right place for innovation -- Making your work environment friendly -- Growing Ideas with Outside Help: Incubators and Accelerators -- Spotting the Best Opportunities -- Finding opportunity in failure (yours and others) -- Finding opportunity for underrepresented communities -- Finding opportunity in things that don't go together -- Chapter 4 Testing an Opportunity Before You Leap -- Starting with Your First Risk: You! …”
    Libro electrónico
  14. 15594
    Publicado 2023
    Tabla de Contenidos: “…-- Change the Targeting/Messaging Strategy -- Change the Distribution Strategy -- Content Marketing Channel Management and Promotion -- Adjust the Editorial Calendar -- Put More Resources Toward Social Media/Online Communities -- Change the Website -- Change the Products/Services -- Content Marketing Measurement and Control -- Adjust the KPIs -- Change the Content Marketing Metrics -- Chapter 6 Social Media Marketing -- Welcome to the Endless Coffee Cup Podcast -- Social Media Context -- Term "Social Media" Coined in 2004 -- Key Definitions and Framework -- Social Media Marketing Today -- Areas Associated with Social Media Marketing Today -- Content Marketing -- Reputation Management -- Disinformation -- Monitoring/Participating in Conversations -- Influencer Marketing -- Digital Advertising -- Social Media Marketing and Organizational Structure -- Social Media Marketing Strategy and Planning -- How Social Media Impacts Business Goals -- Value of Influencers -- Social Media Channel Management -- Early Social Media Channels -- Social Networks -- Video Sharing -- Microblogging -- Photo Sharing -- Blogs…”
    Libro electrónico
  15. 15595
    Publicado 2023
    Tabla de Contenidos: “…Setting up the software and connecting -- Troubleshooting -- Calibrating and getting readings -- Calibration code -- The calibration process -- Always face North behavior -- CircuitPython code for the face North behavior -- Troubleshooting -- Making a known turn behavior -- Summary -- Exercises -- Further reading -- Chapter 13: Determining Position Using Monte Carlo Localization -- Technical requirements -- Creating a training area for our robot -- What we will make -- How we will make the arena -- Tips for cutting -- Modeling the space -- Representing the arena and robot position as numbers -- Serving the arena from the robot -- The Bleak library -- Creating a Bluetooth LE wrapper library -- Showing the robot's data on the computer screen -- Using sensors to track relative pose -- Setting up poses -- Displaying poses -- Moving with collision avoidance -- Moving poses with the encoders -- Pose movement probabilities -- Monte Carlo localization -- Generating pose weights from a position -- Resampling the poses -- Incorporating distance sensors -- Tuning and improving the Monte Carlo model -- Summary -- Exercises -- Further reading -- Chapter 14: Continuing Your Journey - Your Next Robot -- Technical requirements -- A summary of what you have learned in this book -- Basic robotics with Raspberry Pi Pico -- Extending a Raspberry Pi Pico robot with sensors -- Writing CircuitPython behavior code for Raspberry Pi Pico -- Planning to extend this robot -- Sensors you could add -- Interacting with the robot -- Chassis and form enhancements -- Electronics enhancements -- Outputs you could add -- Extending the code and behaviors -- Planning your next robot -- Form, shape, and chassis -- Electronics and sensors -- Code and behavior -- Further suggested areas to learn about -- Electronics -- Design and manufacturing -- Robotic competitions and communities…”
    Libro electrónico
  16. 15596
    Publicado 2022
    Tabla de Contenidos: “…The industry's platforms versus direct cloud native dilemma -- How communities of practice strengthen DevOps platforms -- The main five strategic platforms incumbents focus on -- The ITSM platform -- The CI/CD pipeline platform -- The testing services platform -- The observability platform - telemetry -- Private cloud platforms -- Public cloud platforms -- Summary -- Chapter 8: 360° Regulatory Compliance as Code -- Setting the regulatory compliance scene in the FSI -- What are the regulatory compliance categories? …”
    Libro electrónico
  17. 15597
    Publicado 2023
    Tabla de Contenidos: “…Contrived complexity -- Dead code -- Excessive data return -- Feature envy -- Identifier size -- Inappropriate intimacy -- Long lines (God lines) -- Lazy methods -- Long methods (God methods) -- Long parameter lists (too many parameters) -- Message chains -- The middleman method -- Oddball solutions -- Speculative generality -- Summary -- Questions -- Further reading -- Chapter 12: Functional Programming -- Technical requirements -- Imperative versus functional programming -- Imperative programming -- Key differences -- Overview of functional programming in C# -- First-class functions and Lambda expressions -- Lambda expressions in C# -- Higher-order functions -- Immutability and pure functions -- Functional composition -- Using Lambda expressions -- Using LINQ and extension methods -- Using higher-order functions -- Option types and the Maybe monad -- Usage of option types in C# -- The Maybe monad in C# -- Functional error handling -- Option types -- The Maybe monad -- The Either monad -- Result objects -- Functional data transformation and pipelines -- Lazy evaluation -- Pattern matching -- Currying and partial application -- Currying -- Partial application -- Key differences -- Concurrency with functional programming -- Recursion -- Summary -- Questions -- Further reading -- Chapter 13: Cross-Platform Application Development with MAUI -- Technical requirements -- Project overview -- Windows version -- Android version -- Creating the project -- Understanding XAML structure -- The MVVM pattern -- Adding CommunityToolkit.Mvvm -- The models -- The ViewModels -- The views -- Configuring our to-do application -- Summary -- Questions -- Further reading -- Chapter 14: Microservices -- What are microservices? …”
    Libro electrónico
  18. 15598
    Publicado 2023
    Tabla de Contenidos: “…-- Advantages and limitations of DAST -- The DAST process -- DAST usage for developers -- DAST usage for security testers -- The importance of DAST in secure development environments -- Incorporating DAST into the application development life cycle -- Advanced DAST techniques -- Choosing the right DAST tool -- How to perform a DAST scan in an organization -- Integrating DAST with other security tools -- Incorporating DAST into DevOps processes -- Prioritizing and remediating vulnerabilities -- Comparing DAST with other security testing approaches -- SAST -- IAST -- RASP -- The future of DAST -- Summary -- Part 4: Tools -- Chapter 12: Setting Up a DevSecOps Program with Open Source Tools -- Techniques used in setting up the program -- Understanding DevSecOps -- Setting up the CI/CD pipeline -- The technicalities of setting up a CI/CD pipeline -- Implementing security controls -- Identifying open source security tools -- Implementing security policies and procedures -- Managing DevSecOps in production -- Monitoring and managing the DevSecOps pipeline in production -- Using open source tools for monitoring, logging, and alerting -- Incorporating continuous compliance and auditing into the pipeline -- Managing incidents and responding to security breaches -- The benefits of the program -- Summary -- Part 5: Governance and an Effective Security Champions Program -- Chapter 13: License Compliance, Code Coverage, and Baseline Policies -- DevSecOps and its relevance to license compliance -- The distinction between traditional licenses and security implications -- Source code access -- Modification and redistribution -- Community oversight -- Vendor dependency -- Cost and resource allocation -- Different types of software licenses -- Permissive licenses (MIT, Apache)…”
    Libro electrónico
  19. 15599
    por Orzach, Yoram
    Publicado 2022
    Tabla de Contenidos: “…Layer 5-based vulnerabilities -- Layer 6-based vulnerabilities -- Layer 7-based vulnerabilities -- Fuzzing tools -- Basic fuzzing -- Breaking usernames and passwords (brute-force attacks) -- Fuzzing network protocols -- Crash analysis - what to do when we find a bug -- Summary -- Questions -- Part 2: Network, Network Devices, and Traffic Analysis-Based Attacks -- Chapter 6: Finding Network-Based Attacks -- Planning a network-based attack -- Gathering information from the network -- Stealing information from the network -- Preventing users from using IT resources -- Active and passive attacks -- Active attacks -- Passive attacks -- Reconnaissance and information gathering -- Listening to network broadcasts -- Listening on a single device/port-mirror -- Network-based DoS/DDoS attacks and flooding -- Flooding through scanning attacks -- Random traffic generation flooding -- Generating and defending against flooding and DoS/DDoS attacks -- L2-based attacks -- MAC flooding -- STP, RSTP, and MST attacks -- L3- and ARP-based attacks -- ARP poisoning -- DHCP starvation -- Summary -- Questions -- Chapter 7: Detecting Device-Based Attacks -- Network devices' structure and components -- The functional structure of communications devices -- The physical structure of communications devices -- Attacks on the management plane and how to defend against them -- Brute-force attacks on console, Telnet, and SSH passwords -- Brute-force attacks against SNMP passwords (community strings) -- Brute-force attacks against HTTP/HTTPS passwords -- Attacks on other ports and services -- SYN-scan and attacks targeting the management plane processes' availability -- Attacks on the control plane and how to defend against them -- Control plane-related actions that influence device resources -- Attacks on the data plane and how to defend against them…”
    Libro electrónico
  20. 15600
    Publicado 2017
    Tabla de Contenidos: “…Bucketing on geo-spatial data -- Geo distance aggregation -- GeoHash grid aggregation -- Pipeline aggregations -- Calculating the cumulative sum of usage over time -- Summary -- Chapter 5: Analyzing Log Data -- Log analysis challenges -- Logstash -- Installation and configuration -- Prerequisites -- Downloading and installing Logstash -- Installing on Windows -- Installing on Linux -- Running Logstash -- Logstash architecture -- Overview of Logstash plugins -- Installing or updating plugins -- Input plugins -- Output plugins -- Filter plugins -- Codec plugins -- Exploring plugins -- Exploring Input plugins -- File -- Beats -- JDBC -- IMAP -- Output plugins -- Elasticsearch -- CSV -- Kafka -- PagerDuty -- Codec plugins -- JSON -- Rubydebug -- Multiline -- Filter plugins -- Ingest node -- Defining a pipeline -- Ingest APIs -- Put pipeline API -- Get Pipeline API -- Delete pipeline API -- Simulate pipeline API -- Summary -- Chapter 6: Building Data Pipelines with Logstash -- Parsing and enriching logs using Logstash -- Filter plugins -- CSV filter -- Mutate filter -- Grok filter -- Date filter -- Geoip filter -- Useragent filter -- Introducing Beats -- Beats by Elastic.co -- Filebeat -- Metricbeat -- Packetbeat -- Heartbeat -- Winlogbeat -- Auditbeat -- Community Beats -- Logstash versus Beats -- Filebeat -- Downloading and installing Filebeat -- Installing on Windows -- Installing on Linux -- Architecture -- Configuring Filebeat -- Filebeat prospectors -- Filebeat global options -- Filebeat general options -- Output configuration -- Filebeat modules -- Summary -- Chapter 7: Visualizing data with Kibana -- Downloading and installing Kibana -- Installing on Windows -- Installing on Linux -- Configuring Kibana -- Data preparation -- Kibana UI -- User interaction -- Configuring the index pattern -- Discover -- Elasticsearch query string…”
    Libro electrónico