Mostrando 50,361 - 50,380 Resultados de 51,519 Para Buscar 'ZCom~', tiempo de consulta: 0.93s Limitar resultados
  1. 50361
    Publicado 2011
    Tabla de Contenidos: “…-- 7.2 Where Do I Start? -- 7.3 How CM Facilitates Good Architecture -- 7.4 What Architects Can Learn From Testers -- 7.5 Configuration Management-Driven Development (CMDD) -- 7.6 Coping with the Changing Architecture -- 7.7 Using Source Code Management to Facilitate Architecture -- 7.8 Training Is Essential -- 7.9 Source Code Management as a Service -- 7.10 Build Engineering as a Service -- Conclusion…”
    Libro electrónico
  2. 50362
    Publicado 2015
    “…The field of protein phosphorylation, especially of the Ser/Thr/Tyr type, has been profoundly transformed. We have become aware that bacterial kinases phosphorylate many protein substrates and thus constitute regulatory nodes with potential for signal integration. …”
    Libro electrónico
  3. 50363
    Publicado 2021
    “…You'll build a full-blown data entry application from scratch, learning how to grow and improve your code in response to continually changing user and business needs. …”
    Libro electrónico
  4. 50364
    Publicado 2015
    “…The Future of Strategy brings strategy back from those big top-down plans. It answers the questions of executives facing tumultuous business conditions and rapidly shifting markets: Is strategy still possible? …”
    Libro electrónico
  5. 50365
    por Orzach, Yoram
    Publicado 2022
    Tabla de Contenidos: “…Layer 5-based vulnerabilities -- Layer 6-based vulnerabilities -- Layer 7-based vulnerabilities -- Fuzzing tools -- Basic fuzzing -- Breaking usernames and passwords (brute-force attacks) -- Fuzzing network protocols -- Crash analysis - what to do when we find a bug -- Summary -- Questions -- Part 2: Network, Network Devices, and Traffic Analysis-Based Attacks -- Chapter 6: Finding Network-Based Attacks -- Planning a network-based attack -- Gathering information from the network -- Stealing information from the network -- Preventing users from using IT resources -- Active and passive attacks -- Active attacks -- Passive attacks -- Reconnaissance and information gathering -- Listening to network broadcasts -- Listening on a single device/port-mirror -- Network-based DoS/DDoS attacks and flooding -- Flooding through scanning attacks -- Random traffic generation flooding -- Generating and defending against flooding and DoS/DDoS attacks -- L2-based attacks -- MAC flooding -- STP, RSTP, and MST attacks -- L3- and ARP-based attacks -- ARP poisoning -- DHCP starvation -- Summary -- Questions -- Chapter 7: Detecting Device-Based Attacks -- Network devices' structure and components -- The functional structure of communications devices -- The physical structure of communications devices -- Attacks on the management plane and how to defend against them -- Brute-force attacks on console, Telnet, and SSH passwords -- Brute-force attacks against SNMP passwords (community strings) -- Brute-force attacks against HTTP/HTTPS passwords -- Attacks on other ports and services -- SYN-scan and attacks targeting the management plane processes' availability -- Attacks on the control plane and how to defend against them -- Control plane-related actions that influence device resources -- Attacks on the data plane and how to defend against them…”
    Libro electrónico
  6. 50366
    por Alexandre Bidon, Danièle
    Publicado 2021
    “…The city developed as a result of contact with both Burgundian and Germanic culture and by the end of the 14th century had become a commercial and religious centre. The second defensive wall, built in the 15th century is a reflection of the city’s prosperity, encircling as it does the original castle, through as well as the two districts of La Halle and Saint-Martin. …”
    Electrónico
  7. 50367
    Publicado 2016
    “…Roberto Valenzuela is a photographer and educator who has a talent for identifying areas where photographers regularly hit roadblocks and a passion for developing clear and concise systems that allow photographers to break through those barriers and become better, more confident practitioners of their craft. …”
    Libro electrónico
  8. 50368
    Publicado 2018
    “…By the end of the book, you will become proficient in Feature Selection, Feature Learning, and Feature Optimization. …”
    Libro electrónico
  9. 50369
    Publicado 2016
    “…In today’s global business environments characterized by growing complexity, volatility, and uncertainty, business analytics has become an indispensable tool for managing these challenges. …”
    Libro electrónico
  10. 50370
    Publicado 2020
    “…This third edition of Framework Design Guidelines adds guidelines related to changes that the .NET team adopted during transition from the world of client-server application to the world of the Cloud.” …”
    Libro electrónico
  11. 50371
    Publicado 2018
    “…Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details…”
    Libro electrónico
  12. 50372
    Publicado 2024
    “…You will learn how to leverage the Data Loss Prevention (DLP) application programming interface (API) to prevent access to your workloads’ sensitive data from unauthorized use. Examples on how to use the DLP API are provided using the Go language, which is becoming widely adopted in the developer community due to its simplicity, and high-performance networking and multi-processing capabilities. …”
    Libro electrónico
  13. 50373
    Publicado 2006
    “…Prevent day-zero attacks Enforce acceptable-use policies Develop host-IPS project implementation plans Evaluate management hierarchy installation options, including single-server, multiserver, and built-in database usage Learn about CSA agents and manual and scripted installation options Understand policy components and custom policy creation Use and filter information from CSA event logs Troubleshoot CSA deployments with agent and management server logs and built-in troubleshooting tools Protecting systems where the private data and intellectual property resides is no longer considered a function of perimeter defense systems but has instead become the domain of endpoint protection software, such as host Intrusion Prevention Systems (IPS). …”
    Libro electrónico
  14. 50374
    Publicado 2004
    “…To meet this need, Cisco Frame Relay Solutions Guide provides comprehensive coverage of Frame Relay technologies and the Cisco Frame Relay solutions developed in Cisco IOS Software from release 12.0 up to 12.2(T). Both Frame Relay beginners, who need to understand the technology, and advanced readers, who need information on the wide range of Frame Relay features Cisco offers, will benefit from this book. …”
    Libro electrónico
  15. 50375
    por Hucaby, Dave
    Publicado 2004
    “…As more organizations make greater use of the Internet, defending against network attacks becomes crucial for businesses. Productivity gains and returns on company investments are at risk if the network is not properly defended. …”
    Libro electrónico
  16. 50376
    Publicado 2003
    “…End-to-end QoS deployment techniques for Cisco Catalyst series switches Examine various QoS components, including congestion management, congestion avoidance, shaping, policing/admission control, signaling, link efficiency mechanisms, and classification and marking Map specified class of service (CoS) values to various queues and maintain CoS values through the use of 802.1q tagging on the Cisco Catalyst 2900XL, 3500XL and Catalyst 4000 and 2948G/2980G CatOS Family of Switches Learn about classification and rewrite capabilities and queue scheduling on the Cisco Catalyst 5000 Implement ACLs, ACPs, ACEs, and low-latency queuing on the Cisco Catalyst 2950 and 3550 Family of Switches Understand classification, policying, and scheduling capabilities of the Catalyst 4000 and 4500 IOS Family of Switches Configure QoS in both Hybrid and Native mode on the Catalyst 6500 Family of Switches Utilize Layer 3 QoS to classify varying levels of service with the Catalyst 6500 MSFC and Flexwan Understand how to apply QoS in campus network designs by examining end-to-end case studies Quality of service (QoS) is the set of techniques designed to manage network resources. …”
    Libro electrónico
  17. 50377
    por Lee, Kok-Keong
    Publicado 2005
    “…Because the network has become such a strategic business tool, its availability is of utmost importance to companies and their service providers. …”
    Libro electrónico
  18. 50378
    por Fox, Dan
    Publicado 2003
    “….” — Michael Yuan , University of Texas at Austin “Moving to the .NET Compact Framework is about to become much easier with the aid of this book. The samples and supplied utility code will help you get a running start on your own mobile development projects.” — Kent Sharkey , Program Manager, MSDN “This book is the starting place for development on devices using the Microsoft Compact Framework. …”
    Libro electrónico
  19. 50379
    por Beck, Kent
    Publicado 2001
    “…I predict that it will be as essential to the present generation as the S.E.I. and its Capability Maturity Model were to the last." --From the foreword by Tom DeMarco The hallmarks of Extreme Programming--constant integration and automated testing, frequent small releases that incorporate continual customer feedback, and a teamwork approach--make it an exceptionally flexible and effective approach to software development. …”
    Libro electrónico
  20. 50380
    Publicado 2005
    “…And now, updated to cover Apple's newest release, iPhoto 5: The Missing Manual comes fully loaded--and in full color--so you can exercise all the power, flexibility, and creativity of the stunning new iPhoto 5. …”
    Libro electrónico