Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 270
- Literatura cristiana oriental 240
- Management 213
- Patrística siria 208
- Application software 207
- Engineering & Applied Sciences 201
- Computer security 174
- Security measures 174
- Computer networks 159
- Computer Science 134
- Business & Economics 131
- History 122
- Leadership 120
- Artificial intelligence 111
- Computer programs 107
- Cloud computing 98
- Computer software 97
- Operating systems (Computers) 93
- Web site development 92
- Historia 91
- Data processing 80
- Computer programming 77
- Finance 72
- Technology: general issues 72
- Social aspects 69
- Database management 68
- Information technology 67
- Photography 67
- Web sites 66
- Design 64
-
8221Publicado 2018“…Build vital connections to accelerate your career success Managing Up is your guide to the most valuable 'soft skill' your career has ever seen. It's not about sucking up or brown-nosing; it's about figuring out who you are, who your boss is, and finding where you meet. …”
Libro electrónico -
8222Publicado 2019“…Review the essentials of Authentication, Authorization, and Accounting (AAA) Explore the RADIUS and TACACS+ AAA protocols, and administer devices with them Enforce basic network access control with the Cisco Identity Services Engine (ISE) Implement sophisticated ISE profiling, EzConnect, and Passive Identity features Extend network access with BYOD support, MDM integration, Posture Validation, and Guest Services Safely share context with ISE, and implement pxGrid and Rapid Threat Containment Integrate ISE with Cisco FMC, WSA, and other devices Leverage Cisco Security APIs to increase control and flexibility Review Virtual Private Network (VPN) concepts and types Understand and deploy Infrastructure VPNs and Remote Access VPNs Virtualize leading Cisco Security products Make the most of Virtual Security Gateway (VSG), Network Function Virtualization (NFV), and microsegmentation…”
Libro electrónico -
8223Publicado 2017“…Whatever your needed transformation may be: a new initiative, a new market, a new product, your fresh strategy is up against a powerful foe: an organization's tendency to stay very busy and completely engaged what it's already doing. …”
Libro electrónico -
8224Publicado 2008“…You’ll learn how to: · Mitigate unique risks associated with Ajax, including overly granular Web services, application control flow tampering, and manipulation of program logic · Write new Ajax code more safely—and identify and fix flaws in existing code · Prevent emerging Ajax-specific attacks, including JavaScript hijacking and persistent storage theft · Avoid attacks based on XSS and SQL Injection—including a dangerous SQL Injection variant that can extract an entire backend database with just two requests · Leverage security built into Ajax frameworks like Prototype, Dojo, and ASP.NET AJAX Extensions—and recognize what you still must implement on your own · Create more secure “mashup” applications Ajax Security will be an indispensable resource for developers coding or maintaining Ajax applications; architects and development managers planning or designing new Ajax software, and all software security professionals, from QA specialists to penetration testers…”
Libro electrónico -
8225Publicado 2005“…Highlighting today's best practices, they show how to write programs that are safe, can be built quickly, and yet offer outstanding performance. …”
Libro electrónico -
8226Publicado 2013“…Weston offers practical guidelines for assessing how much debt is safe -- and compassionate, realistic guidance if you've gone beyond the safety zone. …”
Libro electrónico -
8227Publicado 2014“…14 types of hostile mobs Get friendly mobs on your side and build automated farms Brew potions to cure ills, gain superpowers, and throw at enemies Transform your shelter into a palace (or a secret underwater base) Create new worlds and master the fine art of terraforming Learn the secrets of redstone devices, and build incredible rail systems Play safely through The Nether and The End Minecraft is a trademark of Mojang Synergies / Notch Development AB. …”
Libro electrónico -
8228por Hollitzer Verlag“…The Diaries, Volume II, continue after the death of Marina Tsvetaeva, he returns to Moscow, where he could stay with aunt Lilja, a sister of his father, living off from selling items that he inherited from his mother. …”
Publicado 2022
Libro electrónico -
8229Publicado 2016“…Add Depth with Foreground 21. Keep an Eye on the Sky, and Watch the Clock 26. Setting the Scene 33. …”
Libro electrónico -
8230Publicado 2013“…This Guide’s quick, easy coverage includes Planning a site that will be easy to build and manage Installing Drupal and setting it up to work reliably and securely Quickly finding the Drupal tools and features you’re looking for Mastering an easy 3-step workflow for creating new content Delivering more interesting content with fields and new content types Creating intuitive site structures and user navigation Adding powerful site features with just a few clicks Completely redesigning your site in minutes with Themes Adding site search, registration, and more Presenting content in tables, lists, grids, or photo galleries Creating advanced layouts and 2- or 3-column designs Controlling what users on your site can see and do Preparing your site for launch Administering and updating a live site efficiently and safely Drupal 7 Explained requires absolutely no experience with Drupal, content management, website construction, programming, scripting, or even HTML. …”
Libro electrónico -
8231Publicado 2002“…These factors combined make this the one reference that every developer and system administrator should have. .NET Framework Security provides An extensive introduction to explanation of Code Access Security, the powerful new security system shipping in the .NET Framework Information on how to write and test safe applications using the .NET Framework Extensive coverage on how to effectively administer .NET Framework security In-depth introduction to the cryptography library shipping in the .NET Framework, including an introduction to XML digital signatures An overview of all of the new security features available in .NET Code samples that can be used to implement security on your own Web site or application Step-by-step guidelines for modifying the various configuration files associated with .NET, and an explanation of the elements involved Instructions for all of the aspects of security in the CLR and what it means How to use ASP.NET to create a secure application Explanations for using the CryptoAPI libraries to create your own custom functionality Guidelines on how to create secure network applications as well as applications that exist on the Internet Detailed examples of how to establish security parameters in IIS that relate to ASP.NET Instructions for administering .NET applications hosted in IE 067232184XB04232002…”
Libro electrónico -
8232Publicado 2008“…Surf the web so you can view and use standard web pages on a mobile device. Stay on schedule with Calendar manager sync’d to your Outlook or iCal calendar (or both). …”
Libro electrónico -
8233Publicado 2006“…Drawing on dozens of practical examples and real case studies, Weissman shows presenters how to identify their real goals and messages before they even open PowerPoint; how to stay focused on what their listeners really care about; and how to capture their audiences in the first crucial 90 seconds. …”
Libro electrónico -
8234Publicado 2007“…With clear and simple explanations that say, “You, too, can understand this,” and brilliant, full-color illustrations, How Digital Photography Works, Second Edition , gives you detailed information on the hidden workings of digital cameras, professional picture-taking techniques, and even photo-editing software. …”
Libro electrónico -
8235Publicado 2006“…Real World Digital Audio will show you how to Choose the right software and hardware to fit your musical direction—and your budget Optimize your setup for maximum recording quality and reliability Choose and strategically place microphones for different recording situations Use loops and grooves to create backing tracks, DJ, and enhance live performances Master MIDI and audio editing techniques to make expressive, polished tracks Create dynamic sounds with audio effects, synthesizers, and soft synths Generate publication-quality notated scores on your desktop Mix, master, and share professional recordings, online music, and video soundtracks The DVD included with this book is a cross-platform data DVD compatible with both Mac and Windows computers. …”
Libro electrónico -
8236por Linthicum, David S., 1962-“…Other key topics include integrating packaged applications such as SAP R/3 and PeopleSoft, integrating the supply chain using EAI, the role of XML, and process automation. …”
Publicado 2000
Libro electrónico -
8237Publicado 2008“…He is currently a senior technical instructor and certified Cisco Systems instructor for SkillSoft. He lives with his wife and daughter in Florida. …”
Libro electrónico -
8238Publicado 1998“…Web servers that can support servlets include: Apache, Netscape's FastTrack and Enterprise Servers, Microsoft's IIS, O'Reilly's WebSite, and JavaSoft's Java Web Server. The beauty of servlets is that they execute within the Web server's process space and they persist between invocations. …”
Libro electrónico -
8239Publicado 2005“…. • Experience the fiscal and personal benefits of being “hard on the problem and soft on the people.” • Replace bitterness about the past with shared responsibility for the future. • Create a blame-resistant, emotionally resilient workforce. …”
Libro electrónico -
8240Publicado 2009“…They're the first generation to have literally grown up digital--and they're part of a global cultural phenomenon that's here to stay. The bottom line is this: If you understand the Net Generation, you will understand the future. …”
Libro electrónico