Mostrando 641 - 660 Resultados de 1,227 Para Buscar '"Guard"', tiempo de consulta: 0.08s Limitar resultados
  1. 641
    Publicado 2012
    “…The update to the best-selling Rails tutorial includes: fully updated for Rails 3.2 and Ruby 1.9; all-new design using Twitter's Bootstrap; coverage of the new asset pipeline, including Sprockets & Sass; behavior-driven development (BDD) with Capybara & Rspec; better automated testing with Guard & Spork; roll your own authentication with has_secure_password; and an introduction to Gherkin & Cucumber. …”
    Video
  2. 642
    Publicado 2022
    “…Get to grips with artificial intelligence and cybersecurity techniques to respond to adversaries and incidents Key Features Learn how to secure your Azure cloud workloads across applications and networks Protect your Azure infrastructure from cyber attacks Discover tips and techniques for implementing, deploying, and maintaining secure cloud services using best practices Book Description Security is integrated into every cloud, but this makes users put their guard down as they take cloud security for granted. …”
    Libro electrónico
  3. 643
  4. 644
    por Grüneisen, Wladimir de
    Publicado 1911
    Libro
  5. 645
  6. 646
  7. 647
  8. 648
    Publicado 2014
    Tabla de Contenidos: “…Chapter 9 Glider Wings: Wherein our heroes get separated -- Build a Pair of Glider Wings -- Step 1: Lay Out the Patterns -- Step 2: Cut Part 1 of the Wings -- Step 3: Cut Part 2 of the Wings -- Step 4: Cut Part 3 of the Wings -- Step 5: Embellish the Wings -- Step 6: Assemble the Wings -- Step 7: The Harness -- Step 8: Mount the Wings -- Chapter 10 Rivet Gun (Modded Nerf Blaster): Wherein our heroes get stranded -- Build the Rivet Gun -- Step 1: Paint the Gun -- Step 2: The Handle -- Step 3: The Slide -- Step 4: The Top Ridge -- Step 5: The Magazine -- Step 6: The Barrel -- Step 7: Further Embellishment -- Chapter 11 Power Armor and Magnetic Amplification Gauntlet: Wherein our heroes are reunited -- Build the Power Armor -- Step 1: The Chest Plate -- Step 2: A Bit of Armor -- Step 3: Make the Belt -- Step 4: Make the Riveting Details -- Step 5: Form the Chest Plate -- Step 6: The Gauge -- Step 7: The Back Plate -- Step 8: Strapping -- Step 9: Finishing Touches on the Body Armor -- Step 10: Shoulders -- Step 11: Arm Pieces -- Step 12: Embellishments -- Build the Magnetic Amplification Gauntlet -- Step 1: Cut Out Your Patterns -- Step 2: The Base of the Arm Guard -- Step 3: The Grill -- Step 4: Put Them Together -- Step 5: Steampunk Tailoring for the Arm Guard -- Step 6: Hand and Knuckle Guards -- Step 7: Put It All Together -- Step 8: Embellishments -- Chapter 12 Rocket Pack: Wherein our heroes visit their uncle -- Build the Rocket Pack -- Step 1: Prepare the Bottles for Painting -- Step 2: Paint -- Step 3: The Mounting Plate and Harness -- Step 4: Decorate the Tanks -- Step 5: Attach the Tanks to the Mounting Plate -- Step 6: Attach the Nozzles -- Step 7: Embellishments -- Chapter 13 Epilogue: Wherein our heroes escape -- Part the Third: Hastily Scribbled Laboratory Notes -- Appendix A: This Way Lies Madness -- Further Reading -- Viewing -- Music…”
    Libro electrónico
  9. 649
    Publicado 1998
    Tabla de Contenidos: “…Basic Implication for U.S. Military Policy: ""Guarded Openness""Chapter Seven - Beyond Mexico; Toward a Demography of Social Netwar; Evolution of Organization, Doctrine, and Strategy; Favorable Conditions for Social Netwar; Challenges to Authoritarian Systems; Implications for the U.S. …”
    Libro electrónico
  10. 650
    Publicado 2006
    Tabla de Contenidos: “…Army Medical DepartmentNational Guard Bureau State Partnership Program; U.S. Army South; Conclusion; Chapter Seven - Concluding Observations; AIA Lessons Learned; How Should AIAKSS Information Be Used?…”
    Libro electrónico
  11. 651
    por Yoshida, Nobuko
    Publicado 2021
    Tabla de Contenidos: “…The Decidability of Verification under PS 2.0 -- Data Flow Analysis of Asynchronous Systems using Infinite Abstract Domains -- Types for Complexity of Parallel Computation in Pi-Calculus -- Checking Robustness Between Weak Transactional Consistency Models -- Verified Software Units -- An Automated Deductive Verication Framework for Circuit-building Quantum Programs -- Nested Session Types -- Coupled Relational Symbolic Execution for Differential Privacy -- Graded Hoare Logic and its Categorical Semantics -- Do Judge a Test by its Cover: Combining Combinatorial and Property-Based Testing -- For a Few Dollars More – Verified Fine-Grained Algorithm Analysis Down to LLVM -- Run-time Complexity Bounds Using Squeezers -- Complete trace models of state and control -- Session Coalgebras: A Coalgebraic View on Session Types and Communication Protocols -- Correctness of Sequential Monte Carlo Inference for Probabilistic Programming Languages -- Densities of Almost Surely Terminating Probabilistic Programs are Differentiable Almost Everywhere -- Graded Modal Dependent Type Theory -- Automated Termination Analysis of Polynomial Probabilistic Programs -- Bayesian strategies: probabilistic programs as generalised graphical models -- Temporal Refinements for Guarded Recursive Types -- Query Lifting: Language-integrated query for heterogeneous nested collections -- Reverse AD at Higher Types: Pure, Principled and Denotationally Correct -- Sound and Complete Concolic Testing for Higher-order Functions -- Strong-Separation Logic. …”
    Libro electrónico
  12. 652
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: TypeScript Best Practices -- Environment setup -- Node.js and npm for Linux -- TypeScript -- Quick overview -- Best practices -- Naming -- Interface redefinitions -- Getters and setters -- Constructor -- Type guards -- Enumerator -- Pitfalls -- Type-casting and JSON -- Inheritance and polymorphism -- Summary -- Chapter 2: Angular Bootstrapping -- Architectural overview -- Component -- Services -- Directives -- Pipes -- Routes -- Angular CLI -- Installation -- Creating a new application -- Generating -- Serving -- Deploying -- Summary -- Chapter 3: Classical Patterns -- Components -- Singleton -- Factory method -- Observer -- TypeScript observables with parameters -- Observing HTTP responses -- Implementation -- Understanding the implementation -- Promises -- Summary -- Chapter 4: Navigational Patterns -- MVC -- Model-view-controller at large -- Model-view-controller limitations for the frontend -- Angular's model-view-controller -- Redux -- Summary -- Chapter 5: Stability Patterns -- Timeouts -- Circuit breaker -- Factory -- Memento -- Summary -- Chapter 6: Performance Patterns -- AJAX overkill -- Proxy patterns -- Loop count -- Change detection and immutable states -- Prototype and the reusable pool -- Summary -- Chapter 7: Operation Patterns -- General health metrics -- Specific metrics -- Error reporting -- Method metrics with AOP -- Summary -- Other Books You May Enjoy -- Index…”
    Libro electrónico
  13. 653
    Publicado 2011
    Tabla de Contenidos: “…Coming Home: Examining the Homecoming Experiences of Young Veterans Beyond Words: Homeless Veterans Who Served in Iraq and Afghanistan; Tragedy, Loss, and Triumph After Combat: A Portrait of Young Women Veteran Survivors of Sexual and Combat Trauma; Living in Transition: Young Veterans' Health and the Postdeployment Shift to Family Life 1; Ensuring Equality After the War for the National Guard and Reserve Forces: Revisiting the Yellow Ribbon Initiative; Managing the Return to the Workplace: Reservists Navigating the Stormy Seas of the Homeland…”
    Libro electrónico
  14. 654
    Publicado 2022
    Tabla de Contenidos: “…Acknowledgments -- Preface -- Coding, robotics, and values foundations : a coding playground -- Languages for children -- Starting early -- A window into their world : mouths cannot read bar codes -- The coding wars -- The two sides : a simplified story -- The role of the teacher -- The role of the student -- The role of education -- The role of coding -- A window into their world : robotics guarding nature -- The rise of STEM -- The work pipelines -- Global experience -- Computer science and computational thinking -- The problem with STEM -- A window into their world : programming a map ; building a language -- Coding as another language -- Transitioning languages -- Meaningful sequences -- Doing things with language -- Window into their world : Georgia, Elena,and the old lady -- From theory to practice -- Powerful ideas -- A teacher's perspective -- Coding stages -- A window into their world : the missing audience -- Coding character -- The narrative approach : moral identities -- The reasoning approach : moral thought -- The experiential approach : a moral life -- The values in coding as another language -- A window into Their world : the best use of her time -- The palette of virtues -- The coding playground -- The ten virtues -- Curiosity -- Open-mindedness -- perseverance -- Patience -- Optimism -- Honesty -- Fairness -- Generosity -- Gratitude -- Forgiveness -- Coding a Mensch -- A window into their world : the learning family -- Coding bridges -- The hidden curriculum -- My four powerful ideas : a summary -- A window into their world : A diversity of approaches…”
    Libro
  15. 655
    Publicado 2007
    Tabla de Contenidos: “…Sample Scenario of STP Election Process -- STP Topology Changes -- Per VLAN Spanning Tree Plus -- MAC Address Allocation and Reduction -- STP and IEEE 802.1Q Trunks -- Configuring the Basic Parameters of PVST+ -- Configuring the Root Bridge -- Configuring Port Cost -- Verifying the STP Configuration -- Rapid Spanning Tree Protocol -- RSTP Port States -- RSTP Port Roles -- RSTP BPDU Format and BPDU Handling -- Rapid Transition to Forwarding -- RSTP Topology Change Mechanism -- Compatibility with 802.1D -- Multiple Spanning Tree -- PVST+ Case -- 802.1Q Case -- MST Case -- MST Regions -- IST Instances -- MST Instances -- Configuring Basic Parameters of MST -- Study Tips -- Summary -- Configuration Exercise: Configuring and Verifying Spanning-Tree Bridge Priorities and Spanning-Tree Port Cost -- Required Resources -- Exercise Objective -- Network Diagram -- Command List -- Task 1: Configure and Verify Spanning Tree Root and Backup Bridges and STP Priorities -- Task 2: Configure and Verify Spanning Tree Port Cost -- Task 3: Identifying STP Topology Changes -- Review Questions -- Chapter 6 Adding Resiliency to Spanning Tree Using Advanced Features and Troubleshooting STP Issues -- Enhancements to 802.1D Spanning Tree Protocol -- PortFast -- UplinkFast -- BackboneFast -- Improving Spanning-Tree Resiliency -- BPDU Guard -- BPDU Filtering -- Root Guard -- Preventing Forwarding Loops and Black Holes -- Loop Guard -- Comparison Between Aggressive Mode UDLD and Loop Guard -- Troubleshooting STP -- Potential STP Problems -- Troubleshooting Methodology for STP Problems -- Know the Network -- Identify a Bridging Loop -- Restore Connectivity -- Check Port Status -- Look for Resource Errors -- Disable Unneeded Features -- Study Tips -- Summary -- Configuration Exercise: Configuring BackboneFast, UplinkFast, Root Guard, and PortFast -- Required Resources…”
    Libro electrónico
  16. 656
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Robotics 101 -- The hardware arsenal -- Setting up Raspberry Pi -- Let's program -- Playing with voltage -- Summary -- Chapter 2: Using GPIOs as Input -- A deeper dive into GPIOs -- Interfacing the PIR sensor -- Interfacing the ultrasonic proximity sensor -- Interfacing through I2C -- Summary -- Chapter 3: Making a Gardener Robot -- Working with solenoids -- Making the robot -- Making it more intelligent -- Making it truly intelligent -- Summary -- Chapter 4: Basics of Motors -- The basics -- Getting it rolling -- Changing the speed -- Summary -- Chapter 5: Making a Pet Feeding Robot -- Force measurement -- Constructing the robot -- Making the robot detect pets -- Summary -- Chapter 6: Bluetooth-Controlled Robotic Car -- Basics of the vehicle -- Getting the vehicle ready -- Controlling the vehicle by Bluetooth -- Summary -- Chapter 7: Sensor Interface for Obstacle Avoidance -- Infrared proximity sensor -- Autonomous emergency braking -- Giving the car self-steering capabilities -- Making it fully autonomous -- Summary -- Chapter 8: Making Your Own Area Scanner -- Servo motor -- Lists -- Looking around -- LIDAR on an autonomous vehicle -- Summary -- Chapter 9: Vision Processing -- The basics of images -- Preparing Raspberry Pi for vision processing application -- Image recognition -- Summary -- Chapter 10: Making a Guard Robot -- Face detection -- Knowing the face -- Recognizing the face -- Making the guard robot -- Summary -- Chapter 11: Basic Switching -- Making Jarvis wake you up -- Working with relay and PIR sensor -- Making the alarm irritating -- Making it even more irritating -- Summary -- Chapter 12: Recognizing Humans with Jarvis -- Turn on the light Jarvis -- Understanding motion -- Perfecting motion…”
    Libro electrónico
  17. 657
    Publicado 2015
    Tabla de Contenidos: “…Overriding Methods: Pirates are People, TooUsing super; Protecting the Kingdom with GuardDogs and FlyingMonkeys; Every GuardDog Has His Day ; Once More, with Feeling!…”
    Libro electrónico
  18. 658
    Publicado 2015
    Tabla de Contenidos: “…The print server role securityPrint server access mechanisms; The printer driver security and installation; Print server and share permissions; Hyper-V servers; Applying baseline security; Securing the access mechanism; Guard protection; Enabling the guard protection; Encrypting Hyper-V host servers; Internet Information Services; Applying baseline security; Securing web server components; Securing the access mechanisms; Adding dynamic IP restrictions; Summary; Chapter 5: Network Service Security; Baseline policies; Installing RODCs; Configuring RODCs; Domain Name System…”
    Libro electrónico
  19. 659
    por Greenwald, Rick
    Publicado 2008
    Tabla de Contenidos: “…Information Lifecycle Management and ILM AssistantBackup and Recovery; Incremental backup and recovery; Oracle Secure Backup; Database Availability; Data Guard; Fail Safe; Oracle Real Application Clusters; Data Guard and RAC; Automated Storage Management; Real Application Testing Option; Database Security Features; Label Security Option; Database Vault Option; Audit Vault Server; Oracle Development Tools; Oracle SQL Developer; Oracle Forms Developer; Oracle Reports Developer; Oracle Designer; Oracle Discoverer Administration Edition; Oracle Portal; Embedded Databases; Oracle Berkeley DB…”
    Libro electrónico
  20. 660
    por Prowell, Stacy J.
    Publicado 2010
    Tabla de Contenidos: “…Spanning Tree AttacksLayers of the Internet; Understanding the Spanning Tree Protocol; The Problem of Loops; Solving the Loop Problem with the Spanning Tree Protocol; How Spanning Tree Attacks Work; Capturing BPDU Traffic; Taking over the Root Bridge; Denial of Service; Man in the Middle; Forging BPDU Frames; Discovering the Network; Dangers of Spanning Tree Attacks; Defending against Spanning Tree Attacks; Disable STP; Root Guard and BPDU Guard; The Future of Spanning Tree Attacks; Summary; Endnotes; Chapter 6. …”
    Libro electrónico