Mostrando 161 - 180 Resultados de 417 Para Buscar 'Defensive end', tiempo de consulta: 0.08s Limitar resultados
  1. 161
    Publicado 2023
    “…Use this practical guide to understand the concepts behind Intelligent Multimode Security Systems (IMSS) and how to implement security within an IMSS system to improve the robustness of the devices and of the end-to-end solution. There are nearly half a billion active IMSS cameras globally, with over 100 million added annually. …”
    Libro electrónico
  2. 162
    Publicado 2024
    Libro electrónico
  3. 163
    Publicado 2014
    Libro electrónico
  4. 164
    por Lawson, Brook Stearns
    Publicado 2010
    Libro electrónico
  5. 165
    Publicado 2008
    Libro electrónico
  6. 166
    Publicado 2023
    “…By the end of this social engineering book, you'll be proficient in identifying cyberattacks and safeguarding against the ever-growing threat of social engineering with your defensive arsenal. …”
    Libro electrónico
  7. 167
    por Larrabee, F. Stephen
    Publicado 2002
    Libro electrónico
  8. 168
    por Jonas, Gilbert
    Publicado 2005
    Tabla de Contenidos: “…Negro determination : the NAACP's assault on Jim Crow places it in mortal combat with the Ku Klux Klan and the White Citizens Councils -- Leading the quest for political power : James Weldon Johnson leads the fight against lynching, then Walter White defeats President Hoover's Supreme Court nominee -- Comes the revolution : the struggle between the NAACP and the Communist Party USA : White and Wilkins thwart the communist attempts to win the loyalty of American Negroes -- World Wwar II and its consequences for race : the NAACP presses FDR to utilize Negro troops and open up defense industry jobs to Negroes with Mrs. Roosevelt's help --…”
    Enlace del recurso
    Libro electrónico
  9. 169
    Publicado 2010
    Tabla de Contenidos: “…Thinking beyond means-ends analysis: the role of impulse-driven human creativity in the design of artificially intelligent systems Dongming Xu Yonggui Wang Sukanto Bhattacharya University of Queensland 11. …”
    Libro electrónico
  10. 170
    Publicado 2023
    “…Send files and messages with end-to-end encryption. Secure your home network and keep your smart devices from spying on you. …”
    Libro electrónico
  11. 171
    por Cayirci, E.
    Publicado 2009
    Libro electrónico
  12. 172
    Publicado 2024
    “…The curriculum is thoughtfully structured and covers a wide range of topics, making it accessible and engaging for learners at various levels. By the end of this course, you'll possess a comprehensive understanding of network security and defense, preparing you to tackle real-world challenges in the field…”
    Video
  13. 173
    Publicado 2020
    “…In addition to this, you'll be equipped with the tools you need to ensure compliance and continuous monitoring through security operations. By the end of this book, you'll have developed a full understanding of the processes and tools involved in securing and hardening your Windows environment. …”
    Libro electrónico
  14. 174
    Publicado 2022
    Libro electrónico
  15. 175
    Publicado 2024
    Tabla de Contenidos: “…-- 4.2 Die Natural Law Defense -- 4.3 Kritische Reflexion -- Kapitel 5 Möglichkeiten und Grenzen der theoretischen Theodizee: Eine Zwischenreflexion im Anschluss an Immanuel Kant -- 5.1 Das Ende philosophischer Theodizee? …”
    Libro electrónico
  16. 176
    Publicado 2020
    Tabla de Contenidos: “…Gavin -- Part I: Applied History and Future Scenarios -- Ends of Epidemics / Jeremy A. Greene and Dora Vargha -- The World after COVID: A Perspective from History / Margaret MacMillan -- Future Scenarios: "We are all failed states, now" / Philip Bobbitt -- Part II: Global Public Health and Mitigation Strategies -- Make Pandemics Lose Their Power / Tom Inglesby -- Origins of the COVID-19 Pandemic and the Path Forward: A Global Public Health Policy Perspective / Lainie Rutkow -- Bioethics in a Post- COVID World: Time for Future- Facing Global Health Ethics / Jeffrey P. …”
    Libro electrónico
  17. 177
    por Fritsch, Winston
    Publicado 1992
    Tabla de Contenidos: “…s Role in World Affairs: The Old Perception and the End of the Dream""; ""Brazilâ€?s Emerging Regional Role in the Hemisphere""; ""The U.S. …”
    Capítulo de libro electrónico
  18. 178
    Tabla de Contenidos: “…Declarative Languages""; ""SQL Basics""; ""Statements""; ""Databases""; ""Transaction Logs""; ""Schemas""; ""Tables""; ""Views""; ""Indexes""; ""Stored Procedures""; ""User-Defined Functions""; ""SQL CLR Assemblies""; ""Elements of Style""; ""Whitespace""; ""Naming Conventions""; ""One Entry, One Exit""; ""Defensive Coding""; ""The SELECT * Statement""…”
    Libro electrónico
  19. 179
    Publicado 2015
    Tabla de Contenidos: “…The early thinking of Karl PolanyiContemporary criticisms of neoliberalism; Neoliberalism as Exception; Neoliberalism: The Case of Israel; The End of History; The Death of Neoliberalism?; Neo-Marxian Theoretical Alternatives to Neoliberalism; Transnational capitalism; Empire; Chapter Summary; Discussion Questions; Additional Readings; Notes; Chapter 5 Global Political Structures and Processes; On Political Processes and Flows; The Nation-State; Threats to the nation-state; In Defense of the Nation-State; "Imagined Community"; Changes in Global Nation-State Relations…”
    Libro electrónico
  20. 180
    Publicado 2006
    Tabla de Contenidos: “…E-MAIL ABUSE AND POLICY-BASED SOLUTIONSCONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; E-Commerce Vulnerabilities; INTRODUCTION; E-SHOPLIFTING; CREDIT CARD PAYMENTS; PROTECTING CREDIT CARD PAYMENTS; ONLINE AUCTIONS; NONREPUDIATION; TRUST AND REPUTATION; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; Hacking Techniques in Wired Networks Hacking; INTRODUCTION; PRINCIPLES OF HACKING; ATTACKS AGAINST THE INTERNET INFRASTRUCTURE; ATTACKS AGAINST END SYSTEMS OF THE INTERNET; ATTACKS AGAINST ENTERPRISE NETWORK SYSTEMS; CONCLUSION; ACKNOWLEDGEMENTS; GLOSSARY…”
    Libro electrónico