Mostrando 545,181 - 545,200 Resultados de 674,389 Para Buscar 'OR*', tiempo de consulta: 1.17s Limitar resultados
  1. 545181
    por Bouzid, Mohamed. author
    Publicado 2020
    “…Webpack has become one of the most popular module bundlers in recent years; it’s widely used by developers, companies, and organizations of all sizes, and many web frameworks use it for the management of their assets. …”
    Libro electrónico
  2. 545182
    Publicado 2020
    “…In this mini-encyclopedia, third-generation programmer Matthew Parker introduces you to 27 successful patterns used in organizations that follow distinctive methodologies such as Scrum, Extreme Programming, SAFe (Scaled Agile Framework), and others. …”
    Libro electrónico
  3. 545183
    Publicado 2012
    “…W trakcie lektury poznasz najlepsze sposoby projektowania wydajnej sieci SOHO VoIP oraz wykorzystania adresów IPv6. Twoją szczególną ciekawość powinny wzbudzić rozdziały poświęcone bezpieczeństwu. …”
    Libro electrónico
  4. 545184
    Publicado 2021
    Libro electrónico
  5. 545185
    Publicado 2018
    Tabla de Contenidos: “…-- 5.1.1 Early symmetric cryptography -- 5.1.2 Diffie-Hellman and RSA -- 5.1.3 Public-key infrastructures -- 5.1.4 SSL and TLS -- 5.2 Understanding SSL/TLS -- 5.2.1 The certificate chain -- 5.2.2 The TLS handshake -- 5.2.3 Perfect forward secrecy -- 5.3 Getting applications to use HTTPS -- 5.3.1 Obtaining certificates from AWS -- 5.3.2 Obtaining certificates from Let's Encrypt -- 5.3.3 Enabling HTTPS on AWS ELB -- 5.4 Modernizing HTTPS -- 5.4.1 Testing TLS -- 5.4.2 Implementing Mozilla's Modern guidelines -- 5.4.3 HSTS: Strict Transport Security -- 5.4.4 HPKP: Public Key Pinning -- Summary -- Chapter 6: Security layer 4: securing the delivery pipeline -- 6.1 Access control to code-management infrastructure -- 6.1.1 Managing permissions in a GitHub organization…”
    Libro electrónico
  6. 545186
    Publicado 2016
    “…Since its inception, the development of resilience engineering as a concept and a field of practice has insisted on expanding the scope from a preoccupation with failure to include also the acceptable everyday functioning of a system or an organisation. The preoccupation with failures and adverse outcomes focuses on situations where something goes wrong and the tries to keep the number of such events and their (adverse) outcomes as low as possible. …”
    Libro electrónico
  7. 545187
    Publicado 2020
    Libro electrónico
  8. 545188
    Publicado 2020
    “…This report demonstrates the market opportunity for conversational AI and outlines the use cases that will enhance your customer service and drive value across your organization. IBM AI experts Vivian Lee, Brian Loveys, Aameek Singh, and Robert Yates show customer service executives and line-of-business professionals how enterprises are applying conversational AI and how they can integrate it into their business in three areas: customer-facing AI assistants, agent-supporting AI assistants, and internal employee-facing assistants. …”
    Libro electrónico
  9. 545189
    Publicado 2020
    “…SQL injection is a serious web security risk for many organizations used to gather sensitive information from websites. …”
    Video
  10. 545190
    Publicado 2018
    Libro electrónico
  11. 545191
    Publicado 2018
    Libro electrónico
  12. 545192
    Publicado 2020
    “…This report examines 10 organizations that have implemented continuous delivery in the real world. …”
    Libro electrónico
  13. 545193
    Publicado 2018
    Libro electrónico
  14. 545194
    Publicado 2020
    “…Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide presents you with an organized test-preparation routine using proven series elements and techniques. …”
    Libro electrónico
  15. 545195
    Publicado 2020
    Tabla de Contenidos: “…Chapter 1: General Security Concepts and Trends -- Chapter 2: Network Fundamentals Infrastructure Security -- Chapter 3: Wireless and Intrusion Detection System Network Security -- Chapter 4: Role of People in Security—Operational and Organizational Security -- Chapter 5: Risk Management -- Chapter 6: Change Management and Disaster Recovery -- Chapter 7: Physical Security -- Chapter 8: Forensics, Legal Issues, and Privacy -- Chapter 9: Attacks -- Chapter 10: Network Attacks -- Chapter 11: Baseline and Secure Software Development -- Chapter 12: Email, Instant Messaging, and Web Components -- Chapter 13: Authentication and Remote Access -- Chapter 14: Access Control and Privilege Management -- Chapter 15: Cryptography -- Chapter 16: Public Key Infrastructure -- Glossary…”
    Libro electrónico
  16. 545196
    Publicado 2019
    Tabla de Contenidos: “…Modules and program organization -- 4.1. Basics of module creation and use -- 4.2. …”
    Libro electrónico
  17. 545197
    Publicado 2018
    Libro electrónico
  18. 545198
    Publicado 2019
    “…The most successful organizations today use cloud native to develop innovative software products and services with speed and scalability not possible with the static waterfall development method. …”
    Libro electrónico
  19. 545199
    Publicado 2019
    “…Off loading to physical tape behind a TS7700 is utilized by hundreds of organizations around the world. Using the same hierarchical storage techniques, the TS7700 can also off load to object storage. …”
    Libro electrónico
  20. 545200
    Publicado 2019
    Libro electrónico