Search alternatives:
"actor" » "factor", "actors", "autor"

1
by Nelson, Thomas
Published 2022
Apress
Table of Contents: ...Chapter 1: A Primer on Microsoft Orleans and the Actor Model -- Chapter 2: Introducing Microsoft...

2
by Brown, Anthony
Published 2019
Manning Publications Co.
Table of Contents: .... Storing actor state with Akka. Persistence -- 11.1. Understanding event sourcing -- 11.2. Using Akka...

3
by Skulkin, Oleg
Published 2022
Packt Publishing, Limited
... ; Interpret collected data to understand threat actor tactics, techniques, and procedures ; Understand how...

4
Published 2023
Expanding Security

5
by Bedin, Davide
Published 2020
Packt Publishing, Limited
... leveraging the actor model to foster its strengths. Find out how Dapr helps you simplify the creation...

6
by Johansson, Jesper M.
Published 2008
Microsoft Press
Table of Contents: ...Windows security fundamentals. Subjects, users, and other actors -- Authenticators...

9
by Atkinson, Brandon, Edwards, Dallas
Published 2018
Apress
Table of Contents: ... Application; Bad Actors; Pipeline as Gatekeeper; Agile Can't Die; It Was Never Born; Overview; Chapter 2...

10
by Rogers, Bobby E.
Published 2021
McGraw-Hill Education
Table of Contents: ...Zero-Day Threats -- Advanced Persistent Threats -- Threat Actors -- Nation-States -- Hacktivists...

11
by Merode, Henry van
Published 2023
Apress L. P.
Table of Contents: ... Artifact to Production -- Notify Actors -- Design Strategies -- Context Diagram -- Branching Strategy...

12
by Yehoshua, Nir, Kosayev, Uriel
Published 2021
Packt Publishing Limited
Table of Contents: ... -- Process doppelgänging -- Process injection used by threat actors -- Antivirus bypass using a DLL...

13
by Snell, James
Published 2002
O'Reilly & Associates
Table of Contents: ...; MustUnderstand Faults; Custom Faults; The SOAP Message Exchange Model; Message Paths and Actors; The SOAP Routing...

14
by Dunkerley, Dawn, Meyers, Mike
Published 2021
McGraw-Hill Education
Table of Contents: ... potential indicators associated with network attacks -- Objective 1.5 Explain different threat actors...

15
by Contos, Brian T.
Published 2006
Syngress
Table of Contents: ... Zoning and Global Positioning System Data -- o Active Lists -- o Actors -- o Data Content -- o...

16 Table of Contents: ... of Actors -- Security Trends -- Targets and Attacks -- Approaches to Computer Security -- Ethics...

17
by Muthiyalu, Bhupesh Guptha
Published 2022
Packt Publishing, Limited
... model, runtime, virtual actors, hosting, and deployment. As you advance, you'll become well-versed...

18
by Selmanaj, Drinor
Published 2024
O'Reilly Media, Inc.
... threat actors capable of harming an organization. Author Drinor Selmanaj demonstrates adversary emulation...

19
by Troncone, Paul, Albing, Carl
Published 2019
O'Reilly Media
...If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your...

20
Published 2023
Apress
... confidential company data - should be well-versed in how to protect their information from bad actors...