Mostrando 701 - 720 Resultados de 722 Para Buscar '"The Hole"', tiempo de consulta: 0.08s Limitar resultados
  1. 701
    por Ready, Kevin
    Publicado 2011
    “…He earned his MBA—Master of Bruise Acquisition—through numerous encounters with “situations,” problems, black holes, bad employees, sea monsters, not enough money, and other karate chops to the organizational body. …”
    Libro electrónico
  2. 702
    por McGinn, Jeffrey
    Publicado 2012
    “…Risk management veteran Jeff McGinn pokes holes in prevalent assumptions about how financial markets act that tend to underestimate the likelihood of occurrence of extreme events. …”
    Libro electrónico
  3. 703
    por Institute of Medicine (U.S.).
    Publicado 2010
    “…"Recent outbreaks of illnesses traced to contaminated sprouts and lettuce illustrate the holes that exist in the system for monitoring problems and preventing foodborne diseases. …”
    Libro electrónico
  4. 704
    Publicado 2021
    “…As for control, we must recognise that it is perennially exercised in an environment full of holes. Dans son cours au Collège de France de l'année 1978 sur le thème « Sécurité, territoire et population », Michel Foucault a établi une relation entre « circulation », « sécurité » et « espace ». …”
    Libro electrónico
  5. 705
    Publicado 2018
    “…Use an open source firewall and features such as failover, load balancer, OpenVPN, IPSec, and Squid to protect your network Key Features Explore pfSense, a trusted open source network security solution Configure pfSense as a firewall and create and manage firewall rules Test pfSense for failover and load balancing across multiple WAN connections Book Description While connected to the internet, you're a potential target for an array of cyber threats, such as hackers, keyloggers, and Trojans that attack through unpatched security holes. A firewall works as a barrier (or shield') between your computer and cyberspace. pfSense is highly versatile firewall software. …”
    Libro electrónico
  6. 706
    Publicado 2018
    “…Style and approach This book takes a step-by-step approach to identify the loop holes in a self-learning security system. You will be able to efficiently breach a machine learning system with the help of best practices towards the end of the book…”
    Libro electrónico
  7. 707
    por Maraia, Vincent
    Publicado 2005
    “…It's written in a way that is easy to read and will help a reader fill holes in their vision regarding software build management. …”
    Libro electrónico
  8. 708
    Publicado 2017
    “…Automate security-related tasks in a structured, modular fashion using the best open source automation tool available About This Book Leverage the agentless, push-based power of Ansible 2 to automate security tasks Learn to write playbooks that apply security to any part of your system This recipe-based guide will teach you to use Ansible 2 for various use cases such as fraud detection, network security, governance, and more Who This Book Is For If you are a system administrator or a DevOps engineer with responsibility for finding loop holes in your system or application, then this book is for you. …”
    Libro electrónico
  9. 709
  10. 710
    Publicado 1994
    “…Beginning with chapter 2 of part one, the book discusses such basic subjects as gallium arsenide materials and crystal properties, electron energy band structures, hole and electron transport, crystal growth of GaAs from the melt and defect density analysis. …”
    Libro electrónico
  11. 711
    por Bourquin, Tim
    Publicado 2013
    “…To be sure, becoming a full-time, professional trader, working at a proprietary trading firm, or managing the trading activity of a hedge fund may sound like the perfect career, but it’s all too easy for beginner traders to overestimate their trading abilities, underestimate the movements of the markets, and find themselves in a financial hole of epic proportions after a few bad trades. …”
    Libro electrónico
  12. 712
    Publicado 2022
    “…This follows suggestions from writers in the emerging years of coaching, such as Alison Hardingham (2006) and Jonathan Passmore (2006), who advocated for a more eclectic approach, by which the coach should draw from a number of different streams and, in doing so, would be best able to respond to the unique individual and their specific presenting issue, as opposed to forcing each client to become the round peg required to fit the shape and size of 'hole' offered by the coach. These ideas of eclectic approaches have been further developed (Hardingham, 2021; Passmore, 2021), with an emphasis on each coach developing their own distinctive evidenced-based approach informed by the cultural context, types of clients and their own personal style to build an approach which is informed by science but which can be flexed and adapted to meet the client where they are"--…”
    Libro electrónico
  13. 713
    Publicado 2018
    “…Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holes About This Book Know how to set up your lab with Kali Linux Discover the core concepts of web penetration testing Get the tools and techniques you need with Kali Linux Who This Book Is For Since this book sets out to cover a large number of tools and security fields, it can work as an introduction to practical security skills for beginners in security. …”
    Libro electrónico
  14. 714
    por Monnox, Alan
    Publicado 2005
    “…This book should neatly fill that hole." —Martin Westacott, Director and Senior Consultant, Solstice Software Limited, U.K. …”
    Libro electrónico
  15. 715
    por Vyncke, Eric, Paggen, Christopher
    Publicado 2008
    “…After reading this book, you will have an in-depth understanding of LAN security and be prepared to plug the security holes that exist in a great number of campus networks. …”
    Libro electrónico
  16. 716
    Publicado 2015
    “…Here’s a small sample of what you’ll learn: Set up your Minecraft server and mod development tools Master Java basics every Minecraft modder needs to know Read, write, store, and change information throughout your mod Build mods that can make decisions and respond to player actions Understand object-oriented programming and the objects you can program in Minecraft Handle errors without crashing Minecraft Use threads to create mobs that can do many things at once Customize your mobs, and build on existing objects to write new mods Spawn new mobs, find hidden mobs, and make one mob ride another Dig holes and build structures Create projectile weapons and potion effects Learn Java programming while enhancing your favorite game Contents at a Glance Part I: Java from the Ground Up 1 Dig into Minecraft Programming with Java 2 Use NetBeans for Minecraft Programming 3 Create a Minecraft Mod 4 Start Writing Java Programs 5 Understand How Java Programs Work 6 Store and Change Information in a Mod 7 Use Strings to Communicate 8 Use Conditional Tests to Make Decisions 9 Repeat an Action with Loops 10 Store Information with Arrays Part II: The World of Java Objects 11 Create Your First Object 12 Describe What Your Object Is Like..…”
    Libro electrónico
  17. 717
    Publicado 2020
    “…In response to Dan Zahavi's contention that phenomenology has little to learn from speculative realism, Harman exposes the holes in Zahavi's reasoning. In a final response, Harman gives a point-by-point answer to Stephen Mulhall's critical foray in the London Review of Books. …”
    Libro electrónico
  18. 718
    Publicado 2023
    “…. - Bill Venners, Artima The first edition of FPiS was one of the turning points in my journey through the FP rabbit hole. It was eye-opening to be able to prove that one typeclass interface is equivalent to another. …”
    Video
  19. 719
    Publicado 2023
    “…. - Bill Venners, Artima The first edition of FPiS was one of the turning points in my journey through the FP rabbit hole. It was eye-opening to be able to prove that one typeclass interface is equivalent to another. …”
    Grabación no musical
  20. 720
    Publicado 2020
    “…Els forats negres acústics en mecànica (coneguts per les sigles ABHs, de l’anglès Acoustic Black Holes) solen estar formats per osques en bigues i plaques, el gruix de les quals decau segons una llei potencial. …”
    Tesis