Mostrando 86,121 - 86,140 Resultados de 87,310 Para Buscar 'W1AW~', tiempo de consulta: 1.14s Limitar resultados
  1. 86121
    por Chow, Dennis
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Dedication -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Automating Detection Inputs and Deployments -- Chapter 1: Detection as Code Architecture and Lifecycle -- Understanding detection life cycle concepts -- Establish requirements -- Development -- Testing -- Implementation -- Deprecation -- Conceptualizing detection as code requirements -- Version control systems -- API support -- Use case syntax -- Testing instrumentation -- Secrets management -- Planning automation milestones -- Summary -- Further reading -- Chapter 2: Scoping and Automating Threat-Informed Defense Inputs -- Technical requirements -- Scoping threat-based inputs -- Parsing indicators and payloads -- Lab 2.1 - Custom STIX2 JSON parser -- Lab 2.2 - Automatically block domains with intel feed -- Lab 2.3 - Integrate malicious hashes into Wazuh EDR -- Lab 2.4 - Deploy custom IOCs to CrowdStrike -- Leveraging context enrichment -- Lab 2.5 - Analyze and develop custom detections in Google Chronicle -- Summary -- Further reading -- Chapter 3: Developing Core CI/CD Pipeline Functions -- Technical requirements -- Deploying code repositories -- GitHub usage concepts -- Branching strategy -- Lab 3.1 - Create a new repository -- Setting up CI/CD runners -- Lab 3.2 - Deploy a custom IOA to CrowdStrike Falcon -- Lab 3.3 - CI/CD with Terraform Cloud and Cloudflare WAF -- Lab 3.4 - Policy as Code with Cloud Custodian in AWS -- Lab 3.5 - Custom RASP rule in Trend Micro Cloud One -- Lab 3.6 - Custom detection for Datadog Cloud SIEM with GitHub Actions -- Monitoring pipeline jobs -- Summary -- Chapter 4: Leveraging AI for Use Case Development -- Technical requirements -- Optimizing generative AI usage -- Lab 4.1 - Tuning an LLM-based chatbot -- Experimenting with multiple AI tools -- Lab 4.2 - Exploring SOC Prime Uncoder AI…”
    Libro electrónico
  2. 86122
    Publicado 2024
    Tabla de Contenidos: “…Memory allocations -- Common pitfalls -- CPU profiling -- Memory profiling -- Profiling memory over time -- Preparing to explore the trade-offs -- Summary -- Part 4: Connected Apps -- Chapter 10: Networking -- The net package -- TCP sockets -- HTTP servers and clients -- HTTP verbs -- HTTP status codes -- Putting it all together -- Securing the connection -- Certificates -- Advanced networking -- UDP versus TCP -- Summary -- Chapter 11: Telemetry -- Technical requirements -- Logs -- Zap versus slog -- Logging for debugging or monitoring? -- What to log? -- What not to log? -- Traces -- Effective tracing -- Distributed tracing -- Metrics -- What metric should we use? …”
    Libro electrónico
  3. 86123
    Publicado 2024
    “…By the end of this book, you'll emerge with strategic dexterity, confidently steering your career trajectory towards the C-suite. What you will learn Develop a compelling personal brand for CIO and CISO roles Gain mentorship through expert tips, techniques, and proven strategies to navigate executive leadership Be well prepared for interviews, with insights into interview questions as well as questions you can ask Gain insights into managing high-stakes situations and leading your organization through crises Practice leadership through real-life CISO and CIO scenarios Find out how to establish and leverage professional networks crucial for your advancement to CIO or CISO roles Who this book is for This book is for entry-level, mid-level, and senior managers aspiring to ascend to the C-suite as CISOs or CIOs. …”
    Libro electrónico
  4. 86124
    por Meric, Ahmet
    Publicado 2024
    “…Whether you're an architect, backend developer, or DevOps engineer, this book will help you leverage the advanced features of Spring Boot 3.0 for secure and efficient backend development. What you will learn Leverage reactive programming to build responsive and resilient applications Develop reactive and asynchronous RESTful services using Spring Boot Explore data management using Spring Data for both SQL and NoSQL databases Utilize the new features in Spring Boot 3.0 that facilitate containerization and orchestration Secure your Spring Boot applications using various authentication and authorization mechanisms Build robust event-driven systems by integrating Apache Kafka with Spring Boot Who this book is for If you're a Java developer eager to elevate your skills, then Mastering Spring Boot 3.0 is for you. …”
    Libro electrónico
  5. 86125
    Publicado 2024
    “…Finally, enhance your automation skills with shell scripting and containers, preparing you for modern DevOps environments. What you will learn Install and configure Red Hat Enterprise Linux 9. …”
    Libro electrónico
  6. 86126
    Publicado 2024
    “…A basic understanding of AWS APIs and core AWS services for machine learning is expected…”
    Libro electrónico
  7. 86127
    Publicado 2024
    “…By the end of this book, you'll grasp the importance of developing high performance Java applications and gain practical experience in implementing key strategies to help ensure your Java applications perform optimally. What you will learn Explore optimization strategies for garbage collection and the JIT compiler Discover best practices when using data structures for high performance Test and compare various approaches to using loops Understand how and when to use object pooling Discern the difference between low-performance and high-performance algorithms Uncover strategies for object creation and immutability to improve performance Gain hands-on experience in avoiding memory leaks Who this book is for This book is for developers, software engineers, and software architects looking to take their Java skills to the next level. …”
    Libro electrónico
  8. 86128
    Publicado 2024
    “…By the end of this book, you'll be equipped to confidently build, automate, and deliver your infrastructure and CI/CD pipelines in cloud-based applications. What you will learn Explore Terraform architecture and configurations in depth Integrate Packer with Terraform for VM-based solutions Containerize apps with Docker and Kubernetes Explore GitOps and CI/CD deployment patterns Transform existing applications into serverless architectures Migrate and modernize legacy apps for the cloud Implement Terraform on AWS, Azure, and GCP Use Terraform with teams of varying size and responsibility Who this book is for This book is for Devops engineers, cloud engineers, platform engineers, infrastructure engineers, site reliability engineers, developers, and cloud architects who want to utilize Terraform to automate their cloud infrastructures and streamline software delivery. …”
    Libro electrónico
  9. 86129
    Publicado 2024
    Tabla de Contenidos: “…-- Automatically Adjusting Capacity Using AWS Components -- Using Auto Scaling to Deliver Highly Available Applications -- Introduction to Encryption on AWS and KMS -- Overview of AWS KMS -- Symmetric KMS Keys -- Asymmetric KMS Keys -- What Are Data Keys? …”
    Libro electrónico
  10. 86130
    por Tezuysal, Alkin
    Publicado 2024
    Tabla de Contenidos: “…TiDB as a MySQL drop-in replacement for distributed systems -- PostgreSQL - expanding horizons -- pgEdge - fully distributed PostgreSQL optimized for the network edge -- Multi-master replication in pgEdge -- Simplified cluster management -- Enhanced backup and recovery -- Advanced monitoring and alerting -- EnterpriseDB - elevating PostgreSQL for the enterprise -- Choosing your EDB deployment method -- Introduction to columnar databases with ClickHouse -- What is ClickHouse? -- Choosing the right alternative -- Summary -- Index -- Other Books You May Enjoy…”
    Libro electrónico
  11. 86131
    Publicado 2024
    Tabla de Contenidos: “…Working with pipes for local IPC -- Named pipes -- Anonymous pipes -- Using sockets to establish network-based IPC -- Networking 101 -- A TCP-based chat app -- UDP -- Using shared memory to exchange data between processes -- Overview of RPCs and how to use them for IPC -- JSON RPC -- Overview of gRPC and how to use it for IPC -- Differences between JSON RPC and gRPC -- Next steps -- Chapter 7: The One with the Operating System Tango -- Technical requirement -- The Windows Registry -- What is the Windows Registry? -- How to access and store data with the Windows Registry -- Comparing the Windows Registry to JSON settings files -- Worker Services -- Docker support -- Dissecting the Worker Service -- Controlling the lifetime of the service -- Wrapping up Worker Services -- WMI -- How to use WMI -- Reading the CPU temperature -- Reading the BIOS -- Controlling the Windows Update service -- Watching USB devices -- Registry and WMI - risks and how to avoid them -- The Windows Registry -- Potential risks when dealing with WMI -- Next steps -- Chapter 8: The One with the Network Navigation -- Technical requirements -- The fundamentals -- A walk down the OSI layers -- Exploring the System.Net namespace -- Understanding HTTP/HTTPS -- FTP -- Email protocols -- Working with the System.Net.Sockets namespace -- Steps to take when using sockets -- IPv4 and IPv6 -- Looking up time with sockets -- Async, non-blocking networking -- Making asynchronous calls -- Networking performance -- Connection pooling -- Caching -- Compression and serialization -- Keep-alive connections -- Networking errors and time-outs -- Using the HTTPClient wisely -- Implementing retries with Polly -- The circuit breaker pattern -- Validating network availability -- Monitoring and logging -- Next steps -- Chapter 9: The One with the Hardware Handshakes -- Technical requirements…”
    Libro electrónico
  12. 86132
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Part 1: Understanding Data Science and Its Foundations -- Introducing Data Science -- Data science, AI, and ML - what's the difference? -- The mathematical and statistical underpinnings of data science -- Statistics and data science -- What is statistics? …”
    Libro electrónico
  13. 86133
    Publicado 2024
    “…By the end of this book, you'll be well-versed in applying generative AI capabilities to real-world problems, confidently navigating its enormous potential ethically and responsibly. What you will learn Discover the fundamentals of GenAI and its foundations in NLP Dissect foundational generative architectures including GANs, transformers, and diffusion models Find out how to fine-tune LLMs for specific NLP tasks Understand transfer learning and fine-tuning to facilitate domain adaptation, including fields such as finance Explore prompt engineering, including in-context learning, templatization, and rationalization through chain-of-thought and RAG Implement responsible practices with generative LLMs to minimize bias, toxicity, and other harmful outputs Who this book is for This book is for developers, data scientists, and machine learning engineers embarking on projects driven by generative AI. …”
    Libro electrónico
  14. 86134
    por Kapitanov, Konstantin
    Publicado 2024
    “…Additionally, it's important to provide code examples and explain the structure to help beginners grasp the new Lightning Web Components (LWC) framework as a separate part from the classic Apex methodology. What You Will Learn Valuable insights into Salesforce Apex programming and Lightning Web Components in a straightforward and structured manner. …”
    Libro electrónico
  15. 86135
    Publicado 2020
    “…More than 40 years after the promulgation of Law 833, which established one of the most advanced, protective and efficient national health systems, this book reconstructs the founding moments and the most significant innovations from the Unification of Italy to the present day. …”
    Libro electrónico
  16. 86136
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and credits -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Understanding the Threat Landscape and Attack Life Cycle -- Chapter 1: Introduction to the Threat Landscape -- Getting familiar with the cyber threat landscape -- Types of threat actors and their motivations -- APTs -- Cybercriminals -- Hacktivists -- Competitors -- Insider threats -- Terrorist groups -- Script kiddies -- Wrapping up -- Building the cyber threat landscape -- Summary -- Chapter 2: Understanding the Attack Life Cycle -- Phase 1 -- gaining an initial foothold…”
    Libro electrónico
  17. 86137
    por Lorenz, David
    Publicado 2024
    “…Guided by David Lorenz, a battle-tested software architect with over two decades of development experience, this book will transform the way you approach your projects and make you a Supabase expert. …”
    Libro electrónico
  18. 86138
    Publicado 2024
    “…Through real-world scenarios role played by a team of business actors, you’ll see first-hand what to avoid and how to apply effective negotiating strategies. …”
    Vídeo online
  19. 86139
    Publicado 2022
    “…By the end of the course, you will be able to develop full-scale professional Python projects. What You Will Learn Learn the best clean code practices in Python Develop full scale professional Python projects Write Python code that conforms to PEP 8 Learn about exceptions, global and local variables Learn about arithmetic and logical operations Audience This course can be taken by Software Engineers that wish to improve their coding efficiency. …”
    Video
  20. 86140
    Publicado 2022
    “…At the end of this course, you would have gained knowledge about other powerful, full-stack attacks on modern web applications such as HTTP parameter pollution, subdomain takeover, and clickjacking. What You Will Learn Dive into full-stack exploitation of modern web applications Learn how hackers can bypass Content Security Policy (CSP) Discover how web applications can be hacked through PDFs, images, and links Explore how hackers can steal secrets from AngularJS applications Check if your web applications are vulnerable to race condition attacks Learn about HTTP parameter pollution, subdomain takeover, and clickjacking Audience This course is ideal for all penetration testers, ethical hackers, bug hunters, and security engineers/consultants who want to enhance and refresh their knowledge of pentesting and hacking. …”
    Video