Mostrando 361 - 380 Resultados de 417 Para Buscar 'Defensive end', tiempo de consulta: 0.08s Limitar resultados
  1. 361
    por Barraud, Dany
    Publicado 2021
    “…However, in their general conception, the construction methods of the rampart, the details of organisation of defensive structures (positioning of towers, small number of gates, absence of ditches, abundance or rarety of reused building materials), these fortified towns do not represent individual cases but take their place within a system of defence created at different dates between the gallic empire and the end of roman domination in south-west Gaul…”
    Electrónico
  2. 362
    por Gregg, Michael
    Publicado 2014
    “…Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. …”
    Libro electrónico
  3. 363
    Publicado 2015
    “…The requirement that NATO may now have to build a much more robust deterrence and defense posture in Eastern Europe would require the Army and the Air Force to revisit their planning assumptions that have minimized U.S. military commitments to the region since the end of the Cold War…”
    Libro electrónico
  4. 364
    Publicado 2023
    “…Whether you work in a large enterprise, a government agency, or a small business, the principles and strategies presented in this book are adaptable and scalable to suit your specific needs. By the end of this book, you’ll have all the tools and guidance needed to fortify your organization’s defenses and expand your capabilities as an information security practitioner…”
    Libro electrónico
  5. 365
    Publicado 2022
    “…By the end of this book, you will have learned how to efficiently analyze samples, investigate suspicious activity, and build innovative solutions to handle malware incidents…”
    Libro electrónico
  6. 366
    Publicado 2023
    “…Geospatial analysis is used in almost every domain you can think of, including defense, farming, and even medicine. In this special 10th anniversary edition, you'll embark on an exhilarating geospatial analysis adventure using Python. …”
    Libro electrónico
  7. 367
    Publicado 2024
    “…You'll learn about essential components such as data masking, secure data retrieval, and prompt defense to ensure a robust AI integration into Salesforce systems. …”
    Vídeo online
  8. 368
    Publicado 2019
    “…We will create a virtual network with two secure LANs, a DMZ and a public Internet connection with robust security features. By the end of this course, you will be confident using pfSense to secure physical and virtual networks using the industry's most exciting network perimeter defense system…”
    Video
  9. 369
    Publicado 2022
    “…Wrapping up with post-exploitation strategies, you'll be able to go deeper and keep your access. By the end of this book, you'll be well-versed in identifying vulnerabilities within your clients' environments and providing the necessary insight for proper remediation…”
    Libro electrónico
  10. 370
    Publicado 2022
    “…By the end of the book, you'll have gained the knowledge you need to take the SC-900 certification exam and implement solutions in real-life scenarios. …”
    Libro electrónico
  11. 371
    Publicado 2019
    “…By the end of this book, you'll be ready to develop intelligent systems that can detect unusual and suspicious patterns and attacks, thereby developing strong network security defenses using AI. …”
    Libro electrónico
  12. 372
    por Farwell, James P.
    Publicado 2012
    “…"Power and Persuasion" stands apart for its critical evaluation of the concepts, doctrines, and activities that the US Department of Defense and Department of State employ for the art of strategic communication including psychological operations, military information support operations, propaganda, and public diplomacy. …”
    Libro
  13. 373
    Publicado 2017
    “…This book will also keep you updated with the latest security techniques and methods that can be directly applied to scan, test, hack, and secure networks and systems with Metasploit. By the end of this book, you'll get the hang of bypassing different defenses, after which you'll learn how hackers use the network to gain access into different systems. …”
    Libro electrónico
  14. 374
    Publicado 2022
    “…Build your organization's cyber defense system by effectively applying digital forensics, incident management, and investigation techniques to real-world cyber threats. …”
    Libro electrónico
  15. 375
    por McBreen, Pete
    Publicado 2002
    “…Today’s software development projects are often based on the traditional software engineering model, which was created to develop large-scale defense projects. Projects that use this antiquated industrial model tend to take longer, promise more, and deliver less. …”
    Libro electrónico
  16. 376
    Publicado 2016
    “…By the end of this book you will be able to turn Raspberry Pi 3 into a hacking arsenal to leverage the most popular open source toolkit, Kali Linux 2.0. …”
    Libro electrónico
  17. 377
    por Wong, Reginald
    Publicado 2018
    “…Lastly, you will learn how to analyse other types of files that contain code. By the end of this book, you will have the confidence to perform reverse engineering. …”
    Libro electrónico
  18. 378
    Publicado 2021
    “…You'll learn the concepts of zero trust methodology, shared responsibility model, and defense in depth. After that, you'll cover Microsoft Identity and Access Management Solutions. …”
    Video
  19. 379
    Publicado 2022
    “…Next, you will understand security concepts, defense-in-depth, and key security services such as Network Security Groups and Azure Firewall, as well as security operations tooling such as Azure Security Center and Azure Sentinel. …”
    Grabación no musical
  20. 380
    Publicado 2023
    “…Finally, in addition to various incident response activities, the audiobook will address malware analysis and demonstrate how you can proactively use your digital forensic skills in threat hunting. By the end of this audiobook, you'll be able to investigate and report unwanted security breaches and incidents in your organization. …”
    Grabación no musical