Mostrando 8,561 - 8,580 Resultados de 9,064 Para Buscar 'Syfy~', tiempo de consulta: 0.65s Limitar resultados
  1. 8561
    por Brown, Jason
    Publicado 2023
    “…This book will ensure that you can build a reliable cybersecurity framework to keep your organization safe from cyberattacks. This Executive's Cybersecurity Program Handbook explains the importance of executive buy-in, mission, and vision statement of the main pillars of security program (governance, defence, people and innovation). …”
    Libro electrónico
  2. 8562
    Publicado 2023
    “…What you will learn Discover how to quickly scaffold, structure, and build your Golang applications Design and build databases using PostgreSQL and SQLc to generate type-safe SQL code Monitor applications with centralized logging and metrics collection for high performance Explore frontend frameworks and libraries such as Vuetify, Buefy, and Tailwind CSS to build a responsive frontend for your app Communicate securely between the frontend and backend with cookies and session handling with middleware Understand how to package applications using Docker and set up CI pipelines in GitHub Who this book is for This book is for Go programmers who want to combine the power of the Go language with modern web development technologies to build complete web apps from frontend to backend. …”
    Libro electrónico
  3. 8563
    Publicado 2023
    “…By the end of the book, you'll have a deep understanding of Microsoft Defender for Endpoint and be well equipped to keep your organization safe from different forms of cyber threats. What you will learn Understand the backstory of Microsoft Defender for Endpoint Discover different features, their applicability, and caveats Prepare and plan a rollout within an organization Explore tools and methods to successfully operationalize the product Implement continuous operations and improvement to your security posture Get to grips with the day-to-day of SecOps teams operating the product Deal with common issues using various techniques and tools Uncover commonly used commands, tips, and tricks Who this book is for This book is for cybersecurity professionals and incident responders looking to increase their knowledge of MDE and its underlying components while learning to prepare, deploy, and operationalize the product. …”
    Libro electrónico
  4. 8564
    Publicado 2023
    “…As you advance, you'll cover practical examples of malware and online game hacking, such as EXE infection, shellcode development, software packers, UAC bypass, path parser vulnerabilities, and digital signature forgery, gaining expertise in keeping your system safe from this kind of malware. By the end of this book, you'll be well equipped to implement the red team techniques that you've learned on a victim's computer environment, attempting to bypass security and antivirus products, to test its defense against Windows APT attacks. …”
    Libro electrónico
  5. 8565
    Publicado 2020
    “…Risk Assessment also offers new coverage of safe job analysis and semi-quantitative methods, and it discusses barrier management and HRA methods for offshore application. …”
    Libro electrónico
  6. 8566
    Publicado 2024
    “…What you will learn Develop a solid understanding of Auto-GPT's fundamental principles Hone your skills in creating engaging and effective prompts Effectively harness the potential of Auto-GPT's versatile plugins Tailor and personalize AI applications to meet specific requirements Proficiently manage Docker configurations for advanced setup Ensure the safe and efficient use of continuous mode Integrate your own LLM with Auto-GPT for enhanced performance Who this book is for This book is for developers, data scientists, and AI enthusiasts interested in leveraging the power of Auto-GPT and its plugins to create powerful AI applications. …”
    Libro electrónico
  7. 8567
    Publicado 2023
    “…By the end, you'll be equipped with the skills to measure the effectiveness of your security program and continuously improve it, staying ahead of attackers and evolving threats. What you will learn Define the scope and challenges of application security Learn to create a DevSecOps pipeline Learn about threat modeling and risk rating Apply security standards, requirements, and maturity models Measure and enhance the effectiveness of your security program Create a roadmap for application security in your organization Audience This course is for software developers, architects that are responsible for developing software and need to know how to integrate with security tools and processes. …”
    Video
  8. 8568
    Publicado 2023
    “…Whether you are a tech enthusiast staying at the forefront of advancements or a student/educator recognizing AI's transformative potential, this course empowers you to integrate OpenAI's JS APIs seamlessly. …”
    Video
  9. 8569
    Publicado 2023
    “…His hobbies are soccer (football) and listening to soft music…”
    Video
  10. 8570
    Publicado 2023
    “…Whether you are a beginner or an experienced developer, this book will serve as a valuable resource if you want to get the most out of LLMs and are looking to stay ahead of the curve in the LLMs and LangChain arena. …”
    Libro electrónico
  11. 8571
    Publicado 2013
    “…Reflexiones sobre qué supone ser cristiano, cómo vivir en una Iglesia en gran parte escindida, cómo recuperar la ilusión perdida tras el Concilio Vaticano II, cómo continuar siendo católico cuando, desde la jerarquía, se vive en el reino del no, de la desconfianza ante la ciencia, ante los progresos de la medicina, ante el sufrimiento de tantos divorciados católicos que volvieron a contraer matrimonio, ante tanta gente que sufre... Una Iglesia que aparece demasiado frecuentemente como inhumana, que es lo peor que le puede pasar a la Iglesia católica...Reflexiones más personales acerca de la cuestión de Dios, qué decimos cuando decimos «Dios». …”
    991008362479706719
  12. 8572
    por Teodoreto de Ciro
    Publicado 2006
    “…Una vez muerto Cirilo de Alejandría, sufre la persecución de su sucesor, Dióscoro de Alejandría, y en el año 449 es condenado al destierro, junto con otros obispos, en el llamado latrocinio de Éfeso. …”
    Libro
  13. 8573
    por Moulton Reger, Sara J.
    Publicado 2006
    “…is a superb account of how to manage the ‘soft side’ of mergers and acquisitions, but it has great value for managing many other new business practices as well, such as Open Innovation. …”
    Libro electrónico
  14. 8574
    Publicado 2006
    “…Garcia, President, Global Rational User Group Council, www.rational-ug.org/index.php "Agile software development is real, it works, and it's here to stay. Now is the time to come up to speed on agile best practices for the Unified Process, and this book provides a great starting point." …”
    Libro electrónico
  15. 8575
    Publicado 2021
    “…Finally, you'll be able to get remote access to target systems and networks using the tools you develop and modify as per your own requirements.By the end of this ethical hacking book, you'll have developed the skills needed for building cybersecurity tools and learned how to secure your systems by thinking like a hacker.What You Will Learn:Understand the core concepts of ethical hackingDevelop custom hacking tools from scratch to be used for ethical hacking purposesDiscover ways to test the cybersecurity of an organization by bypassing protection schemesDevelop attack vectors used in real cybersecurity testsTest the system security of an organization or subject by identifying and exploiting its weaknessesGain and maintain remote access to target systemsFind ways to stay undetected on target systems and local networksWho this book is for:If you want to learn ethical hacking by developing your own tools instead of just using the prebuilt tools, this book is for you. …”
    Libro electrónico
  16. 8576
    Publicado 2018
    Tabla de Contenidos: “…Productive thinking in context -- Why think better -- Monkey mind, gator brain, and the elephant's tether -- Productive thinking in principle -- Kaizen vs. Tenkaizen -- Stay in the question -- The miracle of the third third -- Productive thinking in theory -- Productive thinking by design -- Step 1: what's going on? …”
    Libro electrónico
  17. 8577
    Publicado 2017
    “…You will then see how to design administration panels, enhance the post editor with custom fields, store custom data, and modify site behavior based on the value of custom fields. You'll safely incorporate dynamic elements on web pages using scripting languages, and build new widgets that users will be able to add to WordPress sidebars and widget areas. …”
    Libro electrónico
  18. 8578
    Publicado 2017
    “…Here the book also delves deeply into data manipulation (for example, strings and text files) and you will learn how to create safe and correct Perl 6 modules. You will learn to create software in Perl by following the Object Oriented Paradigm. …”
    Libro electrónico
  19. 8579
    Publicado 2016
    “…Over 40 recipes for creating cloud-ready Java web applications with Spring MVC About This Book Configure Spring MVC to build logic-less controllers that transparently support the most advanced web techniques Build an amazing social and financial application that applies microservices patterns on deployment, self-testability, interoperability, cloud architectures, and scalability Fast-paced, practical guide to learn how to set up Spring MVC to produce REST resources and templates as required by the latest front-end best practices Who This Book Is For If you are an experienced Java developer, with prior experience in web technologies, and want to step up in your career and stay up-to-date or learn more about Spring Web scalability, this book is for you. …”
    Libro electrónico
  20. 8580
    Publicado 2016
    “…This course shows you how to do just that, demonstrating how effective Python can be for powerful pentesting that keeps your software safe. Comprising of three key modules, follow each one to push your Python and security skills to the next level. …”
    Libro electrónico