Mostrando 44,721 - 44,740 Resultados de 51,016 Para Buscar 'Nontron~', tiempo de consulta: 1.46s Limitar resultados
  1. 44721
    Publicado 2016
    “…What You Will Learn Get the Raspberry Pi set up and running for the first time Remotely connect to the Raspberry Pi and use your PC/laptop instead of a separate screen/keyboard Get to grips with text, files and creating quick menus using Python Develop desktop applications; handle images and process files with ease Make use of graphics and user control to develop your own exciting games Use the Raspberry Pi's powerful GPU to create 3D worlds Take control of the real world and interface with physical hardware, combining hardware and software for your own needs Measure and control processes, respond to real events and monitor through the Internet Learn about the Raspberry Pi hardware inputs/outputs, starting with the basics and beyond Expand the capabilities of the Raspberry Pi with hardware expansion / add-on modules (use analogue inputs, drive servos and motors, and use SPI/I2C) Create your own Pi-Rover or Pi-Hexpod driven by the Raspberry Pi Make use of existing hardware by modifying and interfacing with it using the Raspberry Pi In Detail Raspberry Pi cookbook for Python Programmers is a practical guide for getting the most out of this little computer. …”
    Libro electrónico
  2. 44722
    Publicado 2007
    “…The Smart Way to StudyTM In This Book You’ll Learn How To: Approach the IS audit process from ISACA’s view of IS auditing best practices Relate and apply information security and systems audit best practices to the six CISA job practice areas Understand the IS audit process and learn how to apply best practices to secure an organization’s assets Evaluate IT governance to ensure that the organization has the structure, policies, and mechanisms in place to provide sufficient IS controls Minimize risk within an IT/IS environment by using sound security techniques and practices Assess systems and infrastructure lifecycle practices to determine their effectiveness in meeting security requirements and meeting organizational objectives Gain a deeper understanding of the business continuity and disaster recovery process to help minimize risk Protect key informational assets by examining the security architecture and evaluating controls designed for the protection of confidentiality, availability, and integrity Streamline your exam preparations with our exam insights, tips, and study strategies WRITTEN BY A LEADING CISA EXAM EXPERT! …”
    Libro electrónico
  3. 44723
    Publicado 2017
    “…It was created to solve the dilemma between high-level, slow code with minimal control over the system, and low-level, fast code with maximum system control. …”
    Libro electrónico
  4. 44724
    Publicado 2018
    “…It includes the following advanced functions: Policy management to control physical volume pooling Cache management Redundant copies, including across a grid network Copy mode control TS7700 delivers the following new capabilities: 7 and 8 way Grid support through approved request for price quotation 16 Gb FICON adapter support for TS7760 (R4.1.2) Optimized host data compression which is based on software (not FICON adapter hardware) compression algorithm (R4.1.2) Control-unit initiated reconfiguration (CUIR) for code load improvement (R4.1.2)[ Grid Resiliency Improvements (R4.1.2) System Events Redesign (R4.1.2) Remote System Log Processing Support in (R4.1.2) Improvements to reliability, availability, and serviceability The TS7760T writes data by policy to physical tape through attachment to high-capacity, high-performance IBM TS1150 and IBM TS1140 tape drives installed in an IBM TS4500 or TS3500 tape library. …”
    Libro electrónico
  5. 44725
    Publicado 2004
    “…Among its many enhancements, V8.13 includes new routines that support the SPF sending site authentication standard (in the Milter library), simultaneous connection control, high connection rate control, and finer tuning of SASL parameters. …”
    Libro electrónico
  6. 44726
    Publicado 2018
    “…Instead, you’ll learn a new psychology for turning-around objections and proven techniques that work with today’s more informed, in control, and skeptical buyers. Inside the pages of Objections , you’ll gain deep insight into: How to get past the natural human fear of NO and become rejection proof The science of resistance and why buyers throw out objections Human influence frameworks that turn you into a master persuader The key to avoiding embarrassing red herrings that derail sales calls How to leverage the “Magical Quarter of a Second” to instantly gain control of your emotions when you get hit with difficult objections Proven objection turn-around frameworks that give you confidence and control in virtually every sales situation How to easily skip past reflex r..…”
    Libro electrónico
  7. 44727
    Publicado 2018
    “…You will also get the hang of post-exploitation techniques, including remotely controlling and interacting with the systems that you compromised. …”
    Libro electrónico
  8. 44728
    Publicado 2020
    “…As you advance, you'll see how to control the flow of your programs using control structures and reuse your code using functions. …”
    Libro electrónico
  9. 44729
    Publicado 2020
    “…As you advance, you'll get to grips with controllers and actions to process requests, and later understand how to create HTML inputs for models. …”
    Libro electrónico
  10. 44730
    Publicado 2019
    “…Skill Level Beginner+ Learn How To * Set up the root account and know when to use it* Use access control policies* Understand monitoring and its impact on billing* Use CloudWatch and set up billing alarms* Use tags and implement compliance features* Use data protection mechanisms in AWS* Use CloudTrail, GuardDuty, and Macie for monitoring* Use Control Tower, Security Hub, and AWS Backup to reduce overhead Who Should Take This Course * Anyone getting into AWS for the first time and looking specifically for account setup strategies and best practices* Anyone with a basic knowledge of AWS who has been using it for a while and wants to restart with a strategy in place before account setup Course Requirements Basic understanding of AWS fundamental concepts Lesson Descriptions Lesson 1, "Securing AWS Account Access," covers the basics of account creation, including the root account and when to use it and access control using policies. …”
    Video
  11. 44731
    por Jones, Bradley
    Publicado 2013
    “…Coverage includes: Understanding C program components and structure Mastering essential C syntax and program control Using core language features, including numeric arrays, pointers, characters, strings, structures, and variable scope Interacting with the screen, printer, and keyboard Using functions and exploring the C Function Library Working with memory and the compiler Contents at a Glance PART I: FUNDAMENTALS OF C 1 Getting Started with C 2 The Components of a C Program 3 Storing Information: Variables and Constants 4 The Pieces of a C Program: Statements, Expressions, and Operators 5 Packaging Code in Functions 6 Basic Program Control 7 Fundamentals of Reading and Writing Information PART II: PUTTING C TO WORK 8 Using Numeric Arrays 9 Understanding Pointers 10 Working with Characters and Strings 11 Implementing Structures, Unions, and TypeDefs 12 Understanding Variable Scope 13 Advanced Program Control 14 Working with the Screen, Printer, and Keyboard PART III: ADVANCED C 15 Pointers to Pointers and Arrays of Pointers 16 Pointers to Functions and Linked Lists 17 Using Disk Files 18 Manipulating Strings 19 Getting More from Functions 20 Exploring the C Function Library 21 Working with Memory 22 Advanced Compiler Use PART IV: APPENDIXES A ASCII Chart B C/C++ Reserved Words C Common C Functions D Ans..…”
    Libro electrónico
  12. 44732
    Publicado 2023
    “…When a Snowflake account is delivered there are no controls, guard rails, external monitoring, nor governance mechanisms baked in. …”
    Libro electrónico
  13. 44733
    Publicado 2020
    “…Current research on immunomodulation is focused on understanding the fundamental mechanisms that control the activation and regulation of innate immune cell function. …”
    Libro electrónico
  14. 44734
    Publicado 2023
    “…You will have the knowledge and skills required to do the following: Architect, engineer, integrate, and implement secure solutions across complex environments to support a resilient enterprise This course in the CASP series covers the following topics: Architecture Analyze security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network Services Deperimeterization/zero trust Merging of networks from various organizations Software-defined networking Analyze organizational requirements to determine proper infrastructure security design Scalability Resiliency Automation Performance Containerization Virtualization Content delivery network Caching Integrate software applications securely into an enterprise architecture Baseline and templates Software assurance Considerations of integrating enterprise applications Integrating security into development life cycle Implement data security techniques for securing enterprise architecture Data loss prevention Data loss detection Data classification, labeling, and tagging Obfuscation Anonymization Encrypted versus unencrypted Data life cycle Data inventory and mapping Data integrity management Data storage, backup, and recovery Analyze security requirements and objectives to provide appropriate authentication and authorization controls Credential management Password policies Federation Access control Protocols Multifactor authentication One-time password Hardware root of trust Single sign-on JavaScript Object Notation web token Attestation and identity proofing Implement secure cloud and virtualization solutions Virtualization strategies Provisioning and deprovisioning Middleware Metadata and tags Deployment models and considerations Hosting models Service models Cloud provider limitations Extending appropriate on-premises controls Storage models Explain how cryptography and public key infrastructure support security objectives and requirements Privacy and confidentiality requirements Integrity requirements Non-repudiation Compliance and policy requirements Common cryptography use cases Common Public key infrastructure use cases Explain impact of emerging technologies on enterprise security and privacy Artificial intelligence Machine learning Quantum computing Blockchain Homomorphic encryption Secure multiparty computation Distributed consensus Big Data Virtual reality Three Dimetional printing Passwordless authentication Nano technology Deep learning Biometric impersonation…”
    Video
  15. 44735
    Publicado 2020
    “…"European Citizenship, although derived from the nationalities of the Member States, came to play a significant independent role in reforming European constitutionalism in unanticipated ways by undermining some of the key assumptions underlying the notions of citizenship, equality and democratic accountability. …”
    Libro electrónico
  16. 44736
    Publicado 1979
    “…The present volume consists of two parts, Part I dealing with the natural surroundings and the social and territorial organization of the Sa'dan-Toraja, Part 11 with religious notions, natural and material symbols, and priestly organization. …”
    Libro electrónico
  17. 44737
    por Grenet, Frantz
    Publicado 2016
    “…The notion of Central Asia emerged at a late stage, replacing that of “Tartary”, often associated with the Mongol Terror, in 1825 only. …”
    Electrónico
  18. 44738
    por Berthelot, Francis
    Publicado 2015
    “…Si la figure du marginal s'avère très répandue dans la littérature, la notion même de marginalité appelle quelques éclaircissements. …”
    Electrónico
  19. 44739
    por Lussier, Andre
    Publicado 2006
    Tabla de Contenidos: “…LA GLOIRE ET LA FAUTE; Préface; Table des matières; Remerciements; Avertissement; Introduction; Chapitre 1_Les positions fluctuantes de Freud; Chapitre 2_Les trois concepts et la notion de conflit; Chapitre 3_Présentations cliniques; Chapitre 4_La pensée française; Mot de la fin; Références…”
    Libro electrónico
  20. 44740
    “…SIGMA Brief 3 gives guidance on the notion of a contracting authority/entity under the directives (especially the concept of “a body governed by public law”). …”
    Capítulo de libro electrónico