Mostrando 26,721 - 26,740 Resultados de 27,816 Para Buscar '"Reds"', tiempo de consulta: 0.12s Limitar resultados
  1. 26721
    por Foguet i Boreu, Francesc, 1971-
    Publicado 2016
    “…"La diáspora de los republicanos catalanes hacia países de Europa o de América tras la derrota de 1939 cortó de raíz el proceso de modernización de la cultura y el teatro catalanes y los situó de súbito en el exilio, sin ninguna otra red efectiva a la que vincularse que la de los casals o centres ya existentes. …”
    Libro
  2. 26722
    Publicado 2013
    “…La obra esta dirigida a los bibliotecarios y a los usuarios de las bibliotecas academicas y especializadas, alumnos, docentes, investigadores, y otros especialistas de la informacion, que necesitan contar con datos actualizados que se encuentran en la red, que deben conocer como evaluarlos y como aprehenderlos, para utilizarlos en la ejecucion y presentacion de sus trabajos…”
    Libro electrónico
  3. 26723
    Publicado 2014
    “…Es, por si el lector aún no lo había adivinado, un libro en red que no desea mantenerse en pie sin a la vez desorganizarse para conectar más y mejor con lo que sucede y hay ahí fuera. …”
    Libro electrónico
  4. 26724
    por Pedroso Filiberto, Eduardo A.
    Publicado 2008
    “…Con la creación del Servicio de Cardiología Pediátrica en Camagüey (1983), y después, de la Red Cardiopediátrica Nacional (1986), comenzó la atención diferenciada a las niñas y niños cardiópatas. …”
    Libro electrónico
  5. 26725
    Publicado 2011
    “…Hay un texto en la red con una metáfora poderosa, la Catedral y el Bazar, sobre las estrategias para desarrollar software: Top-Down [TD] y Bottom-Up (BU). …”
    Electrónico
  6. 26726
    Publicado 2019
    “…What you will learn Learn how to build malware classifiers to detect suspicious activities Apply ML to generate custom malware to pentest your security Use ML algorithms with complex datasets to implement cybersecurity concepts Create neural networks to identify fake videos and images Secure your organization from one of the most popular threats - insider threats Defend against zero-day threats by constructing an anomaly detection system Detect web vulnerabilities effectively by combining Metasploit and ML Understand how to train a model without exposing the training data Who this book is for This book is for cybersecurity professionals and security researchers who are looking to implement the latest machine learning techniques to boost computer security, and gain insights into securing an organization using red and blue team ML. This recipe-based book will also be useful for data scientists and machine learning developers who want to experiment with smart techniques in the cybersecurity domain. …”
    Libro electrónico
  7. 26727
    Publicado 2016
    “…Mit Geschichten zum Erfolg in Content Marketing, PR, Social Media, Employer Branding und Leadership Storytelling als Basis für modernes Content Marketing Wirkung und Erzählformate guter Geschichten Zahlreiche anschauliche Beispiele und praktische Checklisten zur Ideenfindung Storytelling ist für Marketingabteilungen das neue Fundament in der Kundenkommunikation über alte und neue Kanäle wie PR, Content Marketing und Social Media. Marken wie Red Bull, Apple, Coca-Cola, Dove oder airbnb sind heutzutage in aller Munde, wenn es um Brand Storytelling geht. …”
    Libro electrónico
  8. 26728
    “…What You’ll Learn: Understand the basics of the most popular open source tools—Vagrant, Packer, Terraform, and Ansible—and how to use them in the context of deploying and scaling a SharePoint farm Use Vagrant to build SharePoint development environments in less than an hour, and add automated testing Use Packer to create a “golden image” with preconfigured settings, and then use it as the base image in your Terraform configuration for both AWS and Azure farms Use Terraform to scale your SharePoint farm topology Use Red Hat’s Ansible Playbooks to perform configuration management on your farm Use Terraform to deploy immutable infrastructure environments using IaC (Infrastructure as Code) Use InSpec 2.0 to stay in compliance by testing your cloud infrastructure Use Ansible to apply Microsoft updates and patches This book is for IT pros and developers who are looking to expand their knowledge and take a modern approach by using open source technologies to work with Microsoft products. …”
    Libro electrónico
  9. 26729
    Publicado 2015
    “…Type more accurately: Add the autocorrect dictionary groups from Smile and how to create your own autocorrection options, so you'll spend less time fixing common typing mistakes or going red-faced when you spot an egregious error too late. …”
    Libro electrónico
  10. 26730
    Publicado 2015
    “…You will also discover how to easily integrate applications with other AWS services like EMR, S3, CloudSearch, RedShift etc. A couple of chapters talk in detail about how to use DynamoDB as a backend database and hosting it on AWS ElasticBean. …”
    Libro electrónico
  11. 26731
    Publicado 2015
    “…Sander has been teaching Red Hat, SUSE, and LPI Linux classes since 1994. …”
    Video
  12. 26732
    Publicado 2024
    “…What you will learn Explore the core elements of APIs and their collaborative role in API development Understand the OWASP API Security Top 10, dissecting the root causes of API vulnerabilities Obtain insights into high-profile API security breaches with practical examples and in-depth analysis Use API attacking techniques adversaries use to attack APIs to enhance your defensive strategies Employ shield-right security approaches such as API gateways and firewalls Defend against common API vulnerabilities across several frameworks and languages, such as .NET, Python, and Java Who this book is for This book is for application security engineers, blue teamers, and security professionals looking forward to building an application security program targeting API security. For red teamers and pentesters, it provides insights into exploiting API vulnerabilities. …”
    Libro electrónico
  13. 26733
    Publicado 2024
    “…A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. …”
    Video
  14. 26734
    Publicado 2023
    “…By the end of this book, you’ll have enhanced your ability to find and exploit web vulnerabilities.What you will learnUnderstand the mindset, methodologies, and toolset needed to carry out web attacksDiscover how SAML and SSO work and study their vulnerabilitiesGet to grips with WordPress and learn how to exploit SQL injectionFind out how IoT devices work and exploit command injectionFamiliarize yourself with ElectronJS applications and transform an XSS to an RCEDiscover how to audit Solidity’s Ethereum smart contractsGet the hang of decompiling, debugging, and instrumenting web applicationsWho this book is forThis book is for anyone whose job role involves ensuring their organization's security – penetration testers and red teamers who want to deepen their knowledge of the current security challenges for web applications, developers and DevOps professionals who want to get into the mindset of an attacker; and security managers and CISOs looking to truly understand the impact and risk of web, IoT, and smart contracts. …”
    Libro electrónico
  15. 26735
    Publicado 2008
    “…SERIES EDITOR CHRISTOPHER NEGUS is the bestselling author of the Red Hat Linux Bible series, Linux Toys series, and this se..…”
    Libro electrónico
  16. 26736
    Publicado 2010
    “…—Jeffrey Gitomer, bestselling author of The Little Red Book of Selling “If you are serious about building trusting relationships and launching your business and life to new heights, then invest in yourself and buy this book.” …”
    Libro electrónico
  17. 26737
    Publicado 2018
    “…Whether you have a “MY MENU” camera model (the X-Pro2, X-T2, X-T20, X-E3, and X100F) or one of the “RED/BLUE” camera models (the X-Pro1, X-T1, X-T10, X100 models prior to the “F” model, the X-E1, X-E2, X-E2S, X70, and the X-A series, as well as the X10, X20, and X30), you’re certain to learn the ins and outs of your Fuji camera in order to improve your photography…”
    Libro electrónico
  18. 26738
    Publicado 2023
    “…What you will learn Understand and adopt the Microsoft infrastructure kill chain methodology Attack Windows services, such as Active Directory, Exchange, WSUS, SCCM, AD CS, and SQL Server Disappear from the defender's eyesight by tampering with defensive capabilities Upskill yourself in offensive OpSec to stay under the radar Find out how to detect adversary activities in your Windows environment Get to grips with the steps needed to remediate misconfigurations Prepare yourself for real-life scenarios by getting hands-on experience with exercises Who this book is for This book is for pentesters and red teamers, security and IT engineers, as well as blue teamers and incident responders interested in Windows infrastructure security. …”
    Libro electrónico
  19. 26739
    Publicado 2022
    “…Not having this book will be your 101st mistake. - Anupam Sengupta, Red Hat Learn good habits by identifying bad ones. …”
    Grabación no musical
  20. 26740
    Publicado 2022
    “…. - Apoorv Gupta, Facebook Finally, a much-needed introduction to streaming systems--a must-read for anyone interested in this technology. - Anupam Sengupta, Red Hat Tackles complex topics in a very approachable manner. - Marc Roulleau, GIRO A superb resource for helping you grasp the fundamentals of open-source streaming systems. - Simon Verhoeven, Cronos Explains all the main streaming concepts in a friendly way. …”
    Grabación no musical