Mostrando 6,081 - 6,100 Resultados de 6,164 Para Buscar '"White"', tiempo de consulta: 0.09s Limitar resultados
  1. 6081
    Publicado 2018
    “…What you will learn Understand DevSecOps culture and organization Learn security requirements, management, and metrics Secure your architecture design by looking at threat modeling, coding tools and practices Handle most common security issues and explore black and white-box testing tools and practices Work with security monitoring toolkits and online fraud detection rules Explore GDPR and PII handling case studies to understand the DevSecOps lifecycle Who this book is for Hands-On Security in DevOps is for system administrators, security consultants, and DevOps engineers who want to secure their entire organization. …”
    Libro electrónico
  2. 6082
    Publicado 2015
    “…., he has delivered Java, C#, Visual Basic, C++, C and Internet programming courses to industry clients, including Cisco, IBM, Sun Micro systems, Dell, Siemens, Lucent Technologies, Fidelity, NASA at the Kennedy Space Center, the National Severe Storm Laboratory, White Sands Missile Range, Rogue Wave Software, Boeing, SunGard Higher Education, Stratus, Cambridge Technology Partners, One Wave, Hyperion Software, Adra Systems, Entergy, CableData Systems, Nortel Networks, Puma, iRobot, Invensys and many more. …”
    Video
  3. 6083
    por Hartung, Adam, 1957-
    Publicado 2008
    “…Hartung demonstrates how to attack competitors’ Lock-ins, make their Success Formulas obsolete, and create the White Space needed to invent your own new formulas for success. …”
    Libro electrónico
  4. 6084
    Publicado 2012
    “…She has implemented and designed SharePoint solutions for clients such as the White House, the US Air Force, National Institute of Health, Iron Mountain, Ingersoll-Rand, and many others. …”
    Libro electrónico
  5. 6085
    “…To Simon Botha, Privilege Chanana, Rutendo Chinomona, Roxanne Gilbert, Lethabo Mailula, Agnes Matasane, Raeesah Thomas, Thomas White and Jurgen Zwecker for your long hours and persistence in the production of this year's edition. …”
    Libro electrónico
  6. 6086
    Publicado 2016
    “…Enjoy complete access to each of the conference’s 51 sessions, 8 half-day tutorials, and 6 keynotes Hear 82 of the world’s top experts provide pragmatic advice on defensive cybersecurity practices Get tutorials on microservices security, writing secure Node code, threat modeling, and more Learn from White Ops’ Dan Kaminsky about Autoclave, defensive trickery, and better cryptography Watch DARPA’s Michael Walker describe the world's first autonomous computer security systems Hear from Yubico’s Stina Ehrensvard on FIDO U2F and the future of strong online identities Learn about Fastly’s Incident Command protocol and Etsy’s real-time security alerting tool, 411 See Matt Tesauro explain the OWASP AppSec Pipeline project that makes appsec affordable to all Learn about detecting security threats with Apache Hadoop and the new Apache Spot Get 17 sessions on security tools and processes and 9 on security and data science…”
    Video
  7. 6087
    Publicado 2020
    “…This study analyses the centrality of whiteness and the abjection of the "developing world" in Iceland's post-colonial identity, and shows how Crash-writing explores the collisions of Iceland's traditional, nationalist medievalism with a dystopian, Orientalist medievalism associated with the Islamic world.The Crash in Iceland was instantly recognised as offering important economic insights. …”
    Libro electrónico
  8. 6088
    Publicado 2023
    “…What you will learn Evaluate the advantages and limitations of MFA methods in use today Choose the best MFA product or solution for your security needs Deploy and configure the chosen solution for maximum effectiveness Identify and mitigate problems associated with different MFA solutions Reduce UX friction with ForgeRock and behavioral biometrics Stay informed about technologies and future trends in the field Who this book is for This book is for developers, system administrators, security professionals, white-hat hackers, CISOs, and anyone interested in understanding and enhancing their access management infrastructure. …”
    Libro electrónico
  9. 6089
    Publicado 2023
    “…Traditional approaches to mitigating human risk rely heavily on the idealised presumption that because people are employed, they can simply be told what to do -- this works well in safety-critical environments, where the black & white' parameters of desired outcomes are easy to predict, but is much harder when it comes to grey', less codifiable, areas like ethics which are often difficult to monitor until it's too late and rely on employees being positively engaged. …”
    Libro electrónico
  10. 6090
    “…Holbrooke's portraits of the key actors, from officials in the White House and the Élysée Palace to the leaders in the Balkans, are sharp and unforgiving. …”
    Libro
  11. 6091
    por Cohen, Adam Seth
    Publicado 2020
    “…Many of the greatest successes of the Warren Court, such as school desegregation, labor unions, voting rights, and class action suits, have been abandoned in favor of rulings that protect privileged Americans who tend to be white, wealthy, and powerful. As the nation comes to grips with two newly Trump-appointed justices, Cohen proves beyond doubt that the trajectory of today's Court is the result of decisions made fifty years ago, decisions that have contributed directly and grievously to our nation's soaring inequality. …”
    Libro
  12. 6092
    Publicado 2006
    Video
  13. 6093
    por Metthew, Selkman
    Publicado 1996
    “…El modelo aquí presentado integra las ideas de Deshazer, de Michael White (del grupo MRI), de Tom Andersen y del grupo Houston-Galveston. …”
    Texto completo en Odilo
    Otros
  14. 6094
    Publicado 2017
    “…While the image of Dickinson as the reclusive poet dressed only in white remains a popular myth, details of Dickinson's life continue to emerge. …”
    Libro electrónico
  15. 6095
    Publicado 2015
    “…Omar is the author of numerous books, video courses, white papers, and articles, and has delivered technical presentations at many conferences. …”
    Video
  16. 6096
    por Egan, Mark
    Publicado 2010
    “…Schmidt, former cyber security advisor to the White House, CSO Microsoft, and VP CISO eBay "This book gives an excellent overview of the issues around securing information at a time in our history when information is extremely vulnerable to outside attack, retrieval, or manipulation. …”
    Libro electrónico
  17. 6097
    Publicado 2018
    “…By the end of this book, you will be able to navigate the Clip Studio Interface and program preferences, customize the various tools, and be able to create your own black-and-white and color illustrations and comics from start to finish. …”
    Libro electrónico
  18. 6098
    por Oppenheimer, Priscilla
    Publicado 2004
    “…Top-Down Network Design , Second Edition, has a companion website at http://www.topdownbook.com, which includes updates to the book, links to white papers, and supplemental information about design resources. …”
    Libro electrónico
  19. 6099
    Publicado 2020
    “…Topics include: Module 1: Cybersecurity Fundamentals Module 2: Software Defined Networking Security and Network Programmability Module 3: AAA, Identity Management, Network Visibility, and Segmentation Module 4: Infrastructure Security, Firewalls, and Intrusion Prevention Systems Module 5: Virtual Private Networks (VPNs) Module 6: Securing the Cloud and Content Security Module 7: Endpoint Security and Cisco Threat Response About the Instructor Omar Santos is the author of more than 20 books and video courses; numerous white papers, articles, and security configuration guidelines and best practices. …”
    Video
  20. 6100
    Publicado 2020
    “…Among them we find such greats as John Szarkowski, Minor White, Bill Jay, and Robert Adams. It is no exaggeration to include Guy Tal on this esteemed list.” — From the Foreword, by Chuck Kimmerle…”
    Libro electrónico