Mostrando 1,981 - 2,000 Resultados de 2,801 Para Buscar '"Safed"', tiempo de consulta: 0.08s Limitar resultados
  1. 1981
    Publicado 2019
    “…You'll then move on to discover a variety of techniques, right from writing memory-safe code, to building idiomatic Rust libraries, and even advanced macros. …”
    Libro electrónico
  2. 1982
    Publicado 2015
    “…It then guides you through connecting switch sensors and LEDs to the native GPIO connector safely, and how to access them using simple Bash scripts. …”
    Libro electrónico
  3. 1983
    Publicado 2025
    “…Develop your toolkit to safely navigate the ""Exploitation Zone."" See how bad actors exploit fundamental aspects of generative AI to create weapons grade deceptions. …”
    Libro electrónico
  4. 1984
    Publicado 2004
    “…Expert guidance on designing secure networks Understand security best practices and how to take advantage of the networking gear you already have Review designs for campus, edge, and teleworker networks of varying sizes Learn design considerations for device hardening, Layer 2 and Layer 3 security issues, denial of service, IPsec VPNs, and network identity Understand security design considerations for common applications such as DNS, mail, and web Identify the key security roles and placement issues for network security elements such as firewalls, intrusion detection systems, VPN gateways, content filtering, as well as for traditional network infrastructure devices such as routers and switches Learn 10 critical steps to designing a security system for your network Examine secure network management designs that allow your management communications to be secure while still maintaining maximum utility Try your hand at security design with three included case studies Benefit from the experience of the principal architect of the original Cisco Systems SAFE Security Blueprint Written by the principal architect of the original Cisco Systems SAFE Security Blueprint, Network Security Architectures is your comprehensive how-to guide to designing and implementing a secure network. …”
    Libro electrónico
  5. 1985
    Publicado 2017
    “…After establishing how to test these powerful tools safely, you will understand how to better identify vulnerabilities, position and deploy exploits, compromise authentication and authorization, and test the resilience a..…”
    Libro electrónico
  6. 1986
    Publicado 2018
    “…Learn how to hack systems like black hat hackers and secure them like security experts Key Features Understand how computer systems work and their vulnerabilities Exploit weaknesses and hack into machines to test their security Learn how to secure systems from hackers Book Description This book starts with the basics of ethical hacking, how to practice hacking safely and legally, and how to install and interact with Kali Linux and the Linux terminal. …”
    Libro electrónico
  7. 1987
    Publicado 2014
    “…You'll walk step-by-step through planning and performing your Exchange 2013 migration... efficiently managing policies, mailboxes, clients, and databases... working with key administration and troubleshooting tools... enforcing strict security and compliance... safely providing messaging services to diverse mobile/BYOD clients... delivering voicemail to Exchange mailboxes... troubleshooting problems, and more! …”
    Video
  8. 1988
    Publicado 2014
    “…Develop a 24-36 month roadmap reflecting initial requirements, longterm strategies, and key unknowns for organizations from 100 users to 100,000 users Establish governance that reduces risk and increases value, covering the system as well as information architecture components, security, compliance, OneDrive, SharePoint 2013, Office 365, SharePoint Online, Microsoft Azure, Amazon Web Services, and identity management Address unique considerations of large, global, and/or multilingual enterprises Plan for the hybrid cloud (private, public, hybrid, SaaS, PaaS, IaaS) Integrate SharePoint with external data sources: from Oracle and SQL Server to HR, ERP, or document management for business intelligence initiatives Optimize performance across multiple data centers or locations including US and EU compliance and regulatory considerations (PHI, PII, HIPAA, Safe Harbor, etc.) Plan for disaster recovery, business continuity, data replication, and archiving Enforce security via identity management and authentication Safely support mobile devices and apps, including BYOD Implement true recor..…”
    Libro electrónico
  9. 1989
    Publicado 2023
    “…You'll also review eight image augmentation open source libraries, write object-oriented programming (OOP) wrapper functions in Python Notebooks, view color image augmentation effects, analyze safe levels and biases, as well as explore fun facts and take on fun challenges. …”
    Libro electrónico
  10. 1990
    Publicado 2023
    “…What You Will Learn Learn to identify legit apps and spot fake apps Get to know the four ways to work safely with mobile applications Learn to remove ransomware from your mobile device Understand about VPNs and why you need one Learn how to safely download and work with mobile applications Understand mobile malware and how they can affect your mobile device Audience This course is for students and aspiring cybersecurity professionals! …”
    Video
  11. 1991
    Publicado 2024
    “…Suppose that we develop superintelligence safely, govern it well, and make good use of the cornucopian wealth and near magical technological powers that this technology can unlock. …”
    Otros
  12. 1992
    por El Tiby, Amr Mohamed, 1956-
    Publicado 2011
    “…The book will try to give answers to questions such as: Is the existing regulatory framework sufficient enough to - Ensure safe and sound banking system? Face the inherent risk associated with Islamic banking? …”
    Enlace del recurso
    Libro electrónico
  13. 1993
    Publicado 2021
    “…The essays included here address, inter alia, prophets as sites of memory, kings as sites memory, Jerusalem as a site of memory, a mnemonic system shaped by two interacting 'national' histories, matters of identity and othering as framed and explored via memories, mnemonic metanarratives making sense of the past and serving various didactic purposes and their problems, memories of past and futures events shared by the literati, issues of gender constructions and memory, memories understood by the group as 'counterfactual' and their importance, and, in multiple ways, how and why shared memories served as a (safe) playground for exploring multiple, central ideological issues within the group and of generative grammars governing systemic preferences and dis-preferences for particular memories…”
    Libro
  14. 1994
    Publicado 2023
    “…Yet this portrait of a safe and conventional figure at the origins of Christianity airbrushes out many strange things about him. …”
    Otros
  15. 1995
    Publicado 2020
    “…In the following section, an adaptive and robust square root cubature Kalman filter based on variational Bayesian approximation and Huber’s M-estimation is proposed to accurately estimate state of charge (SOC), which is vital for safe operation and efficient management of lithium-ion batteries. …”
    Libro electrónico
  16. 1996
    Publicado 2019
    “…The idea of joining these approaches at different levels, from territorial to micro-urban ones, is defined the “s-RGB Design” (safe Regeneration and Green Blue Design)…”
    Libro electrónico
  17. 1997
    Publicado 2016
    “…Reading Scott in relation to this tradition, Reinventing Liberty demonstrates the genre's troubled role in the construction of the myth of Britain as a nation of gradual, safe political change…”
    Libro electrónico
  18. 1998
    por Both, Norbert, 1970-
    Publicado 2000
    “…By July 1995, the involvement of the Netherlands had deepened to the extent that Dutch troops who found themselves trapped in the UN safe area of Srebrenica together with the local Muslim population were unable to prevent the worst massacre in Europe since the Second World War.This study is based on interviews with all the major players, including two former Defence Ministers and two former Ministers of Foreign Affairs, and on documents from the Netherlands Ministry of Foreign Affairs, made available under the country's own 'freedom of information act'…”
    Libro electrónico
  19. 1999
    Publicado 2019
    “…Centers for Disease Control and Prevention (CDC), achieving safe and healthier foods was one of the top ten achievements of public health in the 20th century. …”
    Libro electrónico
  20. 2000
    por Bhattacharjee, Joydeep. author
    Publicado 2020
    “…Armed with the knowledge of this amazing language, you will be able to create applications that are more performant, memory safe, and less resource heavy. You will: Write machine learning algorithms in Rust Use Rust libraries for different tasks in machine learning Create concise Rust packages for your machine learning applications Implement NLP and computer vision in Rust Deploy your code in the cloud and on bare metal servers…”
    Libro electrónico