Mostrando 7,221 - 7,240 Resultados de 9,082 Para Buscar 'Syfy~', tiempo de consulta: 0.70s Limitar resultados
  1. 7221
    Publicado 2018
    “…With an increase in data recovery and protection problems faced in organizations, it has become important to keep data safe and recoverable. This book contains recipes that will help you upgrade to SCDPM and it covers the advanced features and functionality of SCDPM. …”
    Libro electrónico
  2. 7222
    Publicado 2019
    “…Do you want to Learn Java Step By Step in a Fail Safe in28Minutes Way? Do you want to Learn to Write Great Java Programs? …”
    Video
  3. 7223
    Publicado 2015
    “…CORS is a new web standard that enables safe cross-domain access without complex server-side code. …”
    Libro electrónico
  4. 7224
    Publicado 2014
    “…In addition, this book describes how to use multi-versioning to safely and reliably apply and back out application changes. …”
    Libro electrónico
  5. 7225
    Publicado 2015
    “…You’ll also learn how to re-create classic printmaking techniques using non-toxic digital alternatives, including a water-based transfer solution that’s safe to use anywhere, whether it’s the studio, classroom, or kitchen counter. …”
    Libro electrónico
  6. 7226
    Publicado 2013
    “…In The Alternative Answer , Bob Rice, Bloomberg TV's Alternative Investments Editor, leads an entertaining and easy- to-understand tour of this world, and suggests specific alternative investments for all four key "jobs" of a portfolio: safely generating more current income, decreasing risks of economic shocks, significantly increasing long-term profits, and protecting purchasing power over time. …”
    Libro electrónico
  7. 7227
    Publicado 2019
    “…In the vision of this joint effort, it is only through multidisciplinary engagement and scholarship that we can hope to develop good responses to the challenge of ensuring that AI develops in a way that is safe and beneficial for everyone. This year's conference contributed to building a community of shared concepts and concerns. …”
    Libro electrónico
  8. 7228
    por Thomas, a Charmes, 1703-1765
    Publicado 1790
    Libro
  9. 7229
    Publicado 2006
    “…With User Mode Linux you can create virtual Linux machines within a Linux computer and use them to safely test and debug applications, network services, and even kernels. …”
    Libro electrónico
  10. 7230
    Publicado 2003
    “…Expert solutions for securing network infrastructures and VPNs Build security into the network by defining zones, implementing secure routing protocol designs, and building safe LAN switching environments Understand the inner workings of the Cisco PIX Firewall and analyze in-depth Cisco PIX Firewall and Cisco IOS Firewall features and concepts Understand what VPNs are and how they are implemented with protocols such as GRE, L2TP, and IPSec Gain a packet-level understanding of the IPSec suite of protocols, its associated encryption and hashing functions, and authentication techniques Learn how network attacks can be categorized and how the Cisco IDS is designed and can be set upto protect against them Control network access by learning how AAA fits into the Cisco security model and by implementing RADIUS and TACACS+ protocols Provision service provider security using ACLs, NBAR, and CAR to identify and control attacks Identify and resolve common implementation failures by evaluating real-world troubleshooting scenarios As organizations increase their dependence on networks for core business processes and increase access to remote sites and mobile workers via virtual private networks (VPNs), network security becomes more and more critical. …”
    Libro electrónico
  11. 7231
    Publicado 2005
    “…By explaining how VPNs actually work, networking expert Jon Snader shows software engineers and network administrators how to use tunneling, authentication, and encryption to create safe, effective VPNs for any environment. Using an example-driven approach, VPNs Illustrated explores how tunnels and VPNs function by observing their behavior "on the wire." …”
    Libro electrónico
  12. 7232
    Publicado 2022
    “…This helps you create your own safe hacking lab environment. - Network basics: Here you will learn the basics of networks that will help you understand what should be done before network security testing. - Gather AP information before cracking: In this section, you will learn how you can enumerate the target access point such as ESSID-BSSID-Channel-Encryption type, and so on. …”
    Video
  13. 7233
    Publicado 2022
    “…But once we've successfully connected our devices to the internet, do we have any hope of keeping them, and ourselves, safe from the dangers that lurk beneath the digital waters? …”
    Libro electrónico
  14. 7234
    Publicado 2018
    “…DS2 provides simple, safe syntax for performing complex data transformations in parallel and enables manipulation of native database data types at full precision. …”
    Libro electrónico
  15. 7235
    Publicado 2004
    “…A new edition of this title is available, ISBN-10: 0132354799 ISBN-13: 9780132354790 Completely revised and up-to-date coverage of Multithreading –including the java.util.concurrent library, locks, condition objects, futures, thread pools, thread-safe collections, threads and Swing Collection classes –collections framework, concrete collections, and generic utility methods Annotations and metadata –using annotations to automate programming tasks, JDKTM 5.0 standard annotations, the apt tool for source-level annotation processing, and bytecode engineering Advanced Swing and AWT –lists, trees, tables, and other advanced components; image processing and printing JavaBeansTM –including property editors, customizers, and long-term persistence XML –DOM and SAX parsers, XPath, and XSL transformations The seventh edition of Core JavaTM 2, Volume II, covers advanced user-interface programming and the enterprise features of the Java 2 Platform, Standard Edition (J2SETM). …”
    Libro electrónico
  16. 7236
    Publicado 2003
    “…The CLI, at its heart, is an approach to building software that enables code from many independent sources to co-exist and interoperate safely. Shared Source CLI Essentials is a companion guide to Rotor's code. …”
    Libro electrónico
  17. 7237
    por Mak, Ronald, 1953-
    Publicado 2003
    “…Without getting lost in mathematical detail, you'll learn practical numerical algorithms for safely summing numbers, finding roots of equations, interpolation and approximation, numerical integration, solving differential equations, matrix operations, and solving sets of simultaneous equations. …”
    Libro electrónico
  18. 7238
    Publicado 2009
    “…. • Improving life on the Web: what’s new and different about Chrome, and why you care • Getting from Chrome newbie to power user—fast! • Browsing more safely in the Web jungle • Spit-shining Chrome: making a good-looking browser look spectacular • Optimizing your own web site to make the most of Google Chrome • Tweaking tabs, and more: customizing Chrome to your heart’s content • Saving time with Google Chrome keyboard shortcuts • Troubleshooting problems with Google Chrome, step-by-step • Learning about Chromium (the foundation on which Google Chrome is built) and its components, WebKit, WebKit Core, WebKit Port, and WebKit Glue. …”
    Libro electrónico
  19. 7239
    por Stroustrup, Bjarne
    Publicado 2000
    “…For example: abstract classes as interfaces class hierarchies for object-oriented programming templates as the basis for type-safe generic software exceptions for regular error handling namespaces for modularity in large-scale software run-time type identification for loosely coupled systems the C subset of C++ for C compatibility and system-level work standard containers and algorithms standard strings, I/O streams, and numerics C compatibility, internationalization, and exception safety Bjarne Stroustrup makes C++ even more accessible to those new to the language, while adding advanced information and techniques that even expert C++ programmers will find invaluable…”
    Libro electrónico
  20. 7240
    por Wake, William C., 1960-
    Publicado 2010
    “…You’ll discover how to recognize “code smells,” which signal opportunities for improvement, and then perfect your program’s design one small, safe step at a time. The book shows you when and how to refactor with both legacy code and during new test-driven development, and walks you through real-world refactoring in detail. …”
    Libro electrónico