Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 251
- History 250
- Photography 243
- Digital techniques 192
- Social aspects 86
- Filosofía 76
- Política y gobierno 76
- Engineering & Applied Sciences 71
- History and criticism 70
- Social conditions 67
- Image processing 65
- RELIGION 64
- Computer networks 63
- Race relations 60
- Adobe Photoshop 59
- Management 58
- Novela norteamericana 55
- Crítica e interpretación 53
- African Americans 50
- Computer security 50
- Historia y crítica 50
- Novela inglesa 49
- Art, Architecture & Applied Arts 45
- Politics and government 45
- Visual Arts 45
- Security measures 44
- United States 43
- Aspectos sociales 41
- Computer graphics 40
- Computer Science 37
-
5941por Barnaby, Paul“…Kennedy, et la trajectoire du poète scotto-français, Kenneth White, n'est pas oubliée. Enfin, une étude fait le point sur l'ensemble des traductions françaises de littérature écossaise au XXe siècle…”
Publicado 2018
Electrónico -
5942Publicado 2018“…What you will learn Understand DevSecOps culture and organization Learn security requirements, management, and metrics Secure your architecture design by looking at threat modeling, coding tools and practices Handle most common security issues and explore black and white-box testing tools and practices Work with security monitoring toolkits and online fraud detection rules Explore GDPR and PII handling case studies to understand the DevSecOps lifecycle Who this book is for Hands-On Security in DevOps is for system administrators, security consultants, and DevOps engineers who want to secure their entire organization. …”
Libro electrónico -
5943Publicado 2015“…., he has delivered Java, C#, Visual Basic, C++, C and Internet programming courses to industry clients, including Cisco, IBM, Sun Micro systems, Dell, Siemens, Lucent Technologies, Fidelity, NASA at the Kennedy Space Center, the National Severe Storm Laboratory, White Sands Missile Range, Rogue Wave Software, Boeing, SunGard Higher Education, Stratus, Cambridge Technology Partners, One Wave, Hyperion Software, Adra Systems, Entergy, CableData Systems, Nortel Networks, Puma, iRobot, Invensys and many more. …”
-
5944por Hartung, Adam, 1957-“…Hartung demonstrates how to attack competitors’ Lock-ins, make their Success Formulas obsolete, and create the White Space needed to invent your own new formulas for success. …”
Publicado 2008
Libro electrónico -
5945por Plummer, Tim“…Clear steps to create your own plugins, modules, and components for Joomla 3 Guides you through extending your components by allowing them to interact with modules and plugins Introduces you to packaging your extensions for distribution to other Joomla users Enables you to secure your extensions and avoid common vulnerabilities by gaining some white hat hacking experience In Detail Joomla 3 is the first of the major open source content management systems that was meant to be mobile friendly by default. …”
Publicado 2013
Libro electrónico -
5946Publicado 2012“…She has implemented and designed SharePoint solutions for clients such as the White House, the US Air Force, National Institute of Health, Iron Mountain, Ingersoll-Rand, and many others. …”
Libro electrónico -
5947por Pretoria University Law Press (PULP)“…To Simon Botha, Privilege Chanana, Rutendo Chinomona, Roxanne Gilbert, Lethabo Mailula, Agnes Matasane, Raeesah Thomas, Thomas White and Jurgen Zwecker for your long hours and persistence in the production of this year's edition. …”
Publicado 2017
Libro electrónico -
5948Publicado 2016“…Enjoy complete access to each of the conference’s 51 sessions, 8 half-day tutorials, and 6 keynotes Hear 82 of the world’s top experts provide pragmatic advice on defensive cybersecurity practices Get tutorials on microservices security, writing secure Node code, threat modeling, and more Learn from White Ops’ Dan Kaminsky about Autoclave, defensive trickery, and better cryptography Watch DARPA’s Michael Walker describe the world's first autonomous computer security systems Hear from Yubico’s Stina Ehrensvard on FIDO U2F and the future of strong online identities Learn about Fastly’s Incident Command protocol and Etsy’s real-time security alerting tool, 411 See Matt Tesauro explain the OWASP AppSec Pipeline project that makes appsec affordable to all Learn about detecting security threats with Apache Hadoop and the new Apache Spot Get 17 sessions on security tools and processes and 9 on security and data science…”
-
5949Publicado 2020“…This study analyses the centrality of whiteness and the abjection of the "developing world" in Iceland's post-colonial identity, and shows how Crash-writing explores the collisions of Iceland's traditional, nationalist medievalism with a dystopian, Orientalist medievalism associated with the Islamic world.The Crash in Iceland was instantly recognised as offering important economic insights. …”
Libro electrónico -
5950Publicado 2023“…What you will learn Evaluate the advantages and limitations of MFA methods in use today Choose the best MFA product or solution for your security needs Deploy and configure the chosen solution for maximum effectiveness Identify and mitigate problems associated with different MFA solutions Reduce UX friction with ForgeRock and behavioral biometrics Stay informed about technologies and future trends in the field Who this book is for This book is for developers, system administrators, security professionals, white-hat hackers, CISOs, and anyone interested in understanding and enhancing their access management infrastructure. …”
Libro electrónico -
5951Publicado 2023“…Traditional approaches to mitigating human risk rely heavily on the idealised presumption that because people are employed, they can simply be told what to do -- this works well in safety-critical environments, where the black & white' parameters of desired outcomes are easy to predict, but is much harder when it comes to grey', less codifiable, areas like ethics which are often difficult to monitor until it's too late and rely on employees being positively engaged. …”
Libro electrónico -
5952Publicado 2024“…It's as if we ask leaders to watch a black-and-white television with just three channels, when they can now easily pick from hundreds of streaming options. …”
Libro electrónico -
5953por Holbrooke, Richard C., 1941-2010“…Holbrooke's portraits of the key actors, from officials in the White House and the Élysée Palace to the leaders in the Balkans, are sharp and unforgiving. …”
Publicado 1999
Libro -
5954por Cohen, Adam Seth“…Many of the greatest successes of the Warren Court, such as school desegregation, labor unions, voting rights, and class action suits, have been abandoned in favor of rulings that protect privileged Americans who tend to be white, wealthy, and powerful. As the nation comes to grips with two newly Trump-appointed justices, Cohen proves beyond doubt that the trajectory of today's Court is the result of decisions made fifty years ago, decisions that have contributed directly and grievously to our nation's soaring inequality. …”
Publicado 2020
Libro -
5955“…Naipaul; Second-Class Citizen (1974), de Buchi Emecheta; Sour Sweet (1982), de Timothy Mo; The Buddha of Suburbia (1990), de Hanif Kureishi, y por último White Teeth (2000), de Zadie Smith. La aproximación al estudio de la ciudad de Londres en la ficción de inmigrantes procedentes de las antiguas colonias y sus descendientes que proponemos se organiza en tres etapas, delimitadas por la fecha de publicación de las obras que se analizan. …”
Texto completo en Odilo
Otros -
5956
-
5957
-
5958
-
5959
-
5960Publicado 2018Libro electrónico