Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,716
- Application software 1,430
- Engineering & Applied Sciences 1,425
- Management 1,220
- Computer Science 958
- Computer programs 908
- Computer networks 883
- Data processing 880
- Computer software 661
- Security measures 654
- Design 634
- Computer security 607
- Artificial intelligence 591
- Cloud computing 591
- Web sites 554
- Operating systems (Computers) 548
- Python (Computer program language) 545
- Web site development 514
- Database management 496
- Examinations 492
- Programming 490
- Computer programming 485
- Computer graphics 463
- Digital techniques 448
- Photography 436
- Java (Computer program language) 412
- Business & Economics 395
- Electrical & Computer Engineering 395
- Information technology 388
- Certification 372
-
2501Publicado 2022“…Effectively debug kernel modules, device drivers, and the kernel itself by gaining a solid understanding of powerful open source tools and advanced kernel debugging techniques Key Features Fully understand how to use a variety of kernel and module debugging tools and techniques using examples Learn to expertly interpret a kernel Oops and identify underlying defect(s) Use easy-to-look up tables and clear explanations of kernel-level defects to make this complex topic easy Book Description The Linux kernel is at the very core of arguably the world's best production-quality OS. …”
Libro electrónico -
2502Publicado 2023Tabla de Contenidos: “…., Slack) -- Automating incident response with custom scripts and tools -- Automated security lapse findings -- Security Orchestration, Automation, and Response (SOAR) platforms -- SOAR platforms on the market -- Integrating security tools and automating workflows -- Integrating security tools -- Automating workflows -- Building and maintaining a security automation playbook -- Elements of a security automation playbook -- Building a security automation playbook -- Maintaining a security automation playbook -- Summary -- Quiz -- Further readings -- Chapter 8: DevSecOps Practices for Cloud Native -- Technical requirements -- Infrastructure as Code -- The importance of DevSecOps -- DevSecOps in practice -- Continuous integration and continuous deployment (CI/CD) in DevSecOps -- Infrastructure as Code (IaC) and Policy as Code in DevSecOps -- Security tools in DevSecOps -- Security implications of IaC -- Checkov - a comprehensive overview -- Policy as Code -- Why Policy as Code? …”
Libro electrónico -
2503Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Foreword -- Contributors -- Table of Contents -- Part 1: Attack Preparation -- Chapter 1: Mindset and Methodologies -- Approach and mindset -- The approach -- The process -- The testing techniques -- The baseline competencies -- The mindset -- Methodologies and frameworks -- NIST SP 800-115 -- Penetration Testing Execution Standard (PTES) -- OWASP's WSTG -- ISECOM's OSSTMM -- The recipe -- Summary -- Further reading -- Chapter 2: Toolset for Web Attacks and Exploitation -- Technical requirements -- Operating systems and the tools of the trade -- Operating system -- Linux -- Windows -- macOS -- Browser -- Interception proxy -- Python for automating web tasks -- Virtualization and containerization systems -- VirtualBox -- Docker -- Summary -- Further reading -- Part 2: Evergreen Attacks -- Chapter 3: Attacking the Authentication Layer - a SAML Use Case -- Technical requirements -- Scenario files -- The Doors of Durin SAML login scenario -- How does SAML work and what are its vulnerabilities? …”
Libro electrónico -
2504Publicado 2006“…How to Conduct Productive Meetings is a book designed to provide practical tools and advice for anyone planning or facilitating a meeting. …”
Libro electrónico -
2505
-
2506Publicado 2018Libro electrónico
-
2507Publicado 2020“…As you advance, you'll get to grips with monitoring, securing, and scaling Docker using tools such as Prometheus and Grafana. Later, you'll be able to deploy Docker containers to a variety of environments, including the cloud-native Amazon Elastic Kubernetes Service (Amazon EKS), before finally delving into Docker security concepts and best practices. …”
Libro electrónico -
2508
-
2509por Géron, Aurélien“…Now, even programmers who know close to nothing about this technology can use simple, efficient tools to implement programs capable of learning from data. …”
Publicado 2022
Libro electrónico -
2510Publicado 2013“…Crucial Accountability offers the tools for improving relationships in the workplace and in life and for resolving all these problems--permanently…”
Grabación de sonido -
2511Publicado 2022Libro electrónico
-
2512Publicado 2024“…DevOps and the cloud have changed how we look at software development and operations like never before, leading to the rapid growth of various DevOps tools, techniques, and practices. This updated edition helps you pick up the right tools by providing you with everything you need to get started with your DevOps journey. …”
Libro electrónico -
2513Publicado 2024Tabla de Contenidos: “…-- Selecting the right CI tool for your operations -- What is continuous delivery (CD)? …”
Libro electrónico -
2514Publicado 2023“…Next, you’ll learn how to use Test Studio, Power Automate Desktop, and other tools to automate testing for your Canvas apps. You'll find out how to incorporate testing into your deployment processes for faster and more reliable releases. …”
Libro electrónico -
2515
-
2516
-
2517
-
2518
-
2519
-
2520