Mostrando 26,841 - 26,860 Resultados de 27,383 Para Buscar '"The Act"', tiempo de consulta: 0.13s Limitar resultados
  1. 26841
    Publicado 2015
    “…Topic Areas Enabling ubiquitous, on-demand, scalable network access to shared pools of configurable IT resources Optimizing multitenant environments to efficiently serve multiple unpredictable consumers Using elasticity best practices to scale IT resources transparently and automatically Ensuring runtime reliability, operational resiliency, and automated recovery from any failure Establishing resilient cloud architectures that act as pillars for enterprise cloud solutions Rapi..…”
    Libro electrónico
  2. 26842
    Publicado 2016
    “…What You Will Learn Understand Internetworking, sources of network-based evidence and other basic technical fundamentals, including the tools that will be used throughout the book Acquire evidence using traffic acquisition software and know how to manage and handle the evidence Perform packet analysis by capturing and collecting data, along with content analysis Locate wireless devices, as well as capturing and analyzing wireless traffic data packets Implement protocol analysis and content matching; acquire evidence from NIDS/NIPS Act upon the data and evidence gathered by being able to connect the dots and draw links between various events Apply logging and interfaces, along with analyzing web proxies and understanding encrypted web traffic Use IOCs (Indicators of Compromise) and build real-world forensic solutions, dealing with malware In Detail We live in a highly networked world. …”
    Libro electrónico
  3. 26843
    Publicado 2021
    “…Through considering the way these networks have shaped the city by weaving the urbanites of the city center(s) and suburban areas, this elective has been focused on three station locations which act as gateways to the city center of Rotterdam: Meijersplein Airport station, Rotterdam Alexander rail-metro station and Slinge metro station. …”
    Libro electrónico
  4. 26844
    Publicado 2023
    “…You'll see how the simple act of removing personally identifiable information (PII) from a dataset lowers the risk of social engineering attacks. …”
    Grabación no musical
  5. 26845
    Publicado 2017
    “…What You Will Learn Efficiently collect data from a large variety of monitoring objects Organize your data in graphs, charts, maps, and slide shows Write your own custom probes and monitoring scripts to extend Zabbix Configure Zabbix and its database to be high available and fault-tolerant Automate repetitive procedures using Zabbix's API FInd out how to monitor SNMP devices Manage hosts, users, and permissions while acting upon monitored conditions Set up your Zabbix infrastructure efficiently Customize the Zabbix interface to suit your system needs Monitor your VMware infrastructure in a quick and easy way with Zabbix In Detail Nowadays, monitoring systems play a crucial role in any IT environment. …”
    Libro electrónico
  6. 26846
    por Beriet, Grégory
    Publicado 2019
    “…Il reste toutefois possible de multiplier les approches et de s’attacher aussi bien à décrire les corps brutalisés, qu’à s’interroger sur les logiques du passage à l’acte ou à analyser la « réception » des violences corporelles. …”
    Electrónico
  7. 26847
    por Lavergne, Benjamin
    Publicado 2017
    “…Technique particulière de formulation des énoncés concrétisée dans des actes informels, la soft law recommande un modèle de comportement à ses destinataires. …”
    Electrónico
  8. 26848
    Publicado 2015
    “…Throughout, the focus is squarely on what matters most: transforming data into insights that are clear, accurate, and can be acted upon…”
    Libro electrónico
  9. 26849
    Publicado 2023
    “…Couvrant quatre décennies, l'action de ce fondateur de l'Europe est retracée dans ce volume où sont publiés les actes du colloque qui lui a été consacré en novembre 2021 à l'occasion du 110e anniversaire de sa naissance."…”
    Libro electrónico
  10. 26850
    por Hucaby, Dave
    Publicado 2004
    “…The complete guide to the most popular Cisco PIX®, ASA, FWSM, and IOS® firewall security features Learn about the various firewall models, user interfaces, feature sets, and configuration methods Understand how a Cisco firewall inspects traffic Configure firewall interfaces, routing, IP addressing services, and IP multicast support Maintain security contexts and Flash and configuration files, manage users, and monitor firewalls with SNMP Authenticate, authorize, and maintain accounting records for firewall users Control access through the firewall by implementing transparent and routed firewall modes, address translation, traffic filtering, user authentication, content filtering, application inspection, and traffic shunning Increase firewall availability with firewall failover operation Understand how firewall load balancing works Generate firewall activity logs and learn how to analyze the contents of the log Verify firewall operation and connectivity and observe data passing through a firewall Control access and manage activity on the Cisco IOS firewall Configure a Cisco firewall to act as an IDS sensor Every organization has data, facilities, and workflow processes that are critical to their success. …”
    Libro electrónico
  11. 26851
    por Hucaby, Dave
    Publicado 2008
    “…Learn about the various firewall models, user interfaces, feature sets, and configuration methods Understand how a Cisco firewall inspects traffic Configure firewall interfaces, routing, IP addressing services, and IP multicast support Maintain security contexts and flash and configuration files, manage users, and monitor firewalls with SNMP Authenticate, authorize, and maintain accounting records for firewall users Control access through the firewall by implementing transparent and routed firewall modes, address translation, and traffic shunning Define security policies that identify and act on various types of traffic with th..…”
    Libro electrónico
  12. 26852
    por Raman, T. V., 1965-
    Publicado 2004
    “…In light of the October 2003 deadline for U.S. federal agencies to comply with the mandate of the Government Paperwork Elimination Act (GPEA) to give citizens the opportunity to provide information online, this important technical work comes none too soon. …”
    Libro electrónico
  13. 26853
    Publicado 2004
    “…It features 100 proven methods to positively change the way you think and act—methods based on feedback from the hundreds of thousands of corporate and public seminar attendees Chandler speaks to each year. 100 Ways to Motivate Yourself will help you break through the negative barriers and banish the pessimistic thoughts that are preventing you from fulfilling your lifelong goals and dreams. …”
    Libro electrónico
  14. 26854
    por Elssamadisy, Amr, 1970-
    Publicado 2009
    “…The pattern reference prepares you to Understand the core drivers, principles, and values associated with agile success Tightly focus development on delivering business value–and recognize the “smells” of a project headed off track Gain rapid, effective feedback practices: iteration, kickoff and stand-up meetings, demos, retrospectives, and much more Foster team development: co-location, self-organization, cross-functional roles, and how to bring the customer aboard Facilitate technical tasks and processes: testing, refactoring, continuous integration, simple design, collective code ownership, and pair programming Act as an effective coach, learning to engage the community and promote learning Integrate “clusters” of agile practices that work exceptionally well together Agile Adoption Patterns will help you whether you’re planning your first agile project, trying to improve your next project, or evangelizing agility throughout your organization. …”
    Libro electrónico
  15. 26855
    Publicado 2010
    “…Mike Rother explains how to improve our prevailing management approach through the use of two kata: Improvement Kata--a repeating routine of establishing challenging target conditions, working step-by-step through obstacles, and always learning from the problems we encounter; and Coaching Kata: a pattern of teaching the improvement kata to employees at every level to ensure it motivates their ways of thinking and acting. With clear detail, an abundance of practical examples, and a cohesive explanation from start to finish, Toyota Kata gives executives and managers at any level actionable routines of thought a..…”
    Libro electrónico
  16. 26856
    Publicado 2012
    “…Your employees will learn to think and act like owners and will become active participants in the financial performance of the business. …”
    Libro electrónico
  17. 26857
    Publicado 2019
    “…Further, the approach doesn’t just focus on delivering change; it builds an organization’s muscle to continuously change, making it healthier so that it can act with increased speed and agility to stay perpetually ahead of its competition. …”
    Libro electrónico
  18. 26858
    Publicado 2017
    “…Digital Forensics and Cyber Crime with Kali Linux Fundamentals LiveLessons introduces you to the world of digital forensics and acts as a primer for your future forensic work. This is a fundamentals course with a focus on the average network engineer, so you don’t need to be an IT expert to follow most of the concepts. …”
    Video
  19. 26859
    Publicado 2017
    “…Within the course, we will focus on creating the HTTP API to act as a gateway to the whole system and so-called Activities Service, responsible for handling the incoming messages (or actually the commands that will be distributed through the services bus). …”
    Video
  20. 26860
    Publicado 2008
    “…A rare few will establish the most profound connection, in which presenter and audience understand each other perfectly...discover common ground... and, together, decide to act. In this fully updated edition, Jerry Weissman, the world’s #1 presentation consultant, shows how to connect with even the toughest, most high-level audiences...and move them to action! …”
    Libro electrónico