Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 380
- Development 355
- History 349
- Application software 303
- Engineering & Applied Sciences 237
- Computer Science 177
- Filosofía 152
- Computer programs 138
- Management 129
- Crítica e interpretación 124
- Computer networks 113
- Computer security 113
- Web site development 109
- Java (Computer program language) 107
- Security measures 102
- Computer programming 97
- Cloud computing 94
- Computer software 94
- Microsoft .NET Framework 94
- Historia y crítica 93
- Internet programming 80
- Programming 76
- Biblia 75
- Software engineering 71
- Cristianismo 70
- Artificial intelligence 69
- Job hunting 68
- History and criticism 66
- Design 65
- Business & Economics 63
-
8841por Grayson, Richard S., 1969-“…From the end of mass commemorations of the war in the 1920s until the 1990s, much First World War service by men and women from what is now the Republic of Ireland was forgotten, their story overwhelmed by that of different heroes and heroines: the rebels of 1916. …”
Publicado 2018
Libro -
8842Publicado 1992“…The period covered extends from 1637, the year in which Descartes published his Discours de la Me;thode, until his death in 1650.Verbeek demonstrates how Cartesian philosophy moved successfully into the schools and universities of Holland and how this resulted in a real evolution of Descartes’s thought beyond the somewhat dogmatic position of Descartes himself. …”
Libro -
8843por Kamen, Henry, 1936-“…Henry Kamen's impressive new book offers a fresh and highly original answer.Empire is a global survey of the two and a halt centuries (from the late fifteenth to the mid-eighteenth) in which the Spaniards established the most extensive empire the world had ever known, ranging from Naples and the Netherlands to the Philippines. Unlike previous accounts, which have presented the Empire as a direct consequence of Spanish power, this provocative work of history emphasizes the inability of Spain to run an imperial enterprise by itself The role of conquest was deceptive. …”
Publicado 2003
Libro -
8844Publicado 2023Tabla de Contenidos: “…-- Missing asset inventory for IoT/OT devices -- Risk and vulnerability management -- Continuous IoT/OT threat monitoring, incident response, and threat intelligence -- The installation of the MDIoT service -- Summary -- Part 3: Best Practices to Achieve Continuous Monitoring, Vulnerability Management, Threat Monitoring and Hunting, and to Align the Business Model Toward Zero Trust -- Chapter 7: Asset Inventory -- The device inventory in an on-premises console or the sensor console and the Azure portal -- The sensor console -- An on-premises console -- MDIoT in the Azure portal -- Asset visibility - IoT/OT and identifying the crown jewels -- Important devices - generating attack vectors and risk assessment reports -- Summary -- Chapter 8: Continuous Monitoring -- The protocol violation detection engine -- The policy violation detection engine -- The industrial malware detection engine -- The anomaly detection engine -- The operational engine -- Summary -- Chapter 9: Vulnerability Management and Threat Monitoring -- Risk assessment -- Summary -- Chapter 10: Zero Trust Architecture and the NIST Cybersecurity Framework -- How MDIoT helps in implementing the NIST Cybersecurity Framework -- How MDIoT helps in ZTA implementations in an OT environment -- Visibility -- Protection -- Continuous monitoring -- Validating ZTA with attack vectors -- Summary -- Index -- Other Books You May Enjoy…”
Libro electrónico -
8845Publicado 2020“…Later, you'll discover knowledge graphs and how to build them, then become well-versed with basic to advanced techniques related to hunting for credentials, and learn to automate Microsoft Office and browsers to your advantage. …”
Libro electrónico -
8846Publicado 2024“…What you will learn Explore best practices for participating in bug bounty programs and discover how rewards work Get to know the key steps in security testing, such as information gathering Use the right tools and resources for effective bug bounty participation Grasp strategies for ongoing skill development and ethical bug hunting Discover how to carefully evaluate bug bounty programs to choose the right one Understand basic security concepts and techniques for effective bug hunting Uncover complex vulnerabilities with advanced techniques such as privilege escalation Who this book is for This book is for anyone interested in learning about bug bounties, from cybersecurity and ethical hacking enthusiasts to students and pentesters. …”
Libro electrónico -
8847Publicado 2018“…The patient was given the task to be a mass-"killer" of animals instead of being a hunted one.This book most clearly illustrates how the transgenerational transmission of trauma takes place and how the impact of war continues in future generations. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
8848Publicado 2018“…Colonialism, Culture, Whales: The Cetacean Quartet explores how our attitudes to whales, whale hunting, and whale watching expose colonial attitudes to the natural world in modern Western culture. …”
Libro electrónico -
8849Publicado 2013“…In this breakthrough introduction to modern product design, Etsy Creative Director Randy Hunt explains the skills, processes, types of tools, and recommended workflows for creating world-class web products. …”
Libro electrónico -
8850Publicado 2018“…Its archival records on customs mainly concern matters in Holstein and Lauenburg, but also in Lübeck; the archival records on domains and on forestry and hunting, on the other hand, relate without exception to the Duchy of Schleswig…”
Libro electrónico -
8851por Larsson, Jesper“…The early modern period was a transforming phase of property rights due to fundamental changes in Sami economy: from an economy based on fishing and hunting to an economy where reindeer pastoralism became the main occupation for many Sami. …”
Publicado 2022
Libro electrónico -
8852Publicado 2006Tabla de Contenidos: “…Behavioral Ecology and the Transition from Hunting and Gathering to Agriculture -- 2. A Future Discounting Explanation for the Persistence of a Mixed Foraging-Horticulture Strategy among the Mikea of Madagascar -- 3. …”
Libro electrónico -
8853Publicado 2013“…The author brings to light the pre-eminent forms of our relationship with the past through an analysis going from historiography to philosophy - from Pierre Nora, Carlo Ginzburg, Lynn Hunt to Hayden White, Jacques Derrida, Frank Ankersmit; from the New Cultural History and the histoire de la mémoire to the narrativism and to the philosophies of the historical sublime. …”
Libro electrónico -
8854Publicado 2010“…La película recorre la exposición celebrada en el Museo del Prado con cuadros del Museo de Arte de Ponce, sumergiéndonos en el mundo de John Everett Millais, Dante Gabriel Rossetti, Holman Hunt, Edward Burne-Jones, Frederick Leighton y Thomas Seddon. …”
Ver más información
Disco de vídeo -
8855Publicado 2011“…Dans tous les cas, cette intime obsession, cette hantise les oblige à trouver leur propre voix, chercher leur propre espace et plus largement, décider du sens qu’ils donnent à leur propre quête. …”
Libro electrónico -
8856Publicado 2019“…We also learn about implicit and explicit waits with Selenium WebDriver and Python, a key concept used to speed up the runtime of your acceptance tests. By implementing a Continuous Integration pipeline that runs your tests whenever you make any changes, you'll have much higher project quality so that you don't miss any annoying bugs. …”
-
8857Publicado 2019“…In this video you'll see how to make components in Blazor that communicate efficiently with each other and the Blazor runtime libraries in order to accomplish your application goals. …”
-
8858Publicado 2022“…What You Will Learn What are the core concepts and essential Java data types How to work with operators, execution, exceptions, methods, class design and more How to work with the collections framework and its some methods How to use variables and scopes to store and reference data How to loop and branch code and make runtime decisions How to handled errors and exceptions correctly How to design classes using interfaces, abstract classes and encapsulation Who This Video Is For Java developers that want to formalize their current knowledge by obtaining an official Oracle certificate; recent computer science graduates who what to distinguish themselves from the crowd and specialize in Java development with a highly sort after certificate; already certified Java developers who want to upgrade their knowledge of Java; Java developers who want to take the upgrade exam (1Z0-817 - those with OCP Java 6/7/8); and junior developers who just want to learn about a specific topic covered by one or more of the modules…”
Video -
8859Publicado 2019“…Throughout this book, you will learn how to encrypt Ansible content at rest and decrypt data at runtime. Next, this book will act as an ideal resource to help you master the advanced features and capabilities required to tackle complex automation challenges. …”
Libro electrónico -
8860Publicado 2018“…Microsoft MVP Dino Esposito shows how to: Create new projects and understand their structure Set up and use the familiar MVC application model in ASP.NET Core Write controller class code to govern all stages of request processing Serve HTML from controllers, or directly via Razor Pages Master the Razor language for quickly defining the layout of HTML views Manage cross-cutting concerns such as global configuration data, error and exception handling, controller class design, and dependency injection Secure applications with user authentication and ASP.NET Core’s policy-based user authorization API Design for efficient data access, and choose the right option for reading and writing data Build ASP.NET Core Web APIs that return JSON, XML, or other data Use data binding to programmatically update visual components with fresh information Build device-friendly web views for iOS and Android Explore the radically new ASP.NET Core runtime environment and Dependency Injection (DI) infrastructure…”
Libro electrónico