Mostrando 49,541 - 49,560 Resultados de 51,519 Para Buscar 'ZCom~', tiempo de consulta: 0.94s Limitar resultados
  1. 49541
    por Byer, Amanda. author
    Publicado 2023
    “…It investigates property’s origins and uptake in the common law through the lenses of landscape and spatial justice, providing a genealogy of property, from its early origins in pre-feudal Scandinavia to its development as a cornerstone concept in English common law. …”
    Libro electrónico
  2. 49542
    Publicado 2022
    “…On August 8, 1942, 302 people arrived by train at Vocation, Wyoming, to become the first Japanese American residents of what the U.S. government called the Relocation Center at Heart Mountain. …”
    Libro electrónico
  3. 49543
    por Rouse, William B.
    Publicado 2024
    “…Unity and selflessness or altruism are valued traits in collectivist cultures; independence and personal identity are central in individualistic cultures. Collectivists can become so focused on collective benefits that they ignore sources and opportunities for innovation. …”
    Libro electrónico
  4. 49544
    por Sountharrajan, S.
    Publicado 2023
    Tabla de Contenidos: “…3.6.1 Attacks in Physical Layer -- 3.6.2 Attacks in Data Link Layer -- 3.6.3 Attacks in Network Layer -- 3.6.4 Attacks in Transport Layer -- 3.6.5 Attacks in Application Layer -- 3.7 Security Models -- 3.7.1 Bio-Inspired Trust and Reputation Model -- 3.7.2 Peer Trust System -- 3.8 Case Study: Healthcare -- 3.8.1 Security Risks in Healthcare -- 3.8.2 Prevention from Security Attacks in Healthcare -- 3.9 Minimize the Risks in a Wireless Environment -- 3.9.1 Generate Strong Passwords -- 3.9.2 Change Default Wi-Fi Username and Password -- 3.9.3 Use Updated Antivirus -- 3.9.4 Send Confidential Files with Passwords -- 3.9.5 Detect the Intruders -- 3.9.6 Encrypt Network -- 3.9.7 Avoid Sharing Files Through Public Wi-Fi -- 3.9.8 Provide Access to Authorized Users -- 3.9.9 Used a Wireless Controller -- 3.10 Conclusion -- References -- Chapter 4 Machine Learning-Based Malicious Threat Detection and Security Analysis on Software-Defined Networking for Industry 4.0 -- 4.1 Introduction -- 4.1.1 Software-Defined Network -- 4.1.2 Types of Attacks -- 4.1.2.1 Denial of Services -- 4.1.2.2 Distributed Denial of Service -- 4.2 Related Works -- 4.3 Proposed Work for Threat Detection and Security Analysis -- 4.3.1 Traffic Collection -- 4.3.1.1 Data Flow Monitoring and Data Collection -- 4.3.1.2 Purpose of Data Flow Monitoring and Data Collection -- 4.3.1.3 Types of Collection -- 4.3.2 Feature Selection Using Entropy -- 4.3.3 Malicious Traffic Detection -- 4.3.3.1 Framing of the Expected Traffic Status -- 4.3.3.2 Traffic Filtering Using Regression -- 4.3.4 Traffic Mitigation -- 4.4 Implementation and Results -- 4.5 Conclusion -- References -- Chapter 5 Privacy Enhancement for Wireless Sensor Networks and the Internet of Things Based on Cryptological Techniques -- 5.1 Introduction -- 5.2 System Architecture -- 5.3 Literature Review -- 5.4 Proposed Methodology…”
    Libro electrónico
  5. 49545
    Publicado 2024
    Tabla de Contenidos:
    Libro electrónico
  6. 49546
    por Millett, Scott
    Publicado 2024
    Tabla de Contenidos: “…The CIO Challenge -- Taking Action: Becoming a Strategic Leader -- What Will You Learn? …”
    Libro electrónico
  7. 49547
    por Aliste, Enrique
    Publicado 2018
    “…En este caso, la pluralidad de lo territorial se intuye en las diferentes perspectivas de acercamiento, mostrando tanto la polisemia como las tensiones detrás de conceptos tales como espacio, frontera o representación.Para ello, los investigadores y cientistas sociales que escriben este volumen, asumen el debate centro-periferia entendiendo que la particular mirada desarrollada desde un territorio de integración tardía, como es la Patagonia tanto en Argentina como en Chile, construye una mirada epistemológica necesaria y singular.Así, la Patagonia adopta un carácter plural, las naciones se diversifican y los sentidos y prácticas de lo estatal se complejizan. …”
    Electrónico
  8. 49548
    Publicado 2023
    “…With the benefit of IBM FlashCore Module compression and new QLC flash-based technology becoming available, a compelling argument exists to move away from Nearline SAS storage and on to NVMe. …”
    Libro electrónico
  9. 49549
    Publicado 2023
    “…The Pearson print rental program provides students with affordable access to learning materials, so they come to class ready to succeed. For courses in introductory calculus-based physics. …”
    Libro electrónico
  10. 49550
    Publicado 2024
    “…"A Patterns Approach to Designing Distributed Systems and Solving Common Implementation Problems More and more enterprises today are dependent on cloud services from providers like AWS, Microsoft Azure, and GCP. …”
    Libro electrónico
  11. 49551
    Publicado 2024
    “…Many technical mistakes come from the gap between knowledge about these three items and judgment. …”
    Libro electrónico
  12. 49552
    Publicado 2025
    “…In the hands of the penetration tester, bash scripting becomes a powerful offensive security tool. In Black Hat Bash, you'll learn how to use bash to automate tasks, develop custom tools, uncover vulnerabilities, and execute advanced, living-off-the-land attacks against Linux servers. …”
    Libro electrónico
  13. 49553
    Publicado 2022
    Materias:
    Libro electrónico
  14. 49554
    Publicado 2022
    “…Audience This book is for intermediate- to senior-level business analysts with a basic understanding of Salesforce CRM software or any CRM technology who want to learn proven business analysis techniques to set their business up for success…”
    Grabación no musical
  15. 49555
    Publicado 2023
    “…Infrastructure as Code (IaC) is gaining popularity and developers today are deploying their application environments through IaC tools to the cloud. However, it can become extremely difficult and time-consuming to manage the state of the infrastructure that has been deployed. …”
    Libro electrónico
  16. 49556
    Publicado 2022
    “…Learn cyber threat intelligence fundamentals to implement and operationalize an organizational intelligence program About This Audiobook Develop and implement a threat intelligence program from scratch Discover techniques to perform cyber threat intelligence, collection, and analysis using open-source tools Leverage a combination of theory and practice that will help you prepare a solid foundation for operationalizing threat intelligence programs In Detail We're living in an era where cyber threat intelligence is becoming more important. …”
    Grabación no musical
  17. 49557
    Publicado 2020
    “…Build a Career in Data Science teaches you what school leaves out, from how to land your first job to the lifecycle of a data science project, and even how to become a manager. about the technology What are the keys to a data scientist's long-term success? …”
    Grabación no musical
  18. 49558
    Publicado 2008
    “…The overall effect is that readers become not just proficient in C# 2 and 3, but comfortable that they truly understand the language…”
    Libro electrónico
  19. 49559
    Publicado 2020
    “…What you will learn: Know how to implement infrastructure solutions in GCP What you need to pass the GCP Associate Cloud Engineer Certification Exam Core GCP fundamentals Get started on your journey to becoming a GCP Associate Cloud Engineer Course Requirements: You should have a foundational knowledge cloud computing concepts: network, storage, compute, etc. …”
    Vídeo online
  20. 49560
    Publicado 2021
    “…It covers just about everything you need to learn to quickly become productive in the often confusing and fast-changing world of .NET Core. …”
    Grabación no musical