Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 1,308
- Historia 1,220
- Development 1,058
- Engineering & Applied Sciences 946
- Història 917
- Application software 868
- Management 860
- Computer Science 622
- Computer networks 462
- Leadership 443
- Data processing 438
- Computer programs 405
- Design 398
- Cloud computing 367
- Examinations 363
- Business & Economics 362
- Social aspects 358
- Security measures 351
- Education 344
- Bíblia 342
- Web site development 335
- Web sites 333
- Computer security 321
- Python (Computer program language) 321
- Politics and government 318
- Filosofía 314
- Photography 310
- Computer software 303
- Programming 297
- Crítica e interpretación 295
-
49541por Byer, Amanda. author“…It investigates property’s origins and uptake in the common law through the lenses of landscape and spatial justice, providing a genealogy of property, from its early origins in pre-feudal Scandinavia to its development as a cornerstone concept in English common law. …”
Publicado 2023
Libro electrónico -
49542Publicado 2022“…On August 8, 1942, 302 people arrived by train at Vocation, Wyoming, to become the first Japanese American residents of what the U.S. government called the Relocation Center at Heart Mountain. …”
Libro electrónico -
49543por Rouse, William B.“…Unity and selflessness or altruism are valued traits in collectivist cultures; independence and personal identity are central in individualistic cultures. Collectivists can become so focused on collective benefits that they ignore sources and opportunities for innovation. …”
Publicado 2024
Libro electrónico -
49544por Sountharrajan, S.Tabla de Contenidos: “…3.6.1 Attacks in Physical Layer -- 3.6.2 Attacks in Data Link Layer -- 3.6.3 Attacks in Network Layer -- 3.6.4 Attacks in Transport Layer -- 3.6.5 Attacks in Application Layer -- 3.7 Security Models -- 3.7.1 Bio-Inspired Trust and Reputation Model -- 3.7.2 Peer Trust System -- 3.8 Case Study: Healthcare -- 3.8.1 Security Risks in Healthcare -- 3.8.2 Prevention from Security Attacks in Healthcare -- 3.9 Minimize the Risks in a Wireless Environment -- 3.9.1 Generate Strong Passwords -- 3.9.2 Change Default Wi-Fi Username and Password -- 3.9.3 Use Updated Antivirus -- 3.9.4 Send Confidential Files with Passwords -- 3.9.5 Detect the Intruders -- 3.9.6 Encrypt Network -- 3.9.7 Avoid Sharing Files Through Public Wi-Fi -- 3.9.8 Provide Access to Authorized Users -- 3.9.9 Used a Wireless Controller -- 3.10 Conclusion -- References -- Chapter 4 Machine Learning-Based Malicious Threat Detection and Security Analysis on Software-Defined Networking for Industry 4.0 -- 4.1 Introduction -- 4.1.1 Software-Defined Network -- 4.1.2 Types of Attacks -- 4.1.2.1 Denial of Services -- 4.1.2.2 Distributed Denial of Service -- 4.2 Related Works -- 4.3 Proposed Work for Threat Detection and Security Analysis -- 4.3.1 Traffic Collection -- 4.3.1.1 Data Flow Monitoring and Data Collection -- 4.3.1.2 Purpose of Data Flow Monitoring and Data Collection -- 4.3.1.3 Types of Collection -- 4.3.2 Feature Selection Using Entropy -- 4.3.3 Malicious Traffic Detection -- 4.3.3.1 Framing of the Expected Traffic Status -- 4.3.3.2 Traffic Filtering Using Regression -- 4.3.4 Traffic Mitigation -- 4.4 Implementation and Results -- 4.5 Conclusion -- References -- Chapter 5 Privacy Enhancement for Wireless Sensor Networks and the Internet of Things Based on Cryptological Techniques -- 5.1 Introduction -- 5.2 System Architecture -- 5.3 Literature Review -- 5.4 Proposed Methodology…”
Publicado 2023
Libro electrónico -
49545Publicado 2024Tabla de Contenidos:Libro electrónico
-
49546por Millett, ScottTabla de Contenidos: “…The CIO Challenge -- Taking Action: Becoming a Strategic Leader -- What Will You Learn? …”
Publicado 2024
Libro electrónico -
49547por Aliste, Enrique“…En este caso, la pluralidad de lo territorial se intuye en las diferentes perspectivas de acercamiento, mostrando tanto la polisemia como las tensiones detrás de conceptos tales como espacio, frontera o representación.Para ello, los investigadores y cientistas sociales que escriben este volumen, asumen el debate centro-periferia entendiendo que la particular mirada desarrollada desde un territorio de integración tardía, como es la Patagonia tanto en Argentina como en Chile, construye una mirada epistemológica necesaria y singular.Así, la Patagonia adopta un carácter plural, las naciones se diversifican y los sentidos y prácticas de lo estatal se complejizan. …”
Publicado 2018
Electrónico -
49548Publicado 2023“…With the benefit of IBM FlashCore Module compression and new QLC flash-based technology becoming available, a compelling argument exists to move away from Nearline SAS storage and on to NVMe. …”
Libro electrónico -
49549Publicado 2023“…The Pearson print rental program provides students with affordable access to learning materials, so they come to class ready to succeed. For courses in introductory calculus-based physics. …”
Libro electrónico -
49550Publicado 2024“…"A Patterns Approach to Designing Distributed Systems and Solving Common Implementation Problems More and more enterprises today are dependent on cloud services from providers like AWS, Microsoft Azure, and GCP. …”
Libro electrónico -
49551Publicado 2024“…Many technical mistakes come from the gap between knowledge about these three items and judgment. …”
Libro electrónico -
49552Publicado 2025“…In the hands of the penetration tester, bash scripting becomes a powerful offensive security tool. In Black Hat Bash, you'll learn how to use bash to automate tasks, develop custom tools, uncover vulnerabilities, and execute advanced, living-off-the-land attacks against Linux servers. …”
Libro electrónico -
49553Publicado 2022Materias:Libro electrónico
-
49554Publicado 2022“…Audience This book is for intermediate- to senior-level business analysts with a basic understanding of Salesforce CRM software or any CRM technology who want to learn proven business analysis techniques to set their business up for success…”
Grabación no musical -
49555Publicado 2023“…Infrastructure as Code (IaC) is gaining popularity and developers today are deploying their application environments through IaC tools to the cloud. However, it can become extremely difficult and time-consuming to manage the state of the infrastructure that has been deployed. …”
Libro electrónico -
49556Publicado 2022“…Learn cyber threat intelligence fundamentals to implement and operationalize an organizational intelligence program About This Audiobook Develop and implement a threat intelligence program from scratch Discover techniques to perform cyber threat intelligence, collection, and analysis using open-source tools Leverage a combination of theory and practice that will help you prepare a solid foundation for operationalizing threat intelligence programs In Detail We're living in an era where cyber threat intelligence is becoming more important. …”
Grabación no musical -
49557Publicado 2020“…Build a Career in Data Science teaches you what school leaves out, from how to land your first job to the lifecycle of a data science project, and even how to become a manager. about the technology What are the keys to a data scientist's long-term success? …”
Grabación no musical -
49558Publicado 2008“…The overall effect is that readers become not just proficient in C# 2 and 3, but comfortable that they truly understand the language…”
Libro electrónico -
49559Publicado 2020“…What you will learn: Know how to implement infrastructure solutions in GCP What you need to pass the GCP Associate Cloud Engineer Certification Exam Core GCP fundamentals Get started on your journey to becoming a GCP Associate Cloud Engineer Course Requirements: You should have a foundational knowledge cloud computing concepts: network, storage, compute, etc. …”
Vídeo online -
49560Publicado 2021“…It covers just about everything you need to learn to quickly become productive in the often confusing and fast-changing world of .NET Core. …”
Grabación no musical