Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Biblia 3,665
- Bible 1,923
- Bíblia 1,428
- Historia 1,177
- RELIGION 1,042
- Development 808
- Application software 802
- Engineering & Applied Sciences 770
- Management 648
- Crítica e interpretación 551
- Computer Science 516
- Història 512
- History 456
- Computer networks 447
- Mss 430
- Data processing 412
- Cloud computing 375
- Criticism, interpretation, etc 374
- Computer programs 371
- Operating systems (Computers) 348
- Programming 343
- Comentarios 304
- Security measures 276
- Artificial intelligence 272
- Business & Economics 271
- Crítica, interpretación, etc 266
- Database management 262
- Testigos de Jehová 262
- iOS (Electronic resource) 261
- Crítica, interpretació, etc 249
-
53021Publicado 2024Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Part 1: The Background -- Chapter 1: Introduction to Intrusion Detection and Prevention -- The need for information security -- Defense-in-depth strategy -- Firewalls (network and host layers) -- Intrusion detection and prevention systems (network and host layers) -- Endpoint detection and response (host layer) -- Web application firewalls (network and host layers) -- Mail security gateway (network) -- Log management and monitoring (network and host) -- The role of network IDS and IPS -- Types of intrusion detection -- Signature-based intrusion detection -- Anomaly-based intrusion detection -- Hybrid intrusion detection -- The state of the art in IDS/IPS -- Stateful analysis -- Fast packet acquisition -- Parallel processing -- Pattern matching -- Extending rule language -- App and protocol identification -- File analysis -- IDS/IPS metrics -- Detection accuracy -- Performance-related IDS/IPS metrics -- IDS/IPS evaluation and comparison -- Evasions and attacks -- IDS/IPS evasions -- Attacks against the IDS/IPS -- Summary -- Chapter 2: The History and Evolution of Snort -- The beginning of Snort -- Snort 1 - key features and limitations -- Snort 2 - key features, improvements, and limitations -- Snort 2.9 -- The need for Snort 3 -- Summary -- Part 2: Snort 3 - The New Horizon -- Chapter 3: Snort 3 - System Architecture and Functionality -- Design goals -- High performance -- Pluggable modular architecture -- Configurability and customizability -- Efficiency -- Key components -- DAQ module -- Codecs -- Inspectors -- Detection or rule engine -- Configuration module -- Alerting and logging module -- Snort 3 system architecture -- Multithreading -- Packet analysis flow within each Snort thread -- Summary -- Chapter 4: Installing Snort 3.…”
Libro electrónico -
53022Publicado 2024“…Detailed answers and explanations for all questions will enable you to gauge your current skill level and strengthen weak areas. …”
Libro electrónico -
53023Publicado 2023“…Your journey will also involve embracing a service-oriented approach to application security, focusing on risk management, bridging gaps between engineering and security, and the concept of security enablement. Building a roadmap for application security, setting organizational goals, and identifying gaps will be a crucial part of your learning. …”
Video -
53024Publicado 2023“…Monika has founded GenMan Solutions, which is a management and technology-based education company, which aims at providing in-demand and essential business-related courses for students and professionals, enabling them to accelerate their careers, transform into a leadership role, and internalize managerial thinking…”
Video -
53025Publicado 2024“…This revised edition has been updated to reflect all the latest techniques and products, including migration from Skype for Business On-Prem to Microsoft Teams, along with Teams for Education, which includes a range of features and tools that enable teachers and students to collaborate, communicate, and learn in a virtual environment. …”
Libro electrónico -
53026Publicado 2023Tabla de Contenidos: “…Cover -- Preface -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Part 1: Understanding Business Requirements and Automation Needs -- Chapter 1: Process Flows - Understanding Business Requirements -- Types of business requirements -- Identifying the right stakeholders from project teams and SMEs -- Techniques and tools to identify requirements -- Understanding "as-is" and "to-be" business process flows -- Use-case scenario 1 - Partner user onboarding process -- Use-case scenario 2 - Quote approval process -- Tips for success -- Summary -- Questions -- Further reading -- Chapter 2: Identification of Functional Requirements for Automation -- What are functional requirements? …”
Libro electrónico -
53027Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Contributors -- Table of Contents -- Part 1: From PHP to Ruby Basics -- Chapter 1: Understanding the Ruby Mindset and Culture -- Technical requirements -- Ruby is meant to be read as sentences -- Everything is an object -- Transitioning to Ruby -- Summary -- Chapter 2: Setting Up Our Local Environment -- Technical requirements -- Installing Ruby locally -- macOS users -- Windows users -- Linux users -- Using a virtual machine -- VMware -- VirtualBox -- Vagrant -- Using Docker -- Using rbenv -- Summary -- Chapter 3: Comparing Basic Ruby Syntax to PHP -- Technical requirements -- Running Ruby code from the command line -- Running a simple code file -- Loading a source code file with the load method -- Loading a source code file with the require method -- Ruby classes and modules -- The include method -- Interactive Ruby Shell (IRB) -- Exploring types of variables -- Arrays -- Hashes -- Symbols -- Using conditional statements -- The if statement -- The if-else statement -- The ternary operator -- Repeating code with loops -- Using Ruby language enhancements -- The unless sentence -- The until loop -- Automatic returns -- Optional parentheses -- Questionable exclamation method names -- Summary -- Chapter 4: Ruby Scripting versus PHP Scripting -- Technical requirements -- Beyond Hello World -- Text handling -- The upcase method -- The downcase method -- The capitalize method -- File manipulation -- The split() method -- The map() method -- The join() method -- Creating and modifying file contents -- Command-line arguments -- User input -- Putting it all together -- Summary -- Chapter 5: Libraries and Class Syntax -- Technical requirements -- Let's get ready to bundle!!! …”
Libro electrónico -
53028Publicado 2021Tabla de Contenidos: “…Frontmatter -- Acknowledgements -- Contents -- List of Tables -- List of Figures -- Foreword -- Introduction: A Free Wage Labor African Diaspora -- Chapter 1: Surfboats -- Chapter 2: Freetown – A Catalyst for Diaspora -- Chapter 3: The Expansion of Kru Labor in the Royal Navy -- Chapter 4: Kru Labor in Expeditions and Military Campaigns -- Chapter 5: Kru Labor in the British Caribbean -- Chapter 6: Growth in Diaspora and Decline in the Homeland -- Conclusion: Kru Free Wage Laborers in Global History -- Appendix A: Muster Lists, 1819–20 -- Appendix B: Interviews -- Glossary of Kru Language Terms -- Bibliography -- Index…”
Libro electrónico -
53029Publicado 2017“…Docker containers wrap software in a complete filesystem that contains everything it needs to run, enabling any application to be run anywhere - this flexibily and portabily means that you can run apps in the cloud, on virtual machines, or on dedicated servers. …”
Libro electrónico -
53030por Association for Computing Machinery“…The other big trend for FPGAs in the past year has been towards widespread deployment in data centers, with almost all major data center providers enabling access to FPGAs-as-a-Service. At the same time, CPUs and GPUs continue to dominate Supercomputer deployments. …”
Publicado 2019
Libro electrónico -
53031por Association for Computing Machinery“…The other big trend for FPGAs in the past year has been towards widespread deployment in data centers, with almost all major data center providers enabling access to FPGAs-as-a-Service. At the same time, CPUs and GPUs continue to dominate Supercomputer deployments. …”
Publicado 2019
Libro electrónico -
53032Publicado 2020“…This year, UMAP is being held virtually due to Covid-19 pandemic. In order to enable virtual participation from all time zones, every session is repeated twice, with live interaction. …”
Libro electrónico -
53033por Ricoeur, Paul, 1913-2005“…Continúa en ella Ricoeur el debate con la filosofía moral contemporánea (Rawls, Taylor, Apel y Habermas), situándolo en una nueva perspectiva filosófica, y ello por dos razones: en primer lugar, amplía el horizonte histórico, retomando la matriz aristotélica de la filosofía moral (saber prudencial, verdad, bondad) y, en segundo lugar, porque abre horizontes inexplorados para una antropología personalista y comunitaria en tiempos de globalización (solicitud crítica, transculturalidad, hospitalidad)…”
Publicado 2008
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca del Instituto Superior de Teología de las Islas Canarias, Biblioteca Universitat Ramon Llull, Universidad Loyola - Universidad Loyola Granada, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago)Libro -
53034Publicado 2004“…Today, more than ever, companies must protect themselves against unprecedented threats, understand and adhere to a global mosaic of regulations, and leverage security to enable today's business realities. In Mapping Security, global security expert Tom Patterson shows how to meet these challenges by presenting security best practices, rules, and customs for virtually every country where you do business. …”
Libro electrónico -
53035Publicado 2007“…Creveling introduces a Six Sigma-enabled workflow that encompasses strategic product/technology portfolio definition and development, research and technology development (R&TD), tactical design engineering processes for commercialization, and operational production and service support. …”
Libro electrónico -
53036Publicado 2004“…The J2EE(TM) Platform has become the technology of choice for developing professional e-commerce applications, interactive Web sites, and Web-enabled applications and services. Servlet and JSP(TM) technology is the foundation of this platform: it provides the link between Web clients and server-side applications. …”
Libro electrónico -
53037Publicado 2021“…A comprehensive guide to rolling out Datadog to monitor infrastructure and applications running in both cloud and datacenter environmentsKey Features:Learn Datadog to proactively monitor your infrastructure and cloud servicesUse Datadog as a platform for aggregating monitoring efforts in your organizationLeverage Datadog's alerting service to implement on-call and site reliability engineering (SRE) processesBook Description:Datadog is an essential cloud monitoring and operational analytics tool which enables the monitoring of servers, virtual machines, containers, databases, third-party tools, and application services. …”
Libro electrónico -
53038Publicado 2021“…You'll find out how to harness the power of Python and pentesting to enhance your system security.Developers working with Python will be able to put their knowledge and experience to work with this practical guide. …”
Libro electrónico -
53039Publicado 2007“…Understand traditional telephony network concepts and operation as well as the building blocks of packet telephony networks Examine the interactions of telephony operations at an electrical level Evaluate strategies for overcoming specific challenges in a VoIP network, such as the transmission of fax and modem tones Attach a Cisco voice-enabled router to existing telephony devices, such as a PBX or an analog phone Add call-routing intelligence to a Cisco voice-enab..…”
Libro electrónico -
53040por Anderson, George W. (Software architect)“…Anderson offers unparalleled guidance with regard to predicting the impact of system changes—from new hardware to updated NetWeaver-enabled business processes. Along the way, he shows how to make the most of countless optimization and monitoring tools—from free and low-cost technology stack-based utilities to comprehensive, automated SAP testing suites. …”
Publicado 2004
Libro electrónico