Mostrando 642,401 - 642,420 Resultados de 645,079 Para Buscar 'C5N~', tiempo de consulta: 1.94s Limitar resultados
  1. 642401
    Publicado 2018
    “…Recent case studies highlight common mistakes made—and propagated—by otherwise intelligent people, so you can identify and eliminate these practices within your own organization. …”
    Libro electrónico
  2. 642402
    Publicado 2016
    “…Learn how to · Identify and prioritize potential threats to your network · Use basic networking knowledge to improve security · Get inside the minds of hackers, so you can deter their attacks · Implement a proven layered approach to network security · Resist modern social engineering attacks · Defend against today’s most common Denial of Service (DoS) attacks · Halt viruses, spyware, worms, Trojans, and other malware · Prevent problems arising from malfeasance or ignorance · Choose the best encryption methods for your organization · Compare security technologies, including the latest security appliances · Implement security policies that will work in your environment · Scan your network for vulnerabilities · Evaluate potential security consultants · Master basic computer forensics and know what to do if you’re attacked · Learn how cyberterrorism and information warfare are evolving…”
    Libro electrónico
  3. 642403
    Publicado 2018
    “…The book will then focus on how you can ingest messages and events required to trigger smart contracts with Service Bus and Event Hubs. …”
    Libro electrónico
  4. 642404
    Publicado 2018
    “…You will explore algorithms such as machine learning algorithms, predictive analytical models, and finally deep learning algorithms. You will learn to run the most powerful visualization packages available in R so as to ensure that you can easily derive insights from your data. …”
    Libro electrónico
  5. 642405
    Publicado 2018
    Tabla de Contenidos: “…. -- Detecting SSH versions with the SSH Version Scanner -- Getting ready -- How to do it... -- FTP scanning -- Getting ready -- How to do it... -- SMTP enumeration -- Getting ready -- How to do it... -- SNMP enumeration -- Getting ready -- How to do it... -- HTTP scanning -- Getting ready -- How to do it... -- WinRM scanning and brute forcing -- Getting ready -- How to do it... -- Integrating with Nessus -- Getting ready -- How to do it... -- Integrating with NeXpose -- Getting ready -- How to do it... -- Integrating with OpenVAS -- How to do it... -- Chapter 3: Server-Side Exploitation -- Introduction -- Getting to know MSFconsole -- MSFconsole commands -- Exploiting a Linux server -- Getting ready -- How to do it... -- How it works... -- What about the payload? …”
    Libro electrónico
  6. 642406
    Publicado 2018
    “…By the end of the book, you will have a working knowledge of probabilistic modeling and you will be able to design and implement Bayesian models for your own data science problems. After reading the book you will be better prepared to delve into more advanced material or specialized statistical modeling if you need to. …”
    Libro electrónico
  7. 642407
    Publicado 2019
    “…Throughout this book, we will be using the GeoPackage format, and we will also discuss how QGIS can support many different types of data. Finally, you will learn where to get help and how to become engaged with the GIS community. …”
    Libro electrónico
  8. 642408
    Publicado 2021
    Tabla de Contenidos: “…Ch1: Basic concepts of Monitoring -- Ch 2: Collection of Events, Logs and Metrics -- Ch 3: Architecture of a Modern Monitoring System -- Ch 4: Prometheus -- Ch 5: TICK Platform -- Ch 6: Elastic Stack – Elastic Search -- Ch 7: Analyze and Investigate -- Ch 8: Type of Time Series Graphs -- Ch 9: Type of Summary Graphs -- Ch 10: Graphana -- Ch 11: Alerting and Notifications…”
    Libro electrónico
  9. 642409
    Publicado 2018
    “…Basic knowledge of PHP, JavaScript, HTML and CSS is required to get most out of this book…”
    Libro electrónico
  10. 642410
    Publicado 2018
    “…You will also learn how you can use Group Policy to secure your Active Directory environment, and also understand how Group Policy preferences are different than policies, with the help of real-world examples. …”
    Libro electrónico
  11. 642411
    Publicado 2019
    “…If you're advanced, you can get a deeper understanding of all the tools and technique described in the book…”
    Libro electrónico
  12. 642412
    Publicado 2018
    “…What you will learn Understand the purpose of design patterns and their impact on application lifecycle Build applications that can handle large amounts of data-intensive operations Uncover advanced concurrency techniques and discover how to handle a large number of requests in production Optimize frontends to improve the client-side experience of your application Effective testing and performance profiling techniques to detect issues in applications early in the development cycle Build applications with a focus on security Implement large applications as microservices to improve scalability Who this book is for If you're a developer who wants to build enterprise-grade applications, this book is for you. …”
    Libro electrónico
  13. 642413
    Publicado 2022
    Tabla de Contenidos: “…First Microservice -- Chapter 5. Microservice Messaging -- Chapter 6. Decentralizing Data -- Chapter 7. …”
    Libro electrónico
  14. 642414
    Publicado 2022
    “…You will be shown how each graph can be created, modified, and customized in Stata throughout the course's journey. …”
    Video
  15. 642415
    por Paccagnella, Marco
    Publicado 2016
    “…On average across the OECD countries participating in PIAAC, adults aged 55 to 65 score some 30 points less than adults aged 25 to 34 on the PIAAC literacy scale, which is only slightly smaller than the score point difference between tertiary educated and less-than-upper-secondary educated individuals. …”
    Capítulo de libro electrónico
  16. 642416
    por Love, Patrick
    Publicado 2015
    “…A partir de esta amplia experiencia, en Esenciales OCDE: Comercio internacional, se señala que rara vez, por no decir que nunca, se ha logrado o sostenido la prosperidad sin el comercio. …”
    Libro electrónico
  17. 642417
    “…Different funding and actuarial techniques can be used to achieve this…”
    Capítulo de libro electrónico
  18. 642418
    por Isaksson, Mats
    Publicado 2013
    “…We provide examples of how regulatory initiatives to increase shareholder engagement may have unintended consequences, and note that the diversity and complexity of the investment chain can render general policies or regulation ineffective…”
    Capítulo de libro electrónico
  19. 642419
    Tabla de Contenidos: “…Anexos: Modelos internacionales de aprendizaje -- Direcciones futuras para las políticas de PYMEs y emprendimiento en México -- Marco para la evaluación de programas públicos de PYMEs y emprendimiento en México -- Dimensión local de las políticas de PYMEs y emprendimiento en México -- Resumen ejecutivo -- Introducción -- Estadísticas básicas de México -- Abreviaturas y acrónimos -- Prefacio -- Agradecimientos -- Programas federales de apoyo a PYMEs y al emprendimiento en México -- Entorno empresarial y condiciones de competitividad en México -- Marco estratégico de políticas públicas y procedimientos de ejecución para la promoción de las PYMEs y el emprendimiento en México -- Desempeño de las pequeñas y medianas empresas y el emprendimiento en México…”
    Libro electrónico
  20. 642420
    Publicado 2018
    Tabla de Contenidos: “…Jh. n. Chr.) : Kommentar : Romana Sammern -- Apuleius : Schönes Haar als Verlockung (ca. 160-170) : Kommentar : Julia Saviello -- Isidor von Sevilla : Malerei ist Schminke (ca. 620) : Kommentar : Wolf-Dietrich Löhr -- Hildegard von Bingen : das Haar und der Schmuck der Nonnen (ca. 1150) : Kommentar : Philippe Cordez -- Vinzenz von Beauvais : Schminke als Verlust des göttlichen Bildes (1247-1249) : Kommentar : Wolf-Dietrich Löhr -- Francesco Petrarca : Fragmente und Farben der Schönheit (ca. 1336-1374) : Kommentar : Julia Saviello -- Franco Sacchetti : Frauenkunst als Korrektur der Schöpfung (ca. 1390) : Kommentar : Wolf-Dietrich Löhr -- Lorenzo Valla : die Lust an der Schönheit (1431) : Kommentar : Alberto Saviello -- Leon Battista Alberti : Genealogie der Schönheit (1433-1434) : Kommentar : Julia Saviello -- Leonardo da Vinci : Ungekämmt und natürlich schön (ca. 1492) : Kommentar : Julia Saviello -- Baldassare Castiglione : der Reiz der Nachlässigkeit (1528) : Kommentar : Romana Sammern -- Albrecht Dürer : die Vielfalt des menschlichen Körpers (1528) : Kommentar : Romana Sammern -- Erasmus von Rotterdam : der Körper als bewegtes Bild (1530) : Kommentar : Wolf-Dietrich Löhr -- Agnolo Firenzuola : die Frau als schönes Objekt (1541) : Kommentar : Romana Sammern -- Benedetto Varchi : Schönheit und Anmut (1540er Jahre?) …”
    Libro electrónico