Mostrando 37,961 - 37,980 Resultados de 44,924 Para Buscar '"Morés"', tiempo de consulta: 0.16s Limitar resultados
  1. 37961
    Publicado 2016
    “…It can be used for server-side web application development, real-time applications, microservices, and much more. This book gives you an excellent starting point, bringing you straight to the heart of developing web applications with Node.js. …”
    Libro electrónico
  2. 37962
    Publicado 2016
    “…Next, we work through the tasks that you perform on a daily basis such as working with strings, generics, and lots more. Gradually, we move on to more advanced topics such as the concept of object-oriented programming, asynchronous programming, reactive extensions, and code contracts. …”
    Libro electrónico
  3. 37963
    Publicado 2017
    “…This book will showcase more than twenty working Deep Neural Networks coded in Python using Keras. …”
    Libro electrónico
  4. 37964
    Publicado 2016
    “…What You Will Learn A step-by-step methodology to identify and penetrate secured environments Get to know the process to test network services across enterprise architecture when defences are in place Grasp different web application testing methods and how to identify web application protections that are deployed Understand a variety of concepts to exploit software Gain proven post-exploitation techniques to exfiltrate data from the target Get to grips with various stealth techniques to remain undetected and defeat the latest defences Be the first to find out the latest methods to bypass firewalls Follow proven approaches to record and save the data from tests for analysis In Detail The defences continue to improve and become more and more common, but this book will provide you with a number or proven techniques to defeat the latest defences on the networks. …”
    Libro electrónico
  5. 37965
    Publicado 2015
    “…The authors address topics covering scalability, elasticity, reliability, resiliency, recovery, data management, storage, virtualization, monitoring, provisioning, administration, and much more. Readers will further find detailed coverage of cloud security, from networking and storage safeguards to identity systems, trust assurance, and auditing. …”
    Libro electrónico
  6. 37966
    Publicado 2015
    “…About the Instructor Dan Hotka is a training specialist and an Oracle ACE director who has more than 37 years in the computer industry and mor..…”
    Video
  7. 37967
    Publicado 2023
    “…"You are made to feel as if you would never fall for this and somehow this makes each case all the more memorable. ... Read the book, laugh at the right places, and put your learning to work. …”
    Libro electrónico
  8. 37968
    Publicado 2023
    “…Each topic is presented with a blend of practical explanations, theory, and best practices. Power BI is more than just the Power BI Desktop or the Power BI Service. …”
    Libro electrónico
  9. 37969
    Publicado 2017
    “…This has resulted in numerous design challenges, security concerns, mobile agents, network-centric operations, cognitive capabilities, and much more. This book is distinct as it touches significantly upon all communication technologies on the anvil for the near future, apart from its coverage of routing in past networks. …”
    Libro electrónico
  10. 37970
    Publicado 2019
    “…Our new Sustainability chairs are also helping us take steps towards making the CHI event more sustainable…”
    Libro electrónico
  11. 37971
    por Barnett, Ryan C.
    Publicado 2005
    “…He addresses issues related to IT processes and your underlying OS; Apache downloading, installation, and configuration; application hardening; monitoring, and more. He also presents a chapter-length case study using actual Web attack logs and data captured “in the wild.” …”
    Libro electrónico
  12. 37972
    por Evan, William M.
    Publicado 2002
    “…They reveal the hidden patterns and commonalities beneath more than 30 of the worst technological tragedies of recent history—and identify powerful preventive measu..…”
    Libro electrónico
  13. 37973
    Publicado 2003
    “…Expert solutions for securing network infrastructures and VPNs Build security into the network by defining zones, implementing secure routing protocol designs, and building safe LAN switching environments Understand the inner workings of the Cisco PIX Firewall and analyze in-depth Cisco PIX Firewall and Cisco IOS Firewall features and concepts Understand what VPNs are and how they are implemented with protocols such as GRE, L2TP, and IPSec Gain a packet-level understanding of the IPSec suite of protocols, its associated encryption and hashing functions, and authentication techniques Learn how network attacks can be categorized and how the Cisco IDS is designed and can be set upto protect against them Control network access by learning how AAA fits into the Cisco security model and by implementing RADIUS and TACACS+ protocols Provision service provider security using ACLs, NBAR, and CAR to identify and control attacks Identify and resolve common implementation failures by evaluating real-world troubleshooting scenarios As organizations increase their dependence on networks for core business processes and increase access to remote sites and mobile workers via virtual private networks (VPNs), network security becomes more and more critical. In today's networked era, information is an organization's most valuable resource. …”
    Libro electrónico
  14. 37974
    Publicado 2017
    “…By the end of the book, you will have gained more clarity on the implementation of microservices using Spring Framework and will be able to use them in internet-scale deployments through real-world examples. …”
    Libro electrónico
  15. 37975
    Publicado 2017
    “…What You Will Learn Learn about machine learning landscapes along with the historical development and progress of deep learning Learn about deep machine intelligence and GPU computing with the latest TensorFlow 1.x Access public datasets and utilize them using TensorFlow to load, process, and transform data Use TensorFlow on real-world datasets, including images, text, and more Learn how to evaluate the performance of your deep learning models Using deep learning for scalable object detection and mobile computing Train machines quickly to learn from data by exploring reinforcement learning techniques Explore active areas of deep learning research and applications In Detail Deep learning is the step that comes after machine learning, and has more advanced implementations. …”
    Libro electrónico
  16. 37976
    Publicado 2017
    “…You will get to know how to communicate with users and other services, as well as getting to grips with generics, scoping, and more advanced conditions. You will also discover how to extend the compilation unit in Rust. …”
    Libro electrónico
  17. 37977
    Publicado 2017
    “…Some readers will likely be interested in RxJava to make programs more resilient, concurrent, and scalable. Others may be checking out reactive programming just to see what it is all about, and to judge whether it can solve any problems they may have. …”
    Libro electrónico
  18. 37978
    por Douglass, Bruce Powel
    Publicado 2004
    “…This accessible book examines requirements analysis, the definition of object structure and behavior, architectural and mechanistic design, and more detailed designs that enco..…”
    Libro electrónico
  19. 37979
    por Sullivan, Dan, 1962-
    Publicado 2003
    “…--Jill Dyché, Partner, Baseline Consulting Group Increasingly, corporations are turning to portals to foster more integrated, Web-based user experiences for employees, customers, and vendors. …”
    Libro electrónico
  20. 37980
    Publicado 2021
    “…Starting with object-oriented programming (OOP) in PHP and related language features, you'll work through modern programming techniques such as inheritance, understand how it contrasts with composition, and finally look at more advanced language features. You'll learn about the MVC pattern by developing your own MVC system and advance to understanding what a DI container does by building a toy DI container. …”
    Libro electrónico