Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 1,308
- Historia 1,237
- Development 1,058
- Engineering & Applied Sciences 946
- Història 915
- Application software 868
- Management 860
- Computer Science 622
- Computer networks 462
- Leadership 443
- Data processing 438
- Computer programs 405
- Design 398
- Cloud computing 367
- Examinations 363
- Business & Economics 362
- Social aspects 358
- Security measures 351
- Crítica e interpretación 350
- Education 344
- Bíblia 342
- Web site development 335
- Web sites 333
- Filosofía 323
- Computer security 321
- Python (Computer program language) 321
- Politics and government 318
- Photography 310
- Computer software 303
- Programming 297
-
51821Publicado 2023Tabla de Contenidos: “…-- Differences between emulation and virtualization -- Emulation besides QEMU -- MAME -- Bochs -- RetroPie -- The role of emulation and virtualization in cybersecurity through history -- Anubis -- TEMU -- Ether -- The Cuckoo sandbox -- Commercial solutions - VirusTotal and Joe Sandbox -- Summary -- Chapter 3: QEMU From the Ground -- Approaching IoT devices with emulation -- Code structure -- QEMU emulation -- QEMU IR -- A deep-dive into QEMU architecture -- QEMU extensions and mods -- A brief example of Avatar2 -- PANDA -- Summary -- Part 2: Emulation and Fuzzing -- Chapter 4: QEMU Execution Modes and Fuzzing -- QEMU user mode -- QEMU full-system mode -- Fuzzing and analysis techniques -- The Rosetta Stone of program semantics -- Fuzzing techniques -- American Fuzzy Lop and American Fuzzy Lop++ -- Advantages of AFL and AFL++ versus my own fuzzer -- Fuzzing with AFL and AFL++ -- Fuzzing ARM binaries -- Summary -- Chapter 5: A Famous Refrain: AFL + QEMU = CVEs -- Is it so easy to find vulnerabilities? …”
Libro electrónico -
51822Publicado 2023“…However, when studying the social and public role of the church and clergy, it soon becomes quite clear how pervasive this phenomenon was. …”
Libro electrónico -
51823Publicado 2021Tabla de Contenidos: “…Zur Selbstvergewisserung einer kirchlichen Fachhochschule nach dem Boom -- Wie und warum feiern sich Reformuniversitäten? …”
Libro electrónico -
51824por Organisation de coopération et de développement économiques“…Plusieurs pays sont déjà confrontés à des pénuries à mesure que la génération du baby-boom entre dans le troisième âge. Pour aller Au-delà des applaudissements, il est nécessaire d'adopter une stratégie d'action globale pour remédier aux conditions de travail médiocres et à la reconnaissance sociale insuffisante des personnels du secteur des soins de longue durée, attirer des travailleurs et éviter que les pénuries de main-d'œuvre n'atteignent des niveaux inacceptables. …”
Publicado 2023
Libro electrónico -
51825Publicado 2011“…The IBM System z℗ʼ, the latest generation of the IBM distinguished family of mainframe systems, has come a long way from its IBM System/360 heritage. …”
Libro electrónico -
51826Publicado 2023“…In essence, you’ll build your knowledge from beginner to advanced-level practitioner in no time. …”
Libro electrónico -
51827Publicado 2023Tabla de Contenidos: “…Chapter 5: Node Editing - Modifying Your Shapes with Nodes and Curves -- Editing shapes with the Node tool -- Adding and removing nodes -- Curve handles and node types -- Breaking and joining lines -- Drawing lines and shapes from scratch -- Line styles -- Classical drawing tools -- Advanced curves and line options -- Making brush strokes with Stroke Shape -- Try it yourself -- Summary -- Part 2: Advanced Shape Editing -- Chapter 6: Fast Shape Editing with Path Operations and the Shape Builder Tool -- Technical requirements -- What are Booleans? …”
Libro electrónico -
51828Publicado 2023“…What You Will Learn Evolve from monolithic to the microservices architecture Implement effective microservices decomposition strategies Utilize communication patterns and API gateways Manage data and distributed transactions in microservices Enhance resilience and observability for microservices Audience This course is ideal for individuals seeking to become proficient in software architecture, explicitly focusing on understanding microservices architecture through real-world cases. …”
Video -
51829Publicado 2023“…Whether you're selecting your first JavaScript framework or seeking to stand out among job applicants by adding the latest technology to your resume, this book is your ultimate guide to becoming a SvelteKit master. A solid understanding of HTML, CSS, JavaScript, and Svelte is a must…”
Libro electrónico -
51830Publicado 2023“…An expert's guide to unleash your productivity potential for work and personal projects with Trello automation, advanced features, integrations, and Power-Ups Purchase of the print or Kindle book includes a free PDF eBook Key Features Uncover the secrets of Trello's core features, automation, and integrations to become a Trello power user Master Trello with practical advice, real-world examples, and workflows to improve task management Get in-depth knowledge of Trello to get it up and running within minutes and scale it for future needs Book Description Managing large projects and teams can be an immense challenge, but having an efficient project management system can make all the difference. …”
Libro electrónico -
51831Publicado 2024Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Why Data Stewardship and Why Me? -- Chapter 1: From Business Strategy to Data Strategy to Data Stewardship -- Understanding the strategic, tactical, and operational value of data stewardship -- Bridging the gap between data strategy and data operation -- Unlocking business value with data stewardship -- Understanding business strategy -- Understanding data strategy -- Operationalizing your data strategy via data stewardship -- Exploring the mindset and skillset gap -- Translating strategy into execution -- Data collection -- Data governance framework -- Analytics and reporting tools -- Tracking progress -- Decoding data governance, management, and stewardship -- Data stewards don different hats -- Summary -- Chapter 2: How Data Stewardship Can Help Your Organization -- Defining data stewardship -- The work scope of a data steward -- Understanding the role of a data steward -- Types of data stewards -- Comparing strategic data stewardship with a standard operating procedure -- Using business cases for storytelling and value realization -- Creating a competitive edge with data stewardship -- Summary -- Chapter 3: Getting Started with the Data Stewardship Program -- Defining the origin and destination of your data stewardship program -- Getting buy-in of data stewardship from stakeholders -- Building a prioritization matrix -- The impact-effort matrix -- The RICE method -- MoSCoW analysis -- Comparing different prioritization matrices -- Assessing data maturity -- Building the foundation of your data stewardship program -- Summary -- Part 2: How to Become a Data Steward and Shine! …”
Libro electrónico -
51832Publicado 2024“…Setting up new projects becomes second nature as participants explore the Blender Asset Manager, learning to store files efficiently and manage resources with precision. …”
Video -
51833Publicado 2024Tabla de Contenidos: “…Microsoft 365's Security and Compliance Center (Microsoft Purview) -- Google Workspace Admin console and security features -- Summary -- Further reading -- Part 3: Cloud Forensic Analysis - Responding to an Incident in the Cloud -- Chapter 8: The Digital Forensics and Incident Response Process -- The basics of the incident response process -- Tools and techniques for digital forensic investigations -- Prerequisites -- Cloud host forensics -- Memory forensics -- Live forensic analysis and threat hunting -- EDR-based threat hunting -- Hunting for malware -- Common persistence mechanisms -- Network forensics -- Basic networking concepts -- Cloud network forensics - log sources and tools -- Network investigation tools -- Malware investigations -- Setting up your malware analysis lab -- Working with packed malware -- Binary comparison -- Traditional forensics versus cloud forensics -- Summary -- Further reading -- Chapter 9: Common Attack Vectors and TTPs -- MITRE ATT& -- CK framework -- Forensic triage collections -- Host-based forensics -- Evidence of intrusion -- Prefetch analysis -- AmCache analysis -- ShimCache analysis -- Windows Event Logs -- Analyzing memory dumps -- Misconfigured virtual machine instances -- Unnecessary ports left open -- Default credentials left unchanged -- Outdated or unpatched software -- Publicly exposed sensitive data (or metadata) -- Misconfigured storage buckets -- Public permissions -- Exposed API keys or credentials -- Improper use of IAM policies -- Cloud administrator portal breach -- Summary -- Further reading -- Chapter 10: Cloud Evidence Acquisition -- Forensic acquisition of AWS instance -- Step 1 - creating EC2 volume snapshots -- Step 2 - acquiring OS memory images -- Step 3 - creating a forensic collector instance -- Step 4 - creating and attaching infected volume from snapshots…”
Libro electrónico -
51834Publicado 2020Tabla de Contenidos: “…Introduction -- Political spirituality -- Foucault's work and movements in 1978 and early 1979 -- Corriere Della Sera: A strange invitation -- Into the Incinerator, 16 September 1978 -- Foucault's most consequential Iran writings -- The backlash: Paris in turmoil, April 1979 -- Crucial perspectives from the Foucault scholarship, 1979-2017 -- What was there to liberate in Iran? …”
Libro electrónico -
51835Publicado 2021“…These include current and former faculty and students (ranging from academics such as Christopher Hood, Anne Phillips and Tony Travers, to graduates who have subsequently become politicians-such as Anneliese Dodds, former UK Shadow Chancellor of the Exchequer, and Kennedy Stewart and Michael Fougere, both mayors in Canada), as well as others with strong links to the Department, such as Meghnad (Baron) Desai, and Professors Tim Besley and Nick Barr. …”
Libro electrónico -
51836Publicado 2023“…The Alteryx platform allows users to access, cleanse, and integrate data from various sources, and perform statistical analysis, predictive modeling, and geospatial analysis. …”
Video -
51837Publicado 2023“…AI models like ChatGPT and DALL-E 2 are becoming increasingly sophisticated, enabling us to generate high-quality text and images at an unprecedented speed and scale. …”
Video -
51838Publicado 2023“…He looks forward to helping aspiring students on their journey to explore penetration testing, ethical hacking, and information security to become the person they would want to be, in an arguably short period of time!…”
Video -
51839Publicado 2023Tabla de Contenidos: “…CHECKLIST FOR OBTAINING A URINE SPECIMEN FROM A FOLEY CATHETER -- 21.13. CHECKLIST FOR FOLEY REMOVAL -- 21.14. …”
Libro electrónico -
51840Publicado 2024Tabla de Contenidos: “…-- A supermarket analogy -- The shift from ETL to ELT -- The difference between analytics engineers, data analysts, and data engineers -- Summary -- Chapter 2: The Modern Data Stack -- Understanding a Modern Data Stack -- Explaining three key differentiators versus legacy stacks -- Lowering technical barriers with a SQL-first approach -- Improving infrastructure efficiency with cloud-native systems -- Simplifying implementation and maintenance with managed and modular solutions -- Discussing the advantages and disadvantages of the MDS -- Summary -- Part 2: Building Data Pipelines -- Chapter 3: Data Ingestion -- Digging into the problem of moving data between two systems -- The source of all problems -- Understanding the eight essential steps of a data ingestion pipeline -- Trigger -- Connection -- State management -- Data extraction -- Transformations -- Validation and data quality -- Loading -- Archiving and retention -- Managing the quality and scalability of data ingestion pipelines - the three key topics -- Scalability and resilience -- Monitoring, logging, and alerting -- Governance -- Working with data ingestion - an example pipeline -- Summary -- Chapter 4: Data Warehousing -- Uncovering the evolution of data warehousing -- The problem with transactional databases -- The history of data warehouses -- Moving to the cloud -- Benefits of cloud versus on-premises data warehouses -- Cloud data warehouse users - no one-size fits all -- Building blocks of a cloud data warehouse -- Compute…”
Libro electrónico