Mostrando 8,221 - 8,240 Resultados de 9,064 Para Buscar 'Syfy~', tiempo de consulta: 0.60s Limitar resultados
  1. 8221
    Publicado 2018
    “…Build vital connections to accelerate your career success Managing Up is your guide to the most valuable 'soft skill' your career has ever seen. It's not about sucking up or brown-nosing; it's about figuring out who you are, who your boss is, and finding where you meet. …”
    Libro electrónico
  2. 8222
    Publicado 2019
    “…Review the essentials of Authentication, Authorization, and Accounting (AAA) Explore the RADIUS and TACACS+ AAA protocols, and administer devices with them Enforce basic network access control with the Cisco Identity Services Engine (ISE) Implement sophisticated ISE profiling, EzConnect, and Passive Identity features Extend network access with BYOD support, MDM integration, Posture Validation, and Guest Services Safely share context with ISE, and implement pxGrid and Rapid Threat Containment Integrate ISE with Cisco FMC, WSA, and other devices Leverage Cisco Security APIs to increase control and flexibility Review Virtual Private Network (VPN) concepts and types Understand and deploy Infrastructure VPNs and Remote Access VPNs Virtualize leading Cisco Security products Make the most of Virtual Security Gateway (VSG), Network Function Virtualization (NFV), and microsegmentation…”
    Libro electrónico
  3. 8223
    Publicado 2017
    “…Whatever your needed transformation may be: a new initiative, a new market, a new product, your fresh strategy is up against a powerful foe: an organization's tendency to stay very busy and completely engaged what it's already doing. …”
    Libro electrónico
  4. 8224
    Publicado 2008
    “…You’ll learn how to: · Mitigate unique risks associated with Ajax, including overly granular Web services, application control flow tampering, and manipulation of program logic · Write new Ajax code more safely—and identify and fix flaws in existing code · Prevent emerging Ajax-specific attacks, including JavaScript hijacking and persistent storage theft · Avoid attacks based on XSS and SQL Injection—including a dangerous SQL Injection variant that can extract an entire backend database with just two requests · Leverage security built into Ajax frameworks like Prototype, Dojo, and ASP.NET AJAX Extensions—and recognize what you still must implement on your own · Create more secure “mashup” applications Ajax Security will be an indispensable resource for developers coding or maintaining Ajax applications; architects and development managers planning or designing new Ajax software, and all software security professionals, from QA specialists to penetration testers…”
    Libro electrónico
  5. 8225
    Publicado 2005
    “…Highlighting today's best practices, they show how to write programs that are safe, can be built quickly, and yet offer outstanding performance. …”
    Libro electrónico
  6. 8226
    Publicado 2013
    “…Weston offers practical guidelines for assessing how much debt is safe -- and compassionate, realistic guidance if you've gone beyond the safety zone. …”
    Libro electrónico
  7. 8227
    Publicado 2014
    “…14 types of hostile mobs Get friendly mobs on your side and build automated farms Brew potions to cure ills, gain superpowers, and throw at enemies Transform your shelter into a palace (or a secret underwater base) Create new worlds and master the fine art of terraforming Learn the secrets of redstone devices, and build incredible rail systems Play safely through The Nether and The End Minecraft is a trademark of Mojang Synergies / Notch Development AB. …”
    Libro electrónico
  8. 8228
    por Hollitzer Verlag
    Publicado 2022
    “…The Diaries, Volume II, continue after the death of Marina Tsvetaeva, he returns to Moscow, where he could stay with aunt Lilja, a sister of his father, living off from selling items that he inherited from his mother. …”
    Libro electrónico
  9. 8229
    Publicado 2016
    “…Add Depth with Foreground 21. Keep an Eye on the Sky, and Watch the Clock 26. Setting the Scene 33. …”
    Libro electrónico
  10. 8230
    Publicado 2013
    “…This Guide’s quick, easy coverage includes Planning a site that will be easy to build and manage Installing Drupal and setting it up to work reliably and securely Quickly finding the Drupal tools and features you’re looking for Mastering an easy 3-step workflow for creating new content Delivering more interesting content with fields and new content types Creating intuitive site structures and user navigation Adding powerful site features with just a few clicks Completely redesigning your site in minutes with Themes Adding site search, registration, and more Presenting content in tables, lists, grids, or photo galleries Creating advanced layouts and 2- or 3-column designs Controlling what users on your site can see and do Preparing your site for launch Administering and updating a live site efficiently and safely Drupal 7 Explained requires absolutely no experience with Drupal, content management, website construction, programming, scripting, or even HTML. …”
    Libro electrónico
  11. 8231
    Publicado 2002
    “…These factors combined make this the one reference that every developer and system administrator should have. .NET Framework Security provides An extensive introduction to explanation of Code Access Security, the powerful new security system shipping in the .NET Framework Information on how to write and test safe applications using the .NET Framework Extensive coverage on how to effectively administer .NET Framework security In-depth introduction to the cryptography library shipping in the .NET Framework, including an introduction to XML digital signatures An overview of all of the new security features available in .NET Code samples that can be used to implement security on your own Web site or application Step-by-step guidelines for modifying the various configuration files associated with .NET, and an explanation of the elements involved Instructions for all of the aspects of security in the CLR and what it means How to use ASP.NET to create a secure application Explanations for using the CryptoAPI libraries to create your own custom functionality Guidelines on how to create secure network applications as well as applications that exist on the Internet Detailed examples of how to establish security parameters in IIS that relate to ASP.NET Instructions for administering .NET applications hosted in IE 067232184XB04232002…”
    Libro electrónico
  12. 8232
    Publicado 2008
    “…Surf the web so you can view and use standard web pages on a mobile device. Stay on schedule with Calendar manager sync’d to your Outlook or iCal calendar (or both). …”
    Libro electrónico
  13. 8233
    Publicado 2006
    “…Drawing on dozens of practical examples and real case studies, Weissman shows presenters how to identify their real goals and messages before they even open PowerPoint; how to stay focused on what their listeners really care about; and how to capture their audiences in the first crucial 90 seconds. …”
    Libro electrónico
  14. 8234
    Publicado 2007
    “…With clear and simple explanations that say, “You, too, can understand this,” and brilliant, full-color illustrations, How Digital Photography Works, Second Edition , gives you detailed information on the hidden workings of digital cameras, professional picture-taking techniques, and even photo-editing software. …”
    Libro electrónico
  15. 8235
    Publicado 2006
    “…Real World Digital Audio will show you how to Choose the right software and hardware to fit your musical direction—and your budget Optimize your setup for maximum recording quality and reliability Choose and strategically place microphones for different recording situations Use loops and grooves to create backing tracks, DJ, and enhance live performances Master MIDI and audio editing techniques to make expressive, polished tracks Create dynamic sounds with audio effects, synthesizers, and soft synths Generate publication-quality notated scores on your desktop Mix, master, and share professional recordings, online music, and video soundtracks The DVD included with this book is a cross-platform data DVD compatible with both Mac and Windows computers. …”
    Libro electrónico
  16. 8236
    por Linthicum, David S., 1962-
    Publicado 2000
    “…Other key topics include integrating packaged applications such as SAP R/3 and PeopleSoft, integrating the supply chain using EAI, the role of XML, and process automation. …”
    Libro electrónico
  17. 8237
    Publicado 2008
    “…He is currently a senior technical instructor and certified Cisco Systems instructor for SkillSoft. He lives with his wife and daughter in Florida. …”
    Libro electrónico
  18. 8238
    Publicado 1998
    “…Web servers that can support servlets include: Apache, Netscape's FastTrack and Enterprise Servers, Microsoft's IIS, O'Reilly's WebSite, and JavaSoft's Java Web Server. The beauty of servlets is that they execute within the Web server's process space and they persist between invocations. …”
    Libro electrónico
  19. 8239
    Publicado 2005
    “…. • Experience the fiscal and personal benefits of being “hard on the problem and soft on the people.” • Replace bitterness about the past with shared responsibility for the future. • Create a blame-resistant, emotionally resilient workforce. …”
    Libro electrónico
  20. 8240
    Publicado 2009
    “…They're the first generation to have literally grown up digital--and they're part of a global cultural phenomenon that's here to stay. The bottom line is this: If you understand the Net Generation, you will understand the future. …”
    Libro electrónico