Mostrando 921 - 940 Resultados de 1,227 Para Buscar '"Guard"', tiempo de consulta: 0.11s Limitar resultados
  1. 921
    Publicado 2020
    Tabla de Contenidos: “…9.7 Voltage Level Shifters -- 9.8 Power on Reset -- 9.9 ESD Circuit -- 9.10 SPICE Example -- 9.11 Layout Example -- 9.12 Summary -- References -- Chapter 10: Layout and Packaging -- 10.1 Introduction -- 10.2 Process -- 10.2.1 Antenna Rule -- 10.2.2 Electromigration and Metal Density -- 10.2.3 Shear Stress -- 10.3 Floor Planning -- 10.4 ESD and I/O Pad Layout -- 10.4.1 Low Parasitic Capacitance Pad -- 10.4.2 Seal Ring -- 10.5 Analog Circuit Layout Technique -- 10.5.1 Matching -- 10.5.2 Guard Ring -- 10.5.3 Shielding -- 10.5.4 Voltage (IR) Drop -- 10.5.5 Metal over Implant -- 10.5.6 Substrate Tap -- 10.6 Digital Circuit Layout Technique -- 10.6.1 Power Distribution for Mixed-Signal Design -- 10.6.2 Clock Distribution -- 10.6.3 Latch-up -- 10.7 Packaging -- 10.7.1 Die Attach -- 10.7.2 Package Type -- 10.7.3 Package Parasitic -- 10.8 Summary -- References -- Index…”
    Libro electrónico
  2. 922
    Publicado 2016
    Tabla de Contenidos: “…Intercepting Network Traffic -- Performing In-Game Actions -- Emulating the Keyboard -- Sending Packets -- Tying the Pieces Together -- Making the Perfect Healer -- Resisting Enemy Crowd-Control Attacks -- Avoiding Wasted Mana -- Closing Thoughts -- Chapter 11: Putting it All Together: Writing Autonomous Bots -- Control Theory and Game Hacking -- State Machines -- Combining Control Theory and State Machines -- A Basic Healer State Machine -- A Complex Hypothetical State Machine -- Error Correction -- Pathfinding with Search Algorithms -- Two Common Search Techniques -- How Obstacles Disrupt Searches -- An A* Search Algorithm -- When A* Searches Are Particularly Useful -- Common and Cool Automated Hacks -- Looting with Cavebots -- Automating Combat with Warbots -- Closing Thoughts -- Chapter 12: Staying Hidden -- Prominent Anti-Cheat Software -- The PunkBuster Toolkit -- Signature-Based Detection -- Screenshots -- Hash Validation -- The ESEA Anti-Cheat Toolkit -- The VAC Toolkit -- DNS Cache Scans -- Binary Validation -- False Positives -- The GameGuard Toolkit -- User-Mode Rootkit -- Kernel-Mode Rootkit -- The Warden Toolkit -- Carefully Managing a Bot's Footprint -- Minimizing a Bot's Footprint -- Masking Your Footprint -- Teaching a Bot to Detect Debuggers -- Anti-Debugging Techniques -- Defeating Signature-Based Detection -- Defeating Screenshots -- Defeating Binary Validation -- Defeating an Anti-Cheat Rootkit -- Defeating Heuristics -- Closing Thoughts -- Index -- Footnotes -- Chapter 4: From Code to Memory: A General Primer -- Resources -- The Electronic Frontier Foundation -- Get Inside the Game…”
    Libro electrónico
  3. 923
    Publicado 2022
    Tabla de Contenidos: “…3 Deploying and operating in AWS global infrastructure -- 3.1 Hosting IT infrastructure on AWS -- 3.2 Deploying and operating in AWS -- 3.2.1 Interacting with the AWS Cloud -- 3.2.2 Deploying in the AWS Cloud -- 3.2.3 Connectivity options in the AWS Cloud -- 3.2.4 Section quiz -- 3.3 AWS global infrastructure -- 3.3.1 Regions -- 3.3.2 Availability Zones -- 3.3.3 Edge Locations -- 3.3.4 Section quiz -- Summary -- Chapter quiz answers -- 4 Core AWS services -- 4.1 Compute services -- 4.1.1 Amazon Elastic Compute Cloud -- 4.1.2 AWS Elastic Beanstalk -- 4.1.3 Elastic Load Balancing -- 4.1.4 AWS Lambda -- 4.1.5 Amazon Elastic Container Service -- 4.1.6 Section quiz -- 4.2 Storage services -- 4.2.1 Amazon Simple Storage Service -- 4.2.2 Amazon Elastic Block Store -- 4.2.3 AWS Snowball -- 4.2.4 AWS Storage Gateway -- 4.2.5 Amazon Elastic File System -- 4.2.6 Section quiz -- 4.3 Database services -- 4.3.1 Amazon Relational Database Service -- 4.3.2 Amazon DynamoDB -- 4.3.3 Amazon Redshift -- 4.3.4 Section quiz -- 4.4 Networking and content delivery services -- 4.4.1 Amazon Route 53 -- 4.4.2 Section quiz -- 4.5 Management tools -- 4.5.1 AWS CloudFormation -- 4.5.2 AWS CloudTrail -- 4.5.3 Amazon CloudWatch -- 4.5.4 AWS Config -- 4.5.5 AWS Trusted Advisor -- 4.5.6 Section quiz -- Summary -- Chapter quiz answers -- 5 Security and compliance -- 5.1 Security and compliance concepts -- 5.1.1 Shared responsibility model -- 5.1.2 A Well-Architected Framework -- 5.1.3 Principle of least privilege -- 5.1.4 Section quiz -- 5.2 Security services -- 5.2.1 AWS Identity and Access Management -- 5.2.2 AWS Web Application Firewall -- 5.2.3 AWS Shield -- 5.2.4 Amazon Inspector -- 5.2.5 AWS Trusted Advisor -- 5.2.6 Amazon GuardDuty -- 5.2.7 Section quiz -- Summary -- Chapter quiz answers -- 6 Billing and pricing -- 6.1 AWS billing and pricing concepts…”
    Libro electrónico
  4. 924
    por Schuster, Roland J.
    Publicado 2024
    Tabla de Contenidos: “…PM-Symposiums der FH des BFI Wien Interventionswissenschaftliche Aspekte in Bezug auf Gestaltung, Ablauf und Interpretation einer Großveranstaltung -- 8.1 Grundlegendes zum PM-Symposium aus der Perspektive der Interventionswissenschaft -- 8.2 Exkurs zu Hintergrundtheorien aus dem Bereich der Psychoanalyse -- 8.3 Das Design des PM-Symposiums als Intervention -- 8.4 Zur Planung und Vorbereitung des PM-Symposiums -- 8.5 Das Design des PM-Symposiums und Überlegungen zum Container-Contained-Prozess -- 8.6 Überlegungen zur Struktur des PM-Symposiums (Raum- und Zeitdimension) -- 8.7 Resümee zum PM-Symposium 2012 -- 8.8 Ausblick -- 9 On the teaching of leadership intervention science in the action-theoretical background and design of a lecture on leadership -- 9.1 Aims, target groups, and general didactical idea of the paper -- 9.2 A psychodynamic view of leadership -- 9.3 A psychodynamic perspective on the »Jonah« film sequence -- 9.4 Learning by experience – an approach based on intervention science -- 9.5 Conclusion -- 9.6 Appendix (Cast of the Movie »Master and Commander« (Weir 2003)) -- 10 Fallstudie: Optimierung des Arbeitsprozesses einer Arbeitsgruppe (Interventionswissenschaft in Aktion) -- 10.1 Ziel der Interventionsforschung und Beschreibung der Forschungssituation -- 10.2 Grundlegendes zur Organisation -- 10.3 Fallstudie: Detaildarstellung der Optimierung des Arbeitsprozesses der AG anhand einer konkreten Intervention -- 10.4 Ergebnisse und Erkenntnisse innerhalb der Arbeitsgruppe (lokal) -- 10.5 Ergebnisse und Erkenntnisse in Bezug auf die Interventionswissenschaft (global) -- 11 Etablierung einer Gruppenreflexion -- 11.1 Einleitung -- 11.2 Theoretische Aspekte und grundlegende Voraussetzungen der Gruppenreflexion -- 11.3 Chronologische Entwicklung des Kommunikationsinstruments Gruppenreflexion -- 11.4 Zur interventionswissenschaftlichen Perspektive der Gruppenreflexion -- 11.5 Darlegung und Interpretation der Beobachtung von Preßl (Autor: Karl Preßl) -- 11.6 Die Methode der psychodynamischen Organisationsbeobachtung und ihre Relevanz in der Lehrpraxis für Projektmanager:innen (Autorin: Ina Pircher) -- 11.7 Zusammenfassende Bemerkungen -- 12 Lehren, Lernen und Emotion -- 12.1 Emotion: Ausloten von Begriffsbestimmung und -verwendung -- 12.2 Der Begriff Emotion in Bezug auf die dargelegte praktische Anwendung -- 12.3 Der politische Aspekt der dargelegten praktischen Anwendung -- 12.4 Die praktische Anwendung des Faktors Emotion -- 12.5 Diskussion -- 13 Learning by experience; emotions as border guards and signposts regarding unknown territory -- 13.1 Introduction -- 13.2 The intervention science perspective -- 13.3 The connection between experience, consciousness, feelings, emotions, and thinking -- 13.4 Exploring the boundary of unknown territory -- 13.5 Scope of action of sequences (1–3) -- 13.6 Discussion -- 14 Praxis, Forschung und Lehre als co-creativer Prozess -- 14.1 Interventionswissenschaftliche Perspektive auf Didaktik im Allgemeinen -- 14.2 Interventionswissenschaftliche Perspektive auf Didaktik im konkreten Fall -- 14.3 Co-creative Planung der Lehrveranstaltung und deren Beforschung -- 14.4 Erfahrungen im Forschungsfeld (Autorin: Jana Ochsenreither) -- 14.5 Diskussion -- Fazit -- Verzeichnis Zusatzmaterial -- Literaturverzeichnis -- Abbildungsverzeichnis -- Gastautor:innen in alphabetischer Reihung nach Nachnamen -- Index…”
    Libro electrónico
  5. 925
    Publicado 2024
    Tabla de Contenidos: “…. -- See also -- Checking upfront with guard -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Doing it later with defer -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Bailing out with fatalError and precondition -- Getting ready -- How to do it... -- How it works... -- See also -- Chapter 4: Generics, Operators, and Nested Types -- Technical requirements -- Using generics with types -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Using generics with functions -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Using generics with protocols -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Using advanced operators -- Getting ready -- How to do it…”
    Libro electrónico
  6. 926
    Publicado 2016
    “…The Safety Critical Systems Handbook: A Straightforward Guide to Functional Safety: IEC 61508 (2010 Edition), IEC 61511 (2016 Edition) & Related Guidance, Fourth Edition, presents the latest on the electrical, electronic, and programmable electronic systems that provide safety functions that guard workers and the public against injury or death, and the environment against pollution. …”
    Libro electrónico
  7. 927
    Publicado 2017
    Tabla de Contenidos: “…16.1.3.1 Explicit Token Creation -- 16.1.3.2 Implicit Token Creation: Forking a New Path -- 16.1.3.3 Multiple Forks -- 16.1.3.4 Forking vs Spawning -- 16.1.4 Consuming Tokens -- 16.1.4.1 Multiple Forks -- 16.1.4.2 Flow Final -- 16.1.5 Joining at an Action -- 16.2 Timers and Timing Events -- 16.3 Object Flows/Edges -- 16.4 Advanced Topics -- 16.4.1 Weights -- 16.4.2 Stream -- 16.4.3 Send/Receive Messages/Events -- 16.4.4 Local Pre/Postconditions -- 16.5 Activity Diagrams -- 16.5.1 Activities -- 16.5.2 Invoking an Activity -- 16.5.3 Calling an Operation -- 17 Questions for Chapter 16 -- Answers for Chapter 16 -- 18 Behavior: State Machine Diagrams -- 18.1 What is a State and State Machine -- 18.1.1 States and Modes -- 18.1.2 Differences Between States -- 18.1.3 Qualitatively Different States -- 18.1.4 Naming States -- 18.1.5 Overlapping States -- 18.1.6 Finding States -- 18.2 Transitions -- 18.2.1 Events -- 18.2.2 Simple State Machine -- 18.2.3 Guard Conditions -- 18.2.4 Transition Effect -- 18.2.5 Transition Syntax -- 18.2.6 Ongoing Behavior -- 18.2.6.1 Implicit Behavior -- 18.2.6.2 Do Behavior -- 18.2.7 State Setup and Teardown -- 18.2.8 Exit/Entry Action Equivalents -- 18.2.9 Completion -- 18.2.10 Internal Transitions -- 18.3 State Machine Processing -- 18.3.1 Run-to-Completion -- 18.3.2 States and Pseudostates -- 18.3.3 Types of Transitions -- 18.3.4 State Diagrams and Machines -- 18.3.5 Hierarchy of States -- 18.3.6 States Contours -- 18.4 State vs Activity Semantics -- 19 Questions for Chapter 18 -- Answers for Chapter 18 -- Index -- Back Cover…”
    Libro electrónico
  8. 928
    Publicado 2017
    Tabla de Contenidos: “…STANDARDS -- COMMON INFORMATION MODEL (CIM, CIM V2) -- CLOUD AUDITING DATA FEDERATION -- WEB-SERVICES MANAGEMENT SPECIFICATION -- OPEN VIRTUALIZATION FORMAT -- MANAGING WITH ASL-BISL FOUNDATION STANDARDS -- APPLICATION SERVICES LIBRARY -- MANAGING WITH ISO/IEC STANDARDS -- ISO/IEC 16350 FOR APPLICATION MANAGEMENT -- ISO/IEC 17203: 2011 -- OPEN STANDARDS -- APPLICATIONS RESPONSE MEASUREMENT -- CLOUD APPLICATION MANAGEMENT FOR PLATFORMS -- SUMMARY -- KEY TAKEAWAYS -- 17 - LOOKING AHEAD -- INTRODUCTION -- CLOUD COMPUTING INNOVATIONS -- THE CHANGING FACE OF APPLICATIONS -- SOFTWARE-DEFINED EVERYTHING -- ADVANCED PREDICTIVE ANALYTICS FOR PERFORMANCE MANAGEMENT -- DYNAMIC POLICY RULES -- AUTONOMICS AND COGNITIVE COMPUTING -- HEIGHTENED SECURITY NEEDS -- NORMALIZING DEVOPS -- CLOUD MANAGEMENT STANDARDS -- CHANGING OF THE GUARD…”
    Libro electrónico
  9. 929
    Publicado 2020
    Tabla de Contenidos: “…by Dr Eleri Rosier, Cardiff University -- 5 Consumer markets and buyer behaviour -- Chapter preview -- Learning outcomes -- Model of consumer behaviour -- Characteristics affecting consumer behaviour -- Cultural factors -- Social factors -- Personal factors -- Psychological factors -- Types of buying decision behaviour -- Complex buying behaviour -- Dissonance-reducing buying behaviour -- Habitual buying behaviour -- Variety-seeking buying behaviour -- The buyer decision process -- Need recognition -- Information search -- Evaluation of alternatives -- Purchase decision -- Post-purchase behaviour -- The buyer decision process for new products -- Stages in the adoption process -- Individual differences in innovativeness -- Influence of product characteristics on rate of adoption -- Learning outcomes review -- Navigating the key terms -- Discussion and critical thinking -- Discussion the concepts -- Critical-thinking exercises -- Mini-cases and applications -- Online, mobile and social media marketing: digital influencer credibility -- Marketing ethics: ultimate water -- Marketing by numbers: evaluating alternatives -- Video case: IMG Worldwide -- References -- Company case: Porsche: guarding the old while bringing in the new -- 6 Business markets and business buyer behaviour -- Chapter preview -- Learning outcomes -- Business markets -- Market structure and demand -- Nature of the buying unit -- Types of decisions and the decision process -- Business buyer behaviour -- Major types of buying situations -- Participants in the business buying process -- Major influences on business buyers -- The business buying process -- Engaging business buyers with digital and social marketing -- E-procurement and online purchasing -- Business-to-business digital and social media marketing -- Institutional and government markets -- Institutional markets -- Government markets -- Learning outcomes review -- Navigating the key terms -- Discussion and critical thinking -- Discussing the concepts -- Critical-thinking exercises -- Mini-cases and applications -- Online, mobile and social media marketing: e-procurement and mobile procurement -- Marketing ethics: commercial bribery -- Marketing by numbers: salespeople -- Video case: Eaton -- References -- Company case: Procter &amp -- Gamble: treating business customers as strategic partners -- Part 3 Designing a customer value-driven strategy and mix -- 7 Customer-driven marketing strategy: creating value for target customers -- Chapter preview -- Learning outcomes -- Customer-driven marketing strategy -- Market segmentation -- Segmenting consumer markets -- Segmenting business markets -- Segmenting international markets -- Requirements for effective segmentation -- Market targeting -- Evaluating market segments -- Selecting target market segments -- Differentiation and positioning -- Positioning maps -- Choosing a differentiation and positioning strategy -- Communicating and delivering the chosen position -- Learning outcomes review -- Navigating the key terms -- Discussion and critical thinking -- Discussing the concepts -- Critical-thinking exercises -- Mini-cases and applications -- Online, mobile and social media marketing: get your Groupon -- Marketing ethics: unrealistic bodies -- Marketing by numbers: USAA -- References -- Company case: Volvo cars -- 8 Products, services and brands: building customer value -- Chapter preview -- Learning outcomes -- What is a product? …”
    Libro electrónico
  10. 930
    Publicado 2013
    Tabla de Contenidos: “…The psychiatric emergency services (PES) model -- Pros and cons -- Structure and design of PES programs -- Extended observation -- Treatment models in the PES -- EMTALA -- Alternative crisis treatment modalities -- -- Psychiatric urgent care/voluntary crisis centers -- Mobile crisis teams -- Acute diversion units -- Conclusion -- References -- Section 2 Evaluation of the psychiatric patient -- Chapter 3 The medical clearance process for psychiatric patients presenting acutely to the emergency department -- Introduction -- Areas of consensus -- Medical mimics -- The role of the history and physical exam in recognizing medical mimics -- The role of laboratory testing in recognizing medical mimics -- The role of urine drug screens in recognizing medical mimics -- Tips to improve the accuracy of medical screening exams -- The utility of guidelines and protocols -- Conclusions -- References -- Chapter 4 Advanced interviewing techniques for psychiatric patients in the emergency department -- Introduction -- Case 1: Engagement and psychological guarding of occult medical acuity -- Discussion -- Case 2: Occult danger to others and the underlying crisis state of mind -- Discussion -- Case 3: Interview skills mitigate imperfect working conditions -- Conclusion -- References -- Chapter 5 Use of routine alcohol and drug testing for psychiatric patients in the emergency department -- Introduction -- Reasons for drug testing -- Reasons against drug testing -- Conclusions -- References -- Chapter 6 Drug intoxication in the emergency department -- Introduction -- Psychiatric comorbidity -- Medical comorbidity -- Service utilization -- Brief interventions -- Drugs of abuse and intoxication -- Alcohol -- Prevalence and community impact -- Management -- Opiates -- Sedative hypnotics -- Benzodiazepines -- Barbiturates -- Gamma-hydroxybutyrate (GHB) -- Stimulants…”
    Libro electrónico
  11. 931
    Publicado 2024
    Tabla de Contenidos: “…Compliance and regulatory considerations -- BCP/DRP lab -- Physical security -- Access control -- Surveillance systems -- Intrusion detection and alarm systems -- Physical barriers and deterrents -- Security personnel and guards -- Security policies and procedures -- Incident response and emergency preparedness -- Environmental controls -- Inventory and asset management -- Perimeter security -- Collaboration with law enforcement and first responders -- Physical security audits and assessments -- Why implement physical security controls? …”
    Libro electrónico
  12. 932
    Publicado 2024
    Tabla de Contenidos: “…Chapter 9: Enhancing the Performance and Security of Angular Applications -- Understanding Angular change detection -- Zone.js and Angular -- Improving change detection efficiency -- Angular change detection and Signals -- Enhancing the performance of Angular applications -- Understanding and using the runOutsideAngular() method -- Understanding and using the NgOptimizedImage directive -- Understanding and using the trackBy and track functions -- Understanding and using web workers in Angular -- Building secure Angular applications -- Setting up route guards -- Angular attack surfaces and how to mitigate them -- Summary -- Chapter 10: Internationalization, Localization, and Accessibility of Angular Applications -- Adding translatable content in Angular applications -- Installing Transloco in your Nx monorepo -- Translating content using Transloco -- Changing the Transloco configurations at runtime -- Localization for Angular applications -- Localizing currencies using the translocoCurrency pipe -- Localizing dates using the translocoDate pipe -- Localizing numbers using the translocoDecimal pipe -- Making your Angular applications accessible to everyone -- How to make Angular applications accessible -- Using the tabindex attribute -- Adding ARIA attributes -- Summary -- Chapter 11: Testing Angular Applications -- Different types of application testing -- Understanding unit tests -- Understanding end-to-end tests -- Understanding component tests -- Understanding integration tests -- Unit testing of Angular applications using Jest -- Setting the coverage threshold -- Adding additional configurations -- Writing and running unit tests -- Adding additional unit tests for the expenses-registration application -- End-to-end testing of Angular applications using Cypress -- Writing your first e2e test -- Defining page objects for e2e testing…”
    Libro electrónico
  13. 933
    Tabla de Contenidos: “…-- Authentication and Authorization -- Authentication and Access Control Layers -- Administrative Access Controls (Layer) -- Access Control Policy -- Personnel related - jobs, responsibilities, and authorities -- Segregation of duties -- Supporting policies and procedure -- Control Over Information Access to Trade Restricted Persons -- Technical (Logical) Controls -- Passwords -- Smartcards -- Encryption -- Network Access -- System Access -- Physical Access Controls -- Network Segregation -- Perimeter Security -- Security Guards -- Badge Systems -- Biometric Access Controls -- Access Control Strategies -- Discretionary Access Control (DAC) -- Mandatory Access Control (MAC) -- Role-Based Access Control (RBAC) -- Attribute Based Access Control -- Implementing Access Controls -- Access Control Lists (ACLs) -- File System ACLs -- Network ACLs -- AAA Framework -- RADIUS and TACAS+ -- LDAP and Active Directory -- IDAM -- Chapter Summary -- Chapter 5: Information Systems Management -- Introduction -- Risk -- Incident -- Disaster -- Disaster Recovery -- Business Continuity -- Risk Management -- Identification of Risk -- Risk Analysis -- Risk Responses -- Execution of the Risk Treatment Plans -- The Importance of Conducting a Periodic Risk Assessment -- Incident Response -- Incident Response Policy, Plan, and Processes -- Incident Response Policy -- Purpose and Scope of the Policy -- Definition of Information Security Incidents and Related Terms 2 -- Organizational Structure, Roles, Responsibilities, and Authorities -- Ratings of Incidents -- Measurements…”
    Libro electrónico
  14. 934
    Publicado 2021
    Tabla de Contenidos: “…Reducing memory overhead and increasing performance using ranges -- Moving computations at compile time -- Helping the compiler help you by using const -- Leveraging the power of safe types -- Constraining template parameters -- Writing modular C++ -- Summary -- Questions -- Further reading -- Chapter 6: Design Patterns and C++ -- Technical requirements -- Writing idiomatic C++ -- Automating scope exit actions using RAII guards -- Managing copyability and movability -- Implementing non-copyable types -- Adhering to the rules of three and five -- Adhering to the rule of zero -- Using hidden friends -- Providing exception safety using the copy-and-swap idiom -- Writing niebloids -- Policy-based design idiom -- Curiously recurring template pattern -- Knowing when to use dynamic versus static polymorphism -- Implementing static polymorphism -- Interlude - using type erasure -- Creating objects -- Using factories -- Using factory methods -- Using factory functions -- Choosing the return type of a factory -- Using factory classes -- Using builders -- Building with composites and prototypes -- Tracking state and visiting objects in C++ -- Dealing with memory efficiently -- Reducing dynamic allocations using SSO/SOO -- Saving memory by herding COWs -- Leveraging polymorphic allocators -- Using memory arenas -- Using the monotonic memory resource -- Using pool resources -- Writing your own memory resource -- Ensuring there are no unexpected allocations -- Winking out memory -- Summary -- Questions -- Further reading -- Chapter 7: Building and Packaging -- Technical requirements -- Getting the most out of compilers -- Using multiple compilers -- Reducing build times -- Using a fast compiler -- Rethinking templates -- Leveraging tools -- Finding potential code issues -- Using compiler-centric tools -- Abstracting the build process -- Introducing CMake…”
    Libro electrónico
  15. 935
    Publicado 2018
    Tabla de Contenidos: “…-- Maltego for network data gathering -- Step 1 - opening Maltego -- Step 2 - choosing a machine -- Step 3 - choosing a target -- Step 4 - results -- Using Maltego to collect data on an individual -- Step 1 - selecting the machine -- Step 2 - specifying a target -- Step 3 - results -- Google -- Hacking personal information -- Hacking servers -- Apache servers -- Microsoft servers -- Oracle servers -- IBM servers -- Netscape servers -- Red Hat servers -- System reports -- Error message queries -- Social engineer toolkit (SET) -- Spear phishing -- Web attack vector -- Infectious media generator -- SMS spoofing attack vector -- Wireless access point attack vector -- QRCode attack vector -- Third-party modules - fast track exploitation -- Create a payload and listener -- Mass mailer attack -- Phone tools -- Caller ID spoofing -- Scripts -- The way back machine -- Spokeo -- Metagoofil -- Fingerprinting Organizations with Collected Archives (FOCA) -- The credential harvester attack method -- Social engineering exercise -- Phishing with BeEF -- Zabasearch.com -- Job postings -- Shodan.io -- Default passwords -- Hardware keyloggers -- Toll-free number providers -- Netcraft website -- Netcraft toolbar -- Microsoft Edge SmartScreen -- Windows Defender application guard -- SmartScreen filter -- Windows Defender network protection -- Highly recommended -- Ask the experts -- Tips -- Summary -- Chapter 9: Prevention and Mitigation -- Learning to identify social engineering attacks…”
    Libro electrónico
  16. 936
    Publicado 2022
    Tabla de Contenidos: “…Offline CA -- Stapling -- Pinning -- Trust Models -- Certificate Chaining -- Hierarchical Trust Model -- Peer-to-Peer Model -- Hybrid Trust Model -- Walking the Certificate Path -- Digital Certificates -- Certificate Classes -- Certificate Extensions -- Certificate Attributes -- Certificate Formats -- Certificate Lifecycles -- Registration and Generation -- CSR -- Renewal -- Suspension -- Certificate Revocation -- Key Destruction -- Certificate Repositories -- Sharing Key Stores -- Trust and Certificate Verification -- Centralized and Decentralized Infrastructures -- Hardware Security Modules -- Private Key Protection -- Key Recovery -- Key Escrow -- Certificate-Based Threats -- PKIX and PKCS -- PKIX Standards -- PKCS -- Why You Need to Know the PKIX and PKCS Standards -- Stolen Certificates -- ISAKMP -- CMP -- XKMS -- CEP -- Chapter 7 Review -- Chapter 8 Physical Security -- The Security Problem -- Physical Security Safeguards -- Walls and Guards -- Lights and Signage -- Physical Access Controls and Monitoring -- Electronic Access Control Systems -- Policies and Procedures…”
    Libro electrónico
  17. 937
    Publicado 2011
    Tabla de Contenidos: “…Certificate Repositories -- Trust and Certificate Verification -- Digital Certificates -- Certificate Attributes -- Certificate Extensions -- Certificate Lifecycles -- Centralized or Decentralized Infrastructures -- Hardware Storage Devices -- Private Key Protection -- Key Recovery -- Key Escrow -- Public Certificate Authorities -- In-house Certificate Authorities -- Outsourced Certificate Authorities -- Tying Different PKIs Together -- Trust Models -- Chapter Review -- Questions -- Answers -- Chapter 6 Standards and Protocols -- PKIX/PKCS -- PKIX Standards -- PKCS -- Why You Need to Know the PKIX and PKCS Standards -- X. 509 -- SSL/TLS -- ISAKMP -- CMP -- XKMS -- S/MIME -- IETF S/MIME v3 Specifications -- PGP -- How PGP Works -- HTTPS -- IPsec -- CEP -- FIPS -- Common Criteria (CC) -- WTLS -- PPTP -- WEP -- WEP Security Issues -- ISO/IEC 27002 (Formerly ISO 17799) -- Chapter Review -- Questions -- Answers -- Part III Security in the Infrastructure -- Chapter 7 Physical Security -- The Security Problem -- Physical Security Safeguards -- Walls and Guards -- Policies and Procedures -- Access Controls and Monitoring -- Environmental Controls -- Fire Suppression -- Authentication -- Chapter Review -- Questions -- Answers -- Chapter 8 Infrastructure Security -- Devices -- Workstations -- Servers -- Network Interface Cards -- Hubs -- Bridges -- Switches -- Routers -- Firewalls -- Wireless -- Modems -- Telecom/PBX -- RAS -- VPN -- Intrusion Detection Systems -- Network Access Control -- Network Monitoring/Diagnostic -- Virtualization -- Mobile Devices -- Media -- Coaxial Cable -- UTP/STP -- Fiber -- Unguided Media -- Security Concerns for Transmission Media -- Physical Security -- Removable Media -- Magnetic Media -- Optical Media -- Electronic Media -- The Cloud -- Software as a Service -- Platform as a Service -- Infrastructure as a Service…”
    Libro electrónico
  18. 938
    por Reddy, Martin
    Publicado 2024
    Tabla de Contenidos: “…The maybe_unused attribute -- Migrating to C++17 -- C++20 API features -- Modules -- Named Modules -- Header units -- The spaceship operator -- Constraints and concepts -- Abbreviated function templates -- The consteval specifier -- The constinit specifier -- Migrating to C++20 -- C++23 API features -- Expected values -- Multidimensional subscript operator -- Preprocessor directives -- Migrating to C++23 -- 8 - Performance -- Pass input arguments by const reference -- Minimize #include dependencies -- Avoid "Winnebago" headers -- Forward declarations -- Redundant #include guards -- Declaring constants -- The constexpr, consteval, and constinit keywords -- Initialization lists -- Memory optimization -- Don't inline functions until you need to -- Copy on write -- Iterating over elements -- Iterators -- Random access -- Array references -- Extern templates -- Performance analysis -- Time-based analysis -- Memory-based analysis -- Multithreading analysis -- 9 - Concurrency -- Multithreading with C++ -- Terminology -- Data races and race conditions -- Thread safety -- Reentrancy -- Asynchronous tasks -- Parallelism -- Accessing shared data -- Stateless APIs -- Initializing shared data -- Synchronized data access -- Concurrent API design -- Concurrency best practices -- Thread-Safe Interface pattern -- 10 - Versioning -- Version numbers -- Version number significance -- Esoteric numbering schemes -- Creating a version API -- Software branching strategies -- Branching strategies -- Branching policies -- APIs and parallel branches -- File formats and parallel products -- Life cycle of an API -- Levels of compatibility -- Backward compatibility -- Functional compatibility -- Source compatibility -- Binary/application binary interface compatibility -- Binary incompatible API changes -- Binary compatible API changes -- Forward compatibility…”
    Libro electrónico
  19. 939
    por Kumkum, Mukherjee
    Publicado 2015
    Tabla de Contenidos: “…Seven Stages of OD Cycle -- Questions -- References -- Case Study: JPT-Where Things Do Not Change -- Chapter 12 Agents for Organization Development -- Opening Case: Change of Guards at Tata Sons -- LEARNING OBJECTIVES -- Change Agents: Who will take the cudgel? …”
    Libro electrónico
  20. 940
    por Mata, Juan
    Publicado 1992
    Libro