Mostrando 53,021 - 53,040 Resultados de 53,879 Para Buscar 'NPBL~', tiempo de consulta: 0.90s Limitar resultados
  1. 53021
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Part 1: The Background -- Chapter 1: Introduction to Intrusion Detection and Prevention -- The need for information security -- Defense-in-depth strategy -- Firewalls (network and host layers) -- Intrusion detection and prevention systems (network and host layers) -- Endpoint detection and response (host layer) -- Web application firewalls (network and host layers) -- Mail security gateway (network) -- Log management and monitoring (network and host) -- The role of network IDS and IPS -- Types of intrusion detection -- Signature-based intrusion detection -- Anomaly-based intrusion detection -- Hybrid intrusion detection -- The state of the art in IDS/IPS -- Stateful analysis -- Fast packet acquisition -- Parallel processing -- Pattern matching -- Extending rule language -- App and protocol identification -- File analysis -- IDS/IPS metrics -- Detection accuracy -- Performance-related IDS/IPS metrics -- IDS/IPS evaluation and comparison -- Evasions and attacks -- IDS/IPS evasions -- Attacks against the IDS/IPS -- Summary -- Chapter 2: The History and Evolution of Snort -- The beginning of Snort -- Snort 1 - key features and limitations -- Snort 2 - key features, improvements, and limitations -- Snort 2.9 -- The need for Snort 3 -- Summary -- Part 2: Snort 3 - The New Horizon -- Chapter 3: Snort 3 - System Architecture and Functionality -- Design goals -- High performance -- Pluggable modular architecture -- Configurability and customizability -- Efficiency -- Key components -- DAQ module -- Codecs -- Inspectors -- Detection or rule engine -- Configuration module -- Alerting and logging module -- Snort 3 system architecture -- Multithreading -- Packet analysis flow within each Snort thread -- Summary -- Chapter 4: Installing Snort 3.…”
    Libro electrónico
  2. 53022
    Publicado 2024
    “…Detailed answers and explanations for all questions will enable you to gauge your current skill level and strengthen weak areas. …”
    Libro electrónico
  3. 53023
    Publicado 2023
    “…Your journey will also involve embracing a service-oriented approach to application security, focusing on risk management, bridging gaps between engineering and security, and the concept of security enablement. Building a roadmap for application security, setting organizational goals, and identifying gaps will be a crucial part of your learning. …”
    Video
  4. 53024
    Publicado 2023
    “…Monika has founded GenMan Solutions, which is a management and technology-based education company, which aims at providing in-demand and essential business-related courses for students and professionals, enabling them to accelerate their careers, transform into a leadership role, and internalize managerial thinking…”
    Video
  5. 53025
    Publicado 2024
    “…This revised edition has been updated to reflect all the latest techniques and products, including migration from Skype for Business On-Prem to Microsoft Teams, along with Teams for Education, which includes a range of features and tools that enable teachers and students to collaborate, communicate, and learn in a virtual environment. …”
    Libro electrónico
  6. 53026
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Preface -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Part 1: Understanding Business Requirements and Automation Needs -- Chapter 1: Process Flows - Understanding Business Requirements -- Types of business requirements -- Identifying the right stakeholders from project teams and SMEs -- Techniques and tools to identify requirements -- Understanding "as-is" and "to-be" business process flows -- Use-case scenario 1 - Partner user onboarding process -- Use-case scenario 2 - Quote approval process -- Tips for success -- Summary -- Questions -- Further reading -- Chapter 2: Identification of Functional Requirements for Automation -- What are functional requirements? …”
    Libro electrónico
  7. 53027
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Contributors -- Table of Contents -- Part 1: From PHP to Ruby Basics -- Chapter 1: Understanding the Ruby Mindset and Culture -- Technical requirements -- Ruby is meant to be read as sentences -- Everything is an object -- Transitioning to Ruby -- Summary -- Chapter 2: Setting Up Our Local Environment -- Technical requirements -- Installing Ruby locally -- macOS users -- Windows users -- Linux users -- Using a virtual machine -- VMware -- VirtualBox -- Vagrant -- Using Docker -- Using rbenv -- Summary -- Chapter 3: Comparing Basic Ruby Syntax to PHP -- Technical requirements -- Running Ruby code from the command line -- Running a simple code file -- Loading a source code file with the load method -- Loading a source code file with the require method -- Ruby classes and modules -- The include method -- Interactive Ruby Shell (IRB) -- Exploring types of variables -- Arrays -- Hashes -- Symbols -- Using conditional statements -- The if statement -- The if-else statement -- The ternary operator -- Repeating code with loops -- Using Ruby language enhancements -- The unless sentence -- The until loop -- Automatic returns -- Optional parentheses -- Questionable exclamation method names -- Summary -- Chapter 4: Ruby Scripting versus PHP Scripting -- Technical requirements -- Beyond Hello World -- Text handling -- The upcase method -- The downcase method -- The capitalize method -- File manipulation -- The split() method -- The map() method -- The join() method -- Creating and modifying file contents -- Command-line arguments -- User input -- Putting it all together -- Summary -- Chapter 5: Libraries and Class Syntax -- Technical requirements -- Let's get ready to bundle!!! …”
    Libro electrónico
  8. 53028
    Publicado 2021
    Tabla de Contenidos: “…Frontmatter -- Acknowledgements -- Contents -- List of Tables -- List of Figures -- Foreword -- Introduction: A Free Wage Labor African Diaspora -- Chapter 1: Surfboats -- Chapter 2: Freetown – A Catalyst for Diaspora -- Chapter 3: The Expansion of Kru Labor in the Royal Navy -- Chapter 4: Kru Labor in Expeditions and Military Campaigns -- Chapter 5: Kru Labor in the British Caribbean -- Chapter 6: Growth in Diaspora and Decline in the Homeland -- Conclusion: Kru Free Wage Laborers in Global History -- Appendix A: Muster Lists, 1819–20 -- Appendix B: Interviews -- Glossary of Kru Language Terms -- Bibliography -- Index…”
    Libro electrónico
  9. 53029
    Publicado 2017
    “…Docker containers wrap software in a complete filesystem that contains everything it needs to run, enabling any application to be run anywhere - this flexibily and portabily means that you can run apps in the cloud, on virtual machines, or on dedicated servers. …”
    Libro electrónico
  10. 53030
    “…The other big trend for FPGAs in the past year has been towards widespread deployment in data centers, with almost all major data center providers enabling access to FPGAs-as-a-Service. At the same time, CPUs and GPUs continue to dominate Supercomputer deployments. …”
    Libro electrónico
  11. 53031
    “…The other big trend for FPGAs in the past year has been towards widespread deployment in data centers, with almost all major data center providers enabling access to FPGAs-as-a-Service. At the same time, CPUs and GPUs continue to dominate Supercomputer deployments. …”
    Libro electrónico
  12. 53032
    Publicado 2020
    “…This year, UMAP is being held virtually due to Covid-19 pandemic. In order to enable virtual participation from all time zones, every session is repeated twice, with live interaction. …”
    Libro electrónico
  13. 53033
    por Ricoeur, Paul, 1913-2005
    Publicado 2008
    “…Continúa en ella Ricoeur el debate con la filosofía moral contemporánea (Rawls, Taylor, Apel y Habermas), situándolo en una nueva perspectiva filosófica, y ello por dos razones: en primer lugar, amplía el horizonte histórico, retomando la matriz aristotélica de la filosofía moral (saber prudencial, verdad, bondad) y, en segundo lugar, porque abre horizontes inexplorados para una antropología personalista y comunitaria en tiempos de globalización (solicitud crítica, transculturalidad, hospitalidad)…”
    Libro
  14. 53034
    Publicado 2004
    “…Today, more than ever, companies must protect themselves against unprecedented threats, understand and adhere to a global mosaic of regulations, and leverage security to enable today's business realities. In Mapping Security, global security expert Tom Patterson shows how to meet these challenges by presenting security best practices, rules, and customs for virtually every country where you do business. …”
    Libro electrónico
  15. 53035
    Publicado 2007
    “…Creveling introduces a Six Sigma-enabled workflow that encompasses strategic product/technology portfolio definition and development, research and technology development (R&TD), tactical design engineering processes for commercialization, and operational production and service support. …”
    Libro electrónico
  16. 53036
    Publicado 2004
    “…The J2EE(TM) Platform has become the technology of choice for developing professional e-commerce applications, interactive Web sites, and Web-enabled applications and services. Servlet and JSP(TM) technology is the foundation of this platform: it provides the link between Web clients and server-side applications. …”
    Libro electrónico
  17. 53037
    Publicado 2021
    “…A comprehensive guide to rolling out Datadog to monitor infrastructure and applications running in both cloud and datacenter environmentsKey Features:Learn Datadog to proactively monitor your infrastructure and cloud servicesUse Datadog as a platform for aggregating monitoring efforts in your organizationLeverage Datadog's alerting service to implement on-call and site reliability engineering (SRE) processesBook Description:Datadog is an essential cloud monitoring and operational analytics tool which enables the monitoring of servers, virtual machines, containers, databases, third-party tools, and application services. …”
    Libro electrónico
  18. 53038
    Publicado 2021
    “…You'll find out how to harness the power of Python and pentesting to enhance your system security.Developers working with Python will be able to put their knowledge and experience to work with this practical guide. …”
    Libro electrónico
  19. 53039
    Publicado 2007
    “…Understand traditional telephony network concepts and operation as well as the building blocks of packet telephony networks Examine the interactions of telephony operations at an electrical level Evaluate strategies for overcoming specific challenges in a VoIP network, such as the transmission of fax and modem tones Attach a Cisco voice-enabled router to existing telephony devices, such as a PBX or an analog phone Add call-routing intelligence to a Cisco voice-enab..…”
    Libro electrónico
  20. 53040
    “…Anderson offers unparalleled guidance with regard to predicting the impact of system changes—from new hardware to updated NetWeaver-enabled business processes. Along the way, he shows how to make the most of countless optimization and monitoring tools—from free and low-cost technology stack-based utilities to comprehensive, automated SAP testing suites. …”
    Libro electrónico