Mostrando 7,521 - 7,540 Resultados de 9,082 Para Buscar 'Syfy~', tiempo de consulta: 0.66s Limitar resultados
  1. 7521
    por Skoudis, Ed
    Publicado 2004
    “…Reveals how attackers install malicious code and how they evade detection Shows how you can defeat their schemes and keep your computers and network safe! Details viruses, worms, backdoors, Trojan horses, RootKits, and other threats Explains how to handle today's threats, with an eye on handling the threats to come "This is a truly outstanding book-enormous technical wealth and beautifully written." …”
    Libro electrónico
  2. 7522
    Publicado 2008
    “…Windows Home Server is the data equivalent to a home safe. We recommend Paul McFedries’s Microsoft®Windows®Home Server Unleashed as the best first step in getting a strong hold on securing and maintaining personal data at home.” …”
    Libro electrónico
  3. 7523
    Publicado 2018
    “…Real-World SRE goes beyond just reacting to disaster - uncover the tools and strategies needed to safely test and release software, plan for long-term growth, and foresee future bottlenecks. …”
    Libro electrónico
  4. 7524
    Publicado 2018
    “…You'll learn how to solve common problems, save on data usage by connecting to WiFi, and keep your information safe using the iPhone's various security features. …”
    Libro electrónico
  5. 7525
    por Valadares, Eduardo de Campos
    Publicado 2006
    “…From wind tunnels to flying saucers, you’;ll learn exactly how to safely build these experiments, why they work, and what they mean. …”
    Libro electrónico
  6. 7526
    Publicado 2013
    “…The course is designed for Cisco Networking Academy students who want to pursue careers in IT and learn how computers work, how to assemble computers, and how to safely and securely troubleshoot hardware and software issues. …”
    Libro electrónico
  7. 7527
    Publicado 2017
    “…US organizations that process EU residents' personal data will be able to comply with the GDPR via the EU-US Privacy Shield (the successor to the Safe Harbor framework), which permits international data transfers of EU data to US organizations that self-certify that they have met a number of requirements. …”
    Libro electrónico
  8. 7528
    Publicado 2007
    “…Programmers need to know that their code will be safe in an almost infinite number of scenarios and configurations. …”
    Libro electrónico
  9. 7529
    Publicado 2008
    “…Their code is easy to understand, quick to modify, and feels safe and comfortable to work with. If you ask how they thought to write something the way they did, they always have a good reason. …”
    Libro electrónico
  10. 7530
    por Abelar, Greg
    Publicado 2005
    “…Protect critical data and maintain uptime with Cisco ASDM and Cisco Security Agent Understand how attacks can impact your business and the different ways attacks can occur Learn about the defense-in-depth model for deploying firewall and host protection Examine navigation methods and features of Cisco ASDM Set up Cisco ASA, PIX Firewall, and ASDM hardware and software Use the Cisco ASDM startup wizard to safely connect your network to the Internet and securely add public devices such as mail and web servers to your network Authenticate firewall users and users of public web servers Filter traffic and protect your network from perimeter attacks Deploy Cisco Intrusion Prevention System (IPS) to provide more granular traffic inspection and proactive threat response Stop attacks launched at the desktop by deploying Cisco Security Agent Extend the defense-in-depth model to remote users through IPSec virtual private networks (VPN) Enhance your security posture through proper security management Understand the advanced features available in the Cisco PIX version 7 operating system Recover from software failure with Cisco PIX version 7 Many people view security as a “black-box-voodoo” technology that is very sophisticated and intimidating. …”
    Libro electrónico
  11. 7531
    por Carter, Earl
    Publicado 2004
    “…Understand how Cisco IDS can be used to protect, monitor, and enforce physical security policies Review techniques applicable to both network- and host-based platforms Review the security wheel concepts and apply security to AVVID using the SAFE Blueprint Install and configure the Cisco IDS to monitor your network for malicious activity Understand Cisco Threat Response (CTR) benefits and how it operates Apply alarm signatures and gain the proficiency to create your own custom signatures Deploy Cisco IDS effectively in your network using sensor and management platforms Get inside the Cisco Security Agent (CSA) architecture In addition to firewalls and other security appliances intended to limit outsider access to a network, intrusion detection and targeted countermeasures are a critical component of a complete network security plan. …”
    Libro electrónico
  12. 7532
    Publicado 2008
    “…You’ll find answers to all of your questions about getting out of PC pickles, recognizing when you’re headed for trouble, keeping Vista on the straight and narrow, creating a safe and secure PC environment, and even preventing problems down the road. …”
    Libro electrónico
  13. 7533
    Publicado 2009
    “…Duffy aims to give application, system, and library developers the tools and techniques needed to write efficient, safe code for multicore processors. This is important not only for the kinds of problems where concurrency is inherent and easily exploitable—such as server applications, compute-intensive image manipulation, financial analysis, simulations, and AI algorithms—but also for problems that can be speeded up using parallelism but require more effort—such as math libraries, sort routines, report generation, XML manipulation, and stream processing algorithms. …”
    Libro electrónico
  14. 7534
    Publicado 2018
    “…If a product is FDA-approved we feel confident it's safe. If someone makes an untrue claim or breaks an agreement we can sue. …”
    Libro electrónico
  15. 7535
    Publicado 2020
    “…As you advance, you’ll learn how to work with various in-built Dynamics frameworks such as SysOperation, SysTest, and Business Events. Finally, you’ll get to grips with automated build management and workflows for better application state management. …”
    Libro electrónico
  16. 7536
    Publicado 2020
    “…Rather than two separate titles on the new macOS version as we've had in past years, this time we've rolled everything into one: a book that helps you prepare for the new system, safely upgrade your Mac to run Big Sur, and then get to know all the new features. …”
    Libro electrónico
  17. 7537
    Publicado 2018
    “…Combine Clojure's tools for maximum effectiveness as you work with immutable data, functional programming, and safe concurrency to write programs that solve real-world problems. …”
    Libro electrónico
  18. 7538
    Publicado 2020
    “…Get up to speed with effectively securing your cloud systems About This Video Understand the key differences between different hosting environments Learn the basics of cloud computing and cloud architecture Find out how to secure cloud systems with the help of Microsoft Azure In Detail Every organization is now migrating to the cloud to save money, but is it really safe? If you’re looking to learn about the cloud and how to effectively secure it, as well as build your own virtualized networks inside the Microsoft Azure cloud computing platform, then you’re in the right place! …”
    Video
  19. 7539
    Publicado 2018
    “…Learn Google Protobuf with examples and exercises. Write code in Java. Say goodbye to JSON and XML About This Video Learning and getting hands-on on Protocol Buffers helps you to enhance your career opportunities and helps to boost your income. …”
    Video
  20. 7540
    Publicado 2016
    “…It’s a paradigm shift for delivering Internet experiences that’s safe to access, SEO discoverable, works online or offline, and shows up on any device. …”
    Video