Mostrando 30,361 - 30,380 Resultados de 30,491 Para Buscar 'Dynów~', tiempo de consulta: 1.00s Limitar resultados
  1. 30361
    Publicado 2017
    “…Ausgewählte Stimmen zum StreetScooter: »Mit gesundem Menschenverstand an die Sache herangegangen. In den verkrusteten Dino-Hierarchien der Old Technology wäre so ein Projekt höchstens bis zum Papierkorb im Archiv gekommen.« »Eines der wenigen sinnvollen Projekte. …”
    Libro electrónico
  2. 30362
    Publicado 2021
    “…With the new era of quantum computing, this book serves as a stepping stone to quantum cryptography, finding useful connections between current cryptographic concepts and quantum related topics. What You Will Learn: Know when to enlist cryptography, and how it is often misunderstood and misused Explore modern cryptography algorithms, practices, and properties Design and implement usable, advanced cryptographic methods and mechanisms Understand how new features in C# and .NET impact the future of cryptographic algorithms Use the cryptographic model, services, and System.Security.Cryptography namespace in .NET Modernize your cryptanalyst mindset by exploiting the performance of C# and .NET with its weak cryptographic algorithms Practice the basics of public key cryptography, including ECDSA signatures Discover how most algorithms can be broken This book is for information security experts, cryptologists, software engineers, developers, data scientists, and academia who have experience with C#, .NET, as well as IDEs such as Visual Studio, VS Code, or Mono. …”
    Libro electrónico
  3. 30363
    Publicado 2016
    “…You'll dig into the whole spectrum of warranty fraud, from simple sloppy procedures to systematic organized crime, and get to know the fraudulent parties, the victims, as well as the objectives and methods of the fraudulent activities in different scenarios. …”
    Libro electrónico
  4. 30364
    por Ramsay, Morgan. author
    Publicado 2015
    “…For those who simply enjoy games and know of some of these founders, this will be a most interesting read. …”
    Libro electrónico
  5. 30365
    Publicado 2022
    “…Our aspirations are made realizable through the labor and resources of countless others, most of whom we'll never see or even know. Some are exploited in developing world cell phone cities, banana plantations, diamond mines, sneaker factories, and sweat shops. …”
    Libro electrónico
  6. 30366
    Publicado 2023
    “…What You Will Learn Understand supervised machine learning with real-world examples Understand and code using the NumPy stack Make use of NumPy, SciPy, Matplotlib, and Pandas to implement numerical algorithms Understand the pros and cons of various machine learning models Get a brief introduction to the classification and regression Learn how to calculate the PDF and CDF under the normal distribution Audience This course is designed for anyone who is interested in data science and machine learning, who knows Python and wants to take the next step into Python libraries for data science, or who is interested in acquiring tools to implement machine learning algorithms. …”
    Video
  7. 30367
    Publicado 2023
    “…You will learn everything you need to know inside. Basic JavaScript and web development is a plus! …”
    Video
  8. 30368
    Publicado 2024
    “…Learn why you're asked to give permission for apps to access folders and personal data on your Mac Moderate access to your audio, video, screen actions, and other hardware inputs and outputs Get to know the increasing layers of system security deployed over the past few years Prepare against a failure or error that might lock you out of your device Share files and folders securely over a network and through cloud services Upgrade your iCloud data protection to use end-to-end encryption Control other low-level security options to reduce the risk of someone gaining physical access to your Mac--or override them to install system extensions Understand FileVault encryption and protection for Mac, and avoid getting locked out Investigate the security of a virtual private network (VPN) to see whether you should use one Learn how the Secure Enclave in Macs with a T2 chip or M-series Apple silicon affords hardware-level protections Dig into ransomware, the biggest potential threat to Mac users (though rare in practice) Discover recent security and privacy technologies, such as Lockdown Mode and passkeys…”
    Libro electrónico
  9. 30369
    Publicado 1986
    “…3 the nature of the relationship between groups and technology (now and for the future) and how we learn from the study of that. …”
    Libro electrónico
  10. 30370
    por Ruyssen, Georges-Henri
    Publicado 2018
    “…Oltre a porre il problema di come valutare il grado di fede necessario per celebrare validamente il sacramento, si deve tener presente che la fede non dipende completamente dalla volontà del soggetto, ma che è innanzitutto un dono soprannaturale. Tuttavia, non si può negare che la fede personale abbia un ruolo importante nel matrimonio cristiano. …”
    Artículo
  11. 30371
    por Cucci, Giovanni
    Publicado 2017
    “…Il dubbio deve essere superato in un altro modo, chiedendo a Dio il dono della sapienza. Considerato in questa prospettiva, il dubbio invita a non presumere di sé e a coltivare l’umiltà; nello stesso tempo, come notava Agostino è possibile dubitare proprio perché ci si trova nella verità. …”
    Artículo
  12. 30372
    Publicado 2022
    “…By the end of the course, you will know how to build a DevSecOps pipeline and how to integrate different tools to handle the OWASP Top Ten, as well as compliance checks to stay up to date with regulations like HIPAA, PCI, and GDPR. …”
    Video
  13. 30373
    Publicado 2023
    “…Hand-drawn illustrations, reflective thought experiments, and brain-tickling example problems help you get your creative juices flowing--you'll even be able to track your progress against a scientifically validated Creative Programming Problem Solving Test. Before you know it, you'll be thinking up new and novel ways to tackle the big challenges of your projects. …”
    Libro electrónico
  14. 30374
    por Wallace, Kevin
    Publicado 2011
    “…Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your final study plan. …”
    Libro electrónico
  15. 30375
    Publicado 2001
    “…No one before or after him has done as much toward compiling what we know today about the history of the book, whether it be in the Austro-Hungarian Monarchy or in the Republic of Austria. …”
    Libro electrónico
  16. 30376
    “…What You'll Learn: Understand different architectural designs for implementing Azure Security Operate and monitor an Azure environment Deploy Azure Governance, Policies, and Blueprints Discover key Azure features that enhance security Implement and confidently access Azure Security Center Get to know Azure Sentinel This book is for technical engineers, consultants, solution and cloud architects, IT managers, and SecOps teams who need to understand how to integrate governance, security, and compliance in hybrid and Azure environments. …”
    Libro electrónico
  17. 30377
    Publicado 2018
    “…You're a security engineer or a system administrator who needs to roll out an Ubuntu-based server and want to make it as secure as possible You're debating whether a Linux server is the right fit for you and your company and want to learn if there are steps you can take to better secure it You're a new administrator or security professional (or a student) and you want to see how easy it is to manage the security of an Ubuntu server Prerequisites: You should have a basic understanding of Linux and general security principles You should know how to use the command line You should have access to a user with root privileges Materials or downloads needed in advance: Learning Path: Networking for Sysadmins Learning Path: Kali Linux…”
    Video
  18. 30378
    Publicado 2011
    “…It adds clarity to things that you intuitively know and provides insight into things that you don't. …”
    Grabación no musical
  19. 30379
    Publicado 2022
    “…At the end of the course, you will not only know what predictive analytics is and what it can do for an organization but also develop basic skills to practice predictive analytics using numerous tools and platforms, most of which are free and open source. …”
    Video
  20. 30380
    Publicado 2014
    “…Aspiring tech entrepreneurs will learn to: Set up shop: build the team, assemble necessary startup assets (including technology and intellectual property), get legal and financial affairs in order Secure capital: ask for money, nail the term sheet, ask for more money Get out: know when to sell, who to sell to, and how to make it a happy exit for all stakeholders, including the employees Written with deep insight, refreshing candor, and a dash of humor, this comprehensive guide to the often harsh realities of startup life is indispensable for entrepreneurs at any stage. …”
    Grabación no musical