Mostrando 2,441 - 2,460 Resultados de 2,650 Para Buscar '"Safed"', tiempo de consulta: 0.06s Limitar resultados
  1. 2441
    Publicado 2023
    “…Apply design patterns built around lambda expressions, safely manage resource allocations, use memoization, and learn to transform data into different forms, all while honoring immutability, and providing thread safety to leverage lazy evaluation for efficiency and parallel execution for performance. …”
    Libro electrónico
  2. 2442
    Publicado 2024
    “…From data security to model security, system infrastructure to secure development practices, you'll get a thorough understanding of how to keep AI systems safe and resilient. Privacy and ethics are also key focuses of this guide. …”
    Grabación no musical
  3. 2443
    Publicado 2015
    “…The data reservoir reference architecture includes description of governance and management processes and definitions to ensure the human and business systems around the technology support a collaborative, self-service, and safe environment for data use. The data reservoir reference architecture was first introduced in Governing and Managing Big Data for Analytics and Decision Makers, REDP-5120, which is available at: http://www.redbooks.ibm.com/redpieces/abstracts/redp5120.html. …”
    Libro electrónico
  4. 2444
    Publicado 2022
    “…One of the first Operating Systems written in Rust, Tock is designed to safely run multiple applications on low power devices, enabling you to build a secure foundation for IoT systems. …”
    Libro electrónico
  5. 2445
    Publicado 2020
    “…However, a survey of the adult population shows that the inhabitants of Varkaus are typically satisfied with their work, with their social relationships and their lives in general. Varkaus is seen as a safe and good living environment. A central element of well-being is couple relationship, as well as other social relationships. …”
    Libro electrónico
  6. 2446
    Publicado 2018
    “… • Edit and enhance photos with the powerful new tools on the Photos app • Browse the web safely with Safari's new privacy features • Share files quickly and easily using iCloud Drive • Use Siri to accomplish more in less time Like any computer, your Mac is a tool. …”
    Libro electrónico
  7. 2447
    Publicado 2018
    “…What you will learn Design a serverless architecture Use AWS Lambda to contain your serverless API Explore the various ways to keep serverless apps safe and secure Understand how a serverless API allows you to use huge infrastructure and cut costs Discover how to handle distributed systems in Kotlin Design the data flow between cloud services and custom business logic Secure your Kotlin AWS serverless application Master Kotlin design patterns for serverless applications Who this book is for Hands-On Serverless Applications with Kotlin is for you if you are a Kotlin developer who wants to learn about serverless architectures. …”
    Libro electrónico
  8. 2448
    por Robichau, Bernard Peter. author
    Publicado 2014
    “…It will help you keep health information safe, and it will help keep your organization—whether local clinic or major hospital system—on the right side of the law…”
    Libro electrónico
  9. 2449
    Publicado 2013
    “…Learn how to: • Get started quickly with Surface 2 and Windows RT 8.1 • Connect to Wi-Fi, share printers, and access files from your network or your SkyDrive cloud storage account • Get on the Web fast and enjoy it more with Internet Explorer 11 and the Bing search engine • Secure your Surface and control what your kids can do with it • Do all your Facebook and Twitter social networking through the People app • Find and play the music you love with Xbox Music, Radio, and Xbox Music Pass • Watch Netflix, YouTube, Hulu Plus, and other streaming video • Instantly retrieve up-to-the-minute news from top media and journalists • Create, edit, format, proof, and share documents with Word 2013 • Crunch numbers with Excel 2013 • Present on the go with PowerPoint 2013 • Use OneNote 2013 to organize notes, sync them across devices, and access them from anywhere • Manage email and track your calendar with Outlook 2013 • Go anywhere with Surface 2’s easy maps and directions • Capture, manage, touch up, and geotag your photos • Make sure your files are always safely backed up • Find the best new Windows Store Apps • Keep your Surface 2 working reliably, with maximum battery life • Personalize your Surface 2 using the newest customization settings • Get more help whenever you need it…”
    Libro electrónico
  10. 2450
    Publicado 2014
    “…Coverage includes Understanding the key goals and concepts of Software-Defined Storage and Virtual SAN technology Meeting physical and virtual requirements for safe Virtual SAN implementation Installing and configuring Virtual SAN for your unique environment Using Storage Policy Based Management to control availability, performance, and reliability Simplifying deployment with VM Storage Policies Discovering key Virtual SAN architectural details: caching I/O, VASA, witnesses, pass-through RAID, and more Ensuring efficient day-to-day Virtual SAN management and maintenance Interoperating with other VMware features and products Designing and sizing Virtual SAN clusters Troubleshooting, monitoring, and performance optimization…”
    Libro electrónico
  11. 2451
    Publicado 2015
    “…Machine Learning is an accessible, comprehensive guide for the non-mathematician, providing clear guidance that allows readers to: Learn the languages of machine learning including Hadoop, Mahout, and Weka Understand decision trees, Bayesian networks, and artificial neural networks Implement Association Rule, Real Time, and Batch learning Develop a strategic plan for safe, effective, and efficient machine learning By learning to construct a system that can learn from data, readers can increase their utility across industries. …”
    Libro electrónico
  12. 2452
    Publicado 2017
    “…Gradually, you will learn about the different approaches and models of the Security framework and explore various authentication models and authorization techniques, such as social media-based authentication and safe storage using app secrets. By the end..…”
    Libro electrónico
  13. 2453
    Publicado 2014
    “…Learn how to Apply core practices for securing the platform Protect code, algorithms, and business rules from reverse engineering Eliminate hardcoding of keys, APIs, and other static data Eradicate extraneous data from production APKs Overcome the unique challenges of mobile authentication and login Transmit information securely using SSL Prevent man-in-the-middle attacks Safely store data in SQLite databases Prevent attacks against web servers and services Avoid side-channel data leakage through third-party libraries Secure APKs running on diverse devices and Android versions Achieve HIPAA or FIPS compliance Harden devices with encryption, SELinux, Knox, and MDM Preview emerging attacks and countermeasures This guide is a perfect complement to Nolan’s AndroidTM Security Essentials LiveLessons (video training; ISBN-13: 978-0-13-382904-4) and reflects new risks that have been identified since the LiveLessons were released…”
    Libro electrónico
  14. 2454
    Publicado 2005
    “…Either way, Securing Windows Server 2003 will guide you safely through the morass of security threats…”
    Libro electrónico
  15. 2455
    Publicado 2019
    “…Review the essentials of Authentication, Authorization, and Accounting (AAA) Explore the RADIUS and TACACS+ AAA protocols, and administer devices with them Enforce basic network access control with the Cisco Identity Services Engine (ISE) Implement sophisticated ISE profiling, EzConnect, and Passive Identity features Extend network access with BYOD support, MDM integration, Posture Validation, and Guest Services Safely share context with ISE, and implement pxGrid and Rapid Threat Containment Integrate ISE with Cisco FMC, WSA, and other devices Leverage Cisco Security APIs to increase control and flexibility Review Virtual Private Network (VPN) concepts and types Understand and deploy Infrastructure VPNs and Remote Access VPNs Virtualize leading Cisco Security products Make the most of Virtual Security Gateway (VSG), Network Function Virtualization (NFV), and microsegmentation…”
    Libro electrónico
  16. 2456
    Publicado 2008
    “…You’ll learn how to: · Mitigate unique risks associated with Ajax, including overly granular Web services, application control flow tampering, and manipulation of program logic · Write new Ajax code more safely—and identify and fix flaws in existing code · Prevent emerging Ajax-specific attacks, including JavaScript hijacking and persistent storage theft · Avoid attacks based on XSS and SQL Injection—including a dangerous SQL Injection variant that can extract an entire backend database with just two requests · Leverage security built into Ajax frameworks like Prototype, Dojo, and ASP.NET AJAX Extensions—and recognize what you still must implement on your own · Create more secure “mashup” applications Ajax Security will be an indispensable resource for developers coding or maintaining Ajax applications; architects and development managers planning or designing new Ajax software, and all software security professionals, from QA specialists to penetration testers…”
    Libro electrónico
  17. 2457
    Publicado 2005
    “…Highlighting today's best practices, they show how to write programs that are safe, can be built quickly, and yet offer outstanding performance. …”
    Libro electrónico
  18. 2458
    Publicado 2013
    “…Weston offers practical guidelines for assessing how much debt is safe -- and compassionate, realistic guidance if you've gone beyond the safety zone. …”
    Libro electrónico
  19. 2459
    Publicado 2014
    “…14 types of hostile mobs Get friendly mobs on your side and build automated farms Brew potions to cure ills, gain superpowers, and throw at enemies Transform your shelter into a palace (or a secret underwater base) Create new worlds and master the fine art of terraforming Learn the secrets of redstone devices, and build incredible rail systems Play safely through The Nether and The End Minecraft is a trademark of Mojang Synergies / Notch Development AB. …”
    Libro electrónico
  20. 2460
    Publicado 2013
    “…This Guide’s quick, easy coverage includes Planning a site that will be easy to build and manage Installing Drupal and setting it up to work reliably and securely Quickly finding the Drupal tools and features you’re looking for Mastering an easy 3-step workflow for creating new content Delivering more interesting content with fields and new content types Creating intuitive site structures and user navigation Adding powerful site features with just a few clicks Completely redesigning your site in minutes with Themes Adding site search, registration, and more Presenting content in tables, lists, grids, or photo galleries Creating advanced layouts and 2- or 3-column designs Controlling what users on your site can see and do Preparing your site for launch Administering and updating a live site efficiently and safely Drupal 7 Explained requires absolutely no experience with Drupal, content management, website construction, programming, scripting, or even HTML. …”
    Libro electrónico