Mostrando 301 - 320 Resultados de 417 Para Buscar 'Defensive end', tiempo de consulta: 0.13s Limitar resultados
  1. 301
    Publicado 2022
    Tabla de Contenidos: “…-- Trade Finance Ecosystem -- Trade Finance Functional Architecture -- Case Study: Collateral Management -- Collateral Management Functional Architecture -- Collateral Management Architecture -- Microservices and User Interface: Micro Front End -- Routing -- Composition -- Communication -- Pros and Cons of Micro Front Ends -- Microservice Architecture in Artificial Intelligence -- AI Subcategories -- Microservices Vertical Components: Speech AI -- Summary -- Chapter 6: Event-Driven Architecture -- Evolution of Event-Driven Architecture -- Tightly Coupled World to Loosely Coupled World -- Message Broker World to Event World -- Event -- Business Events -- Technical Events -- Processing an Event -- Event Handling in Domain Context -- Event Governance -- What Is Event-Driven Architecture? …”
    Libro electrónico
  2. 302
    Publicado 2022
    Tabla de Contenidos: “…Part IV Communication and Network Security -- Chapter 11 Networking Fundamentals -- Data Communications Foundations -- Network Reference Models -- Protocols -- Application Layer -- Presentation Layer -- Session Layer -- Transport Layer -- Network Layer -- Data Link Layer -- Physical Layer -- Functions and Protocols in the OSI Model -- Tying the Layers Together -- Local Area Networks -- Network Topology -- Medium Access Control Mechanisms -- Layer 2 Protocols -- Transmission Methods -- Layer 2 Security Standards -- Internet Protocol Networking -- TCP -- IP Addressing -- IPv6 -- Address Resolution Protocol -- Dynamic Host Configuration Protocol -- Internet Control Message Protocol -- Simple Network Management Protocol -- Domain Name Service -- Network Address Translation -- Routing Protocols -- Intranets and Extranets -- Metropolitan Area Networks -- Metro Ethernet -- Wide Area Networks -- Dedicated Links -- WAN Technologies -- Chapter Review -- Quick Review -- Questions -- Answers -- Chapter 12 Wireless Networking -- Wireless Communications Techniques -- Spread Spectrum -- Orthogonal Frequency Division Multiplexing -- Wireless Networking Fundamentals -- WLAN Components -- WLAN Standards -- Other Wireless Network Standards -- Other Important Standards -- Evolution of WLAN Security -- 802.11 -- 802.11i -- 802.11w -- WPA3 -- 802.1X -- Best Practices for Securing WLANs -- Mobile Wireless Communication -- Multiple Access Technologies -- Generations of Mobile Wireless -- Satellites -- Chapter Review -- Quick Review -- Questions -- Answers -- Chapter 13 Securing the Network -- Applying Secure Design Principles to Network Architectures -- Secure Networking -- Link Encryption vs. End-to-End Encryption -- TLS -- VPN -- Secure Protocols -- Web Services -- Domain Name System -- Electronic Mail -- Multilayer Protocols -- Distributed Network Protocol 3.…”
    Libro electrónico
  3. 303
    Publicado 2022
    Libro electrónico
  4. 304
    por Gatti, Giovanni
    Publicado 2021
    “…Bessarion initially attempted to incorporate Gatti's 'Notata' whole cloth into the 'In calumniatorem Platonis', but in the end he exploited it as a storehouse of the scholastic references, quotations, and arguments that made up the new Book III of the 1469 'In calumniatorem Platonis'. …”
    Libro
  5. 305
    Publicado 2017
    Libro electrónico
  6. 306
    Publicado 2023
    Libro electrónico
  7. 307
    Publicado 2021
    Tabla de Contenidos: “…Step 1: Generate Your API Token in Cloud App Security -- Step 2: Create Your Trigger in Microsoft Flow -- Step 3: Create the Teams Message Action in Microsoft Flow -- Step 4: Generate an Email in Microsoft Flow -- Connecting the Flow in Cloud App Security -- Performing an Automated Response Using Azure Security Center -- Using Machine Learning and Artificial Intelligence in Threat Response -- Overview of Fusion Detections -- Overview of Azure Machine Learning -- Summary -- Chapter 5 Microsoft Cybersecurity Reference Architecture and Capability Map -- Introduction -- Microsoft Security Architecture versus the NIST Cybersecurity Framework (CSF) -- Microsoft Security Architecture -- The Identify Function -- The Protect Function -- The Detect Function -- The Respond Function -- The Recover Function -- Using the Microsoft Reference Architecture -- Microsoft Threat Intelligence -- Service Trust Portal -- Security Development Lifecycle (SDL) -- Protecting the Hybrid Cloud Infrastructure -- Azure Marketplace -- Private Link -- Azure Arc -- Azure Lighthouse -- Azure Firewall -- Azure Web Application Firewall (WAF) -- Azure DDOS Protection -- Azure Key Vault -- Azure Bastion -- Azure Site Recovery -- Azure Security Center (ASC) -- Microsoft Azure Secure Score -- Protecting Endpoints and Clients -- Microsoft Endpoint Manager (MEM) Configuration Manager -- Microsoft Intune -- Protecting Identities and Access -- Azure AD Conditional Access -- Passwordless for End-to-EndSecure Identity -- Azure Active Directory (aka Azure AD) -- Azure MFA -- Azure Active Directory Identity Protection -- Azure Active Directory Privilege Identity Management (PIM) -- Microsoft Defender for Identity -- Azure AD B2B and B2C -- Azure AD Identity Governance -- Protecting SaaS Apps -- Protecting Data and Information -- Azure Purview -- Microsoft Information Protection (MIP)…”
    Libro electrónico
  8. 308
    por Vanhove, Sander
    Publicado 2024
    Tabla de Contenidos: “…-- Networking in Godot Engine -- Learning about IP addresses -- Using port numbers -- Setting up the base networking code -- Creating the client-server connection -- Adding UI -- Running multiple debug instances at the same time -- Synchronizing different clients -- Updating the player scene for multiplayer -- Synchronizing EntitySpawner -- Synchronizing the enemy and collectibles -- Synchronizing the projectile -- Fixing the timer and end game -- Synchronizing the timer…”
    Libro electrónico
  9. 309
    Publicado 2023
    Libro electrónico
  10. 310
    Publicado 2008
    “…This comprehensive suite of tools provides end-to-e…”
    Libro electrónico
  11. 311
    Publicado 2015
    Libro electrónico
  12. 312
    Publicado 1998
    Tabla de Contenidos: “…Automated Categorization -- Search Engines -- Thesaurus Management Tools -- Portal or Enterprise Knowledge Platform -- Content Management Systems -- Analytics -- Diagramming Software -- Prototyping Tools -- User Research -- Questions to Ask -- Part V -- Making the Case for Information Architecture -- You Must Sell -- The Two Kinds of People in the World -- Running the Numbers -- Debunking the ROI Case -- Talking to the Reactionaries -- Other Case-Making Techniques -- The Information Architecture Value Checklist -- A Final Note -- Business Strategy -- The Origins of Strategy -- Defining Business Strategy -- Alignment -- Strategic Fit -- Exposing Gaps in Business Strategy -- One Best Way -- Many Good Ways -- Understanding Our Elephant -- Competitive Advantage -- The End of the Beginning -- Information Architecture for the Enterprise -- Information Architecture, Meet the Enterprise -- Finding Your Way Through an Enterprise Information Architecture -- What's the Goal of EIA? …”
    Libro electrónico
  13. 313
    Publicado 2018
    Libro electrónico
  14. 314
    Publicado 2023
    Libro electrónico
  15. 315
    por Kennedy, Antony
    Publicado 2011
    Libro electrónico
  16. 316
    por Gomez-Mejia, Luis R.
    Publicado 2016
    Libro electrónico
  17. 317
    Publicado 2010
    Tabla de Contenidos: “…Getting connected -- Going worldwide -- Connection technologies -- Choosing equipment -- Ordering the service -- Installing a modem for dial-up service -- Configuring a dial-up Internet connection -- Making and ending a dial-up connection -- Installing a network adapter for broadband service -- Configuring a high-speed connection -- Changing the default connection -- Managing multiple Internet connections -- 14. …”
    Libro electrónico
  18. 318
    Publicado 2018
    Libro electrónico
  19. 319
    Publicado 2018
    Libro electrónico
  20. 320
    Publicado 2023
    Tabla de Contenidos: “…Chapter 40 India Is Fostering a Solarized Digital Future -- India's Blockchain-Based Mobile Payment Systems -- Smart, Solar Cities -- Electric Vehicles -- Drones, Solar Power Satellite Systems, and Solar Missions -- Environmental Tax Policy in India -- Nonfungible Tokens -- Notes -- Chapter 41 Russia Leads Multinational Stablecoin Initiative -- Digitalization Is a Priority -- Solar Digital Initiatives for Power Plants and Waterways -- Solar Power Satellite (SPS) Systems -- Nonfungible Tokens -- Tax Policy in Russia and Member States -- Russia's Cryptocurrency Laws -- Notes -- Chapter 42 Africa's Solarized Digitalization Agenda in the Time of Coronavirus -- UNECA's Digital Agenda -- Digital Currencies in Africa -- Nigeria Is the World's Second-Largest Bitcoin Market -- Nonfungible Tokens -- The Solar Energy Potential of Africa -- Notes -- Chapter 43 The Need to Report Carbon Emissions Amid the Coronavirus Pandemic -- Global Environmental Tax Policy -- Carbon Tax -- Tax Credits -- Paris Agreement Climate Change Advocates -- Corporate Internal Carbon Pricing -- Country-by-Country Reporting Scheme -- Notes -- Chapter 44 The Pandemic Year Ends with a Tokenized Carbon Cap-and-Trade Solution -- World's First Tradable Carbon Token -- Cap-and-Trade Programs of the Top Six CO2-Emitting Countries/Regions of the World -- China -- United States -- European Union -- India -- Russia -- Japan -- Notes -- Chapter 45 The UN's COP26 Climate Change Goals Include Emerging Tech and Carbon Taxes -- Carbon Tax -- Notes -- Index -- EULA…”
    Libro electrónico