Mostrando 6,481 - 6,500 Resultados de 9,082 Para Buscar 'Syfy~', tiempo de consulta: 0.66s Limitar resultados
  1. 6481
    Publicado 2024
    “…Learners will also explore the basics of how malware works and how to set up a safe environment to analyze malware in a lab. This course is meant to be an introduction to simple tools and techniques for those new to cyber security. …”
    Video
  2. 6482
    Publicado 2022
    “…In Secret Key Cryptography: Ciphers, from simple to unbreakable you will: Measure the strength of your ciphers and learn how to guarantee their security Construct and incorporate data-compression codes Generate true random numbers in bulk Construct huge primes and safe primes Add an undetectable backdoor to a cipher Defeat hypothetical ultracomputers that could be developed decades from now Construct 30 unbreakable ciphers Secret Key Cryptography gives you a toolbox of cryptographic techniques and Secret Key methods. …”
    Video
  3. 6483
    Publicado 2023
    “…Maintaining software quality through testing is important for software delivery to occur frequently and safely. But testing is a broad concept that can be applied in a variety of methods across organizations. …”
    Video
  4. 6484
    Publicado 2023
    “…Everyone gets the chance to practice their craft with a real software architecture problem in a safe and social environment, and the finalists and winners earn well-deserved bragging rights (not to mention an intriguing line on their résumé). …”
    Video
  5. 6485
    Publicado 2018
    “…The Kubernetes container orchestration system safely manages the structure and flow of a distributed application, organizing containers and services for maximum efficiency. …”
    Grabación no musical
  6. 6486
    Publicado 2012
    “…The chapters describe ways to make city cycling feasible, convenient, and safe for commutes to work and school, shopping trips, visits, and other daily transportation needs. …”
    Libro
  7. 6487
    Publicado 2020
    “…Suppose you're offered an opportunity to experience something that is unlike anything you have ever encountered, but that's all you know--aside from the fact that the experience is physically safe and morally acceptable. How do you decide whether to take up the offer? …”
    Libro
  8. 6488
    Publicado 2018
    Tabla de Contenidos: “…Steps for adding an administrator -- Steps for removing an administrator -- VPCs and subnets management -- Steps for creating a VPC and subnets -- Steps for deleting a VPC -- Security groups management -- Steps for creating a security group -- Steps for deleting a security group -- Environment management in AWS -- Steps for creating an environment -- Steps for deleting an environment -- User permissions management -- VM migration to Amazon EC2 with AWS Connector for vCenter -- The VM import authorization process -- Virtual machine migration process -- Backing up the instance -- Migrated EC2 instance export process -- Troubleshooting migration -- Validation of the certificates -- VMware Cross-Cloud Model with IBM Cloud -- Prerequisites -- Components/services used in this architecture -- VMware Cloud services architecture on SoftLayer -- Physical infrastructure -- Physical operational model -- Logical operational model -- Cluster (compute, storage, and network) architecture -- Compute clusters -- Management cluster -- Edge cluster -- Storage cluster -- Physical network provided by SoftLayer -- Simplicity -- Scalability -- High bandwidth -- Fault-tolerant transport -- Physical storage -- vSAN -- Network File System (NFS) -- Storage virtualization -- VMware SDS is vSAN -- Virtual Machine Disks (VMDK) -- Virtual infrastructure -- Compute virtualization -- Provisioning -- Resource scheduling -- Availability -- Performance -- Network virtualization -- Network virtualization components -- Distributed virtual switches -- Network I/O control details -- Network virtualization services -- Infrastructure management -- Compute management -- Storage management -- Network management -- Common services -- Identity and access services -- DNS -- NTP services -- Simple Mail Transfer Protocol (SMTP) services -- Certificate Authority (CA) services…”
    Libro electrónico
  9. 6489
    Publicado 2016
    “…In addition, dual emphasis on both tech and soft skills ensures you learn all you need to become a qualified, professional, and customer-friendly technician. …”
    Libro electrónico
  10. 6490
    Publicado 2017
    “…Take your Bootstrap game to the next level with this practical guide About This Book Packed with easy-to-follow recipes on building responsive web pages with Bootstrap 4 that can be applied to a web project of your choice Build intuitive user interfaces that are mobile-ready with the latest features offered by BS4 Stay on top of the changes that Bootstrap 4 brings to front-end development Craft beautiful UIs and learn best practices, tips and tricks for quick, effortless, and proper Bootstrap 4 development Who This Book Is For If you are a web designer or a developer who is familiar with the basics of Bootstrap and now want to build highly responsive and professional web pages using Bootstrap 4, this cookbook is for you. …”
    Libro electrónico
  11. 6491
    Publicado 2018
    “…Discover unique features and powerful capabilities of Scala Programming as you build projects in a wide range of domains Key Features Develop a range of Scala projects from web applications to big data analysis Leverage full power of modern web programming using Play Framework Build real-time data pipelines in Scala with a Bitcoin transaction analysis app Book Description Scala is a type-safe JVM language that incorporates object-oriented and functional programming (OOP and FP) aspects. …”
    Libro electrónico
  12. 6492
    Publicado 2019
    “…You'll then move on to discover a variety of techniques, right from writing memory-safe code, to building idiomatic Rust libraries, and even advanced macros. …”
    Libro electrónico
  13. 6493
    Publicado 2015
    “…It then guides you through connecting switch sensors and LEDs to the native GPIO connector safely, and how to access them using simple Bash scripts. …”
    Libro electrónico
  14. 6494
    Publicado 2004
    “…Expert guidance on designing secure networks Understand security best practices and how to take advantage of the networking gear you already have Review designs for campus, edge, and teleworker networks of varying sizes Learn design considerations for device hardening, Layer 2 and Layer 3 security issues, denial of service, IPsec VPNs, and network identity Understand security design considerations for common applications such as DNS, mail, and web Identify the key security roles and placement issues for network security elements such as firewalls, intrusion detection systems, VPN gateways, content filtering, as well as for traditional network infrastructure devices such as routers and switches Learn 10 critical steps to designing a security system for your network Examine secure network management designs that allow your management communications to be secure while still maintaining maximum utility Try your hand at security design with three included case studies Benefit from the experience of the principal architect of the original Cisco Systems SAFE Security Blueprint Written by the principal architect of the original Cisco Systems SAFE Security Blueprint, Network Security Architectures is your comprehensive how-to guide to designing and implementing a secure network. …”
    Libro electrónico
  15. 6495
    Publicado 2017
    “…What You Will Learn Build a complete WebRTC/SIP VoIP platform able to interconnect and process audio and video in real time Use advanced PBX features to create powerful dialplans Understand the inner workings and architecture of FreeSWITCH Real time configuration from database and webserver with mod_xml_curl Integrate browser clients into your telephony service Use scripting to go beyond the dialplan with the power and flexibility of a programming language Secure your FreeSWITCH connections with the help of effective techniques Deploy all FreeSWITCH features using best practices and expert tips Overcome frustrating NAT issues Control FreeSWITCH remotely with the all-powerful event socket Trace packets, check debug logging, ask for community and commercial help In Detail FreeSWITCH is an open source telephony platform designed to facilitate the creation of voice and chat-driven products, scaling from a soft-phone to a PBX and even up to an enterprise-class soft-switch. …”
    Libro electrónico
  16. 6496
    Publicado 2017
    Tabla de Contenidos: “…-- Summary -- Chapter 6: Infiltrating Sessions via Cross-Site Scripting -- The low-down on XSS types -- Should XSS stay or should it go? -- Location, location, and location! …”
    Libro electrónico
  17. 6497
    Publicado 2019
    “…TABLE OF CONTENTS THE MONOCHROMATIC VISION Past, Present, and Future Thinking in Black and White Contrast Color Implied The Tonal Landscape Visual Implication Seeing in Black and White Pre-Visualization Techniques Black and White Composition Framing Patterns and Lines Shape and Form High Key Low Key Shades of Gray Finding Monochromatic Subjects Black and White at Night Photographing People Portraiture in Black and White BLACK AND WHITE IN THE DIGITAL ERA Digital Black and White Roadmap The RAW Advantage Black and White in Adobe Camera RAW Black and White in Lightroom Grayscale Conversion Using Presets HSL Conversion Exposure Gradients and Adjustments Exporting Virtual Copies into Photoshop as Layers Multiple Layers and Masking in Photoshop Multi-RAW Processing in Photoshop Black and White in Photoshop Blending with Black Using the Channel Mixer Black & White Adjustment Layers Silver Efex Pro Topaz B&W Effects OnOne Perfect B&W The Digital Analog to the Analog Zone System Combining Conversions in Photoshop CREATIVE BLACK AND WHITE OPPORTUNITIES Lighting and Monochromatic Photos Creating High-Key Effects Creating Low-Key Effects HDR in Black and White Shooting for HDR Using HDR Software Toning and Tinting Tinting with a Black & White Adjustment Layer Split Toning The Ansel Adams Effect Selective Color Hand Coloring Using LAB Color Inverting the L Channel Equalizing LAB Channels Swapping Tonalities Using Blending Modes LAB Inversions Soft Focus Adding Soft Focus Pinhole Effect Solarization Using Curves to Solarize an Image Simulating the Blossfeldt Effect Duotone and Tritone Effects Adding and Reducing Noise Film Effects Infrared Camera Conversions Infrared Conversion without an IR Camera Creating X-Ray Images MOBILE BLACK AND WHITE Black and White using a Cell Phone Camera Worki..…”
    Libro electrónico
  18. 6498
    Publicado 2007
    “…. • Find the best places to go if you have special needs. • Stay in touch with family and friends through Internet cafes, laptops, hotspots, and high-tech gadgets. • Take your pet with you! …”
    Libro electrónico
  19. 6499
    Publicado 2018
    “…Learn how to hack systems like black hat hackers and secure them like security experts Key Features Understand how computer systems work and their vulnerabilities Exploit weaknesses and hack into machines to test their security Learn how to secure systems from hackers Book Description This book starts with the basics of ethical hacking, how to practice hacking safely and legally, and how to install and interact with Kali Linux and the Linux terminal. …”
    Libro electrónico
  20. 6500
    Publicado 2020
    “…This third edition of the Drupal Module Development guide covers these new Drupal features, helping you to stay on top of code deprecations and the changing architecture with every release. …”
    Libro electrónico