Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 250
- History 250
- Photography 243
- Digital techniques 192
- Social aspects 86
- Filosofía 76
- Política y gobierno 76
- Engineering & Applied Sciences 71
- History and criticism 70
- Social conditions 67
- Image processing 65
- RELIGION 64
- Computer networks 63
- Race relations 60
- Adobe Photoshop 59
- Management 58
- Novela norteamericana 55
- Crítica e interpretación 53
- African Americans 50
- Computer security 50
- Historia y crítica 50
- Novela inglesa 49
- Art, Architecture & Applied Arts 45
- Politics and government 45
- Visual Arts 45
- Security measures 44
- United States 43
- Aspectos sociales 41
- Computer graphics 40
- Computer Science 37
-
6081Publicado 2018“…What you will learn Understand DevSecOps culture and organization Learn security requirements, management, and metrics Secure your architecture design by looking at threat modeling, coding tools and practices Handle most common security issues and explore black and white-box testing tools and practices Work with security monitoring toolkits and online fraud detection rules Explore GDPR and PII handling case studies to understand the DevSecOps lifecycle Who this book is for Hands-On Security in DevOps is for system administrators, security consultants, and DevOps engineers who want to secure their entire organization. …”
Libro electrónico -
6082Publicado 2015“…., he has delivered Java, C#, Visual Basic, C++, C and Internet programming courses to industry clients, including Cisco, IBM, Sun Micro systems, Dell, Siemens, Lucent Technologies, Fidelity, NASA at the Kennedy Space Center, the National Severe Storm Laboratory, White Sands Missile Range, Rogue Wave Software, Boeing, SunGard Higher Education, Stratus, Cambridge Technology Partners, One Wave, Hyperion Software, Adra Systems, Entergy, CableData Systems, Nortel Networks, Puma, iRobot, Invensys and many more. …”
-
6083por Hartung, Adam, 1957-“…Hartung demonstrates how to attack competitors’ Lock-ins, make their Success Formulas obsolete, and create the White Space needed to invent your own new formulas for success. …”
Publicado 2008
Libro electrónico -
6084Publicado 2012“…She has implemented and designed SharePoint solutions for clients such as the White House, the US Air Force, National Institute of Health, Iron Mountain, Ingersoll-Rand, and many others. …”
Libro electrónico -
6085por Pretoria University Law Press (PULP)“…To Simon Botha, Privilege Chanana, Rutendo Chinomona, Roxanne Gilbert, Lethabo Mailula, Agnes Matasane, Raeesah Thomas, Thomas White and Jurgen Zwecker for your long hours and persistence in the production of this year's edition. …”
Publicado 2017
Libro electrónico -
6086Publicado 2016“…Enjoy complete access to each of the conference’s 51 sessions, 8 half-day tutorials, and 6 keynotes Hear 82 of the world’s top experts provide pragmatic advice on defensive cybersecurity practices Get tutorials on microservices security, writing secure Node code, threat modeling, and more Learn from White Ops’ Dan Kaminsky about Autoclave, defensive trickery, and better cryptography Watch DARPA’s Michael Walker describe the world's first autonomous computer security systems Hear from Yubico’s Stina Ehrensvard on FIDO U2F and the future of strong online identities Learn about Fastly’s Incident Command protocol and Etsy’s real-time security alerting tool, 411 See Matt Tesauro explain the OWASP AppSec Pipeline project that makes appsec affordable to all Learn about detecting security threats with Apache Hadoop and the new Apache Spot Get 17 sessions on security tools and processes and 9 on security and data science…”
-
6087Publicado 2020“…This study analyses the centrality of whiteness and the abjection of the "developing world" in Iceland's post-colonial identity, and shows how Crash-writing explores the collisions of Iceland's traditional, nationalist medievalism with a dystopian, Orientalist medievalism associated with the Islamic world.The Crash in Iceland was instantly recognised as offering important economic insights. …”
Libro electrónico -
6088Publicado 2023“…What you will learn Evaluate the advantages and limitations of MFA methods in use today Choose the best MFA product or solution for your security needs Deploy and configure the chosen solution for maximum effectiveness Identify and mitigate problems associated with different MFA solutions Reduce UX friction with ForgeRock and behavioral biometrics Stay informed about technologies and future trends in the field Who this book is for This book is for developers, system administrators, security professionals, white-hat hackers, CISOs, and anyone interested in understanding and enhancing their access management infrastructure. …”
Libro electrónico -
6089Publicado 2023“…Traditional approaches to mitigating human risk rely heavily on the idealised presumption that because people are employed, they can simply be told what to do -- this works well in safety-critical environments, where the black & white' parameters of desired outcomes are easy to predict, but is much harder when it comes to grey', less codifiable, areas like ethics which are often difficult to monitor until it's too late and rely on employees being positively engaged. …”
Libro electrónico -
6090por Holbrooke, Richard C., 1941-2010“…Holbrooke's portraits of the key actors, from officials in the White House and the Élysée Palace to the leaders in the Balkans, are sharp and unforgiving. …”
Publicado 1999
Libro -
6091por Cohen, Adam Seth“…Many of the greatest successes of the Warren Court, such as school desegregation, labor unions, voting rights, and class action suits, have been abandoned in favor of rulings that protect privileged Americans who tend to be white, wealthy, and powerful. As the nation comes to grips with two newly Trump-appointed justices, Cohen proves beyond doubt that the trajectory of today's Court is the result of decisions made fifty years ago, decisions that have contributed directly and grievously to our nation's soaring inequality. …”
Publicado 2020
Libro -
6092
-
6093por Metthew, Selkman“…El modelo aquí presentado integra las ideas de Deshazer, de Michael White (del grupo MRI), de Tom Andersen y del grupo Houston-Galveston. …”
Publicado 1996
Texto completo en Odilo
Otros -
6094Publicado 2017“…While the image of Dickinson as the reclusive poet dressed only in white remains a popular myth, details of Dickinson's life continue to emerge. …”
Libro electrónico -
6095Publicado 2015“…Omar is the author of numerous books, video courses, white papers, and articles, and has delivered technical presentations at many conferences. …”
-
6096por Egan, Mark“…Schmidt, former cyber security advisor to the White House, CSO Microsoft, and VP CISO eBay "This book gives an excellent overview of the issues around securing information at a time in our history when information is extremely vulnerable to outside attack, retrieval, or manipulation. …”
Publicado 2010
Libro electrónico -
6097Publicado 2018“…By the end of this book, you will be able to navigate the Clip Studio Interface and program preferences, customize the various tools, and be able to create your own black-and-white and color illustrations and comics from start to finish. …”
Libro electrónico -
6098por Oppenheimer, Priscilla“…Top-Down Network Design , Second Edition, has a companion website at http://www.topdownbook.com, which includes updates to the book, links to white papers, and supplemental information about design resources. …”
Publicado 2004
Libro electrónico -
6099Publicado 2020“…Topics include: Module 1: Cybersecurity Fundamentals Module 2: Software Defined Networking Security and Network Programmability Module 3: AAA, Identity Management, Network Visibility, and Segmentation Module 4: Infrastructure Security, Firewalls, and Intrusion Prevention Systems Module 5: Virtual Private Networks (VPNs) Module 6: Securing the Cloud and Content Security Module 7: Endpoint Security and Cisco Threat Response About the Instructor Omar Santos is the author of more than 20 books and video courses; numerous white papers, articles, and security configuration guidelines and best practices. …”
-
6100Publicado 2020“…Among them we find such greats as John Szarkowski, Minor White, Bill Jay, and Robert Adams. It is no exaggeration to include Guy Tal on this esteemed list.” — From the Foreword, by Chuck Kimmerle…”
Libro electrónico