Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 4,290
- Development 2,182
- Management 1,787
- Application software 1,775
- History 1,459
- Engineering & Applied Sciences 1,245
- Història 1,096
- Computer networks 974
- Science: general issues 931
- Data processing 848
- Películas cinematográficas 830
- Computer programs 809
- Computer Science 792
- Cloud computing 775
- Business & Economics 761
- Biblia 758
- Leadership 750
- Design 739
- Filosofía 735
- Documentales 733
- Universidad Pontificia de Salamanca (España) 727
- Security measures 725
- Computer security 714
- Social aspects 686
- Computer software 683
- Python (Computer program language) 658
- Information technology 653
- Web site development 646
- Artificial intelligence 641
- Computer programming 619
-
111241Publicado 2018“…Using Cisco intent-based networking, you spend less time programming devices, managing configurations, and troubleshooting problems so you have more time for driving value from your network, your applications, and most of all, your users. This guide systematically introduces Cisco DNA, highlighting its business value propositions, design philosophy, tenets, blueprints, components, and solutions.Combining insider information with content previously scattered through multiple technical documents, it provides a single source for evaluation, planning, implementation, and operation. …”
Libro electrónico -
111242Publicado 2020“…Whatever your security role, you'll learn how to save hours, days, or even weeks by solving problems in the most efficient and reliable ways possible. Two of Microsoft's leading cloud security experts show how to: Implement a comprehensive new security paradigm designed specifically for cloud and hybrid environments Gain visibility and control to secure all key workloads Incorporate Azure Security Center into your security operations center, and integrate Azure AD Identity Protection Center and third-party solutions Adapt Azure Security Center's built-in policies and definitions for your organization Perform security assessments, and implement Azure Security Center recommendations fast with single-click remediation Use incident response features to detect, investigate, and address threats Create high-fidelity fusion alerts to focus attention on your most urgent security issues Implement application whitelisting and just-in-time VM access Assess IoT device security with the Azure IoT Hub managed service Monitor user behavior and access, and investigate compromised or misused credentials Integrate Microsoft's new Azure Sentinel Security Information and Event Management (SIEM) platform Customize and perform operating system security baseline assessments About This Book For cloud architects, designers, implementers, operations professionals, and security specialists working in Microsoft Azure cloud or hybrid environments For all IT professionals and decision-makers concerned with the security of Azure environments…”
Libro electrónico -
111243Publicado 2017“…Learn how cyber risk management can be integrated to better protect your enterprise Design and benchmark new and improved practical counter-cyber capabilities Examine planning and implementation approaches, models, methods, and more Adopt a new cyber risk maturity model tailored to your enterprise needs The need to manage cyber risk across the enterprise—inclusive of the IT operations—is a growing concern as massive data breaches make the news on an alarmingly frequent basis. …”
Libro electrónico -
111244Publicado 2018“…We will also cover why Ethereum and Hyperledger are widely used, and discuss the technical merits of the technology platform. About the Instructor Joe Holbrook has been in the IT field since 1993 when he was exposed to several HPUX systems on board a U.S. …”
-
111245Publicado 2017“…Discusses practical consequences for business transformation to continually define, develop and improve robust services that customers want to use. About the Authors Brian Johnson has held a number of key leadership and strategic roles in government and private companies. …”
Libro electrónico -
111246Publicado 2018Tabla de Contenidos: “…A tour of C++ and environs -- New and improved C++ fundamentals -- Modelling functions in C++ -- Advanced c++ template programming -- Tuples in c++ and their applications -- Type traits, advanced lambdas and multiparadigm design in C++ -- Multiparadigm design in C++ -- C++ numerics, IEEE754 and boost C++ multiprecision -- An introduction to unified software design (USD) -- New data types, containers and algorithms in C++ and boost C++ libraries -- Lattice models fundamental data structures and algorithms -- Lattice models applications to computational finance -- Numerical linear algebra : tridiagonal systems and applications -- Data visualisation in Excel -- Univariate statistical distributions -- Bivariate statistical distributions and two-asset option pricing -- STL algorithms in detail -- STL algorithms part II -- An introduction to optimisation and the solution of nonlinear equations -- The finite difference method for PDEs mathematical background -- Software framework for one-factor option models -- Extending the software framework -- A PDE software framework in C++11 for a class of path-dependent options -- Ordinary differential equations and their numerical approximation -- Advanced ordinary differential equations and method of lines (MOL) -- Random number generation and distributions -- Microsoft .net, C# and C++11 interoperability -- C++ concurrency, Part I Threads -- C++ concurrency, part II Tasks -- Parallel patterns language (PPL) -- Monte Carlo simulation, Part I -- Monte Carlo simulation, Part II -- Bibliography -- Appendix -- Index…”
Libro electrónico -
111247Publicado 2020“…Build secure private blockchain networks to handle mission-critical security challenges such as denial-of-service attacks, user wallets, and pool mining attacks Key Features Explore blockchain concepts such as cryptography, consensus algorithms, and security assumptions Architect network security for mission-critical decentralized apps (Dapps) using design security considerations Consider various deployment and operational aspects while building a blockchain network Book Description Blockchain adoption has extended from niche research to everyday usage. …”
Libro electrónico -
111248Publicado 2018“…You will work with the powerful Julia tools and data structures along with the most popular Julia packages. You will learn to create vectors, handle variables, and work with functions. …”
Libro electrónico -
111249Publicado 2018“…Some programming experience in Python will be helpful to get the most out of this course…”
Libro electrónico -
111250Publicado 2018Tabla de Contenidos: “…Chapter 12: Security Testing Toolkits -- General security testing toolkits -- Automation testing criteria -- Behavior-driven security testing framework -- Android security testing -- Securing infrastructure configuration -- Docker security scanning -- Integrated security tools -- Summary -- Questions -- Further reading -- Chapter 13: Security Automation with the CI Pipeline -- Security in continuous integration -- Security practices in development -- IDE plugins to automate the code review -- Static code analysis -- Secure compiler configuration -- Dependency check -- Web testing in proactive/proxy mode -- Web automation testing tips -- Security automation in Jenkins -- Summary -- Questions -- Further reading -- Chapter 14: Incident Response -- Security incident response process -- Preparation -- Detection and analysis -- Containment and recovery -- Post-incident activity -- Security incident response platforms (SIRP) -- SOC team -- Incident forensics techniques -- Summary -- Questions -- Further reading -- Chapter 15: Security Monitoring -- Logging policy -- Security monitoring framework -- Source of information -- Threat intelligence toolset -- Security scanning toolset -- Malware behavior matching - YARA -- Summary -- Questions -- Further reading -- Chapter 16: Security Assessment for New Releases -- Security review policies for releases -- Security checklist and tools -- BDD security framework -- Consolidated testing results -- Summary -- Questions -- Further reading -- Chapter 17: Threat Inspection and Intelligence -- Unknown threat detection -- Indicators of compromises -- Security analysis using big data frameworks -- TheHive -- MISP - an Open Source Threat Intelligence Platform -- Apache Metron -- Summary -- Questions -- Further reading -- Chapter 18: Business Fraud and Service Abuses -- Business fraud and abuses…”
Libro electrónico -
111251Publicado 2021“…This book shows you how threat information that has been collected, evaluated, and analyzed is a critical component in protecting your organization’s resources. Adopting an intelligence-led approach enables your organization to nimbly react to situations as they develop. …”
Libro electrónico -
111252Publicado 2021“…Choose the right Azure data service and correct model design for successful implementation of your data model with the help of this hands-on guideKey Features* Design a cost-effective, performant, and scalable database in Azure* Choose and implement the most suitable design for a database* Discover how your database can scale with growing data volumes, concurrent users, and query complexityBook DescriptionData is at the heart of all applications and forms the foundation of modern data-driven businesses. …”
Libro electrónico -
111253Publicado 2021“…First off, you will look at Prometheus and understand its architecture and usage. You will also learn about InfluxDB, formerly called TICK Stack (Telegraf, InfluxDB, Chronograf, and Kapacitor). …”
Libro electrónico -
111254Publicado 2021“…You'll also focus on time series forecasting, covering pmdarima and Facebook Prophet.By the end of this trading book, you will be able to build predictive trading signals, adopt basic and advanced algorithmic trading strategies, and perform portfolio optimization.What You Will Learn:Discover how quantitative analysis works by covering financial statistics and ARIMAUse core Python libraries to perform quantitative research and strategy development using real datasetsUnderstand how to access financial and economic data in PythonImplement effective data visualization with MatplotlibApply scientific computing and data visualization with popular Python librariesBuild and deploy backtesting algorithmic trading strategiesWho this book is for:This book is for data analysts and financial traders who want to explore how to design algorithmic trading strategies using Python's core libraries. …”
Libro electrónico -
111255Publicado 2019“…What you will learn Recognize the most common design patterns used in C++ Understand how to use C++ generic programming to solve common design problems Explore the most powerful C++ idioms, their strengths, and drawbacks Rediscover how to use popular C++ idioms with generic programming Understand the impact of design patterns on the program's performance Who this book is for This book is for experienced C++ developers and programmers who wish to learn about software design patterns and principles and apply them to create robust, reusable, and easily maintainable apps…”
Libro electrónico -
111256Publicado 2019“…Design cost-efficient database solutions, scale enterprise operations and reduce overhead business costs with MySQL Key Features Explore the new and advanced features of MySQL 8.0 Use advanced techniques to optimize MySQL performance Create MySQL-based applications for your enterprise with the help of practical examples Book Description Advanced MySQL 8 teaches you to enhance your existing database infrastructure and build various tools to improve your enterprise applications and overall website performance. …”
Libro electrónico -
111257por Fowler, Robert Booth, 1940-“…He recounts how the consensus liberal view in postWorld War II American political thought collapsed among public intellectuals during the tumult of the 1960s and remains so to this day. …”
Publicado 1999
Libro electrónico -
111258Publicado 2022Tabla de Contenidos: “…- Chapter 2: Azure Resource Manager -- Chapter 3: Preparing Your Environment -- Chapter 4: Building Your First Azure Resource Manager Template -- Chapter 5: Deployment Scopes -- Chapter 6: Working with Parameters on Your ARM Template -- Chapter 7: Using Variables in Your ARM Template -- Chapter 8: Working with the Resources Section of Your ARM Template -- Chapter 9: Understanding Dependencies in Your ARM Template -- Chapter 10: Making Use of Functions in Your ARM Template -- Chapter 11: Deployment Modes of Your ARM Template -- Chapter 12: Working with Loops in Your ARM Template -- Chapter 13: Understanding Post-Deployment Configurations: Extensions and Deployment Scripts -- Chapter 14: Working with Larger and More Complex Environments -- Chapter 15: Working with Secrets in Your ARM Template -- Chapter 16: Validating Your ARM Template -- Chapter 17: Building Your Environment with Azure DevOps and ARM Templates -- Chapter 18: Deploy ARM Templates Using GitHub Actions -- Chapter 19: Project Bicep…”
Libro electrónico -
111259Publicado 2022“…If you are fed up with those nagging, day-to-day issues, want to avoid costly repairs, or just want to learn more about how PCs work, Windows 10 Troubleshooting is your ideal one-stop guide to the Windows 10 operating system. …”
Libro electrónico -
111260Publicado 2021“…It contains an opportunity to learn about some of the real-world scenarios where optimizing workloads in Databricks has helped organizations increase performance and save costs across various domains. …”
Libro electrónico