Mostrando 3,361 - 3,380 Resultados de 3,562 Para Buscar 'Uberach~', tiempo de consulta: 1.35s Limitar resultados
  1. 3361
    Publicado 2014
    “…Heather Buckley, Co-Founder and Director of Silicon Beach Training "This book will help everyone understand that a few small changes can add up to big changes in our happiness and success." …”
    Libro electrónico
  2. 3362
    Publicado 2003
    “…In the following months, beaches and cliffs were affected by the oil slick, threatening the delicate ecological balance of Galicia, one of the areas of the world richest in marine biodiversity. …”
    DVD
  3. 3363
    Publicado 2018
    “…[This book provides an overview of] how mediation mitigates difficulties in such IP areas as the following: disputes on trademarks, designs, patents, copyrights and other IP rights; allegations of breach of contract; licences and transfers; and R&D cooperation agreements. …”
    Libro electrónico
  4. 3364
    Publicado 2023
    “…In this focused guide, you'll explore relevant, real-world examples like protecting secrets in a code repository, securing keys with HashiCorp Vault, and adding layers to maintain protection after a breach. Along the way, you'll pick up secrets management techniques you can use outside Kubernetes, as well…”
    Libro electrónico
  5. 3365
    Publicado 2021
    “…The book includes an overall account of the contemporary laws of war and delves into whether states should be able to continue to claim so-called 'belligerent rights' over their enemies and those accused of breaching expectations of neutrality. A central claim in the book is as follows: while there is general agreement that war has been abolished as a legal institution for settling disputes, the time has come to admit that the belligerent rights that once accompanied states at war are no longer available. …”
    Libro
  6. 3366
    Publicado 2016
    “…Internet-enabled devices creep into the spaces we inhabit, and these devices report back on spatial conditions such as light, radiation, air quality and temperature, count the number of people stopping at retail displays minute by minute, detect intruders and security breaches, monitor locations and track characteristics of equipment and supply chain elements, enable us to open locked doors remotely using our mobile devices, and pass terabytes of data to backend systems that analyze, report, and modify the environments we occupy. …”
    Libro electrónico
  7. 3367
    Publicado 2009
    “…Manage network equipment with Best Common Practices Enhance scalability by adjusting network designs and protocols Combine the IGP and BGP networks of two merging companies Perform network audits Identify JUNOScripting techniques to maintain high availability Secure network equipment against breaches, and contain DoS attacks Automate network configuration through specific strategies and tools This book is a core part of the Juniper Networks Technical LibraryTM…”
    Libro electrónico
  8. 3368
    Publicado 2022
    “…The skills you acquire in this cybersecurity book will help you deal with all types of modern malware, strengthen your defenses, and prevent or promptly mitigate breaches regardless of the platforms involved. By the end of this book, you will have learned how to efficiently analyze samples, investigate suspicious activity, and build innovative solutions to handle malware incidents…”
    Libro electrónico
  9. 3369
    Publicado 2024
    “…In its latest third edition, this book goes further to guide you on how to setup your labs and explains breaches using enterprise networks. This book is designed for newcomers and those curious about penetration testing, this guide is your fast track to learning pentesting with Kali Linux 2024.x. …”
    Libro electrónico
  10. 3370
    Publicado 2022
    “…Web application security is the process of securing websites, web applications, and other internet-based services from cyber-attacks, breaches, and security threats that leverage loopholes, misconfigurations, and vulnerabilities in these applications or their codes. …”
    Video
  11. 3371
    Publicado 2024
    “…As the course advances, discover methods to identify internal server errors and data leaks in URLs—common breaches that pose significant security threats. Learn how to spot insecure HTTP web pages that could jeopardize both user and organizational safety. …”
    Video
  12. 3372
    por Cartwright, John, 1957-
    Publicado 2013
    “…After a general introduction to the common law system-how a common lawyer reasons and finds the law-the book explains the principles of the law of contract in English law covering all the aspects of a contract from its formation to the remedies available for breach, whilst directing attention in particular to those areas where the approach of English law is in marked contrast to that taken in many civil law systems…”
    Libro
  13. 3373
    Publicado 2009
    “…Mientras nieva su noche de bodas, los recién casados John y Jenny Grogan deciden que dejarán atrás los duros inviernos de Michigan para iniciar sus nuevas vidas en la soleada West Palm Beach, Florida. Los dos consiguen empleo con dos periódicos rivales, compran su primera casa y se abren camino mientras enfrentan los retos del matrimonio, nuevas carreras y quizá la llegada de un nuevo miembro a la familia. …”
    Video
  14. 3374
    Publicado 2017
    “…Beaches are places that give and take, bringing unexpected surprises to society, and pulling essentials away from it. …”
    Libro electrónico
  15. 3375
    Publicado 2018
    “…Die Ausschließlichkeit hat aber eine Kehrseite: Verbietet der Rechtsinhaber Nutzungen, ohne sie (auf eine bestimmte Art) selbst vorzunehmen, liegen vergriffene Werke brach, werden Innovationen behindert und wissenschaftliche Zeitschriften prohibitiv verteuert. …”
    Libro electrónico
  16. 3376
    por Rummler, Geary A.
    Publicado 1995
    “…With multiple charts, checklists, hands-on tools, and case studies, Rummler and Brache document how they have implemented this Performance Improvement and Management methodology in over 250 successful projects with clients such as Hewlett-Packard, 3M, Shell Oil, and Citibank…”
    Libro electrónico
  17. 3377
    por Southwick, Steven M.
    Publicado 2012
    “…Maybe you were on the beach in Thailand during a tsunami, or in New Orleans during Hurricane Katrina. …”
    Libro electrónico
  18. 3378
    Publicado 2018
    “…This was a moral-patriotic framework, born of both pre-war socio-cultural norms and daily interaction with the enemy, that guided conduct and was especially concerned with what was considered acceptable and unacceptable behaviour. Those who breached the limits of this occupied culture faced criticism and sometimes punishment. …”
    Libro electrónico
  19. 3379
    por Wittkop, Jeremy. author
    Publicado 2016
    “…Budgets have increased and executives are implementing stronger defenses. Nonetheless, breaches continue to increase in frequency and scope. …”
    Libro electrónico
  20. 3380
    Publicado 2018
    “…Finally, you will cover injection attacks, a common exploit technique used to detect flaws and breaches in websites. What You Will Learn Exploit your network and perform penetration tests Footprint and scan networks and websites for vulnerabilities Be aware of key vulnerabilities to watch out for within your network and website Who This Video Is For Network security experts, web security specialists, application security experts, penetration testers, and ethical hackers…”
    Video