Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 46
- Computer networks 39
- Computer security 36
- Historia 34
- Development 33
- Application software 30
- History 30
- Oracle (Computer file) 29
- Història 28
- Carles 26
- Engineering & Applied Sciences 25
- Cloud computing 24
- Mental illness 22
- Database management 20
- Management 20
- Delusions 18
- Diagnosis 18
- Examinations 18
- Paranoia 18
- Relational databases 16
- Certification 15
- United States 15
- Amazon Web Services (Firm) 14
- Armed Forces 14
- AngularJS (Software framework) 13
- Comercio 13
- Consulado de Bilbao 13
- Guerra de Successió, 1702-1714 13
- Programming 13
- Sermons castellans 13
-
881por Luther, Martin, 1483-1546Tabla de Contenidos: “…A sincere admonition by Martin Luther to all Christians to guard against insurrection and rebellion (1522) : LW 45:51 -- Luther's table talk (1542) : LW 54:428ff -- Preface to the complete edition of Luther's Latin writings (1545) : LW 34:336-38 -- On the Jews and their lies (1543) : LW 47:137ff -- Luther's will (Wittenberg, January 6, 1542) : LW 34:289-97…”
Publicado 2012
Libro -
882Publicado 2017Tabla de Contenidos: “…SECURING COMMUNICATIONS -- The Favored Operating System: Linux -- Step 1: Let Us Get Secure: Encrypting Files and Using Secure Shell -- Gnu Privacy Guard -- Encrypting and Decrypting Using GNU Privacy Guard -- Secure Shell Access to Servers -- Moving Files Securely -- Exercise for the Reader -- 4. …”
Libro electrónico -
883Publicado 2021Tabla de Contenidos: “…Control Structures -- for Loops and for Expressions -- if/then/else-if Expressions -- match Expressions and Pattern Matching -- try/catch/finally Blocks -- while Loops -- Control Structures as a Defining Feature of Programming Languages -- 4.1 Looping over Data Structures with for -- Problem -- Solution -- Discussion -- See Also -- 4.2 Using for Loops with Multiple Counters -- Problem -- Solution -- Discussion -- See Also -- 4.3 Using a for Loop with Embedded if Statements (Guards) -- Problem -- Solution -- Discussion -- 4.4 Creating a New Collection from an Existing Collection with for/yield -- Problem -- Solution -- Discussion -- See Also -- 4.5 Using the if Construct Like a Ternary Operator -- Problem -- Solution -- Discussion -- 4.6 Using a Match Expression Like a switch Statement -- Problem -- Solution -- Discussion -- See Also -- 4.7 Matching Multiple Conditions with One Case Statement -- Problem -- Solution -- See Also…”
Libro electrónico -
884por Breeze, David J.Tabla de Contenidos: “…The late Roman fort at Portchester Castle -- Figure 63. The Ermine Street Guards on parade -- Figure 64. Tom Parker gets instructions on ballista from the Ermine Street Guard -- Figure 65. …”
Publicado 2022
Libro electrónico -
885Publicado 2018Tabla de Contenidos: “…-- Server setup -- Client connections -- Setting up Vue and Socket.io -- Determining connection status -- Creating a connection status bar -- Navigation bar -- Message list -- Adding messages to the list -- Server-side events with Socket.io -- Nodemon -- Summary -- Chapter 8: Vue Router Patterns -- Single Page Applications -- Using the router -- Creating routes -- Dynamic routes -- Route props -- Component Navigation Guards -- beforeRouteUpdate -- beforeRouteEnter -- beforeRouteLeave -- Global router hooks -- beforeEach -- beforeResolve -- afterEach -- Resolution stack -- Programmatic navigation -- router.replace -- router.go -- Lazy loading routes -- An SPA project -- Enabling the router -- Defining routes -- Creating the UserList route -- Getting data from an API -- Creating a detail page -- Child routes -- Summary -- Chapter 9: State Management with Vuex -- What is Vuex? …”
Libro electrónico -
886por Kruegle, HermanTabla de Contenidos: “…1.2.1.7 Standby Power and Communications1.2.2 Security Investigations; 1.2.3 Safety; 1.2.4 The Role of the Guard; 1.2.5 Employee Training and Education; 1.3 Synergy through Integration; 1.3.1 Integrated Functions; 1.3.2 System Hardware; 1.4 Video's Role and Its Applications; 1.4.1 Video System Solutions; 1.4.2 Overt vs. …”
Publicado 2005
Libro electrónico -
887por Loshin, PeterTabla de Contenidos: “…3.3.9 KeePassX3.3.10 Metadata Anonymization Toolkit; 3.3.11 Claws Mail; 3.3.12 GNU Privacy Guard; 4 Tor Relays, Bridges, and Obfsproxy; 4.1 When Basic Tor Is Not Enough; 4.1.1 How China Blocked Tor; 4.1.2 Is Tor Down, or Do You Need a Bridge; 4.2 Bridge Relays; 4.2.1 Getting a Bridge Relay Using BridgeDB; 4.2.2 Getting Bridge Relays by E-mail; 4.2.3 Other Ways to Get Bridge Relays; 4.3 Setting Up to Use a Bridge Relay; 4.4 Pluggable Transports and Obfsproxy; 4.4.1 Pluggable Transport Proxies; 4.4.2 Flash Proxy; 4.4.3 Using Pluggable Transports; 5 Sharing Tor Resources…”
Publicado 2013
Libro electrónico -
888Publicado 2016Tabla de Contenidos: “…-- 11.3 String Dependencies - Abhängigkeiten von Zeichenketten -- 11.4 Enumerationen -- 11.5 Enumerationen mit Methoden -- Kapitel 12: Sicherer Programmcode -- 12.1 Funktionen absichern mit guard -- 12.2 Fehlerbehandlung -- 12.3 Fehler werfen mit throw -- 12.4 Fehler auffangen mit catch -- Kapitel 13: Speicherverwaltung mit Referenzzähler -- 13.1 Automatic Reference Counting -- 13.2 Starke und schwache Referenzen -- 13.3 Zirkelverweise -- Kapitel 14: Lotto - 6 aus 49 -- 14.1 MVC: Model - View - Controller -- 14.2 Projektvorlage - Cocoa Application -- 14.3 Der Lottozahlengenerator -- 14.4 Der Interface Builder -- 14.5 Inspector und Bibliothek -- 14.6 Arbeiten mit dem Interface Builder -- 14.7 Der Controller -- 14.8 Zurück zum Interface Builder -- 14.9 Das war es jetzt schon? …”
Libro electrónico -
889Publicado 2023Tabla de Contenidos: “…-- A Java code coverage tool - JaCoCo -- Test-driven development -- Advantages of TDD -- Summary -- Further reading -- Chapter 5: Refactoring Techniques -- Writing better methods -- Extract Method -- Inline Method -- Extract and inline variables -- Combining a function into a class -- Moving features between objects -- Moving a method or field -- Moving statements into/from methods -- Hiding delegates -- Removing dead code -- Organizing data -- Field encapsulation -- Replacing primitives with objects -- Replacing type code with subclasses -- Simplifying conditional logic -- Returning a special case instead of null -- Using polymorphism instead of conditions -- Removing duplicated conditions -- Guard clauses -- Simplifying method calls -- Avoiding side effects -- Removing setter methods -- Using generalization -- Pull up field -- Push down field -- Pull up method -- Push down method -- Template method -- Using enums instead of constants -- Summary -- Further reading -- Chapter 6: Metaprogramming -- What is metaprogramming? …”
Libro electrónico -
890por Barrett, Daniel J.Tabla de Contenidos: “…1.4.4 Keys and Agents1.4.5 Access Control; 1.4.6 Port Forwarding; 1.5 History of SSH; 1.6 Related Technologies; 1.6.1 rsh Suite (r-Commands); 1.6.2 Pretty Good Privacy (PGP) and GNU Privacy Guard (GnuPG); 1.6.3 Kerberos; 1.6.4 IPSEC and Virtual Private Networks; 1.6.5 Secure Remote Password (SRP); 1.6.6 Secure Socket Layer (SSL) Protocol; 1.6.7 SSL-Enhanced Telnet and FTP; 1.6.8 stunnel; 1.6.9 Firewalls; 1.7 Summary; Basic Client Use; 2.1 A Running Example; 2.2 Remote Terminal Sessions with ssh; 2.2.1 File Transfer with scp; 2.3 Adding Complexity to the Example; 2.3.1 Known Hosts…”
Publicado 2005
Libro electrónico -
891por Impact of Empire (Organization).“…Military installations and buildings, the imperial guard, other troops, fleets, and militarily tinged works of art brought home the majesty of Rome to anybody who saw them, in Rome and in other parts of the Empire. …”
Publicado 2007
Libro electrónico -
892Publicado 2022Tabla de Contenidos: “…Gain on DC Zone Assets -- Gain on Reinvestments in Opportunity Zones -- Foreign Taxes on Investments -- Exercise of Incentive Stock Options -- Losses from Investment Ponzi Schemes -- Deferral of Income in Commercial Annuities -- Chapter 9 Travel -- Business Travel -- Temporary Work Assignments -- Conventions -- Medical Travel -- Charitable Travel -- Education‐Related Travel -- National Guard and Military Reservist Travel -- Frequent Flier Miles -- Recordkeeping for Travel Expenses -- Chapter 10 Real Estate -- Vacation Home -- Home Office -- Timeshares -- Rentals -- Low‐Income Housing Credit -- Rehabilitation Credit -- Like‐Kind Exchanges -- Deduction for Energy‐Efficient Commercial Buildings -- Qualified Improvement Property -- Conservation Easements -- Chapter 11 Borrowing and Interest -- Home Mortgage Interest -- Student Loan Interest -- Borrowing from Retirement Plans -- Investment‐Related Interest -- Business Interest -- Accrued Interest on Bond Purchases -- Below‐Market Loans -- Bad Debts -- Debt Forgiveness -- Chapter 12 Insurance and Catastrophes -- Casualty, Theft, and Disaster Losses -- Economic Impact Payments -- Disaster Relief Payments -- Damages -- Disability Coverage -- Accelerated Death Benefits -- Legal Fees -- Identity Theft Losses -- Tax Identity Theft and Relief -- Chapter 13 Your Job -- Educator Expenses -- Prizes and Awards -- Performing Artists -- State or Local Government Officials Paid on a Fee Basis -- Repayment of Supplemental Unemployment Benefits -- Jury Duty Pay Turned Over to Your Employer -- Impairment‐Related Expenses -- Military Benefits -- Contributions to State Benefit Programs -- Dependent Care Assistance -- Fringe Benefits -- Income Earned Abroad -- Chapter 14 Your Business -- Start‐Up Costs -- Qualified Business Income Deduction -- Equipment Purchases -- Payment for Services -- Supplies -- Gifts…”
Libro electrónico -
893Publicado 2024Tabla de Contenidos: “…Logging options -- DFIR use cases for S3 monitoring -- AWS CloudTrail -- Creating a trail -- Event data stores -- Investigating CloudTrail events -- DFIR use cases for CloudTrail logging -- AWS CloudWatch -- CloudWatch versus CloudTrail -- Setting up CloudWatch logging -- Querying CloudWatch logs on the AWS console -- DFIR use cases for CloudWatch -- Amazon GuardDuty -- Amazon Detective -- Summary -- Further reading -- Part 2: Forensic Readiness: Tools, Techniques, and Preparation for Cloud Forensics -- Chapter 5: DFIR Investigations - Logs in Azure -- Azure Log Analytics -- Azure Virtual Networks -- NSG flow logs -- Azure Storage -- Azure Monitor -- Azure Virtual Machines log analysis -- Microsoft Defender for Cloud -- NSG flow logs -- Microsoft Sentinel -- Summary -- Further reading -- Chapter 6: DFIR Investigations - Logs in GCP -- GCP core services -- GCP IAM -- GCP's IAM roles and identities -- Policy Analyzer -- DFIR use cases for Policy Analyzer -- GCP Logs Explorer -- Overview of log buckets -- DFIR use cases for using Logs Explorer -- Familiarizing with Logs Explorer -- VPC Flow Logs -- Enabling VPC Flow Logs -- Hunting VPC Flow Logs for malicious activities -- Packet Mirroring -- Compute Engine logs -- GCP's logging platform -- GCP's default logging -- Logging Dataflow pipelines -- GCP storage logs -- Storage permissions -- Storage object logging -- Investigating GCP Cloud storage logs -- Cloud Security Command Center (Cloud SCC) -- IAM roles -- Threats and Findings dashboards -- GCP Cloud Shell -- Summary -- Further reading -- Chapter 7: Cloud Productivity Suites -- Overview of Microsoft 365 and Google Workspace core services -- Microsoft 365 -- Google Workspace -- IAM in Microsoft 365 and Google Workspace -- Microsoft 365 -- Google Workspace -- Auditing and compliance features in Microsoft 365 and Google Workspace…”
Libro electrónico -
894Publicado 2021Tabla de Contenidos: “…Setting up state management using Vuex -- Step 1 - Writing a store -- Step 2 - Writing a module -- Step 3 - Writing a module if we are using TypeScript -- Step 4 - Writing an API service -- Step 5 - Writing an action type -- Step 6 - Writing an action -- Step 7 - Writing a state -- Step 8 - Writing a mutation -- Step 9 - Writing a getter -- Step 10 - Updating the store by inserting the module -- Step 11 - Updating components with mapGetters and mapActions -- Summary -- Chapter 15: Sending POST, DELETE, and PUT HTTP Requests in Vue.js with Vuex -- Technical requirements -- Removing a tour list using Axios and Vuex -- Adding a tour list using Axios and Vuex -- Using a non-async action in Vuex -- Removing a tour package using Axios and Vuex -- Adding a tour package using Axios and Vuex -- Updating a tour package using Axios and Vuex -- Summary -- Chapter 16: Adding Authentication in Vue.js -- Technical requirements -- Setting up Vuex for authentication -- Writing an auth guard -- HTTP interceptor -- Auto login -- Summary -- Section 4: Testing and Deployment -- Chapter 17: Input Validations in Forms -- Technical requirements -- Installing an input validation library -- Using validators in forms -- Summary -- Chapter 18: Writing Integration Tests Using xUnit -- Technical requirements -- Getting started with automated testing -- Benefits of automated testing -- Installing MS SQL Server in a Docker container -- Understanding xUnit -- Features of xUnit -- Using xUnit in ASP.NET Core -- Understanding unit testing -- Writing unit tests -- Understanding integration testing -- Writing integration tests -- Summary -- Chapter 19: Automatic Deployment Using GitHub Actions and Azure -- Technical requirements -- Introducing GitHub Actions - a CI/CD tool -- Understanding GitHub Actions -- GitHub Actions for .NET apps -- Understanding where to deploy…”
Libro electrónico -
895Publicado 2018Tabla de Contenidos: “…Twitter Sign-in -- Twitter Api key -- Project Configuration -- Phone number sign-in -- Project configuration -- Firebase SDK social networking site authentication -- Google sign-in -- Facebook login -- Twitter sign-in -- Phone number sign-in -- Anonymous Authentication -- Link multiple Auth providers -- Firebase Authentication failures -- Firebase Authentication exceptions -- Summary -- Chapter 3: Safe and Sound - Firebase Crashlytics -- Firebase Crash Reporting and Crashlytics -- Firebase Crash Reporting setup -- Creating crash reports -- Creating custom logs -- Deobfuscating ProGuard labels -- Crash Report support for multiple APK -- Disabling Crash Reporting -- Firebase Crashlytics -- Firebase Crashlytics setup and upgrading from Crash Reporting -- Migrating from Firebase Crash Reporting to Crashlytics -- Validating Crashlytics implementation -- Enabling Crashlytics debug mode -- Customizing Crashlytics reports -- Crashlytics and functions -- Summary -- Chapter 4: Genie in the Cloud - Firebase Cloud Functions -- Firebase Cloud Functions -- Set up the development environment -- Project structure -- Required modules -- Deploying Cloud functions project -- Custom logs and reviewing functions -- Trigger functions -- Cloud Firestore Triggers -- Specific documents -- Creating a document -- Updating documents -- Deleting a document -- Changes in a document -- Realtime Database Triggers -- Firebase Authentication Triggers -- Analytics and Crashlytics Triggers -- Cloud Storage Triggers -- HTTP Triggers -- Cloud Pub/Sub Triggers -- Writing Firebase functions -- Cloud Functions to fire a push notification -- Summary -- Chapter 5: Arsenal for Your Files - Firebase Cloud Storage -- Firebase a Cloud Storage -- Creating storage reference -- Storage reference properties -- Limitations of reference -- Uploading and downloading files -- Uploading files…”
Libro electrónico -
896Publicado 2022Tabla de Contenidos: “…Optimizing Performance for the Core AWS Services -- Compute -- Storage -- Database -- Network Optimization and Load Balancing -- Infrastructure Automation -- CloudFormation -- Third-Party Automation Solutions -- Reviewing and Optimizing Infrastructure Configurations -- AWS Well-Architected Tool -- Load Testing -- Visualization -- Optimizing Data Operations -- Caching -- Partitioning/Sharding -- Compression -- Summary -- Exam Essentials -- Review Questions -- Chapter 12 Secure Architectures -- Introduction -- Identity and Access Management -- Protecting AWS Credentials -- Fine-Grained Authorization -- Permissions Boundaries -- Roles -- Enforcing Service-Level Protection -- Detective Controls -- CloudTrail -- CloudWatch Logs -- Searching Logs with Athena -- Auditing Resource Configurations with AWS Config -- Amazon GuardDuty -- Amazon Inspector -- Amazon Detective -- Security Hub -- Amazon Fraud Detector -- AWS Audit Manager -- Protecting Network Boundaries -- Network Access Control Lists and Security Groups -- AWS Web Application Firewall -- AWS Shield -- AWS Firewall Manager -- Data Encryption -- Data at Rest -- Data in Transit -- Macie -- Summary -- Exam Essentials -- Review Questions -- Chapter 13 Cost-Optimized Architectures -- Introduction -- Planning, Tracking, and Controlling Costs -- AWS Budgets -- Monitoring Tools -- AWS Trusted Advisor -- Online Calculator Tools -- Cost-Optimizing Compute -- Maximizing Server Density -- EC2 Reserved Instances -- EC2 Spot Instances -- Auto Scaling -- Elastic Block Store Lifecycle Manager -- Summary -- Exam Essentials -- Review Questions -- Appendix A: Answers to Review Questions -- Chapter 1: Introduction to Cloud Computing and AWS -- Chapter 2: Compute Services -- Chapter 3: AWS Storage -- Chapter 4: Amazon Virtual Private Cloud (VPC) -- Chapter 5: Database Services…”
Libro electrónico -
897Tabla de Contenidos: “…Branch-Combining Diversity -- Diversity Antenna Array, Type, Orientation, and Spacing -- Transmit Beam-Forming Types -- Legacy Beam Forming -- Implicit Beam Forming -- Explicit Beam Forming -- MIMO Antenna Array Coverage and Placement -- Coding -- Binary Convolutional Coding (BCC) -- Low-Density Parity Checking (LDPC) -- HT PHY and Operation -- HT Mixed -- HT-Greenfield Format -- Channel Bonding/40-MHz-Wide Channels -- Protection -- Power Management -- Packet Aggregation -- Bursting/Block ACK (BACK) -- Short Guard Interval (GI) -- Reduced Inter-Frame Spacing (RIFS) -- Reverse Direction Protocol (RDP) -- Modulation and Coding Schemes (MCS) -- Configuration Requirements to Obtain HT Rates -- Predicting 802.11 Link Performance -- Summary -- Chapter 4 Cisco Unified Wireless LAN Security Fundamentals -- Understanding WLAN Security Challenges -- Vulnerabilities Inherent to the Radio Transmission Medium -- Physical Containment Problem -- Unlicensed Radio Spectrum Problem -- Vulnerabilities Inherent to the Standards Definitions -- Authentication and Encryption Weaknesses -- Unauthenticated Management Frames -- Vulnerabilities Inherent to Mobility -- Misconfigured Wireless Devices and Clients -- Rogue Access Points and Devices -- Readily Available Profiling and Attack Tools -- Addressing the WLAN Security Challenges -- Background on Strong Authentication and Privacy -- How WEP Encryption Works -- How WEP Is Broken -- 802.11 Authentication -- Addressing the Strong Authentication and Privacy Challenges -- Authentication Framework -- Authentication Algorithm -- Data Privacy and Integrity -- Alternative Approaches to Authentication and Data Privacy -- Rogue Access Point Detection and Wireless Intrusion Prevention -- Secure Management and Security Policies -- Summary -- References -- Chapter 5 Design Considerations -- 100 Percent Wireless Access Layer…”
Libro electrónico -
898Publicado 2022Tabla de Contenidos: “…Security monitoring and audit trails using Azure Monitor -- Best practices for using Azure Monitor -- Security monitoring and approval process using Customer Lockbox -- Best practices for using Customer Lockbox -- Security monitoring and audit trail using Google Cloud Logging -- Security monitoring using Google Security Command Center -- Security monitoring and approval process using Access Transparency and Access Approval -- Conducting threat detection and response -- Using Amazon Detective for threat detection -- Using Amazon GuardDuty for threat detection -- Security monitoring using Microsoft Defender for Cloud -- Using Azure Sentinel for threat detection -- Using Azure Defender for threat detection -- Using Google Security Command Center for threat detection and prevention -- Conducting incident response and digital forensics -- Conducting incident response in AWS -- Conducting incident response in Azure -- Conducting incident response in Google Cloud Platform -- Summary -- Chapter 7: Applying Encryption in Cloud Services -- Technical requirements -- Introduction to encryption -- Symmetric encryption -- Asymmetric encryption -- Best practices for deploying KMSes -- AWS Key Management Service (KMS) -- AWS CloudHSM -- Azure Key Vault -- Azure Dedicated/Managed HSM -- Google Cloud Key Management Service (KMS) -- Best practices for deploying secrets management services -- AWS Secrets Manager -- Google Secret Manager -- Best practices for using encryption in transit -- IPSec -- Transport Layer Security (TLS) -- Best practices for using encryption at rest -- Object storage encryption -- Block storage encryption -- Full database encryption -- Row-level security -- Encryption in use -- AWS Nitro Enclaves -- Azure Confidential Computing -- Google Confidential Computing -- Summary -- Section 3: Threats and Compliance Management…”
Libro electrónico -
899Publicado 2021Tabla de Contenidos: “…LA ECONOMÍA GLOBAL Y LA INFORMACIÓN COMO MERCADO -- EL ZÁNGANO Y EL AUTÓMATA: UNA ENSOÑACIÓN -- EL TALENTO DE LOS SIMIOS -- DE NARCISO A LOS SELFIES -- DINERO Y DEUDAS -- EL BANCO DEL TÍO GILITO Y EL PROFESOR CHIFLADO -- EL BOTÍN DE ANA -- LO QUE HAY ES MUCHO VICIO -- UNA PROPUESTA SENSATA -- GUARDE SU DINERO EN UN CALCETÍN -- GRECIA: EL VIEJO Y EL NUEVO DRACMA -- DÉSPOTAS, CAPITALISTAS Y AMIGUETES -- LA LIBERTAD DE LAS MARIONETAS -- LOS NIÑOS PRODIGIO -- LA ECONOMÍA DE LA IMAGINACIÓN ACADÉMICA -- CIENCIA, COMERCIO Y SOCIEDAD -- CIENCIA DE IZQUIERDAS, CIENCIA DE DERECHAS -- MARCO POLO HONORIS CAUSA -- ANTICAPITALISMO -- EL DISCURSO SIN MÉTODO -- NO CREO EN LA GRAVEDAD -- EL MAL. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
900Publicado 2017Tabla de Contenidos: “…. -- See also -- Checking up front with guard -- How to do it... -- How it works... -- See also -- Doing it later with defer -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Bailing out with fatalError and precondition -- Getting ready -- How to do it... -- How it works... -- See also -- Chapter 4: Generics, Operators, and Nested Types -- Introduction -- Using generics with types -- How to do it... -- How it works... -- There's more... -- See also -- Using generics with functions -- How to do it... -- How it works... -- There's more... -- See also -- Using generics with protocols…”
Libro electrónico