Mostrando 461 - 480 Resultados de 532 Para Buscar '"Footprints"', tiempo de consulta: 0.08s Limitar resultados
  1. 461
    Operations management for dummies
    Operations Management For Dummies
    Publicado 2022
    “…Other new stuff inside: supply chain traceability, ethical sourcing and carbon footprint, business resiliency, and modularizing the supply chain. …”
    Libro electrónico
  2. 462
    Publicado 2011
    “…The goal of the book is to bring nuclear power to our readers as one of the promising energy sources that has a unique potential to meet energy demands with minimized environmental impact, near-zero carbon footprint, and competitive economics via robust potential applications. …”
    Libro electrónico
  3. 463
    Publicado 2018
    “…By using this concept and focusing on real-world problems exemplified by sports data sets and statistics, this book seeks to help you take advantage of the hash object productively, in particular, but not limited to, the following tasks: select proper hash tools to perform hash table operations use proper hash table operations to support specific data management tasks use the dynamic, run-time nature of hash object programming understand the algorithmic principles behind hash table data look-up, retrieval, and aggregation learn how to perform data aggregation, for which the hash object is exceptionally well suited manage the hash table memory footprint, especially when processing big data use hash object techniques for other data processing tasks, such as filtering, combining, splitting, sorting, and unduplicating. …”
    Libro electrónico
  4. 464
    Publicado 2022
    “…Every feature of this book supports both efficient exam preparation and long-term mastery: * Opening topics lists identify the topics you need to learn in each chapter and list EC-Council's official exam objectives * Key Topics figures, tables, and lists call attention to the information that's most crucial for exam success * Exam Preparation Tasks enable you to review key topics, define key terms, work through scenarios, and answer review questions...going beyond mere facts to master the concepts that are crucial to passing the exam and enhancing your career * Key Terms are listed in each chapter and defined in a complete glossary, explaining all the field's essential terminology This study guide helps you master all the topics on the latest CEH exam, including * Ethical hacking basics * Technical foundations of hacking * Footprinting and scanning * Enumeration and system hacking * Social engineering, malware threats, and vulnerability analysis * Sniffers, session hijacking, and denial of service * Web server hacking, web applications, and database attacks * Wireless technologies, mobile security, and mobile attacks * IDS, firewalls, and honeypots * Cryptographic attacks and defenses * Cloud computing, IoT, and botnets…”
    Libro electrónico
  5. 465
    Publicado 2017
    “…The heavier the digital footprint, the more complicated it is to rein it all in. …”
    Libro electrónico
  6. 466
    Publicado 2020
    “…Every feature of this book supports both efficient exam preparation and long-term mastery: · Opening Topics Lists identify the topics you need to learn in each chapter and list EC-Council's official exam objectives · Key Topics figures, tables, and lists call attention to the information that's most crucial for exam success · Exam Preparation Tasks enable you to review key topics, define key terms, work through scenarios, and answer review questions...going beyond mere facts to master the concepts that are crucial to passing the exam and enhancing your career · Key Terms are listed in each chapter and defined in a complete glossary, explaining all the field's essential terminology This study guide helps you master all the topics on the latest CEH exam, including · Ethical hacking basics · Technical foundations of hacking · Footprinting and scanning · Enumeration and system hacking · Social engineering, malware threats, and vulnerability analysis · Sniffers, session hijacking, and denial of service · Web server hacking, web applications, and database attacks · Wireless technologies, mobile security, and mobile attacks · IDS, firewalls, and honeypots · Cryptographic attacks and defenses · Cloud computing, IoT, and botnets…”
    Libro electrónico
  7. 467
    por Forthun, Colin
    Publicado 2010
    “…Going forward, the government needs to contain public expenditure growth and improve public administration efficiency to reduce the public “footprint” on the economy and allow lower taxes. Key areas that warrant intensified efforts are public administration and health. …”
    Capítulo de libro electrónico
  8. 468
    por Kornilov, Dmitry
    Publicado 2023
    “…This book will show you how to take full advantage of the cloud by optimizing applications with fast start times, low memory consumption, and a small disk footprint. The open-source Helidon framework provides all that, and more. …”
    Libro electrónico
  9. 469
    Publicado 2003
    “…The result is a highly portable, small-footprint application development environment that brings the unique capabilities of Java technology, including platform independence and enhanced security, to the rapidly growing wireless market. …”
    Libro electrónico
  10. 470
    Publicado 2011
    “…Get full details on the hacker's footprinting, scanning, and profiling tools, including SHODAN, Maltego, and OWASP DirBuster See new exploits of popular platforms like Sun Java System Web Server and Oracle WebLogic in operation Understand how attackers defeat commonly used Web authentication technologies See how real-world session attacks leak sensitive data and how to fortify your applications Learn the most devastating methods used in today's hacks, including SQL injection, XSS, XSRF, phishing, and XML injection techniques Find and fix vulnerabilities in ASP.NET, PHP, and J2EE execution environments Safety deploy XML, social networking, cloud computing, and Web 2.0 services Defend against RIA, Ajax, UGC, and browser-based, client-side exploits Implement scalable threat modeling, code review, application scanning, fuzzing, and security testing procedures…”
    Libro electrónico
  11. 471
    Publicado 2014
    “…These benefits include better user experience, server and application consolidation, development cycle reduction, application scalability, data center footprint savings, and improved price performance economics. …”
    Libro electrónico
  12. 472
    Publicado 2018
    “…The z14 ZR1 is designed for enhanced modularity, in an industry standard footprint. A data-centric infrastructure must always be available with a 99.999% or better availability, have flawless data integrity, and be secured from misuse. …”
    Libro electrónico
  13. 473
    Publicado 2019
    “…Two integrated memory controllers that allow double the memory footprint of IBM POWER8® processor-based servers. An integrated I/O subsystem and hot-pluggable Peripheral Component Interconnect Express (PCIe) Gen4 and Gen3 I/O slots. …”
    Libro electrónico
  14. 474
    Publicado 2024
    “…Elixir is a functional language with a fairly small footprint. This makes it easier to learn and put into production than other languages. …”
    Libro electrónico
  15. 475
    Publicado 2002
    “…With the SAX2 API, developers have access to the information in XML documents as they are read, without imposing major memory constraints or a large code footprint. SAX2 is often used by other APIs "under the covers", and provides a foundation for processing and creating both XML and non-XML information. …”
    Libro electrónico
  16. 476
    Publicado 2022
    “…This comprehensive guide is written by two data literacy pioneers, each with a thorough footprint within the data and analytics commercial world and lectures at top universities in the US and the Netherlands. …”
    Grabación no musical
  17. 477
    “…This book teaches you how to secure your online identity and personal devices, encrypt your digital data and online communications, protect cloud data and Internet of Things (IoT), mitigate social engineering attacks, keep your purchases secret, and conceal your digital footprint. You will understand best practices to harden your operating system and delete digital traces using the most widely used operating system, Windows. …”
    Libro electrónico
  18. 478
    por Prag, Andrew
    Publicado 2016
    “…Although difficult to demonstrate empirically, the conditions that could lead to such effects are described conceptually in the report, noting particularities of certain types of schemes such as quantitative footprints. The report also documents a range of ways that government and non-government bodies have responded to ELIS multiplication, such as mutual recognition of schemes and creation of “focal” schemes or standards that can lead to market convergence. …”
    Capítulo de libro electrónico
  19. 479
    Publicado 2016
    “…A major change with the introduction of the DS8880 is the reduction of the footprint to a 19-inch rack. Like its predecessors, the DS8880 supports advanced disaster recovery (DR) solutions, business continuity solutions, and thin provisioning. …”
    Libro electrónico
  20. 480
    Publicado 2014
    “…The MQTT protocol is simple, which results in a client library with a low footprint. MQTT was proposed as an Organization for the Advancement of Structured Information Standards (OASIS) standard. …”
    Libro electrónico