Mostrando 10,781 - 10,800 Resultados de 11,208 Para Buscar 'Brigus~', tiempo de consulta: 1.12s Limitar resultados
  1. 10781
  2. 10782
    Publicado 2019
    Libro
  3. 10783
  4. 10784
    Publicado 1999
    Libro
  5. 10785
    Libro
  6. 10786
    por Maynard, Harold B. 1902-1975
    Publicado 1956
    Libro
  7. 10787
    por O'Hurley-Pitts, Michael, 1965-
    Publicado 2002
    Libro
  8. 10788
    por Longo, Luigi, 1900-1980
    Publicado 1966
    Libro
  9. 10789
    Publicado 2023
    Tabla de Contenidos: “…Chapter 6 Preventing Social Engineering Attacks -- Don't Trust Technology More than You Would People -- Types of Social Engineering Attacks -- Six Principles Social Engineers Exploit -- Don't Overshare on Social Media -- Your schedule and travel plans -- Financial information -- Personal information -- Information about your children -- Information about your pets -- Work information -- Possible cybersecurity issues -- Crimes and minor infractions -- Medical or legal advice -- Your location -- Your birthday -- Your "sins" -- Leaking Data by Sharing Information as Part of Viral Trends -- Identifying Fake Social Media Connections -- Photo -- Verification -- Friends or connections in common -- Relevant posts -- Number of connections -- Industry and location -- Similar people -- Duplicate contact -- Contact details -- Premium status -- LinkedIn endorsements -- Group activity -- Appropriate levels of relative usage -- Human activities -- Cliché names -- Poor contact information -- Skill sets -- Spelling -- Age of an account -- Suspicious career or life path -- Level or celebrity status -- Using Bogus Information -- Using Security Software -- General Cyberhygiene Can Help Prevent Social Engineering -- 3 Securing a Business -- Chapter 1 Securing Your Small Business -- Making Sure Someone Is In Charge -- Watching Out for Employees -- Incentivize employees -- Avoid giving out the keys to the castle -- Give everyone separate credentials -- Restrict administrators -- Limit access to corporate accounts -- Implement employee policies -- Enforce social media policies -- Monitor employees -- Dealing with a Remote Workforce -- Use work devices and separate work networks -- Set up virtual private networks -- Create standardized communication protocols -- Use a known network -- Determine how backups are handled -- Be careful where you work remotely…”
    Libro electrónico
  10. 10790
    Cybersecurity
    Cybersecurity For Dummies
    Publicado 2022
    Tabla de Contenidos: “…USB-based authentication -- Chapter 9 Preventing Social Engineering Attacks -- Don't Trust Technology More than You Would People -- Types of Social Engineering Attacks -- Six Principles Social Engineers Exploit -- Don't Overshare on Social Media -- Your schedule and travel plans -- Financial information -- Personal information -- Information about your children -- Information about your pets -- Work information -- Possible cybersecurity issues -- Crimes and minor infractions -- Medical or legal advice -- Your location -- Your birthday -- Your "sins" -- Leaking Data by Sharing Information as Part of Viral Trends -- Identifying Fake Social Media Connections -- Photo -- Verification -- Friends or connections in common -- Relevant posts -- Number of connections -- Industry and location -- Similar people -- Duplicate contact -- Contact details -- Premium status -- LinkedIn endorsements -- Group activity -- Appropriate levels of relative usage -- Human activities -- Cliché names -- Poor contact information -- Skill sets -- Spelling -- Age of an account -- Suspicious career or life path -- Level or celebrity status -- Using Bogus Information -- Using Security Software -- General Cyberhygiene Can Help Prevent Social Engineering -- Part 4 Cybersecurity for Businesses, Organizations, and Government -- Chapter 10 Securing Your Small Business -- Making Sure Someone Is In Charge -- Watching Out for Employees -- Incentivize employees -- Avoid giving out the keys to the castle -- Give everyone separate credentials -- Restrict administrators -- Limit access to corporate accounts -- Implement employee policies -- Enforce social media policies -- Monitor employees -- Dealing with a Remote Workforce -- Use work devices and separate work networks -- Set up virtual private networks -- Create standardized communication protocols -- Use a known network…”
    Libro electrónico
  11. 10791
    Publicado 2023
    Tabla de Contenidos: “…Writing readable assertions with FluentAssertions -- Testing performance with Shouldly -- Generating test data with Bogus -- Mocking dependencies with Moq and NSubstitute -- Understanding the need for mocking libraries -- Creating mock objects with Moq -- Programming Moq return values -- Verifying Moq calls -- Mocking with NSubstitute -- Pinning tests with Snapper -- Experimenting with Scientist .NET -- Summary -- Questions -- Further reading -- Chapter 10: Defensive Coding Techniques -- Technical requirements -- Introducing the Cloudy Skies API -- Validating inputs -- Performing basic validation -- Using the nameof keyword -- Validation with guard clauses -- Guard clauses with the GuardClauses library -- Using CallerMemberInformation attributes -- Protecting against null -- Enabling nullability analysis in C# -- Using nullability operators -- Moving beyond classes -- Preferring immutable classes -- Using required and init-only properties -- Primary constructors -- Converting classes into record classes -- Cloning objects using with expressions -- Advanced type usage -- Exploring pattern matching -- Using generics to reduce duplication -- Introducing type aliases with the using directive -- Summary -- Questions -- Further reading -- Part 3: Advanced Refactoring with AI and Code Analysis -- Chapter 11: AI-Assisted Refactoring with GitHub Copilot -- Technical requirements -- Introducing GitHub Copilot -- Understanding GitHub's predictive model -- Starting the conversation with GitHub Copilot Chat -- Getting started with GitHub Copilot in Visual Studio -- Installing and activating GitHub Copilot -- Getting access to GitHub Copilot -- Generating suggestions with GitHub Copilot -- Interacting with GitHub Copilot Chat -- Refactoring with GitHub Copilot Chat -- GitHub Copilot Chat as a code reviewer -- Targeted refactoring with GitHub Copilot Chat…”
    Libro electrónico
  12. 10792
    por Neumann, Adrian J.
    Publicado 2024
    Tabla de Contenidos: “…ACT Strategic (formerly known as Project Argus) -- 6.2.6. Cross-Sectoral Security Communications (CSSC)…”
    Libro electrónico
  13. 10793
    por Ryckman, Pamela
    Publicado 2013
    “…It's about what happens when bright, extraordinary women-from captains of industry to aspiring entrepreneurs-come together to celebrate and unwind, debate and compare notes. …”
    Libro electrónico
  14. 10794
    Publicado 2019
    “…This monograph interprets Sermones book 1 as a collection of Horace's credentials for Maecenas and traces his efforts in getting accepted as an associate of the latter after his miscalculation in joining Brutus. Although Horace regularly reflects on his poetic orientation and standards of good poetry, his primary objective was his self-presentation. …”
    Libro electrónico
  15. 10795
    por Platón, ca. 427-347 a.C
    Publicado 1961
    Libro
  16. 10796
    Publicado 1823
    Libro
  17. 10797
    Publicado 2013
    “…"Four years ago, a bright young presidential candidate named Barack Obama campaigned on a theme of hope and change and made history. …”
    Libro
  18. 10798
    por Bucher, Chris
    Publicado 2007
    “…A rigorous practical guide to photographic lighting techniques, complete with hands-on assignmentsOffering digital photographers a complete course in photographic lighting, this book covers everything from using flash systems and studio lights to working outdoors in bright or low-light conditions. Full-color examples show how the right lighting can enhance color, improve contrast, and open the door to new creative possibilities…”
    Libro electrónico
  19. 10799
    por Daly, Tim, 1964-
    Publicado 2009
    “…Photoshop users:Ever feel like your printer is letting you down? Sick of seeing the bright, saturated tones of photos on your monitor turn into washed-out, drab prints? …”
    Libro electrónico
  20. 10800
    por Arjona, Javier, 1968-
    Publicado 2016
    “…La historia de la Península Ibérica ha sido un continuo devenir de clanes, tribus, pueblos y culturas, de viajeros del pasado, que han conformado el ADN de aquella Iberia griega que los romanos transformaron en Hispania y sobre la que los visigodos establecieron la primera monarquía preludio de la futura España. …”
    Libro