Mostrando 3,921 - 3,940 Resultados de 5,492 Para Buscar '"suite"', tiempo de consulta: 0.12s Limitar resultados
  1. 3921
    por Church, Steve
    Publicado 2009
    Tabla de Contenidos: “…2.4.3 VPNs2.4.4 DNS; 2.4.5 DHCP; 2.4.6 IP Broadcast; 2.4.7 IP Multicast; 2.4.8 Firewalls; 2.4.9 NATs; 2.5 Quality of Service; 2.5.1 Bandwidth; 2.5.2 Dropped Packets; 2.5.3 Delay and Jitter; 2.5.4 Service Level Agreements; 2.5.5 MPLS; 2.6 IP and Ethernet Addresses; 2.6.1 IP Addresses; 2.6.2 Subnets and the Subnet Mask; 2.6.3 Ethernet Addresses; 2.7 Network Diagrams; 2.8 Pro Audio, Meet IP; Chapter 3 Switching and Routing; 3.1 Layers and Terms; 3.2 Ethernet Switch; 3.2.1 Managed Switches; 3.2.2 Scalability; 3.3 IP Router; 3.3.1 Roots of the Internet; 3.3.2 TCP/IP Suite; 3.4 Straddling Layers…”
    Libro electrónico
  2. 3922
    Publicado 2011
    Tabla de Contenidos: “…Automated Testing -- 1.1 The Unit Test -- 1.2 Assertions -- 1.3 Test Functions, Cases and Suites -- 1.4 Integration Tests -- 1.5 Benefits of Unit Tests -- 1.6 Pitfalls of Unit Testing -- 1.7 Summary -- 2. …”
    Libro electrónico
  3. 3923
    por Barrett, Daniel J.
    Publicado 2005
    Tabla de Contenidos: “…1.4.4 Keys and Agents1.4.5 Access Control; 1.4.6 Port Forwarding; 1.5 History of SSH; 1.6 Related Technologies; 1.6.1 rsh Suite (r-Commands); 1.6.2 Pretty Good Privacy (PGP) and GNU Privacy Guard (GnuPG); 1.6.3 Kerberos; 1.6.4 IPSEC and Virtual Private Networks; 1.6.5 Secure Remote Password (SRP); 1.6.6 Secure Socket Layer (SSL) Protocol; 1.6.7 SSL-Enhanced Telnet and FTP; 1.6.8 stunnel; 1.6.9 Firewalls; 1.7 Summary; Basic Client Use; 2.1 A Running Example; 2.2 Remote Terminal Sessions with ssh; 2.2.1 File Transfer with scp; 2.3 Adding Complexity to the Example; 2.3.1 Known Hosts…”
    Libro electrónico
  4. 3924
    Publicado 2013
    Tabla de Contenidos: “…Running a Compare and Report Against a Maintenance Pack -- Filtering Results -- Conclusion -- Chapter 12: PeopleSoft Test Framework -- Installing PeopleSoft Test Framework -- Environment Prerequisites -- Install PTF -- My First Test -- Creating a Profile -- Troubleshooting Connections -- Execution Profiles -- Creating a Test -- Reviewing Logs -- Using PTF to Verify and Reset Configurations after Upgrade -- Library Tests -- Automated Test Suites -- Creating Shell Tests -- Test Case Reporting -- Conclusion -- Chapter 13: Upgrade Tips and Techniques -- Planning the Upgrade -- Upgrade Types -- Upgrade Timeframe -- Upgrade Team -- Performing the Upgrade -- Creating a New Demo Database -- PeopleTools Upgrade -- Virtualizing the Application Upgrade -- Adjusting Upgrade Flags -- Reconfiguring the Application -- Conclusion -- Part IV: Appendixes -- Appendix A: Manually Applying Patches and Bundles -- Download the Update -- Extract the Update Archive -- Apply the Update -- Identify Maintenance Documentation -- Follow the Instructions -- Change Projects -- Files -- Binary File Considerations -- Conclusion -- Appendix B: Data Mover Commands and Syntax -- Change_Access_Password -- Create_Temp_Table -- Create_Trigger -- Encrypt_Password -- Export -- Import -- Rename -- Replace_All -- Replace_Data -- Replace_View -- Run -- Swap_Base_Language -- SET Statements -- Standard SQL Commands -- Nonstandard SQL Commands -- Meta-SQL Statements -- Conclusion -- Index…”
    Libro electrónico
  5. 3925
    por Greenwald, Rick
    Publicado 2004
    Tabla de Contenidos: “…Availability; 1.10. Oracle Developer Suite; 1.10.1.2. Oracle JDeveloper; 1.10.1.3. Oracle Designer; 1.10.1.4. …”
    Libro electrónico
  6. 3926
    Publicado 2024
    Tabla de Contenidos: “…Understanding hidden sources -- Diving into the deep and dark web -- Let's make sure we understand the internet -- Harvesting more with theHarvester -- Shodan -- Automating OSINT collection and analysis -- Summary -- Chapter 4: Exploring the Unknown - How Discovery Tools Reveal Hidden Information -- Introduction to discovery tools -- Unlocking network secrets -- Domain and IP address analysis -- Understanding the DNA of WHOIS - Its definition and purpose -- Applicability - Not just domains but IP blocks too -- The online magnifying glasses - Popular WHOIS lookup platforms -- Finding the connections -- The darker side - When attackers use WHOIS -- DNS and IP analysis - Connecting domains to infrastructure -- Traceroute and network mapping - Navigating the vast cyber seas -- Website reconnaissance - Mastering the unseen layers -- Web page scraping and analysis -- Document and metadata analysis -- Identifying hidden information in documents and files -- Analyzing document contents for valuable clues -- OSINT data visualization -- Tools and techniques for visualizing OSINT data -- Best practices for using discovery tools -- Summary -- Chapter 5: From Recon-ng to Trace Labs - A Tour of the Best Open Source Intelligence Tools -- Recon-ng - A powerful OSINT framework -- Running modules and gathering information with Recon-ng -- Maltego - Visualizing OSINT data and connections -- Getting started with Maltego for OSINT investigations -- Discovering the infrastructure -- Shodan - The search engine for IoT -- Getting started with Shodan -- Using Shodan's API -- Trace Labs - A powerful OS designed just for OSINT -- Overview of the Aircrack-ng suite -- Airmon-ng -- Airodump-ng -- Aireplay-ng -- Aircrack-ng -- Airbase-ng -- Airgraph-ng -- Finding hidden networks -- Additional open source OSINT tools -- SpiderFoot -- Twint -- Some final thoughts on tools…”
    Libro electrónico
  7. 3927
    Tabla de Contenidos: “…Chronologie économique -- STATISTIQUES DE BASE : COMPARAISONS INTERNATIONALES -- STATISTIQUES DE BASE : COMPARAISONS INTERNATIONALES -- STATISTIQUES DE BASE : COMPARAISONS INTERNATIONALES (suite) -- STATISTIQUES DE BASE : COMPARAISONS INTERNATIONALES (suite) -- Tableaux -- Tableau 1. …”
    Libro electrónico
  8. 3928
    Tabla de Contenidos: “…. -- Annexe III - Chronologie économique -- STATISTIQUES DE BASE : COMPARAISONS INTERNATIONALES -- STATISTIQUES DE BASE : COMPARAISONS INTERNATIONALES -- STATISTIQUES DE BASE : COMPARAISONS INTERNATIONALES (suite) -- STATISTIQUES DE BASE : COMPARAISONS INTERNATIONALES (suite) -- Encadrés -- Encadré 1. …”
    Libro electrónico
  9. 3929
    Tabla de Contenidos: “…Marchés financiers -- STATISTIQUES DE BASE : COMPARAISONS INTERNATIONALES -- STATISTIQUES DE BASE : COMPARAISONS INTERNATIONALES -- STATISTIQUES DE BASE : COMPARAISONS INTERNATIONALES (suite) -- STATISTIQUES DE BASE : COMPARAISONS INTERNATIONALES (suite) -- Encadrés -- Encadré 1. …”
    Libro electrónico
  10. 3930
    Tabla de Contenidos: “…Volume et structure de la dette et des garanties de prêts infranationales dans 53 régions -- Actions et réformes envisageables -- Notes -- Bibliographie -- Annexes -- Annexe I - Affectation des dépenses dans la Fédération de Russie -- Affectation des dépenses dans la Fédération de Russie -- Annexe II - Le cadre juridique des emprunts infranationaux -- Le cadre juridique des emprunts infranationaux -- STATISTIQUES DE BASE : COMPARAISONS INTERNATIONALES -- STATISTIQUES DE BASE : COMPARAISONS INTERNATIONALES -- STATISTIQUES DE BASE : COMPARAISONS INTERNATIONALES (suite) -- STATISTIQUES DE BASE : COMPARAISONS INTERNATIONALES (suite) -- Encadrés -- Encadré 1. …”
    Libro electrónico
  11. 3931
    Publicado 2018
    Tabla de Contenidos: “…Azure Key Vault secrets in ARM templates -- Azure Storage Service Encryption -- Azure Disk Encryption -- Azure SQL Database Security -- Azure Active Directory Managed Service Identity -- Summary -- Questions -- Further reading -- Chapter 11: Governance and Policies -- Technical requirements -- Azure Role-Based Access Control -- Built-in Roles -- Custom Roles -- Creating a Custom Role -- Azure Resource Policies -- Azure AD Privileged Identity Management -- Azure AD Identity Protection -- Azure Security Center -- Advanced Threat Detection -- Azure Endpoint Protection -- Operations Management Suite - Security and Compliance -- Summary -- Questions -- Further reading -- Chapter 12: Artificial Intelligence, IoT, and Media Services -- Technical requirements -- Azure Cognitive Services -- Available services and APIs -- Using the Computer Vision API -- Azure Bot Service -- Creating a Bot from the Azure Portal -- Azure Machine Learning -- Azure IoT Hub -- Azure Event Hub -- Azure IoT Edge -- Azure Stream Analytics -- Azure Time Series Insights -- Azure Media Services -- Azure Media Analytics -- Using the Azure Media Analytics Indexer -- Summary -- Questions -- Further reading -- Chapter 13: Implementing Messaging Solutions -- Technical requirements -- Azure Queue Storage -- Azure Service Bus -- Azure Event Grid -- Routing Events with Azure Event Grid -- Notification Hubs -- Designing an effective messaging architecture -- Summary -- Questions -- Further reading -- Chapter 14: Application Monitoring and Alerting Strategies -- Azure Log Analytics -- Creating a Log Analytics Workspace -- Azure Monitor -- Application Insights -- Azure Service Health -- Azure Advisor -- Address Recommendation from Azure Advisor -- Azure Network Watcher -- Summary -- Questions -- Further reading -- Chapter 15: Exploring Operations Automation Strategies…”
    Libro electrónico
  12. 3932
    Publicado 2019
    “…Presents the principles, design, development and applications of the Diameter protocol suite The Diameter protocol was born in the Internet Engineering Task Force (IETF) and designed to be a general-purpose Authentication, Authorization, and Accounting (AAA) protocol applicable to many network environments. …”
    Libro electrónico
  13. 3933
    Publicado 2022
    Tabla de Contenidos: “…Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Acknowledgments -- Introduction -- Chapter 1: Office Productivity, Note-Taking, Accounting, and PDF Creation -- LibreOffice: The Powerful Free Office Suite -- LibreOffice Modules -- Writer -- Calc -- Impress -- Base -- Draw -- LibreOffice Support -- FreeOffice 2021: A Free Alternative to Microsoft Office for Personal and Business Use -- FreeOffice Apps -- TextMaker -- PlanMaker -- Presentations -- FreeOffice Support -- Simplenote: A Free Note-Taking Application for Syncing Across Devices -- Simplenote Support -- Zim: An Open Source Note-Taking Application for Desktops -- Zim Support -- GnuCash: Open Source Accounting Software -- Main Features -- Advanced Features -- Data Storage and Exchange Features -- Other Goodies -- GnuCash Support -- Manager: Free Small Business Accounting Software -- Manager Support -- PDF reDirect: Basic PDF Creation Freeware -- Feature Highlights -- PDF reDirect Support -- Summary -- Chapter 2: Point-of-Sale, CRM, Backup, and Compression Software -- Point-of-Sale Solutions -- Customer Relationship Management Solutions -- File Backup and Compression Solutions -- Imonggo (Free Version): A Point-of-Sale Utility for Small Shops or Boutiques -- Feature Highlights -- Imonggo Support -- POS/Cash Register: Turn Your Old PC into a Cash Register -- Feature Highlights -- POS/Cash Register Support -- Bitrix24: A Social Intranet, CRM Solution for Small Business -- Feature Highlights -- Bitrix24 Support -- FBackup: A Free Basic Backup Utility -- Feature Highlights -- FBackup Support -- 7Zip: An Open Source Alternative to WinZip -- Feature Highlights -- 7Zip Support -- Summary -- Chapter 3: Desktop Publishing, Illustration, Painting, and 3D Modeling Software -- Canva: Easy Template-Based Desktop Publishing -- Feature Highlights -- Design Capabilities…”
    Libro electrónico
  14. 3934
    Publicado 2017
    Tabla de Contenidos: “…Wi-Fi cracking tools -- The steps -- The Transmission Control Protocol (TCP) handshake -- The password lists -- How to make a strong password -- The short version (a cheat-sheet for the aircrack-ng suite) -- Summary -- Chapter 4: Creating a RAT Using Msfvenom -- Remote Access Trojans -- Ways to disguise your RAT though Metasploit -- PDF-embedded RAT -- MS Word-embedded RAT -- Android RAT -- Your defence -- Summary -- References -- Chapter 5: Veil Framework -- Veil-Evasion -- Veil-Pillage -- How do hackers hide their attack? …”
    Libro electrónico
  15. 3935
    Publicado 2018
    Tabla de Contenidos: “…-- Ethereum -- Hyperledger Fabric -- Summary -- Chapter 9: Building a Next-Generation Oracle B2B Platform -- Introducing the business case -- Traditional cross-organizational applications -- Introducing Oracle B2B -- Introducing Oracle SOA Suite -- Implementing the business case on a B2B network -- What is the common application architecture? …”
    Libro electrónico
  16. 3936
    Publicado 2009
    Tabla de Contenidos: “…Cover -- Table of Contents -- Chapter 1: After Effects: The Big Picture -- The QuickPro Series -- Adobe Creative Suite 4 Production Premium -- Minimum Requirements -- Mac OS vs. …”
    Libro electrónico
  17. 3937
    Publicado 2023
    “…Explore expert tips and techniques to effectively manage the security, compliance, and identity features within your Microsoft 365 applications Purchase of the print or Kindle book includes a free PDF eBook Key Features Discover techniques to reap the full potential of Microsoft security and compliance suite Explore a range of strategies for effective security and compliance Gain practical knowledge to resolve real-world challenges Book Description The Microsoft 365 Security, Compliance, and Identity Administration is designed to help you manage, implement, and monitor security and compliance solutions for Microsoft 365 environments. …”
    Libro electrónico
  18. 3938
    por Moraschi, Davide
    Publicado 2013
    Tabla de Contenidos: “…. -- Installing MicroStrategy Suite -- Getting ready -- How to do it... -- There's more... -- Registering the MicroStrategy License -- Getting ready -- How to do it... -- There's more.... -- Metadata and data warehouse -- Getting ready -- How to do it... -- How it works... -- There's more... -- Creating ODBC DSN for metadata and data warehouse -- Getting ready -- How to do it... -- How it works... -- There's more... -- Modifying the logon account for the Intelligence Server -- Getting ready -- How to do it... -- How it works…”
    Libro electrónico
  19. 3939
    Publicado 2017
    Tabla de Contenidos: “…-- Unit tests -- PyUnit -- Example -- Output -- Expanding our test suite -- Unit testing concurrent code -- Integration tests -- Debugging -- Make it work as a single thread -- Pdb -- An interactive example -- Catching exceptions in child threads -- Benchmarking -- The timeit module -- Timeit versus time -- Command-line example -- Importing timeit into your code -- Utilizing decorators -- Timing context manager -- Output -- Profiling -- cProfile -- Simple profile example -- The line_profiler tool -- Kernprof -- Memory profiling -- Memory profile graphs -- Summary -- Chapter 7: Executors and Pools -- Concurrent futures -- Executor objects -- Creating a ThreadPoolExecutor -- Example -- Output -- Context manager -- Example -- Output -- Maps -- Example -- Output -- Shutdown of executor objects -- Example -- Output -- Future objects -- Methods in future objects -- The result() method -- The add_done_callback() method -- The .running() method -- The cancel() method -- The .exception() method -- The .done() method -- Unit testing future objects…”
    Libro electrónico
  20. 3940
    por Millett, Scott
    Publicado 2024
    “…In The Accidental CIO, veteran software developer-turned-executive Scott Millett delivers an essential playbook to becoming an impactful, strategic leader at any stage of your IT leadership journey from your earliest aspirations to long time incumbents in director and C-suite roles. You'll find a wealth of hands-on advice for tackling the many challenges and paradoxes that face technology leaders, from creating an aligned IT strategy, defining a target architecture, designing a balanced operating model, and leading teams and executing strategy. …”
    Libro electrónico