Mostrando 51,821 - 51,840 Resultados de 52,366 Para Buscar 'ZCom~', tiempo de consulta: 1.02s Limitar resultados
  1. 51821
    Publicado 2023
    Tabla de Contenidos: “…-- Differences between emulation and virtualization -- Emulation besides QEMU -- MAME -- Bochs -- RetroPie -- The role of emulation and virtualization in cybersecurity through history -- Anubis -- TEMU -- Ether -- The Cuckoo sandbox -- Commercial solutions - VirusTotal and Joe Sandbox -- Summary -- Chapter 3: QEMU From the Ground -- Approaching IoT devices with emulation -- Code structure -- QEMU emulation -- QEMU IR -- A deep-dive into QEMU architecture -- QEMU extensions and mods -- A brief example of Avatar2 -- PANDA -- Summary -- Part 2: Emulation and Fuzzing -- Chapter 4: QEMU Execution Modes and Fuzzing -- QEMU user mode -- QEMU full-system mode -- Fuzzing and analysis techniques -- The Rosetta Stone of program semantics -- Fuzzing techniques -- American Fuzzy Lop and American Fuzzy Lop++ -- Advantages of AFL and AFL++ versus my own fuzzer -- Fuzzing with AFL and AFL++ -- Fuzzing ARM binaries -- Summary -- Chapter 5: A Famous Refrain: AFL + QEMU = CVEs -- Is it so easy to find vulnerabilities? …”
    Libro electrónico
  2. 51822
    Publicado 2023
    “…However, when studying the social and public role of the church and clergy, it soon becomes quite clear how pervasive this phenomenon was. …”
    Libro electrónico
  3. 51823
    Publicado 2021
    Tabla de Contenidos: “…Zur Selbstvergewisserung einer kirchlichen Fachhochschule nach dem Boom -- Wie und warum feiern sich Reformuniversitäten? …”
    Libro electrónico
  4. 51824
    “…Plusieurs pays sont déjà confrontés à des pénuries à mesure que la génération du baby-boom entre dans le troisième âge. Pour aller Au-delà des applaudissements, il est nécessaire d'adopter une stratégie d'action globale pour remédier aux conditions de travail médiocres et à la reconnaissance sociale insuffisante des personnels du secteur des soins de longue durée, attirer des travailleurs et éviter que les pénuries de main-d'œuvre n'atteignent des niveaux inacceptables. …”
    Libro electrónico
  5. 51825
    Publicado 2011
    “…The IBM System z℗ʼ, the latest generation of the IBM distinguished family of mainframe systems, has come a long way from its IBM System/360 heritage. …”
    Libro electrónico
  6. 51826
    Publicado 2023
    “…In essence, you’ll build your knowledge from beginner to advanced-level practitioner in no time. …”
    Libro electrónico
  7. 51827
    Publicado 2023
    Tabla de Contenidos: “…Chapter 5: Node Editing - Modifying Your Shapes with Nodes and Curves -- Editing shapes with the Node tool -- Adding and removing nodes -- Curve handles and node types -- Breaking and joining lines -- Drawing lines and shapes from scratch -- Line styles -- Classical drawing tools -- Advanced curves and line options -- Making brush strokes with Stroke Shape -- Try it yourself -- Summary -- Part 2: Advanced Shape Editing -- Chapter 6: Fast Shape Editing with Path Operations and the Shape Builder Tool -- Technical requirements -- What are Booleans? …”
    Libro electrónico
  8. 51828
    Publicado 2023
    “…What You Will Learn Evolve from monolithic to the microservices architecture Implement effective microservices decomposition strategies Utilize communication patterns and API gateways Manage data and distributed transactions in microservices Enhance resilience and observability for microservices Audience This course is ideal for individuals seeking to become proficient in software architecture, explicitly focusing on understanding microservices architecture through real-world cases. …”
    Video
  9. 51829
    Publicado 2023
    “…Whether you're selecting your first JavaScript framework or seeking to stand out among job applicants by adding the latest technology to your resume, this book is your ultimate guide to becoming a SvelteKit master. A solid understanding of HTML, CSS, JavaScript, and Svelte is a must…”
    Libro electrónico
  10. 51830
    Publicado 2023
    “…An expert's guide to unleash your productivity potential for work and personal projects with Trello automation, advanced features, integrations, and Power-Ups Purchase of the print or Kindle book includes a free PDF eBook Key Features Uncover the secrets of Trello's core features, automation, and integrations to become a Trello power user Master Trello with practical advice, real-world examples, and workflows to improve task management Get in-depth knowledge of Trello to get it up and running within minutes and scale it for future needs Book Description Managing large projects and teams can be an immense challenge, but having an efficient project management system can make all the difference. …”
    Libro electrónico
  11. 51831
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Why Data Stewardship and Why Me? -- Chapter 1: From Business Strategy to Data Strategy to Data Stewardship -- Understanding the strategic, tactical, and operational value of data stewardship -- Bridging the gap between data strategy and data operation -- Unlocking business value with data stewardship -- Understanding business strategy -- Understanding data strategy -- Operationalizing your data strategy via data stewardship -- Exploring the mindset and skillset gap -- Translating strategy into execution -- Data collection -- Data governance framework -- Analytics and reporting tools -- Tracking progress -- Decoding data governance, management, and stewardship -- Data stewards don different hats -- Summary -- Chapter 2: How Data Stewardship Can Help Your Organization -- Defining data stewardship -- The work scope of a data steward -- Understanding the role of a data steward -- Types of data stewards -- Comparing strategic data stewardship with a standard operating procedure -- Using business cases for storytelling and value realization -- Creating a competitive edge with data stewardship -- Summary -- Chapter 3: Getting Started with the Data Stewardship Program -- Defining the origin and destination of your data stewardship program -- Getting buy-in of data stewardship from stakeholders -- Building a prioritization matrix -- The impact-effort matrix -- The RICE method -- MoSCoW analysis -- Comparing different prioritization matrices -- Assessing data maturity -- Building the foundation of your data stewardship program -- Summary -- Part 2: How to Become a Data Steward and Shine! …”
    Libro electrónico
  12. 51832
    Publicado 2024
    “…Setting up new projects becomes second nature as participants explore the Blender Asset Manager, learning to store files efficiently and manage resources with precision. …”
    Video
  13. 51833
    Publicado 2024
    Tabla de Contenidos: “…Microsoft 365's Security and Compliance Center (Microsoft Purview) -- Google Workspace Admin console and security features -- Summary -- Further reading -- Part 3: Cloud Forensic Analysis - Responding to an Incident in the Cloud -- Chapter 8: The Digital Forensics and Incident Response Process -- The basics of the incident response process -- Tools and techniques for digital forensic investigations -- Prerequisites -- Cloud host forensics -- Memory forensics -- Live forensic analysis and threat hunting -- EDR-based threat hunting -- Hunting for malware -- Common persistence mechanisms -- Network forensics -- Basic networking concepts -- Cloud network forensics - log sources and tools -- Network investigation tools -- Malware investigations -- Setting up your malware analysis lab -- Working with packed malware -- Binary comparison -- Traditional forensics versus cloud forensics -- Summary -- Further reading -- Chapter 9: Common Attack Vectors and TTPs -- MITRE ATT&amp -- CK framework -- Forensic triage collections -- Host-based forensics -- Evidence of intrusion -- Prefetch analysis -- AmCache analysis -- ShimCache analysis -- Windows Event Logs -- Analyzing memory dumps -- Misconfigured virtual machine instances -- Unnecessary ports left open -- Default credentials left unchanged -- Outdated or unpatched software -- Publicly exposed sensitive data (or metadata) -- Misconfigured storage buckets -- Public permissions -- Exposed API keys or credentials -- Improper use of IAM policies -- Cloud administrator portal breach -- Summary -- Further reading -- Chapter 10: Cloud Evidence Acquisition -- Forensic acquisition of AWS instance -- Step 1 - creating EC2 volume snapshots -- Step 2 - acquiring OS memory images -- Step 3 - creating a forensic collector instance -- Step 4 - creating and attaching infected volume from snapshots…”
    Libro electrónico
  14. 51834
    Publicado 2020
    Tabla de Contenidos: “…Introduction -- Political spirituality -- Foucault's work and movements in 1978 and early 1979 -- Corriere Della Sera: A strange invitation -- Into the Incinerator, 16 September 1978 -- Foucault's most consequential Iran writings -- The backlash: Paris in turmoil, April 1979 -- Crucial perspectives from the Foucault scholarship, 1979-2017 -- What was there to liberate in Iran? …”
    Libro electrónico
  15. 51835
    Publicado 2021
    “…These include current and former faculty and students (ranging from academics such as Christopher Hood, Anne Phillips and Tony Travers, to graduates who have subsequently become politicians-such as Anneliese Dodds, former UK Shadow Chancellor of the Exchequer, and Kennedy Stewart and Michael Fougere, both mayors in Canada), as well as others with strong links to the Department, such as Meghnad (Baron) Desai, and Professors Tim Besley and Nick Barr. …”
    Libro electrónico
  16. 51836
    Publicado 2023
    “…The Alteryx platform allows users to access, cleanse, and integrate data from various sources, and perform statistical analysis, predictive modeling, and geospatial analysis. …”
    Video
  17. 51837
    Publicado 2023
    “…AI models like ChatGPT and DALL-E 2 are becoming increasingly sophisticated, enabling us to generate high-quality text and images at an unprecedented speed and scale. …”
    Video
  18. 51838
    Publicado 2023
    “…He looks forward to helping aspiring students on their journey to explore penetration testing, ethical hacking, and information security to become the person they would want to be, in an arguably short period of time!…”
    Video
  19. 51839
    Publicado 2023
    Tabla de Contenidos: “…CHECKLIST FOR OBTAINING A URINE SPECIMEN FROM A FOLEY CATHETER -- 21.13. CHECKLIST FOR FOLEY REMOVAL -- 21.14. …”
    Libro electrónico
  20. 51840
    Publicado 2024
    Tabla de Contenidos: “…-- A supermarket analogy -- The shift from ETL to ELT -- The difference between analytics engineers, data analysts, and data engineers -- Summary -- Chapter 2: The Modern Data Stack -- Understanding a Modern Data Stack -- Explaining three key differentiators versus legacy stacks -- Lowering technical barriers with a SQL-first approach -- Improving infrastructure efficiency with cloud-native systems -- Simplifying implementation and maintenance with managed and modular solutions -- Discussing the advantages and disadvantages of the MDS -- Summary -- Part 2: Building Data Pipelines -- Chapter 3: Data Ingestion -- Digging into the problem of moving data between two systems -- The source of all problems -- Understanding the eight essential steps of a data ingestion pipeline -- Trigger -- Connection -- State management -- Data extraction -- Transformations -- Validation and data quality -- Loading -- Archiving and retention -- Managing the quality and scalability of data ingestion pipelines - the three key topics -- Scalability and resilience -- Monitoring, logging, and alerting -- Governance -- Working with data ingestion - an example pipeline -- Summary -- Chapter 4: Data Warehousing -- Uncovering the evolution of data warehousing -- The problem with transactional databases -- The history of data warehouses -- Moving to the cloud -- Benefits of cloud versus on-premises data warehouses -- Cloud data warehouse users - no one-size fits all -- Building blocks of a cloud data warehouse -- Compute…”
    Libro electrónico