Mostrando 621 - 640 Resultados de 1,227 Para Buscar '"Guard"', tiempo de consulta: 0.07s Limitar resultados
  1. 621
    Publicado 2012
    Tabla de Contenidos: “…African diasporas in Asia and the Mediterranean : a methodological introduction -- "African diaspora" and "creolity" : confronting the two concepts and their references -- Female bondage and agency in the Indian Ocean world -- Diversity of experience and legacies of African slavery in the western Indian Ocean -- African cavalry guards : a place for the construction of memory, identity and ethnicity -- Jews in Siddi Janjira -- "Black face, white heart; long live the king" : the ambiguous identity of the African soldiers in the Dutch East Indies army -- Unauthorised voyagers across two oceans : Africans, Indians and Aborigines in Australia -- The stambali of Tunis : its origins and transculturation from a secret-possession cult to ethno-religious and national culture in Ḥusaynid Tunisia -- Coping with trauma in a new world : cultural response of enslaved Africans in the Ottoman Empire -- Liberated bodies and saved souls : freed African slave girls and missionaries in Egypt -- The pupil of the eye : abolitionism, racial unity, and the iconography of enslaved Africans in Baha'i tradition -- "The Jewish rabbis have stopped protecting us, and the bad witches from home enter" : African migrant workers in Israel trapped between the extended family, money and witchcraft -- Construction of identity and integration of Turks of African descent…”
    Libro
  2. 622
    por Kaminow, Ivan P., 1930-
    Publicado 2013
    Tabla de Contenidos: “…3.4.3.1 Multiplexing OFDM-modulated signals with guard band 3.4.3.2 Multiplexing Nyquist-filtered single-carrier signals with guard band; 3.5 Detection; 3.6 Superchannel Transmission; 3.6.1 Transmission based on single-carrier modulation and O-OFDM multiplexing; 3.6.2 Transmission based on OFDM modulation and O-OFDM multiplexing; 3.6.3 Transmission based on Nyquist-WDM; 3.6.4 Optimization of the spectral-efficiency-distance-product; 3.7 Networking Implications; 3.8 conclusion; Acknowledgments; Glossary; References; 4 Optical Satellite Communications; 4.1 Introduction; 4.1.1 Reduced diffraction…”
    Libro electrónico
  3. 623
    por Lipovača, Miran
    Publicado 2011
    Tabla de Contenidos: “…; What You Need to Dive In; Acknowledgments; Chapter 1: Starting Out; Calling Functions; Baby's First Functions; An Intro to Lists; Texas Ranges; I'm a List Comprehension; Tuples; Chapter 2: Believe the Type; Explicit Type Declaration; Common Haskell Types; Type Variables; Type Classes 101; Chapter 3: Syntax in Functions; Pattern Matching; Guards, Guards!; where?!; let It Be; case Expressions; Chapter 4: Hello Recursion!…”
    Libro electrónico
  4. 624
    por Makan, Keith
    Publicado 2013
    Tabla de Contenidos: “…Man in the middle attacks on applicationsChapter 5: Protecting Applications; Introduction; Securing application components; Protecting components with custom permissions; Protecting content provider paths; Defending against SQL injection attack; Application signature verification (anti-tamper); Tamper protection by detecting the installer, emulator, and debug flag; Removing all log messages with ProGuard; Advanced code obfuscation with DexGuard; Chapter 6: Reverse Engineering Applications; Introduction; Compiling from Java to DEX; Decompiling DEX files; Interpreting the Dalvik bytecode…”
    Libro electrónico
  5. 625
    por Dobbins, James
    Publicado 2011
    Tabla de Contenidos: “…Interests, Objectives, and Strategies; Long History of Mutual Grievances; Ups and Downs in the Relationship; Chapter Three: Iran's Interests, Objectives, and Strategies; Iranian Views of the United States; Iranian Factional Interests; Ideological Opposition to the United States; The Revolutionary Guards; Iran's Future Nuclear Posture; Conclusion; Chapter Four: The Other Actors; The Gulf Cooperation Council States; Key Areas of U.S. …”
    Libro electrónico
  6. 626
    por Empson, Scott, Roth, Hans, 1953-
    Publicado 2010
    Tabla de Contenidos: “…Cover -- Contents -- Introduction -- Chapter 1 Analyzing Campus Network Designs -- Cisco Hierarchical Model of Network Design -- Cisco Enterprise Composite Network Model -- Cisco Service-Oriented Network Architecture -- PPDIOO Lifecycle Approach -- Chapter 2 Implementing VLANs in a Campus Network -- Virtual Local Area Networks -- Creating Static VLANs -- Assigning Ports to VLANs -- Using the range Command -- Dynamic Trunking Protocol -- Setting the Encapsulation Type -- Verifying VLAN Information -- Saving VLAN Configurations -- Erasing VLAN Configurations -- Verifying VLAN Trunking -- VLAN Trunking Protocol -- Verifying VTP -- Configuration Example: VLANs -- Private Virtual Local Area Networks -- Configuring Private VLANs -- PVLAN Trunk on the Catalyst 3560/3750 -- PVLAN Trunk on the Catalyst 4500 -- PVLAN on a 3750 Layer 3 Switch -- Verifying PVLANs -- Configuration Example: PVLAN -- EtherChannel -- Interface Modes in EtherChannel -- Guidelines for Configuring EtherChannel -- Configuring L2 EtherChannel -- Configuring L3 EtherChannel -- Verifying EtherChannel -- Configuration Example: EtherChannel -- Chapter 3 Implementing Spanning Tree -- Enabling Spanning Tree Protocol -- Configuring the Root Switch -- Configuring a Secondary Root Switch -- Configuring Port Priority -- Configuring the Path Cost -- Configuring the Switch Priority of a VLAN -- Configuring STP Timers -- FlexLinks -- Verifying STP -- Optional STP Configurations -- PortFast -- BPDU Guard -- BPDU Filtering -- UplinkFast -- BackboneFast -- Root Guard -- Loop Guard -- Unidirectional Link Detection -- Changing the Spanning-Tree Mode -- Extended System ID -- Enabling Rapid Spanning Tree -- Enabling Multiple Spanning Tree -- Verifying MST -- Troubleshooting Spanning Tree -- Configuration Example: STP -- Core Switch (3560) -- Distribution 1 Switch (3560) -- Distribution 2 Switch (3560)…”
    Libro electrónico
  7. 627
    Publicado 2023
    Tabla de Contenidos: “…-- The bring your own device model -- The choose your own device model -- Key considerations -- Comparing options -- Protection and governance options -- Identity and access management -- Information protection -- Device configuration -- Application management -- Storage sync options -- OneDrive for Business -- Work Folders -- Alternative EUC delivery options -- Windows 365 Cloud PC and Azure Virtual Desktop -- Enabling virtual private networks -- Publishing applications via proxy -- End user behavior analytics -- Summary -- Chapter 8: Windows 11 Security -- Introducing security posture -- Zero trust -- Defense in depth -- Ensuring hardware security -- TPM -- Microsoft Pluton security processor -- Windows Defender System Guard -- Hypervisor-protected Code Integrity -- Ensuring that we operate system security -- Introducing Secure Boot and Trusted Boot -- Exploring the Windows Security app -- Using BitLocker for encryption -- Security baselines -- Ensuring user identity security -- Windows Hello for Business -- Microsoft Defender Credential Guard -- Summary -- Chapter 9: Advanced Configurations -- Virtual desktops -- On-prem virtual desktop best practices -- VDI configurations -- The Windows Configuration Designer -- Windows 11 Kiosk Mode -- Windows Autopilot -- The Set up School PCs application -- Device lockdown -- Windows Subsystem for Linux -- Group Policy Editor -- Remote Desktop Protocol -- Windows Hello and Windows Hello for Business -- Windows Firewall with Advanced Security -- Hyper-V -- Windows Task Scheduler -- Enabling BitLocker drive encryption -- Storage Spaces Direct -- Windows Defender Application Guard -- Summary -- Chapter 10: Windows 11 21H2 and 22H2 Changes (versus Windows 10) -- New Start menu and taskbar…”
    Libro electrónico
  8. 628
    Publicado 2014
    “…Like many young Neapolitan physicians, Giosuè Sangiovanni (1776-1849) was involved in the revolution of 1799. He served in the Guard of the Republic, whose tragic end marked his destiny as an exile and a scientist. …”
    Libro electrónico
  9. 629
    Publicado 2002
    “…However, they risked, despite their loyalty, to violate the secrets entrusted to their guard to deliver them to the enemy, if they fell into his hands. …”
    Libro electrónico
  10. 630
    Publicado 2019
    “…Mencken as a catalyst for the blossoming of black literary culture in the 1920s and chronicles the intensely productive exchange of ideas between Mencken and two generations of black writers: the Old Guard who pioneered the Harlem Renaissance and the Young Wits who sought to reshape it a decade later. …”
    Libro electrónico
  11. 631
    Publicado 2018
    “…Like the exam, the guide goes beyond knowledge application and is designed to ensure that security personnel anticipate security risks and guard against them. In Mike Meyers’ CompTIA Security+ Certification Guide, Second Edition (Exam SY0-501) , the bestselling author and leading authority on CompTIA A+ certification brings his proven methodology to IT security. …”
    Libro electrónico
  12. 632
    Publicado 2015
    “…Like the exam, this book goes beyond knowledge application and is designed to ensure that security personnel anticipate security risks and guard against them. Meyers’ “in the trenches” voice and the clarity of his explanations make his books the bestselling self-study resources available for professional certification. …”
    Libro electrónico
  13. 633
    Publicado 2015
    “…Discover the differences of using a fat arrow vs. a skinny arrow when defining functions Learn the quickest way to test JavaScript in a Rails application Explore how to add client-side subscriptions using EventSource and the Sinatra streaming API Generate source map files and use them to debug CoffeScript code in the browser Build a jQuery plug-in using Jasmine, Guard, and test driven development…”
    Video
  14. 634
    Publicado 2019
    “…With this knowledge, you will be able to confidently mitigate and help guard your network from the multifaceted attacks that you will encounter while also preparing you to pass the CEH exam. …”
    Video
  15. 635
    Publicado 2018
    “…He admits to spending a lot of time alone, that very little makes him happy, and he has few times he can let his guard down and make people laugh. Dan further describes a lack of appetite, that he has lost weight recently, stopped playing sports because of an injury, and is just tired a lot…”
    Vídeo online
  16. 636
    Publicado 2010
    “…A passionate searcher for immortality, he developed his own version of pantheism meant to guard his unique persona from dissolution in the All-One. …”
    Libro electrónico
  17. 637
    Publicado 2008
    “…Plan and deploy permanent, temporary, and bigfile tablespaces Optimize disk allocation, CPU usage, I/O throughput, and SQL queries Develop powerful database management applications Guard against human errors using Oracle Flashback and Oracle Automatic Undo Management Diagnose and tune system performance using Oracle Automatic Workload Repository and SQL Tuning Sets Implement robust security using authentication, authorization, fine-grained auditing, and fine-grained access control Maintain high availability using Oracle Real Application Clusters and Oracle Active Data Guard Respond more efficiently to failure scenarios by leveraging the Oracle Automatic Diagnostic Repository and the Oracle Repair Advisor Back up and restore tables, tablespaces, and databases with Oracle Recovery Manager and Oracle Data Pump Export and Import Work with networked databases, data warehouses, and VLDBs Put the latest Oracle Database 11 g tools to work--Oracle Total Recall, Oracle Flashback Data Archive, and more…”
    Libro electrónico
  18. 638
    Publicado 2011
    “…"A collection of intelligence and security articles, this book covers common security terms and vulnerabilities that security and IT personnel need to know in order to guard their systems. Topics discussed include Stack Based Buffer Overflows, Malware Naming, Fast-Flux, SQL Injection, and Format String Vulnerability. …”
    Libro electrónico
  19. 639
    Publicado 2019
    “…Most importantly and all new, they tell you how to identify and guard against manipulation so you remain in control of your choices and options. …”
    Libro electrónico
  20. 640
    Publicado 2020
    “…Over the course of this book, you'll learn to use AWS security services such as Config for monitoring, as well as maintain compliance with GuardDuty, Macie, and Inspector. Finally, the book covers cloud security best practices and demonstrates how you can integrate additional security services such as Glacier Vault Lock and Security Hub to further strengthen your infrastructure. …”
    Libro electrónico