Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,424
- Application software 1,230
- Engineering & Applied Sciences 1,159
- Management 831
- Computer Science 775
- Computer networks 679
- Data processing 568
- Computer programs 543
- Security measures 512
- Historia 499
- Cloud computing 487
- Web site development 466
- Design 463
- Computer security 438
- Computer software 433
- Python (Computer program language) 429
- History 420
- Java (Computer program language) 420
- Database management 412
- Computer programming 402
- Colón, Cristóbal 398
- Programming 391
- Web sites 380
- Electrical & Computer Engineering 356
- Operating systems (Computers) 353
- Examinations 333
- Artificial intelligence 322
- Telecommunications 311
- Microsoft .NET Framework 300
- Machine learning 285
-
31901Publicado 2016“…Learn how to · Identify and prioritize potential threats to your network · Use basic networking knowledge to improve security · Get inside the minds of hackers, so you can deter their attacks · Implement a proven layered approach to network security · Resist modern social engineering attacks · Defend against today’s most common Denial of Service (DoS) attacks · Halt viruses, spyware, worms, Trojans, and other malware · Prevent problems arising from malfeasance or ignorance · Choose the best encryption methods for your organization · Compare security technologies, including the latest security appliances · Implement security policies that will work in your environment · Scan your network for vulnerabilities · Evaluate potential security consultants · Master basic computer forensics and know what to do if you’re attacked · Learn how cyberterrorism and information warfare are evolving…”
Libro electrónico -
31902Publicado 2020“…Finally, you'll explore the architectural components of Hyperledger Fabric, and how they can be configured to build secure private blockchain networks. …”
Libro electrónico -
31903Publicado 2018“…You will understand how to use a solution template to seamlessly deploy components required to create blockchain applications. …”
Libro electrónico -
31904Publicado 2021“…This book shows you how threat information that has been collected, evaluated, and analyzed is a critical component in protecting your organization’s resources. …”
Libro electrónico -
31905Publicado 2016“…Then, he walks through the modern best practices for structuring apps, using widgets and components, and working with views. You learn how to build apps that are easy to manage and update, deliver accurate and up-to-date information without wasting precious battery power, and take advantage of new hardware, such as Android Wear and Android TV. …”
Libro electrónico -
31906Publicado 2018“…Investigating the Cyber Breach The Digital Forensics Guide for the Network Engineer Understand the realities of cybercrime and today’s attacks Build a digital forensics lab to test tools and methods, and gain expertise Take the right actions as soon as you discover a breach Determine the full scope of an investigation and the role you’ll play Properly collect, document, and preserve evidence and data Collect and analyze data from PCs, Macs, IoT devices, and other endpoints Use packet logs, NetFlow, and scanning to build timelines, understand network activity, and collect evidence Analyze iOS and Android devices, and understand encryption-related obstacles to investigation Investigate and trace email, and identify fraud or abuse Use social media to investigate individuals or online identities Gather, extract, and analyze breach data with Cisco tools and techniques Walk through common breaches and responses from start to finish Choose the right tool for each task, and explore alternatives that might also be helpful The professional’s go-to digital forensics resource for countering attacks right now Today, cybersecurity and networking professionals know they can’t possibly prevent every breach, but they can substantially reduce risk by quickly identifying and blocking breaches as they occur. …”
Libro electrónico -
31907por Juneau, Josh. author“…The book takes a problem-solution approach in which each section introduces a common programming problem, showing you how to best solve that problem using the latest features in Jakarta EE. …”
Publicado 2020
Libro electrónico -
31908Publicado 2020“…We will cover various application components and architectures of Dynamics such as requirements processing, development, reports and analytics, and integration. …”
Libro electrónico -
31909Publicado 2018“…What You Will Learn Understand what network and protocol analysis is and how it can help you Use Wireshark to capture packets in your network Filter captured traffic to only show what you need Explore useful statistic displays to make it easier to diagnose issues Customize Wireshark to your own specifications Analyze common network and network application protocols In Detail Wireshark, a combination of a Linux distro (Kali) and an open source security framework (Metasploit), is a popular and powerful tool. …”
Libro electrónico -
31910Publicado 2021“…You will dive deep into the architecture of a modern monitoring system and look at its individual components in detail. Part 2 introduces you to popular open-source tools which are used by enterprises and startups alike and are well established as the tools of choice for industry stalwarts. …”
Libro electrónico -
31911Publicado 2018“…Finally we will spend some time on maintenance and troubleshooting common Group Policy-related issues so that you, as a directory administrator, will understand the diagnosing process for policy settings. …”
Libro electrónico -
31912Publicado 2018“…What You Will Learn How Rust supports the use of basic functional programming principles Use functional programming to handle concurrency with elegance Read and interpret complex type signatures for types and functions Implement powerful abstractions using meta programming in Rust Create quality code formulaically using Rust's functional design patterns Master Rust's complex ownership mechanisms particularly for mutability In Detail Functional programming allows developers to divide programs into smaller, reusable components that ease the creation, testing, and maintenance of software as a whole. …”
Libro electrónico -
31913Publicado 2018“…Learning the behaviours and roles each component must have in order to make a videogame. Learn about videogame development Creating a videogame without the need of learning any programming language Create your own gameplay HUD to display player and Enemy information Who this book is for This book is for anyone who is interested in becoming a game developer but do not posses any coding experience or programming skills. …”
Libro electrónico -
31914Publicado 2018“…Get up and running with system programming concepts in Linux Key Features Acquire insight on Linux system architecture and its programming interfaces Get to grips with core concepts such as process management, signalling and pthreads Packed with industry best practices and dozens of code examples Book Description The Linux OS and its embedded and server applications are critical components of today's software infrastructure in a decentralized, networked universe. …”
Libro electrónico -
31915Publicado 2018“…What you will learn Learn to parse a CSV file and read data into the Haskell environment Create Haskell functions for common descriptive statistics functions Create an SQLite3 database using an existing CSV file Learn the versatility of SELECT queries for slicing data into smaller chunks Apply regular expressions in large-scale datasets using both CSV and SQLite3 files Create a Kernel Density Estimator visualization using normal distribution Who this book is for This book is intended for people who wish to expand their knowledge of statistics and data analysis via real-world examples. …”
Libro electrónico -
31916Publicado 2018“…By the end of this book, you will have a practical, hands-on understanding of how you can leverage the power of Python and Keras to perform effective deep learning What you will learn Install and configure Keras in TensorFlow Master neural network programming using the Keras library Understand the different Keras layers Use Keras to implement simple feed-forward neural networks, CNNs and RNNs Work with various datasets and models used for image and text classification Develop text summarization and reinforcement learning models using Keras Who this book is for Keras Deep Learning Cookbook is for you if you are a data scientist or machine learning expert who wants to find practical solutions to common problems encountered while training deep learning models. …”
Libro electrónico -
31917Publicado 2022“…Throughout the text, actual problems, questions, and common pitfalls are provided to help you recognize optimal solutions for maximum success in the different application scenarios you might encounter. …”
Libro electrónico -
31918Publicado 2021“…Followed by adding components of your virtual assistant like data, time, voice to text, and so on. …”
Video -
31919Publicado 2022“…Focus on the problems that most commonly plague PC users and fix each one with a step-by-step approach that helps you understand the cause, solution, and tools required. …”
Libro electrónico -
31920por Geloso Grosso, Massimo“…Foreign equity restrictions are still quite common in the sector and contribute significantly to the index. …”
Publicado 2014
Capítulo de libro electrónico