Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 270
- Literatura cristiana oriental 240
- Management 213
- Patrística siria 208
- Application software 207
- Engineering & Applied Sciences 201
- Computer security 174
- Security measures 174
- Computer networks 159
- Computer Science 134
- Business & Economics 131
- History 122
- Leadership 120
- Artificial intelligence 111
- Computer programs 107
- Cloud computing 98
- Computer software 97
- Operating systems (Computers) 93
- Web site development 92
- Historia 91
- Data processing 80
- Computer programming 77
- Finance 72
- Technology: general issues 72
- Social aspects 69
- Database management 68
- Information technology 67
- Photography 67
- Web sites 66
- Design 64
-
8561por Brown, Jason“…This book will ensure that you can build a reliable cybersecurity framework to keep your organization safe from cyberattacks. This Executive's Cybersecurity Program Handbook explains the importance of executive buy-in, mission, and vision statement of the main pillars of security program (governance, defence, people and innovation). …”
Publicado 2023
Libro electrónico -
8562Publicado 2023“…What you will learn Discover how to quickly scaffold, structure, and build your Golang applications Design and build databases using PostgreSQL and SQLc to generate type-safe SQL code Monitor applications with centralized logging and metrics collection for high performance Explore frontend frameworks and libraries such as Vuetify, Buefy, and Tailwind CSS to build a responsive frontend for your app Communicate securely between the frontend and backend with cookies and session handling with middleware Understand how to package applications using Docker and set up CI pipelines in GitHub Who this book is for This book is for Go programmers who want to combine the power of the Go language with modern web development technologies to build complete web apps from frontend to backend. …”
Libro electrónico -
8563Microsoft defender for endpoint in depth take any organization's endpoint security to the next levelPublicado 2023“…By the end of the book, you'll have a deep understanding of Microsoft Defender for Endpoint and be well equipped to keep your organization safe from different forms of cyber threats. What you will learn Understand the backstory of Microsoft Defender for Endpoint Discover different features, their applicability, and caveats Prepare and plan a rollout within an organization Explore tools and methods to successfully operationalize the product Implement continuous operations and improvement to your security posture Get to grips with the day-to-day of SecOps teams operating the product Deal with common issues using various techniques and tools Uncover commonly used commands, tips, and tricks Who this book is for This book is for cybersecurity professionals and incident responders looking to increase their knowledge of MDE and its underlying components while learning to prepare, deploy, and operationalize the product. …”
Libro electrónico -
8564Publicado 2023“…As you advance, you'll cover practical examples of malware and online game hacking, such as EXE infection, shellcode development, software packers, UAC bypass, path parser vulnerabilities, and digital signature forgery, gaining expertise in keeping your system safe from this kind of malware. By the end of this book, you'll be well equipped to implement the red team techniques that you've learned on a victim's computer environment, attempting to bypass security and antivirus products, to test its defense against Windows APT attacks. …”
Libro electrónico -
8565Publicado 2020“…Risk Assessment also offers new coverage of safe job analysis and semi-quantitative methods, and it discusses barrier management and HRA methods for offshore application. …”
Libro electrónico -
8566Publicado 2024“…What you will learn Develop a solid understanding of Auto-GPT's fundamental principles Hone your skills in creating engaging and effective prompts Effectively harness the potential of Auto-GPT's versatile plugins Tailor and personalize AI applications to meet specific requirements Proficiently manage Docker configurations for advanced setup Ensure the safe and efficient use of continuous mode Integrate your own LLM with Auto-GPT for enhanced performance Who this book is for This book is for developers, data scientists, and AI enthusiasts interested in leveraging the power of Auto-GPT and its plugins to create powerful AI applications. …”
Libro electrónico -
8567Publicado 2023“…By the end, you'll be equipped with the skills to measure the effectiveness of your security program and continuously improve it, staying ahead of attackers and evolving threats. What you will learn Define the scope and challenges of application security Learn to create a DevSecOps pipeline Learn about threat modeling and risk rating Apply security standards, requirements, and maturity models Measure and enhance the effectiveness of your security program Create a roadmap for application security in your organization Audience This course is for software developers, architects that are responsible for developing software and need to know how to integrate with security tools and processes. …”
Video -
8568Publicado 2023“…Whether you are a tech enthusiast staying at the forefront of advancements or a student/educator recognizing AI's transformative potential, this course empowers you to integrate OpenAI's JS APIs seamlessly. …”
Video -
8569Publicado 2023“…His hobbies are soccer (football) and listening to soft music…”
Video -
8570Publicado 2023“…Whether you are a beginner or an experienced developer, this book will serve as a valuable resource if you want to get the most out of LLMs and are looking to stay ahead of the curve in the LLMs and LangChain arena. …”
Libro electrónico -
8571Publicado 2013“…Reflexiones sobre qué supone ser cristiano, cómo vivir en una Iglesia en gran parte escindida, cómo recuperar la ilusión perdida tras el Concilio Vaticano II, cómo continuar siendo católico cuando, desde la jerarquía, se vive en el reino del no, de la desconfianza ante la ciencia, ante los progresos de la medicina, ante el sufrimiento de tantos divorciados católicos que volvieron a contraer matrimonio, ante tanta gente que sufre... Una Iglesia que aparece demasiado frecuentemente como inhumana, que es lo peor que le puede pasar a la Iglesia católica...Reflexiones más personales acerca de la cuestión de Dios, qué decimos cuando decimos «Dios». …”
991008362479706719 -
8572por Teodoreto de Ciro“…Una vez muerto Cirilo de Alejandría, sufre la persecución de su sucesor, Dióscoro de Alejandría, y en el año 449 es condenado al destierro, junto con otros obispos, en el llamado latrocinio de Éfeso. …”
Publicado 2006
Libro -
8573por Moulton Reger, Sara J.“…is a superb account of how to manage the ‘soft side’ of mergers and acquisitions, but it has great value for managing many other new business practices as well, such as Open Innovation. …”
Publicado 2006
Libro electrónico -
8574Publicado 2006“…Garcia, President, Global Rational User Group Council, www.rational-ug.org/index.php "Agile software development is real, it works, and it's here to stay. Now is the time to come up to speed on agile best practices for the Unified Process, and this book provides a great starting point." …”
Libro electrónico -
8575Publicado 2021“…Finally, you'll be able to get remote access to target systems and networks using the tools you develop and modify as per your own requirements.By the end of this ethical hacking book, you'll have developed the skills needed for building cybersecurity tools and learned how to secure your systems by thinking like a hacker.What You Will Learn:Understand the core concepts of ethical hackingDevelop custom hacking tools from scratch to be used for ethical hacking purposesDiscover ways to test the cybersecurity of an organization by bypassing protection schemesDevelop attack vectors used in real cybersecurity testsTest the system security of an organization or subject by identifying and exploiting its weaknessesGain and maintain remote access to target systemsFind ways to stay undetected on target systems and local networksWho this book is for:If you want to learn ethical hacking by developing your own tools instead of just using the prebuilt tools, this book is for you. …”
Libro electrónico -
8576Publicado 2018Tabla de Contenidos: “…Productive thinking in context -- Why think better -- Monkey mind, gator brain, and the elephant's tether -- Productive thinking in principle -- Kaizen vs. Tenkaizen -- Stay in the question -- The miracle of the third third -- Productive thinking in theory -- Productive thinking by design -- Step 1: what's going on? …”
Libro electrónico -
8577WordPress Plugin development cookbook create powerful plugins to extend the world's most popular CMSPublicado 2017“…You will then see how to design administration panels, enhance the post editor with custom fields, store custom data, and modify site behavior based on the value of custom fields. You'll safely incorporate dynamic elements on web pages using scripting languages, and build new widgets that users will be able to add to WordPress sidebars and widget areas. …”
Libro electrónico -
8578Publicado 2017“…Here the book also delves deeply into data manipulation (for example, strings and text files) and you will learn how to create safe and correct Perl 6 modules. You will learn to create software in Perl by following the Object Oriented Paradigm. …”
Libro electrónico -
8579Publicado 2016“…Over 40 recipes for creating cloud-ready Java web applications with Spring MVC About This Book Configure Spring MVC to build logic-less controllers that transparently support the most advanced web techniques Build an amazing social and financial application that applies microservices patterns on deployment, self-testability, interoperability, cloud architectures, and scalability Fast-paced, practical guide to learn how to set up Spring MVC to produce REST resources and templates as required by the latest front-end best practices Who This Book Is For If you are an experienced Java developer, with prior experience in web technologies, and want to step up in your career and stay up-to-date or learn more about Spring Web scalability, this book is for you. …”
Libro electrónico -
8580Publicado 2016“…This course shows you how to do just that, demonstrating how effective Python can be for powerful pentesting that keeps your software safe. Comprising of three key modules, follow each one to push your Python and security skills to the next level. …”
Libro electrónico