Mostrando 1,001 - 1,020 Resultados de 2,801 Para Buscar '"Safed"', tiempo de consulta: 0.10s Limitar resultados
  1. 1001
    por Hart-Davis, Guy
    Publicado 2012
    Tabla de Contenidos: “…Return to a Web Page You Visited RecentlyCustomize the Top Sites Screen for Quick Browsing; Bookmark a Page You Want to Revisit; Keep a Reading List of Web Pages; Search for Websites; Download a File from the Internet; Secure Safari for Safe Browsing; Chapter 6: Sending and Receiving Email; Open and Close Apple Mail; Add Your Email Accounts to Mail; Send an Email Message; Receive and Read Your Email Messages; Reply to a Message; Forward a Message to Someone Else; Send a File via Email; Receive a File via Email; Read Email Messages Quickly in Conversations…”
    Libro electrónico
  2. 1002
    Publicado 2019
    Tabla de Contenidos: “…Housing Boom and Bust: The Homeowner's Society Creates the People's Panic -- "Safe as Houses" -- The Music Stops -- The Boombustology of the U.S. …”
    Libro electrónico
  3. 1003
    Publicado 2023
    Tabla de Contenidos: “…-- Networking in the cloud - to isolate and protect -- Allowing or disabling traffic by defining the right routes -- Filtering traffic with security rules (stateful and stateless) -- Connecting multiple networks in a safe way -- Summary -- Further reading -- Part 2: Platform Services -- Chapter 6: Databases - To SQL or Not to SQL for So Many Records... -- Purpose-built databases: using the right tool for the right job -- Relational databases -- Non-relational databases -- Summary -- Further reading -- Chapter 7: Identity and Access Management - Who Am I and What Can I Do? …”
    Libro electrónico
  4. 1004
    Publicado 2023
    Tabla de Contenidos: “…-- The birth of an idea -- Rise and fall -- Chapter 9 From Crisis to Crisis-Israeli Cyber Grows Up -- Safe browsing: Island &amp -- Co. -- The massive switch to networks -- Is the bubble about to burst? …”
    Libro electrónico
  5. 1005
    Publicado 2016
    Tabla de Contenidos: “…-- Writing Android malwares -- Writing a simple reverse shell Trojan using socket programming -- Registering permissions -- Writing a simple SMS stealer -- The user interface -- Registering permissions -- Code on the server -- A note on infecting legitimate apps -- Malware analysis -- Static analysis -- Disassembling Android apps using Apktool -- Decompiling Android apps using dex2jar and JD-GUI -- Dynamic analysis -- Analyzing HTTP/HTTPS traffic using Burp -- Analysing network traffic using tcpdump and Wireshark -- Tools for automated analysis -- How to be safe from Android malwares? -- Summary -- Chapter 10: Attacks on Android Devices -- MitM attacks -- Dangers with apps that provide network level access -- Using existing exploits -- Malware -- Bypassing screen locks -- Bypassing pattern lock using adb -- Removing the gesture.key file -- Cracking SHA1 hashes from the gesture.key file -- Bypassing password/PIN using adb…”
    Libro electrónico
  6. 1006
    Publicado 2010
    Tabla de Contenidos: “…Working with Bookmarks -- Downloading and Viewing Files -- Saving Web Pages -- Customizing Safari's Toolbar -- Quitting Safari -- 8 Keeping Your Address Book and Schedule -- Using the Address Book -- Using iCal -- 9 Emailing and Chatting Online -- Using Mac Mail -- Using iChat -- 10 Using TextEdit -- Working with Documents -- Navigating and Editing Text -- Setting Margins and Tabs -- Formatting Text -- Formatting Paragraphs -- Exploring Other Formatting Features -- Printing -- 11 Managing and Editing Your Photos -- Setting Up iPhoto -- Importing Photos and Movies -- Viewing Photos -- Viewing, Changing, and Adding Photo Information -- Viewing and Changing Information for Events -- Sorting Photos -- Exploring Methods to Organize Photos -- Searching for Photos -- Editing Photos -- Sharing Photos with Others -- 12 Using Widgets and Other Applications -- Using Widgets -- Using Preview -- Consulting the Dictionary -- Posting Stickies -- Using the Calculator -- 13 Keeping Your Mac Safe, Updated, and Backed Up -- Safely Surfing the Web -- Working with the Keychain -- Maintaining Your Mac Software -- Backing Up with Time Machine -- Part III: Having Fun and Getting Creative -- 14 Watching Movies, Listening to Music, and Playing Games -- Watching Movies and Videos -- Listening to Music with iTunes -- Listening to Music in Front Row -- Acquiring and Playing Podcasts -- Playing Games -- 15 Being Creative with Photos -- Making Self-Portraits in Photo Booth -- Creating and Exporting Slideshows -- Designing and Publishing a Photo Book -- Creating Other Keepsakes -- Using Comic Life -- 16 Making Your Own Movies -- Getting Started -- Adding Video to the Events Library -- Playing Clips in the Event Library -- Creating and Playing a New Movie Project -- Trimming and Splitting Clips -- Adding Transitions between Clips -- Adding Titles -- Sharing and Exporting Movies…”
    Vídeo online
  7. 1007
    por Baker, Kenneth R., 1943-
    Publicado 2009
    Tabla de Contenidos: “…6.7 Using Risk Solver6.8 Summary; References; Exercises; 7 Safe Scheduling; 7.1 Introduction; 7.2 Meeting Service-Level Targets; 7.3 Trading Off Tightness and Tardiness; 7.4 The Stochastic E/T Problem; 7.5 Setting Release Dates; 7.6 The Stochastic U-Problem: A Service-Level Approach; 7.7 The Stochastic U-Problem: An Economic Approach; 7.8 Summary; References; Exercises; 8 Extensions of the Basic Model; 8.1 Introduction; 8.2 Nonsimultaneous Arrivals; 8.2.1 Minimizing the Makespan; 8.2.2 Minimizing Maximum Tardiness; 8.2.3 Other Measures of Performance; 8.3 Related Jobs…”
    Libro electrónico
  8. 1008
    Publicado 2017
    Tabla de Contenidos: “…-- The First Step Is to Transform -- Start at the Culture Level -- Remove the Negativity -- Sooner or Later -- Lead from Where You Are -- Implement the No Complaining Rule -- Michael Phelps's Positive Leadership -- Don't Be Negative about Negativity -- Chapter 7: Positive Leaders Create United and Connected Teams -- Connection Is the Difference -- Team Beats Talent When Talent Isn't a Team -- Dabo Swinney's Safe Seat -- Collaborate and Facilitate -- Don't Let Your Reptile Eat Your Positive Dog…”
    Libro electrónico
  9. 1009
    Publicado 2022
    Tabla de Contenidos: “…Preface Introduction PART I Special Populations 1. Geriatrics: Safe Medication Use in Older Adults 2. Pediatrics Pharmacotherapy 3. …”
    Libro electrónico
  10. 1010
    por Beattie-Hood, Ben
    Publicado 2023
    Tabla de Contenidos: “…-- Utility Types -- Record&lt -- Keys, Type&gt -- -- Pick&lt -- Type, Keys&gt -- -- Omit&lt -- Type, Keys&gt -- -- Partial&lt -- Type&gt -- -- Required&lt -- Type&gt -- -- Readonly&lt -- Type&gt -- -- Exclude&lt -- Type, Keys&gt -- -- Extract&lt -- Type, Keys&gt -- -- Parameters&lt -- FunctionType&gt -- -- ConstructorParameters&lt -- ClassType&gt -- -- ReturnType&lt -- FunctionType&gt -- -- Conditional Types -- extends Keyword -- infer Keyword -- Extracting Inferred Types -- Distributive and Nondistributive Conditional Types -- Conditional Types via Property Accessors -- Mapped Types -- Changing the Type of Fields -- Adding and Removing Fields -- Renaming Fields -- Recursive Types -- Recursion Within an Object Type -- Recursion over a Tuple Type -- Template Literals -- Summary -- Chapter 6: Advanced Usage -- Introduction -- Expect and IsEqual -- Compute -- JsonOf -- Flatten -- UrlParameters -- UrlParameters with Optional Params -- Further Reading -- Summary -- Chapter 7: Performance -- Introduction -- Reducing Inline Types -- Reducing Inferred Types -- Inline Caching Using Conditional Types -- Reduce Intersections -- Reduce Union Types -- Partition Using Packages and Projects -- Partitioning Using Packages -- Partitioning Using Projects -- Other Performance Tweaks -- Debugging Performance Issues -- Using the @typescript/analyze-trace NPM Package -- Using a Trace Viewer Within Your Browser -- Summary -- Chapter 8: Build -- Introduction -- Compiler Options -- Recommended tsconfig.json Settings -- Targeting Modern Browsers -- Prevent Optional Errors -- Display Complete Errors -- Enable Widest Range of Safe Interoperability -- Project Structure and Build Output -- Other Options -- Linting -- Installing ESLint -- Ideal Ruleset -- Additional Strict Errors -- Additional Strict Warnings -- Removed Rules…”
    Libro electrónico
  11. 1011
    por Rothwell, Kevin
    Publicado 2007
    Tabla de Contenidos:
    Libro electrónico
  12. 1012
    por Watson, David
    Publicado 2013
    Tabla de Contenidos: “…Clean Room; 2.4.6. Fire Safes; 2.4.7. Secure Off-Site Storage; 2.5. Layout of the Forensic Laboratory; 2.5.1. …”
    Libro electrónico
  13. 1013
    Publicado 2018
    Tabla de Contenidos: “…-- (V)-Verify Progress -- (E)-Enhance Yourself, Mentally and Physically, with Safe Biohacking -- This Guidebook Can Help You Strive -- Chapter 2: Are You Passionate Enough? …”
    Libro electrónico
  14. 1014
    Publicado 2015
    Tabla de Contenidos: “…March 11, about 15:37: IC isolation valves closed with fail-safe function…”
    Libro electrónico
  15. 1015
    Publicado 2019
    Tabla de Contenidos: “…Build a network of support: 3 ways women can rethink office politics: understand your network and secure allies / by Kathryn Heath -- You need many mentors, not just one: create a personal board of directors / by Dorie Clark -- The right way to find a career sponsor: align with someone who will advocate for you / by Sylvia ann Hewlett -- Break out of the girls' club: ask for introductions - to both men and women / by Whitney Johnson -- Make yourself safe for sponsorship: four tips to keep rumors at bay / by Sylvia Ann Hewlett -- Section Four. …”
    Libro
  16. 1016
    Publicado 2018
    Tabla de Contenidos: “…Trull -- What is social engineering? -- Staying safe from social engineering attacks -- People -- Process -- Technology -- Developing an effective cyber strategy -- Resources -- Business drivers -- Data -- Controls -- Threats -- Marcus Murray and Hasain Alshakarti -- Sample scenario - the workstation-data collection job -- Step 1 - preparing the attack -- Step 2 - staging the attack -- Step 3 - selecting the target -- Step 4 - launching the attack -- Step 5 - result -- Key points from this example -- Physical exposure -- The physical attack -- Emre Tinaztepe -- Malvertising -- Prevention -- Rogue/fake applications -- Prevention -- Documents with malicious payloads -- Prevention -- Public Wi-Fi hotspots -- Prevention -- Phishing/spear phishing -- Milad Aslaner -- Information is everywhere -- User activities -- Understanding reconnaissance -- Practical examples of reconnaissance -- Real-world examples -- Chapter 12: Ask the Experts - Part 2.…”
    Libro electrónico
  17. 1017
    Publicado 2018
    Tabla de Contenidos: “…. -- There's more... -- Safe type-casting -- How to do it... -- How it works... -- Other Books You May Enjoy -- Index…”
    Libro electrónico
  18. 1018
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Keep It Real - Firebase Realtime Database -- Firebase Realtime Database -- Setting up a development environment -- Prerequisites -- Configuring Firebase in Android projects -- Reading and writing to Realtime Database -- Database reference -- Writing into Realtime Database -- Reading from Realtime Database -- Structuring the data with objects -- Reading the objects from Firebase -- Reading value changes -- Parsing the DataSnapshot object -- Updating data -- Writing HashMaps to Realtime Database -- Realtime Database and lists -- Deleting data -- Offline capabilities -- Realtime Database rules -- Default security rules -- Database rules and types -- Customizing database rules -- Data security -- Custom variables -- Default variables -- RuleDataSnapshot and its methods -- Creating an Android application using Realtime Database -- User interface design -- Logic -- Summary -- Chapter 2: Safe and Sound - Firebase Authentication -- Firebase Authentication -- Setting up Firebase Authentication -- FirebaseUI Auth authentication -- Firebase SDK Authentication -- FirebaseUI Email Authentication -- Configuring for Email Authentication -- Enabling Email/Password Authentication in Console -- Initializing Firebase Authentication -- Finalizing the project -- Firebase SDK Email Authentication -- Sign up new users -- Sign in existing users -- Managing users -- Provider-specific user profile details -- Profile updating -- Sending a verification Email -- Forgot password -- Deleting a user -- Managing users through console -- Smart Lock -- FirebaseUI social networking site authentication -- Google Sign-in -- SHA-1 fingerprint -- Code for Google provider -- Facebook Login -- Facebook App ID and App secret -- Project configuration…”
    Libro electrónico
  19. 1019
    Publicado 2023
    Tabla de Contenidos: “…Reviewing and Responding to Security Incidents and Alerts in Microsoft 365 Defender -- Reviewing alerts and incidents -- Attack story -- Alerts -- Assets -- Investigations -- Evidence and Response -- Responding to Alerts and Incidents -- Reviewing and Responding to Issues Identified in Security and Compliance Reports in Microsoft 365 Defender -- General -- Endpoints -- Email and Collaboration -- Cloud Apps -- Reviewing and Responding to Threats Identified in Threat Analytics -- Overview -- Analyst Report -- Related Incidents -- Impacted Assets -- Endpoints Exposure -- Recommended Actions -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 8: Implementing and Managing Email and Collaboration Protection Using Microsoft Defender for Office 365 -- Implementing Policies and Rules in Defender for Office 365 -- Deploying the Preset Security Policies -- Configuring Standalone Policies -- Anti-Phishing -- Anti-Spam -- Anti-Malware -- Safe Attachments -- Safe Links -- Configuring Rules -- Tenant Allow/Block Lists -- Email Authentication Settings -- Advanced Delivery -- Enhanced Filtering -- Quarantine Policies -- Using the Configuration Analyzer -- Reviewing and Responding to Threats Identified in Defender for Office 365 -- Email &amp -- Collaboration Alerts -- Investigations -- Explorer and Real-Time Detections -- All Email -- Malware -- Phish -- Campaigns -- Content Malware -- URL Clicks -- Creating and Running Campaigns -- Creating a Phishing Campaign -- Creating a Training Simulation -- Reviewing Reports -- Unblocking Users -- Configuring Alerts -- Removing Restrictions -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 9: Implementing and Managing Endpoint Protection by Using Microsoft Defender for Endpoint -- Overview of Microsoft Defender for Endpoint -- Features -- Requirements -- Deployment Architectures…”
    Libro electrónico
  20. 1020
    Publicado 2023
    Tabla de Contenidos: “…The standard data seed -- Table-driven - when test data drives behavior -- Scriptable users and structure -- Exploring synthetic users -- Leveraging production refreshes -- Exploring development, test, and production environments -- Understanding the regulatory issues in test data management -- The user spy feature -- Summary -- Part 2: Testing and Software Delivery -- Chapter 8: Delivery Models and Testing -- Technical requirements -- Waterfall -- The advantages of and place for the waterfall -- The V-Model -- Iterative, incremental, and mini waterfalls -- Extreme Programming (XP) -- The context of XP -- Scrum and SAFe -- The context of Scrum -- SAFe and its context -- House-rules software development -- The Agile Manifesto -- Context-driven testing -- Illustrations of the principles in action -- Kanban as a house rule -- Continuous delivery and deployment -- DevOps, Platform Engineering, SRE -- Summary -- Further reading -- Chapter 9: The Puzzle Pieces of Good Testing -- Technical requirements -- Recipes - how to do hard things -- Defining recipes -- Shouldn't recipes just be automated? …”
    Libro electrónico