Mostrando 1,381 - 1,400 Resultados de 1,430 Para Buscar '"The Wire"', tiempo de consulta: 0.12s Limitar resultados
  1. 1381
    Publicado 2017
    “…This course additionally reviews many different tools that can be used to penetrate a wired or wireless network and the systems within that network. …”
    Video
  2. 1382
    por Simpkins, Stacy. author
    Publicado 2017
    “…What You’ll Learn: Utilize networking tools such as NetMon, WireShark, and Fiddler for troubleshooting Master SharePoint PAL, Webalizer, Indihaing, Developer Dashboard, the Feature Admin tool, and more Become proficient using Timer Jobs and Search Diagnostics Understand how various files are accessed by IIS sites and within the server file system Discover how IIS mappings and file permissions affect issues Troubleshoot with ULS Viewer, PowerShell, and tools such as ProcMon, PerfMon, and Event Viewer Meet your new best friend, the ULS Viewer Use Event Viewer as a troubleshooting source Become conversant in the “language” of SharePoint from the log’s perspective This book is for SharePoint administrators and developers who want to learn how to quickly diagnose and resolve issues in any SharePoint server in SharePoint farms where admin access is possible. …”
    Libro electrónico
  3. 1383
    Publicado 2012
    “…He has contributed to Wired.com’s GeekDad blog for four years and blogged at Make: Online for two, publishing more than 1,500 posts during that time. …”
    Libro electrónico
  4. 1384
    por Whitaker, Andrew
    Publicado 2005
    “…Using popular open-source and commercial applications, the book shows you how to perform a penetration test on an organization’s network, from creating a test plan to performing social engineering and host reconnaissance to performing simulated attacks on both wired and wireless networks. Penetration Testing and Network Defense also goes a step further than other books on hacking, as it demonstrates how to detect an attack on a live network. …”
    Libro electrónico
  5. 1385
    Publicado 2017
    “…The study guide helps you master all the topics on the MCSA 70-741 exam for Windows Server 2016, including DNS implementation, including server configuration, zones, records, policies, DNSSEC, and DANE DHCP, including server installation, configuration, and scopes IPAM, including installation/configuration, DNS/DHCP management, and auditing Network connectivity and remote access solutions, including VPN, DirectAccess, NPS Radius, and wired clients Core and distributed network solutions, including IPv4 and IPv6 addressing, DFS, and branch office solutions Advanced network infrastructure…”
    Libro electrónico
  6. 1386
    Publicado 2018
    “…Style and approach This book consists of practical recipes on Wires..…”
    Libro electrónico
  7. 1387
    Publicado 2004
    “…Charles Koppelman chronicles Walter Murch's astonishing high-wire trapeze act as he works his way through the first large-scale implementation ..…”
    Libro electrónico
  8. 1388
    Publicado 2022
    “…Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks. This book is a comprehensive guide for those who are new to Kali Linux and penetration testing that will have you up to speed in no time. …”
    Libro electrónico
  9. 1389
    Publicado 2016
    “…With this book you will start right from organizing your Backbone.js application to learn where to put each module and how to wire them. From organizing your code in a logical and physical way, you will go on to delimit view responsibilities and work with complex layouts. …”
    Libro electrónico
  10. 1390
    Publicado 2018
    “…Implementing AI sessions, including Graphcore's founder Nigel Toon look at Intelligence Processing Units (the super-smart chips of the future); Rasa's CTO Alan Nichol on building conversational AI bots using the Rasa stack; and IntelligentWire's Yishay Carmiel on how to build privacy and security into deep learning models. …”
    Video
  11. 1391
    Publicado 2015
    “…What You Will Learn Configure the more commonly used NetScaler VPX features such as basic load balancing, authentication, NetScaler Gateway, and StoreFront Configure the AppExpert features such as Responder, Rewrite, AppExpert templates, parsing HTTP, TCP, and UDP data Integrate NetScaler with other Citrix technologies such as CloudBridge, Insight Center, and Command Center Optimize traffic using caching, front-end optimization, and compression Dive deep in the security, caching, and compression enhancements Protect your environment with AAA and Application Firewall, or from HTTP DDoS attacks Troubleshoot an environment using tools such as TaaS and WireShark In Detail Citrix NetScaler is one of the best Application Delivery Controller products in the world. …”
    Libro electrónico
  12. 1392
    Publicado 2014
    “…A founding member of the pioneering Twin Cities Maker hackerspace, he got his start writing for Wired ’s legendary GeekDad blog, and for DIYer bible MAKE Magazine . …”
    Libro electrónico
  13. 1393
    Publicado 2017
    “…What You Will Learn Compile, package and run a trivial program using a build management tool Get to know the principles of test-driven development and dependency management Separate the wiring of multiple modules from the application logic into an application using dependency injection Benchmark Java execution using Java 9 microbenchmarking See the workings of the Spring framework and use Java annotations for the configuration Master the scripting API built into the Java language and use the built-in JavaScript interpreter Understand static versus dynamic implementation of code and high-order reactive programming in Java In Detail This book gets you started with essential software development easily and quickly, guiding you through Java’s different facets. …”
    Libro electrónico
  14. 1394
    Publicado 2015
    “…Major topics are as follows: Understanding and Positioning Cisco TrustSec Cisco TrustSec Functions: Classification, Propagation, and Enforcement Implementing TrustSec on Cisco ISE Implementing TrustSec on Wired and Wireless Devices Implementing Cisco TrustSec on Cisco Firewalls Implementing Cisco TrustSec with Cisco VPN Solutions TrustSec Deployment Considerations Skill Level Intermediate to advanced What You Will Learn How to enhance network security through data flow segmentation. …”
    Video
  15. 1395
    Publicado 2019
    “…As you progress through the book, you will explore the NetHunter tools available for exploiting wired and wireless devices. You will work through new ways to deploy existing tools designed to reduce the chances of detection. …”
    Libro electrónico
  16. 1396
    Publicado 2013
    “…Famous for turning around the wire management company Wiremold, where he rethought every aspect of operations from the customer's standpoint--and got everyone else in the company to do likewise--Byrne has successfully implemented Lean strategies in more than 30 companies in 14 different countries. …”
    Libro electrónico
  17. 1397
    por Eliasz, Andrew
    Publicado 2024
    “…Its design and implementation are oriented towards the development of time critical IoT (Internet of Things) and IIoT (Industrial Internet of Things) applications, and, consequently it has a rich feature set for building both wireless and wired networking applications. However, with a rich feature set comes a fairly steep learning curve. …”
    Libro electrónico
  18. 1398
    Publicado 2007
    “…Deploying Voice over Wireless LANs The definitive guide to planning, architecting, deploying, supporting, and creating Voice over Wireless LAN solutions Recent advances make it possible to deliver high-quality voice and video communications over a wireless LAN (WLAN), replacing costly wired telephone and video surveillance systems and dramatically reducing support costs. …”
    Libro electrónico
  19. 1399
    Publicado 2003
    “…WWANs enable Internet service providers (ISPs) and corporate IT managers to deploy their own cost-efficient broadband networks that deliver high-speed access for buildings and areas where traditional wired connectivity is either completely unavailable or is cost-prohibitive. …”
    Libro electrónico
  20. 1400
    Publicado 2008
    “…Coverage includes Using WCF contracts to define complex structures and interfaces Understanding WCF’s channel stacks and channel model architecture Configuring the WCF communication stack to use only the protocols you need Using standard and custom service behaviors to manage concurrency, instances, transactions, and more Serializing data from .NET types to XML Infosets and representing Infosets “on the wire” Hosting WCF services via IIS, managed .NET applications, and Windows Activation Services WCF security, in depth: authentication; transport and message-level security; and Internet and intranet scenarios Improving reliability: exception handling, diagnostics, and more Workflow services: new integration points between WCF 3.5 and Windows Workflow Foundation Building client-to-client, peer network-based applications Utilizing WCF for non-SOAP Web services: AJAX and JSON examples and .NET 3.5 hosting classes Microsoft’s Steve Resnick , Richard Crane , and Chris Bowen are technology experts at the Microsoft Technology Center in Boston. …”
    Libro electrónico